Search results for: concurrent computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1157

Search results for: concurrent computing

707 Effect of Nicotine on the Reinforcing Effects of Cocaine in a Nonhuman Primate Model of Drug Use

Authors: Mia I. Allen, Bernard N. Johnson, Gagan Deep, Yixin Su, Sangeeta Singth, Ashish Kumar, , Michael A. Nader

Abstract:

With no FDA-approved treatments for cocaine use disorders (CUD), research has focused on the behavioral and neuropharmacological effects of cocaine in animal models, with the goal of identifying novel interventions. While the majority of people with CUD also use tobacco/nicotine, the majority of preclinical cocaine research does not include the co-use of nicotine. The present study examined nicotine and cocaine co-use under several conditions of intravenous drug self-administration in monkeys. In Experiment 1, male rhesus monkeys (N=3) self-administered cocaine (0.001-0.1 mg/kg/injection) alone and cocaine+nicotine (0.01-0.03 mg/kg/injection) under a progressive-ratio schedule of reinforcement. When nicotine was added to cocaine, there was a significant leftward shift and significant increase in peak break point. In Experiment 2, socially housed female and male cynomolgus monkeys (N=14) self-administered cocaine under a concurrent drug-vs-food choice schedule. Combining nicotine significantly decreased cocaine choice ED50 values (i.e., shifted the cocaine dose-response curve to the left) in females but not in males. There was no evidence of social rank differences. In delay discounting studies, the co-use of nicotine and cocaine required significantly larger delays to the preferred drug reinforcer to reallocate choice compared with cocaine alone. Overall, these results suggest drug interactions of nicotine and cocaine co-use is not simply a function of potency but rather a fundamentally distinctive condition that should be utilized to better understand the neuropharmacology of CUD and the evaluation of potential treatments.

Keywords: polydrug use, animal models, nonhuman primates, behavioral pharmacology, drug self-administration

Procedia PDF Downloads 74
706 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment

Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan

Abstract:

With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.

Keywords: data sharing, cross-domain, data exchange, publish-subscribe

Procedia PDF Downloads 112
705 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 53
704 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 195
703 A BIM-Based Approach to Assess COVID-19 Risk Management Regarding Indoor Air Ventilation and Pedestrian Dynamics

Authors: T. Delval, C. Sauvage, Q. Jullien, R. Viano, T. Diallo, B. Collignan, G. Picinbono

Abstract:

In the context of the international spread of COVID-19, the Centre Scientifique et Technique du Bâtiment (CSTB) has led a joint research with the French government authorities Hauts-de-Seine department, to analyse the risk in school spaces according to their configuration, ventilation system and spatial segmentation strategy. This paper describes the main results of this joint research. A multidisciplinary team involving experts in indoor air quality/ventilation, pedestrian movements and IT domains was established to develop a COVID risk analysis tool based on Building Information Model. The work started with specific analysis on two pilot schools in order to provide for the local administration specifications to minimize the spread of the virus. Different recommendations were published to optimize/validate the use of ventilation systems and the strategy of student occupancy and student flow segmentation within the building. This COVID expertise has been digitized in order to manage a quick risk analysis on the entire building that could be used by the public administration through an easy user interface implemented in a free BIM Management software. One of the most interesting results is to enable a dynamic comparison of different ventilation system scenarios and space occupation strategy inside the BIM model. This concurrent engineering approach provides users with the optimal solution according to both ventilation and pedestrian flow expertise.

Keywords: BIM, knowledge management, system expert, risk management, indoor ventilation, pedestrian movement, integrated design

Procedia PDF Downloads 88
702 Assessment of Phytoremediation of Pb-Anthracene Co-Contaminated Soils Using Vetiveira zizanioides, Heianthus annuus L., Zea mays and Glycine max

Authors: O. U. Nwosu, C. O. Osuagwu, N. Nnawugwu, C. T. Amanze

Abstract:

Phytoremediation is a green and sustainable approach to decontaminate and restore contaminated sites while maintaining the biological activity and physical structure of soils. A pot experiment was conducted for a period of 70 days to evaluate the remediation potentials of Vetiveira zizanioides, Heianthus annuus L., Zea mays, and Glycine max in concurrent removal of anthracene and Pb in co-contaminated soil. Sandy loam soils were polluted with Pb chloride salt and anthracene at three different levels (50mg/kg of Pb, 100mg/kg of Pb, and 100mg/kg of Pb+100mg/kg of anthracene) and laid out in a completely randomized design with three replicates. Shoot dry matter weight was significantly reduced (p≤0.05) in comparison to control treatments by 33%, 32%, 40%, and 6.7% when exposed to 100mg kg⁻¹ of Pb, respectively in G.max, H.annuus, Z.mays, and vetiver. There was 42%, 41%, 48%, and 7.1% growth inhibition of shoot dry matter weight of G.max, H.annuus, Z.mays, and vetiver relative to control treatments when 100 mg Pb kg⁻¹ was mixed with 100 mgkg⁻¹ anthracene. Root and shoot metal concentration in G.max, H.annuus, Z.mays, and vetiver increased with increasing concentration of Pb. Translocation factor (TF < 1) obtained for G.max, Z.mays, and vetiver suggests that these plant species predominantly retain Pb in the root portion, while the TF value (TF≥1) obtained for H.annuus suggests that it predominantly retains Pb in the shoot portion. The extractable anthracene decreased significantly (p ≤ 0.05) in soil planted with G.max, H.annuus, Z.mays, and vetiver, as well as in pots without plants. This accounted for 53% to 71% of anthracene dissipation in planted soil and 40% dissipation in unplanted soil. This result suggested that the plant species used are a promising candidate for phytoremediation.

Keywords: phytoremediation, heavy metals, polyaromatic hydrocarbon, co-contaminated soil

Procedia PDF Downloads 102
701 Interspecific Competition among Three Fruit Fly Species Infesting Watermelon and Zucchini (Cucurbitaceae)

Authors: Gbenonsi A. Fabrice, Mama Sambo Sahadatou, Layode B. F. Rodolphe, Totin A. Felicien, Onzo Alexis, Karlsson M. Frida

Abstract:

Interspecific competition occurs among arthropod pest species that share hosts, thereby influencing their population dynamics. In sub-Saharan Africa, the native fruit fly species Dacus vertebratus (Bezzi) and Dacus ciliatus (Loew) (Diptera: Tephritidae) and the exotic Zeugodacus cucurbitae (Coquillett) are concurrent pests in the same host fruits; hence competition among them is likely to occur. We explored interspecific competition among these three fruit fly species on zucchini (Cucurbita pepo L.) and watermelon (Citrullus lanatus Thunb) (Cucurbitaceae) to improve our understanding of the interaction between the species and their capacity to coexist. We exposed the vegetable fruits to different densities of fruit fly species and studied their behavioural activities, evaluating the extrinsic competition. To assess intrinsic competition and understand the effect of co-occurrence inside the fruits, eggs of the three fruit flies were pairwise inoculated into the same fruits. Results showed that the behaviour on the fruits differed between the species and that the interspecific competition affected their developmental time and larval survival in both watermelon and zucchini. Z. cucurbitae were more aggressive than the other species and managed to oviposit more frequently. Emergence was reduced for D. ciliatus and D. vertebratus when inoculated together with Z. cucurbitae in watermelon but not in zucchini. Physical confrontations were more common in zucchini than in watermelon and were more frequently won by Z. cucurbitae than D. vertebratus and D. ciliatus. Interspecific competition information obtained about behavioural differences and interaction effects, providing background for explaining the present fruit fly guild on certain Cucurbitaceae fruits in West Africa.

Keywords: behavioural activities, extrinsic competition, intrinsic competition, Tephritidae

Procedia PDF Downloads 128
700 Impact of Lobular Carcinoma in situ on Local Recurrence in Breast Cancer Treated with Breast Conservation Therapy: A Systematic Review and Meta-Analysis

Authors: Christopher G. Harris, Guy D. Eslick

Abstract:

Purpose: Lobular carcinoma in situ (LCIS) is a known risk factor for breast cancer of unclear significance when detected in association with invasive carcinoma. This meta-analysis aims to determine the impact of LCIS on local recurrence risk for individuals with breast cancer treated with breast conservation therapy to help guide appropriate treatment strategies. Methods: We identified relevant studies from five electronic databases. Studies were deemed suitable for inclusion where they compared patients with invasive breast cancer and concurrent LCIS to those with breast cancer alone, all patients underwent breast conservation therapy (lumpectomy with adjuvant radiation therapy), and local recurrence was evaluated. Recurrence data were pooled by use of a random effects model. Results: From 1488 citations screened by our search, 8 studies were deemed suitable for inclusion. These studies comprised of 908 cases and 10638 controls. Median follow-up time was 90 months. There was a significantly increased overall risk of local breast cancer recurrence for individuals with LCIS in association with breast cancer following breast conservation therapy [pOR 1.87; 95% CI 1.14-3.04; p = 0.012]. The risk of local recurrence was non-significantly increased at 5 [pOR 1.09; 95% CI 0.48-2.48; p = 0.828] and 10 years [pOR 1.90; 95% CI 0.89-4.06; p = 0.096]. Conclusions: Individuals with LCIS in association with invasive breast cancer have an increased risk of local recurrence following breast conservation therapy. This supports consideration of aggressive local control of LCIS by way of completion mastectomy or re-excision for certain high-risk patients.

Keywords: breast cancer, breast conservation therapy, lobular carcinoma in situ, lobular neoplasia, local recurrence, meta-analysis

Procedia PDF Downloads 140
699 Understanding Student Engagement through Sentiment Analytics of Response Times to Electronically Shared Feedback

Authors: Yaxin Bi, Peter Nicholl

Abstract:

The rapid advancement of Information and communication technologies (ICT) is extremely influencing every aspect of Higher Education. It has transformed traditional teaching, learning, assessment and feedback into a new era of Digital Education. This also introduces many challenges in capturing and understanding student engagement with their studies in Higher Education. The School of Computing at Ulster University has developed a Feedback And Notification (FAN) Online tool that has been used to send students links to personalized feedback on their submitted assessments and record students’ frequency of review of the shared feedback as well as the speed of collection. The feedback that the students initially receive is via a personal email directing them through to the feedback via a URL link that maps to the feedback created by the academic marker. This feedback is typically a Word or PDF report including comments and the final mark for the work submitted approximately three weeks before. When the student clicks on the link, the student’s personal feedback is viewable in the browser and they can view the contents. The FAN tool provides the academic marker with a report that includes when and how often a student viewed the feedback via the link. This paper presents an investigation into student engagement through analyzing the interaction timestamps and frequency of review by the student. We have proposed an approach to modeling interaction timestamps and use sentiment classification techniques to analyze the data collected over the last five years for a set of modules. The data studied is across a number of final years and second-year modules in the School of Computing. The paper presents the details of quantitative analysis methods and describes further their interactions with the feedback overtime on each module studied. We have projected the students into different groups of engagement based on sentiment analysis results and then provide a suggestion of early targeted intervention for the set of students seen to be under-performing via our proposed model.

Keywords: feedback, engagement, interaction modelling, sentiment analysis

Procedia PDF Downloads 85
698 Comparison of Mini-BESTest versus Berg Balance Scale to Evaluate Balance Disorders in Parkinson's Disease

Authors: R. Harihara Prakash, Shweta R. Parikh, Sangna S. Sheth

Abstract:

The purpose of this study was to explore the usefulness of the Mini-BESTest compared to the Berg Balance Scale in evaluating balance in people with Parkinson's Disease (PD) of varying severity. Evaluation were done to obtain (1) the distribution of patients scores to look for ceiling effects, (2) concurrent validity with severity of disease, and (3) the sensitivity & specificity of separating people with or without postural response deficits. Methods and Material: Seventy-seven(77) people with Parkinson's Disease were tested for balance deficits using the Berg Balance Scale, Mini-BESTest. Unified Parkinson’s Disease Rating Scale (UPDRS) III and the Hoehn & Yahr (H&Y) disease severity scales were used for classification. Materials used in this study were case record sheet, chair without arm rests or wheels, Incline ramp, stopwatch, a box, 3 meter distance measured out and marked on the floor with tape [from chair]. Statistical analysis used: Multiple Linear regression was carried out of UPDRS jointly on the two scores for the Berg and Mini-BESTest. Receiver operating characteristic curves for classifying people into two groups based on a threshold for the H&Y score, to discriminate between mild PD versus more severe PD.Correlation co-efficient to find relativeness between the two variables. Results: The Mini-BESTest is highly correlated with the Berg (r = 0.732,P < 0.001), but avoids the ceiling compression effect of the Berg for mild PD (skewness −0.714 Berg, −0.512 Mini-BESTest). Consequently, the Mini-BESTest is more effective than the Berg for predicting UPDRS Motor score (P < 0.001 Mini-BESTest versus P = 0.72 Berg), and for discriminating between those with and without postural response deficits as measured by the H&Y (ROC).

Keywords: balance, berg balance scale, MINI BESTest, parkinson's disease

Procedia PDF Downloads 375
697 Increasing Employee Productivity and Work Well-Being by Employing Affective Decision Support and a Knowledge-Based System

Authors: Loreta Kaklauskiene, Arturas Kaklauskas

Abstract:

This employee productivity and work well-being effective system aims to maximise the work performance of personnel and boost well-being in offices. Affective computing, decision support, and knowledge-based systems were used in our research. The basis of this effective system is our European Patent application (No: EP 4 020 134 A1) and two Lithuanian patents (LT 6841, LT 6866). Our study examines ways to support efficient employee productivity and well-being by employing mass-customised, personalised office environment. Efficient employee performance and well-being are managed by changing mass-customised office environment factors such as air pollution levels, humidity, temperature, data, information, knowledge, activities, lighting colours and intensity, scents, media, games, videos, music, and vibrations. These aspects of management generate a customised, adaptive environment for users taking into account their emotional, affective, and physiological (MAP) states measured and fed into the system. This research aims to develop an innovative method and system which would analyse, customise and manage a personalised office environment according to a specific user’s MAP states in a cohesive manner. Various values of work spaces (e.g., employee utilitarian, hedonic, perceived values) are also established throughout this process, based on the measurements that describe MAP states and other aspects related to the office environment. The main contribution of our research is the development of a real-time mass-customised office environment to boost employee performance and well-being. Acknowledgment: This work was supported by Project No. 2020-1-LT01-KA203-078100 “Minimizing the influence of coronavirus in a built environment” (MICROBE) from the European Union’s Erasmus + program.

Keywords: effective decision support and a knowledge-based system, human resource management, employee productivity and work well-being, affective computing

Procedia PDF Downloads 82
696 Temporal Focus Scale: Examination of the Reliability and Validity in Japanese Adolescents and Young Adults

Authors: Yuta Chishima, Tatsuya Murakami, Michael McKay

Abstract:

Temporal focus is described as one component of an individual’s time perspective and defined as the attention individuals devote to thinking about the past, present, and future. It affects how people incorporate perceptions about past experiences, current situations, and future expectations into their attitudes, cognitions, and behavior. The 12-item Temporal Focus Scale (TFS) is comprised of three-factors (past, current and future focus). The purpose of this study was to examine the reliability and validity of TFS scores in Japanese adolescents and young adults. The TFS was translated into Japanese by a professional translator, and the original author confirmed the back translated items. Study 1 involved 979 Japanese university students aged 18-25 years old in a questionnaire-based study. The hypothesized three-factor structure (with reliability) was confirmed, although there were problems with item 10. Internal consistency estimates for scores without item 10 were over .70, and test-retest reliability was also adequate. To verify the concurrent and convergent validity, we tested the relationship between TFS scores and life satisfaction, time perspective, self-esteem, and career efficacy. Results of correlational analyses supported our hypotheses. Specifically, future focus was strongly correlated to career efficacy, while past and current focus was not. Study 2 involved 1030 Japanese junior and junior high school students aged 12-18 years old in a questionnaire-based study, and results of multigroup analyses supported the age invariance of the TFS.

Keywords: Japanese, reliability, scale, temporal focus, validity

Procedia PDF Downloads 331
695 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 94
694 Development of the New York Misophonia Scale: Implications for Diagnostic Criteria

Authors: Usha Barahmand, Maria Stalias, Abdul Haq, Esther Rotlevi, Ying Xiang

Abstract:

Misophonia is a condition in which specific repetitive oral, nasal, or other sounds and movements made by humans trigger impulsive aversive reactions of irritation or disgust that instantly become anger. A few measures exist for the assessment of misophonia, but each has some limitations, and evidence for a formal diagnosis is still lacking. The objective of this study was to develop a reliable and valid measure of misophonia for use in the general population. Adopting a purely descriptive approach, this study focused on developing a self-report measure using all triggers and reactions identified in previous studies on misophonia. A measure with two subscales, one assessing the aversive quality of various triggers and the other assessing reactions of individuals, was developed. Data were gathered from a large sample of both men and women ranging in age from 18 to 65 years. Exploratory factor analysis revealed three main triggers: oral/nasal sounds, hand and leg movements, and environmental sounds. Two clusters of reactions also emerged: nonangry attempts to avoid the impact of the aversive stimuli and angry attempts to stop the aversive stimuli. The examination of the psychometric properties of the scale revealed its internal consistency and test-retest reliability to be excellent. The scale was also found to have very good concurrent and convergent validity. Significant annoyance and disgust in response to the triggers were reported by 12% of the sample, although for some specific triggers, rates as high as 31% were also reported. These findings have implications for the delineation of the criteria for identifying misophonia as a clinical condition.

Keywords: adults, factor analysis, misophonia, psychometric properties, scale

Procedia PDF Downloads 177
693 Quality of Life and Renal Biomarkers in Feline Chronic Kidney Disease

Authors: Bárbara Durão, Pedro Almeida, David Ramilo, André Meneses, Rute Canejo-Teixeira

Abstract:

The importance of quality of life (QoL) assessment in veterinary medicine is an integral part of patient care. This is especially true in cases of chronic diseases, such as chronic kidney disease (CKD), where the ever more advanced treatment options prolong the patient’s life. Whether this prolongment of life comes with an acceptable quality of life remains has been called into question. The aim of this study was to evaluate the relationship between CKD disease biomarkers and QoL in cats. Thirty-seven cats diagnosed with CKD and with no known concurrent illness were enrolled in an observational study. Through the course of several evaluations, renal biomarkers were assessed in blood and urine samples, and owners retrospectively described their cat’s quality of life using a validated instrument for this disease. Correlations between QoL scores (AWIS) and the biomarkers were assessed using Spearman’s rank test. Statistical significance was set at p-value < 0.05, and every serial sample was considered independent. Thirty-seven cats met the inclusion criteria, and all owners completed the questionnaire every time their pet was evaluated, giving a total of eighty-four questionnaires, and the average-weighted-impact-score was –0.5. Results showed there was a statistically significant correlation between the quality of life and most of 17 the studied biomarkers and confirmed that CKD has a negative impact on QoL in cats especially due to the management of the disease and secondary appetite disorders. To our knowledge, this is the attempt to assess the correlation between renal biomarkers and QoL in cats. Our results reveal a strong potential of this type of approach in clinical management, mainly in situations where it is not possible to measure biomarkers. Whilst health-related QoL is a reliable predictor of mortality and morbidity in humans; our findings can help improve the clinical practice in cats with CKD.

Keywords: chronic kidney disease, biomarkers, quality of life, feline

Procedia PDF Downloads 158
692 Local Availability Influences Choice of Radical Treatment for Prostate Cancer

Authors: Jemini Vyas, Oluwatobi Adeyoe, Jenny Branagan, Chandran Tanabalan, Aakash Pai

Abstract:

Introduction: Radical prostatectomy and radiotherapy are both viable options for the treatment of localised prostate cancer. Over the years medicine has evolved towards a patient-centred approach. Patient decision-making is not motivated by clinical outcomes alone. Geographical location and ease of access to treating clinician are contributory factors. With the development of robotic surgery, prostatectomy has been centralised into tertiary centres. This has impacted on the distances that patients and their families are expected to travel. Methods: A single centre retrospective study was undertaken over a five-year period. All patients with localised prostate cancer, undergoing radical radiotherapy or prostatectomy were collected pre-centralisation. This was compared to the total number undergoing these treatments post centralisation. Results: Pre-centralisation, both radiotherapy and prostatectomy groups had to travel a median of less than five miles for treatment. Post-centralisation of pelvic surgery, prostatectomy patients had to travel a median of more than 40 miles, whilst travel distance for the radiotherapy group was unchanged. In the post centralisation cohort, there was a 63% decline in the number of patients undergoing radical prostatectomy per month from a mean of 5.1 to 1.9. The radical radiotherapy group had a concurrent 41% increase in patient numbers with a mean increase from 13.3 to 18.8 patients per month. Conclusion: Choice of radical treatment in localised prostate cancer is based on multiple factors. This study infers that local availability can influence choice of radical treatment. It is imperative that efforts are made to maintain accessibility to all viable options for prostate cancer patients, so that patient choice is not compromised.

Keywords: prostate, prostatectomy, radiotherapy, centralisation

Procedia PDF Downloads 80
691 Effect of Threshold Configuration on Accuracy in Upper Airway Analysis Using Cone Beam Computed Tomography

Authors: Saba Fahham, Supak Ngamsom, Suchaya Damrongsri

Abstract:

Objective: The objective is to determine the optimal threshold of Romexis software for the airway volume and minimum cross-section area (MCA) analysis using Image J as a gold standard. Materials and Methods: A total of ten cone-beam computed tomography (CBCT) images were collected. The airway volume and MCA of each patient were analyzed using the automatic airway segmentation function in the CBCT DICOM viewer (Romexis). Airway volume and MCA measurements were conducted on each CBCT sagittal view with fifteen different threshold values from the Romexis software, Ranging from 300 to 1000. Duplicate DICOM files, in axial view, were imported into Image J for concurrent airway volume and MCA analysis as the gold standard. The airway volume and MCA measured from Romexis and Image J were compared using a t-test with Bonferroni correction, and statistical significance was set at p<0.003. Results: Concerning airway volume, thresholds of 600 to 850 as well as 1000, exhibited results that were not significantly distinct from those obtained through Image J. Regarding MCA, employing thresholds from 400 to 850 within Romexis Viewer showed no variance from Image J. Notably, within the threshold range of 600 to 850, there were no statistically significant differences observed in both airway volume and MCA analyses, in comparison to Image J. Conclusion: This study demonstrated that the utilization of Planmeca Romexis Viewer 6.4.3.3 within threshold range of 600 to 850 yields airway volume and MCA measurements that exhibit no statistically significant variance in comparison to measurements obtained through Image J. This outcome holds implications for diagnosing upper airway obstructions and post-orthodontic surgical monitoring.

Keywords: airway analysis, airway segmentation, cone beam computed tomography, threshold

Procedia PDF Downloads 24
690 Carbohydrate-Based Recommendations as a Basis for Dietary Guidelines

Authors: A. E. Buyken, D. J. Mela, P. Dussort, I. T. Johnson, I. A. Macdonald, A. Piekarz, J. D. Stowell, F. Brouns

Abstract:

Recently a number of renewed dietary guidelines have been published by various health authorities. The aim of the present work was 1) to review the processes (systematic approach/review, inclusion of public consultation) and methodological approaches used to identify and select the underpinning evidence base for the established recommendations for total carbohydrate (CHO), fiber and sugar consumption, and 2) examine how differences in the methods and processes applied may have influenced the final recommendations. A search of WHO, US, Canada, Australia and European sources identified 13 authoritative dietary guidelines with the desired detailed information. Each of these guidelines was evaluated for its scientific basis (types and grading of the evidence) and the processes by which the guidelines were developed Based on the data retrieved the following conclusions can be drawn: 1) Generally, a relatively high total CHO and fiber intake and limited intake of sugars (added or free) is recommended. 2) Even where recommendations are quite similar, the specific, justifications for quantitative/qualitative recommendations differ across authorities. 3) Differences appear to be due to inconsistencies in underlying definitions of CHO exposure and in the concurrent appraisal of CHO-providing foods and nutrients as well the choice and number of health outcomes selected for the evidence appraisal. 4) Differences in the selected articles, time frames or data aggregation method appeared to be of rather minor influence. From this assessment, the main recommendations are for: 1) more explicit quantitative justifications for numerical guidelines and communication of uncertainty; and 2) greater international harmonization, particularly with regard to underlying definitions of exposures and range of relevant nutrition-related outcomes.

Keywords: carbohydrates, dietary fibres, dietary guidelines, recommendations, sugars

Procedia PDF Downloads 241
689 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks

Authors: Ahmed Abdullah Ahmed

Abstract:

The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.

Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments

Procedia PDF Downloads 495
688 Knowledge, Attitude and Practice of Pregnant Women toward Antenatal Care at Public Hospitals in Sana'a City-Yemen

Authors: Abdulfatah Al-Jaradi, Marzoq Ali Odhah, Abdulnasser A. Haza’a

Abstract:

Background: Antenatal care can be defined as the care provided by skilled healthcare professionals to pregnant women and adolescent girls to ensure the best health conditions for both mother and baby during pregnancy. The components of ANC include risk identification; prevention and management of pregnancy-related or concurrent diseases; and health education and health promotion. The aim of this study: to assess the knowledge, attitude, and practice of pregnant women regarding antenatal care. Methodology: A descriptive KAP study was conducting in public hospitals in Sana'a City-Yemen. The study population was included all pregnant women that intended to the prenatal department and clinical outpatient department, the final sample size was 371 pregnant women, a self-administered questionnaire was used to collect the data, statistical package for social sciences SPSS was used to data analysis. The results: Most (79%) of pregnant women were had correct answers in total knowledge regarding antenatal care, and about two-thirds (67%) of pregnant women were had performance practice regarding antenatal care and two-third (68%) of pregnant women were had a positive attitude. Conclusions & Recommendations: We concluded that a significant association between overall knowledge and practice level toward antenatal care and demographic characteristics of pregnant women, women (residence place, level of education, did your husband support you in attending antenatal care and place of delivery of the last baby), at (P-value ≤ 0.05). We recommended more education and training courses, lecturers and education sessions in clinical facilitators focused ANC, which relies on evidence-based interventions provided to women during pregnancy by skilled healthcare providers such as midwives, doctors, and nurses.

Keywords: antenatal care, knowledge, practice, attitude, pregnant women

Procedia PDF Downloads 162
687 Built Environment and Deprived Children: Environmental Perceptions of the Urban Slum Cohort in Pune, India

Authors: Hrishikesh Purandare, Ashwini Pethe

Abstract:

Research from developed countries has demonstrated that the built environment can have a significant effect on children’s cognitive and socio-emotional development. A majority of the studies on the relationship between the built environment and the well-being of children have been conducted in North America and Western Europe, though most of the world’s children live in the global South. Millions of children living in urban slums in India confront issues associated with poor living conditions and lack of access to basic services. It is a well-known fact that slums are places of extreme poverty, substandard housing, overcrowding, and poor sanitation. These challenges faced by children living in slums can have a significant impact on their physical, psychological, and social development. Despite the magnitude of the problem, the area of research, particularly on the impact of the built environment of slums on children and adolescent well-being, has been understudied in India. Only a few studies in the global South have investigated the impact of the built environment on children’s well-being. Apart from issues of the limited access to health and education of these children, the perception of children regarding the built environment which they inhabit is rarely addressed. A sample of 120 children living in the slums of Pune city between the ages 7 and 16 participated in this study, which employed a concurrent embedded approach of mixed method research. Questionnaires were administered to obtain quantitative data that included attributes of crowding, noise, privacy, territoriality and housing quality in the built environment. The qualitative analysis of children’s sketches highlighted aspects of the built environment with which they associated themselves the most. The study sought to examine the perception of the deprived children living in the urban slums in the city of Pune (India) towards their built environment.

Keywords: physical environment, poverty, underprivileged children, urban Indian slums

Procedia PDF Downloads 71
686 Concurrent Micronutrient Deficiencies in Lactating Mothers and Their Infants 6-23 Months of Age in Two Agro-Ecological Zones of Rural Ethiopia

Authors: Kedir Teji Roba, Thomas P. O’Connor, Tefera Belachew, Nora M. O’Brien

Abstract:

Micronutrient deficiencies of ferritin, zinc and haemoglobin are prevalent among the mothers and their infants in developing countries. But little attention has been given to these vulnerable groups. No study has been done on co-existence of the deficiencies among lactating mothers and their breast feeding infants in two different agro-ecological zones of rural Ethiopia. Methods: Data were collected from 162 lactating mothers and their breast feeding infants (aged 6-23 months) who were living in two different agro-ecological zones. The data were collected via a structured interview, anthropometric measurements, and blood test for Zinc, ferritin and anaemia. Correlation and Chi square test were used to determine the association among nutritional status and agro ecological zones. Results: Iron deficiency was found in 44.4% of the infants and 19.8% of the mothers. Zinc deficiency was found in 72.2% of the infants and 67.3% of the mothers. Of the study subject 52.5% of the infants and 19.1% of the mothers were anaemic, and 29.6% of the infants and 10.5% of the mothers had iron deficiency anaemia. Among the mothers with iron deficiency, 81.2% and 56.2% of their children were deficient in zinc and iron respectively. Similarly, among the zinc deficient mothers, 75.2% and 45.3% of their children were deficient in zinc and iron. There was a strong correlation between the micronutrient status of the mothers and the infants on status of ferritin, zinc and anaemia (P < 0.001). There is also statistically significant association between micronutrient deficiency and agro-ecological zones among the mothers (p < 0.001) but not with their infants. Deficiency in one, two, or three, micronutrients was observed in 48.1%, 16.7% and 9.9% of the mothers and 35.8%, 29.0%, and 23.5%, of their infants respectively. Conclusion: This study shows that iron and zinc deficiencies are the prevalent micronutrient deficiencies among the lactating mothers and their infants, with variation of the magnitude across the agro-ecological zones. This finding calls for a need to design effective preventive public health nutrition programs to address both the mothers’ and their infants’ needs.

Keywords: ferritin/iron, zinc, anaemia, agroecology, malnutrition

Procedia PDF Downloads 472
685 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 383
684 The Role of Mass Sport Guidance in the Health Service Industry of China

Authors: Qiu Jian-Rong, Li Qing-Hui, Zhan Dong, Zhang Lei

Abstract:

Facing the problem of the demand of economic restructuring and risk of social economy stagnation due to the ageing of population, the Health Service Industry will play a very important role in the structure of industry in the future. During the process, the orient of Chinese sports medicine as well as the joint with preventive medicine, and the integration with data bank and cloud computing will be involved.

Keywords: China, the health service industry, mass sport, data bank

Procedia PDF Downloads 609
683 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 361
682 Design, Synthesis and Pharmacological Investigation of Novel 2-Phenazinamine Derivatives as a Mutant BCR-ABL (T315I) Inhibitor

Authors: Gajanan M. Sonwane

Abstract:

Nowadays, the entire pharmaceutical industry is facing the challenge of increasing efficiency and innovation. The major hurdles are the growing cost of research and development and a concurrent stagnating number of new chemical entities (NCEs). Hence, the challenge is to select the most druggable targets and to search the equivalent drug-like compounds, which also possess specific pharmacokinetic and toxicological properties that allow them to be developed as drugs. The present research work includes the studies of developing new anticancer heterocycles by using molecular modeling techniques. The heterocycles synthesized through such methodology are much effective as various physicochemical parameters have been already studied and the structure has been optimized for its best fit in the receptor. Hence, on the basis of the literature survey and considering the need to develop newer anticancer agents, new phenazinamine derivatives were designed by subjecting the nucleus to molecular modeling, viz., GQSAR analysis and docking studies. Simultaneously, these designed derivatives were subjected to in silico prediction of biological activity through PASS studies and then in silico toxicity risk assessment studies. In PASS studies, it was found that all the derivatives exhibited a good spectrum of biological activities confirming its anticancer potential. The toxicity risk assessment studies revealed that all the derivatives obey Lipinski’s rule. Amongst these series, compounds 4c, 5b and 6c were found to possess logP and drug-likeness values comparable with the standard Imatinib (used for anticancer activity studies) and also with the standard drug methotrexate (used for antimitotic activity studies). One of the most notable mutations is the threonine to isoleucine mutation at codon 315 (T315I), which is known to be resistant to all currently available TKI. Enzyme assay planned for confirmation of target selective activity.

Keywords: drug design, tyrosine kinases, anticancer, Phenazinamine

Procedia PDF Downloads 94
681 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University

Authors: Kafeero Frank

Abstract:

This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industry

Keywords: open source software., organisational characteristics, external characteristics, cloud computing adoption

Procedia PDF Downloads 50
680 Retrospective Study on the Prognosis of Patients with New-Onset Atrial Fibrillation to Evaluate the Risk of Developing Occult Cancer in Absence of Concurrent Chronic Inflammatory Disease

Authors: Helen Huang, Francisco Javier Quesada Ocet, Blanca Quesada Oce, Javier Jimenez Bello, Victor Palanca Gil, Alba Cervero Rubio, Ana Paya Chaume, Alejandro Herreros-Pomares, Fernando Vidal-Vanaclocha, Rafael Paya Serrano, Aurelio Quesada Dorador, Monica Soliman

Abstract:

Background: Cancer favors both the pro-inflammatory state and autonomic dysfunction, two important mechanisms in the genesis of AF. Atrial remodeling might be caused as a result of paraneoplastic conditions or the result of direct expression of neoplasia. Here, we hypothesize that cancer, through inflammatory mediators, may favor the appearance of AF and patients with the first episode of AF could have a higher risk of developing cancer. Method: Data was collected from patients who attended the emergency department of our hospital for the first episode of AF, diagnosed electrocardiographically, between 2010-2015 (n = 712). The minimum follow-up was 2 years, recording the appearance of cancer, total mortality, recurrences of AF and other events. Patients who developed cancer and those who did not during the 2 years after the onset of AF were compared, as well as with the incidence of cancer in Spain in 2012. Results: After 2 years, 35 patients (4.91%) were diagnosed with cancer, with an annual incidence of 2.45%. Hematological neoplasms were the most frequent (34.28%). The cancer group was older (76.68 +/-12.75 years vs 74.16 +/-12.71; p <0.05) and had fewer typical symptoms (palpitations) (33.38% vs 14.28% , p <0.05). The incidence of cancer in Spain during 2012 was 0.46%, much lower than our sample. When comparing the incidence by age, these differences were maintained both in those over 65 years of age and in those under 65 years of age (2.17% vs. 0.28%; 0.28% vs. 0.18% respectively). Discussion: Therefore, a high incidence of cancer in patients with the first episode of AF was observed (the annual incidence of 2.45% after the onset of AF is 6.1 times that of the general population). After the evaluation of patients with AF in their first detected episode, surveillance of the appearance of cancer should be considered in clinical practice.

Keywords: cancer, cardiovascular outcomes, atrial fibrillation, inflammation

Procedia PDF Downloads 128
679 A Survey on Constraint Solving Approaches Using Parallel Architectures

Authors: Nebras Gharbi, Itebeddine Ghorbel

Abstract:

In the latest years and with the advancements of the multicore computing world, the constraint programming community tried to benefit from the capacity of new machines and make the best use of them through several parallel schemes for constraint solving. In this paper, we propose a survey of the different proposed approaches to solve Constraint Satisfaction Problems using parallel architectures. These approaches use in a different way a parallel architecture: the problem itself could be solved differently by several solvers or could be split over solvers.

Keywords: constraint programming, parallel programming, constraint satisfaction problem, speed-up

Procedia PDF Downloads 301
678 Discerning Divergent Nodes in Social Networks

Authors: Mehran Asadi, Afrand Agah

Abstract:

In data mining, partitioning is used as a fundamental tool for classification. With the help of partitioning, we study the structure of data, which allows us to envision decision rules, which can be applied to classification trees. In this research, we used online social network dataset and all of its attributes (e.g., Node features, labels, etc.) to determine what constitutes an above average chance of being a divergent node. We used the R statistical computing language to conduct the analyses in this report. The data were found on the UC Irvine Machine Learning Repository. This research introduces the basic concepts of classification in online social networks. In this work, we utilize overfitting and describe different approaches for evaluation and performance comparison of different classification methods. In classification, the main objective is to categorize different items and assign them into different groups based on their properties and similarities. In data mining, recursive partitioning is being utilized to probe the structure of a data set, which allow us to envision decision rules and apply them to classify data into several groups. Estimating densities is hard, especially in high dimensions, with limited data. Of course, we do not know the densities, but we could estimate them using classical techniques. First, we calculated the correlation matrix of the dataset to see if any predictors are highly correlated with one another. By calculating the correlation coefficients for the predictor variables, we see that density is strongly correlated with transitivity. We initialized a data frame to easily compare the quality of the result classification methods and utilized decision trees (with k-fold cross validation to prune the tree). The method performed on this dataset is decision trees. Decision tree is a non-parametric classification method, which uses a set of rules to predict that each observation belongs to the most commonly occurring class label of the training data. Our method aggregates many decision trees to create an optimized model that is not susceptible to overfitting. When using a decision tree, however, it is important to use cross-validation to prune the tree in order to narrow it down to the most important variables.

Keywords: online social networks, data mining, social cloud computing, interaction and collaboration

Procedia PDF Downloads 131