Search results for: closed-set tex-independent speaker identification system (CISI)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19936

Search results for: closed-set tex-independent speaker identification system (CISI)

19426 Internet of Things Based Process Model for Smart Parking System

Authors: Amjaad Alsalamah, Liyakathunsia Syed

Abstract:

Transportation is an essential need for many people to go to their work, school, and home. In particular, the main common method inside many cities is to drive the car. Driving a car can be an easy job to reach the destination and load all stuff in a reasonable time. However, deciding to find a parking lot for a car can take a long time using the traditional system that can issue a paper ticket for each customer. The old system cannot guarantee a parking lot for all customers. Also, payment methods are not always available, and many customers struggled to find their car among a numerous number of cars. As a result, this research focuses on providing an online smart parking system in order to save time and budget. This system provides a flexible management system for both parking owner and customers by receiving all request via the online system and it gets an accurate result for all available parking and its location.

Keywords: smart parking system, IoT, tracking system, process model, cost, time

Procedia PDF Downloads 336
19425 Identification of a Lead Compound for Selective Inhibition of Nav1.7 to Treat Chronic Pain

Authors: Sharat Chandra, Zilong Wang, Ru-Rong Ji, Andrey Bortsov

Abstract:

Chronic pain (CP) therapeutic approaches have limited efficacy. As a result, doctors are prescribing opioids for chronic pain, leading to opioid overuse, abuse, and addiction epidemic. Therefore, the development of effective and safe CP drugs remains an unmet medical need. Voltage-gated sodium (Nav) channels act as cardiovascular and neurological disorder’s molecular targets. Nav channels selective inhibitors are hard to design because there are nine closely-related isoforms (Nav1.1-1.9) that share the protein sequence segments. We are targeting the Nav1.7 found in the peripheral nervous system and engaged in the perception of pain. The objective of this project was to screen a 1.5 million compound library for identification of inhibitors for Nav1.7 with analgesic effect. In this study, we designed a protocol for identification of isoform-selective inhibitors of Nav1.7, by utilizing the prior information on isoform-selective antagonists. First, a similarity search was performed; then the identified hits were docked into a binding site on the fourth voltage-sensor domain (VSD4) of Nav1.7. We used the FTrees tool for similarity searching and library generation; the generated library was docked in the VSD4 domain binding site using FlexX and compounds were shortlisted using a FlexX score and SeeSAR hyde scoring. Finally, the top 25 compounds were tested with molecular dynamics simulation (MDS). We reduced our list to 9 compounds based on the MDS root mean square deviation plot and obtained them from a vendor for in vitro and in vivo validation. Whole-cell patch-clamp recordings in HEK-293 cells and dorsal root ganglion neurons were conducted. We used patch pipettes to record transient Na⁺ currents. One of the compounds reduced the peak sodium currents in Nav1.7-HEK-293 stable cell line in a dose-dependent manner, with IC50 values at 0.74 µM. In summary, our computer-aided analgesic discovery approach allowed us to develop pre-clinical analgesic candidate with significant reduction of time and cost.

Keywords: chronic pain, voltage-gated sodium channel, isoform-selective antagonist, similarity search, virtual screening, analgesics development

Procedia PDF Downloads 124
19424 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 256
19423 Age and Sex Identification among Egyptian Population Using Fingerprint Ridge Density

Authors: Nazih Ramadan, Manal Mohy-Eldine, Amani Hanoon, Alaa Shehab

Abstract:

Background and Aims: The study of fingerprints is widely used in providing a clue regarding identity. Age and gender identification from fingerprints is an important step in forensic anthropology in order to minimize the list of suspects search. The aim of this study was to determine finger ridge density and patterns among Egyptians, and to estimate age and gender using ridge densities. Materials and Methods: This study was conducted on 177 randomly-selected healthy Egyptian subjects (90 males and 87 females). They were divided into three age groups; Group (a): from 6-< 12 years, group (b) from 12-< 18 years and group (c) ≥ 18 years. Bilateral digital prints, from every subject, were obtained by the inking procedure. Ridge count per 25 mm² was determined together with assessment of ridge pattern type. Statistical analysis was done with references to different age and sex groups. Results: There was a statistical significant difference in ridge density between the different age groups; where younger ages had significantly higher ridge density than older ages. Females proved to have significantly higher ridge density than males. Also, there was a statistically significant negative correlation between age and ridge density. Ulnar loops were the most frequent pattern among Egyptians then whorls then arches then radial loops. Finally, different regression models were constructed to estimate age and gender from fingerprints ridge density. Conclusion: fingerprint ridge density can be used to identify both age and sex of subjects. Further studies are recommended on different populations, larger samples or using different methods of fingerprint recording and finger ridge counting.

Keywords: age, sex identification, Egyptian population, fingerprints, ridge density

Procedia PDF Downloads 364
19422 Increasing the Efficiency of the Biomass Gasification Technology with Using the Organic Rankin Cycle

Authors: Jaroslav Frantík, Jan Najser

Abstract:

This article deals with increasing the energy efficiency of a plant in terms of optimizing the process. The European Union is striving to achieve the climate-energy package in the area increasing of energy efficiency. The goal of energy efficiency is to reduce primary energy consumption by 20% within the EU until 2020. The objective of saving energy consumption in the Czech Republic was set at 47.84 PJ (13.29 TWh). For reducing electricity consumption, it is possible to choose: a) mandatory increasing of energy efficiency, b) alternative scheme, c) combination of both actions. The Czech Republic has chosen for reducing electricity consumption using-alternative scheme. The presentation is focused on the proposal of a technological unit dealing with the gasification process of processing of biomass with an increase of power in the output. The synthesis gas after gasification of biomass is used as fuel in a cogeneration process of reciprocating internal combustion engine with the classic production of heat and electricity. Subsequently, there is an explanation of the ORC system dealing with the conversion of waste heat to electricity with the using closed cycle of the steam process with organic medium. The arising electricity is distributed to the power grid as a further energy source, or it is used for needs of the partial coverage of the technological unit. Furthermore, there is a presented schematic description of the technology with the identification of energy flows starting from the biomass treatment by drying, through its conversion to gaseous fuel, producing of electricity and utilize of thermal energy with minimizing losses. It has been found that using of ORC system increased the efficiency of the produced electricity by 7.5%.

Keywords: biomass, efficiency, gasification, ORC system

Procedia PDF Downloads 217
19421 Identification and Characterization of Inhibitors of Epoxide Hydrolase from Trichoderma reesei

Authors: Gabriel S. De Oliveira, Patricia P. Adriani, Christophe Moriseau, Bruce D. Hammock, Felipe S. Chambergo

Abstract:

Epoxide hydrolases (EHs) are enzymes that are present in all living organisms and catalyze the hydrolysis of epoxides to the corresponding vicinal diols. EHs have high biotechnological interest for the drug design and chemistry transformation for industries. In this study, we describe the identification of substrates and inhibitors of epoxide hydrolase enzyme from the filamentous fungus Trichoderma reesei (TrEH), and these inhibitors showed the fungal growth inhibitory activity. We have used the cloned enzyme and expressed in E. coli to develop the screening in the library of fluorescent substrates with the objective of finding the best substrate to be used in the identification of good inhibitors for the enzyme TrEH. The substrate (3-phenyloxiranyl)-acetic acid cyano-(6-methoxy-naphthalen-2-yl)-methyl ester showed the highest specific activity and was chosen for the next steps of the study. The inhibitors screening was performed in the library with more than three thousand molecules and we could identify the 6 best inhibitors. The IC50 of these molecules were determined in nM and all the best inhibitors have urea or amide in their structure, because It has been recognized that these groups fit well in the hydrolase catalytic pocket of the epoxide hydrolases. Then the growth of T. reesei in PDA medium containing these TrEH inhibitors was tested, and fungal growth inhibition activity was demonstrated with more than 60% of inhibition of fungus growth in the assay with the TrEH inhibitor with the lowest IC50. Understanding how this EH enzyme from T. reesei responds to inhibitors may contribute for the study of fungal metabolism and drug design against pathogenic fungi.

Keywords: epoxide hydrolases, fungal growth inhibition, inhibitor, Trichoderma reesei

Procedia PDF Downloads 202
19420 A Qualitative Exploration into Australian Muslims Emerging into Adulthood

Authors: Nuray Okcum, Jenny Sharples

Abstract:

While the scrutinization towards marginalized groups throughout the globe has been existent for decades, prejudice towards Muslims in Western countries has been increasing dramatically. The vicious attacks across the globe by perpetrators who identify with Islam as well as popular political discourse by politicians in Western countries claiming and portraying Muslims as being dangerous, oppressed, or lacking the ability to assimilate into the community, adds to the exclusion and lack of belonging Muslims living in Western countries experience. The early stages of adulthood which have recently been conceptualized as emerging adulthood is a critical and socially ambiguous transition. For a young Muslim emerging into adulthood in a Western country, a variety of different challenges and demands that can exceed their coping abilities can arise. While in search for their identity and in a bid to structure themselves with their past childhood experiences together with their newly forming values, the emerging adult may attempt to direct or change the way in which they are viewed by others. This can be done to gain approval from others and to feel a sense of belonging. A change in the emerging adult’s interpersonal interactions and relationships, the way in which they view themselves and others, their sense of belonging, and their identity, also occurs during this developmental stage. To explore the manner in which Muslims emerging into adulthood carve their identity, their experiences, and representation of their Muslim identity, social identification, and their sense of belonging in Australia, an interpretative phenomenological methodology was utilized. This allowed participants to offer their own subjective experiences. A total of eight emerging adults took part in the study whilst four adults who work with emerging adults took part. Adult participants who work with emerging adults took part in the study to bring forth their insight and experiences. Common experiences were organized into themes. Themes included identifying as a Muslim, social identification, and belonging. Identification included visual identification and name, discrimination and resilience. Findings clearly indicated that Muslims emerging into adulthood in Australia do face various hurdles while they try to retain and represent their religious identity. Despite the unique challenges that they face, they still feel a sense of belonging and identity as being Australian.

Keywords: Muslim, Islam, emerging adulthood, Australia

Procedia PDF Downloads 135
19419 Plant Identification Using Convolution Neural Network and Vision Transformer-Based Models

Authors: Virender Singh, Mathew Rees, Simon Hampton, Sivaram Annadurai

Abstract:

Plant identification is a challenging task that aims to identify the family, genus, and species according to plant morphological features. Automated deep learning-based computer vision algorithms are widely used for identifying plants and can help users narrow down the possibilities. However, numerous morphological similarities between and within species render correct classification difficult. In this paper, we tested custom convolution neural network (CNN) and vision transformer (ViT) based models using the PyTorch framework to classify plants. We used a large dataset of 88,000 provided by the Royal Horticultural Society (RHS) and a smaller dataset of 16,000 images from the PlantClef 2015 dataset for classifying plants at genus and species levels, respectively. Our results show that for classifying plants at the genus level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420 and other state-of-the-art CNN-based models suggested in previous studies on a similar dataset. ViT model achieved top accuracy of 83.3% for classifying plants at the genus level. For classifying plants at the species level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420, with a top accuracy of 92.5%. We show that the correct set of augmentation techniques plays an important role in classification success. In conclusion, these results could help end users, professionals and the general public alike in identifying plants quicker and with improved accuracy.

Keywords: plant identification, CNN, image processing, vision transformer, classification

Procedia PDF Downloads 104
19418 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 647
19417 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 113
19416 Abating the Barriers to the Deployment of RFID for Construction Project Delivery in South Africa

Authors: Matthew O. Ikuabe, Ayodeji E. Oke, Clinton O. Aigbavboa, Douglas O. Aghimien

Abstract:

The use of technological innovations have been touted to be beneficial in the delivery of construction projects. Particularly, Radio Frequency Identification (RFID) technology is widely regarded to be of immense advantage for the management of construction projects. This study focused on evaluating the barriers to the use of Radio Frequency Identification (RFID) technology for the delivery of construction projects. Using Gauteng Provincein South Africa as the study area, questionnaire was used in eliciting responses from construction professionals, which made up the population of the study. Retrieved data was analysed using Mean Item Score and One-Sample t-test. Findings from the study showed that the most significant barriers to the deployment of RFID for construction project delivery are high cost and lack of awareness. Conclusively, the study made recommendations that would aid in the abatement of the barriers to the use of RFID technology for construction project delivery.

Keywords: barriers, construction, project delivery, RFID

Procedia PDF Downloads 206
19415 Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam

Authors: Mohd Sidek Ahmad, Zainon Mohd Noor, Zaidah Zainal Ariffin

Abstract:

Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.

Keywords: isolation, identification, fibrinolytic protease, endophytic fungi, Hibiscus leaves

Procedia PDF Downloads 434
19414 Aspects of Tone in the Educated Nigeria Accent of English

Authors: Nkereke Essien

Abstract:

The study seeks to analyze tone in the Educated Nigerian accent of English (ENAE) using the three tones: Low (L), High (H) and Low-High (LH). The aim is to find out whether there are any differences or similarities in the performance of the experimental group and the control. To achieve this, twenty educated Nigerian speakers of English who are educated in the language were selected by a Stratified Random Sampling (SRS) technique from two federal universities in Nigeria. They were given a passage to read and their intonation patterns were compared with that of a native speaker (control). The data were analyzed using Pierrehumbert’s (1980) intonation system of analysis. Three different approaches were employed in the analysis of the intonation Phrase (IP) as used by Pierrehumbert: perceptual, statistical and acoustic. We first analyzed our data from the passage and utterances using Willcoxon Matched Pairs Signs Ranks Test to establish the differences between the performance of the experimental group and the control. Then, the one-way Analysis of variance (ANOVA) statistical and Tukey-Krammar Post Hoc Tests were used to test for any significant difference in the performances of the twenty subjects. The acoustic data were presented to corroborate both the perceptual and statistical findings. Finally, the tonal patterns of the selected subjects in the three categories - A, B, C, were compared with those of the control. Our findings revealed that the tonal pattern of the Educated Nigerian Accent of English (ENAE) is significantly different from the tonal pattern of the Standard British Accent of English (SBAE) as represented by the control. A high preference for unidirectional tones, especially, the high tones was observed in the performance of the experimental group. Also, high tones do not necessarily correspond to stressed syllables and low tones to unstressed syllables.

Keywords: accent, intonation phrase (IP), tonal patterns, tone

Procedia PDF Downloads 230
19413 Magnetic Braking System of an Elevator in the Event of Sudden Breakage of the Hoisting Cable

Authors: Amita Singha

Abstract:

The project describes the scope of magnetic braking. The potential applications of the braking system can be a de-accelerating system to increase the safety of an elevator or any guided rail transportation system.

Keywords: boost and buck converter, electromagnet, elevator, ferromagnetic material, sensor, solenoid, timer

Procedia PDF Downloads 439
19412 Setting the Baseline for a Sentinel System for the Identification of Occupational Risk Factors in Africa

Authors: Menouni Aziza, Chbihi Kaoutar, Duca Radu Corneliu, Gilissen Liesbeth, Bounou Salim, Godderis Lode, El Jaafari Samir

Abstract:

In Africa, environmental and occupational health risks are mostly underreported. The aim of this research is to develop and implement a sentinel surveillance system comprising training and guidance of occupational physicians (OC) who will report new work-related diseases in African countries. A group of 30 OC are recruited and trained in each of the partner countries (Morocco, Benin and Ethiopia). Each committed OC is asked to recruit 50 workers during a consultation in a time-frame of 6 months (1500 workers per country). Workers are asked to fill out an online questionnaire about their health status and work conditions, including exposure to 20 chemicals. Urine and blood samples are then collected for human biomonitoring of common exposures. Some preliminary results showed that 92% of the employees surveyed are exposed to physical constraints, 44% to chemical agents, and 24% to biological agents. The most common physical constraints are manual handling of loads, noise pollution and thermal pollution. The most frequent chemical risks are exposure to pesticides and fuels. This project will allow a better understanding of effective sentinel systems as a promising method to gather high quality data, which can support policy-making in terms of preventing emerging work-related diseases.

Keywords: sentinel system, occupational diseases, human biomonitoring, Africa

Procedia PDF Downloads 82
19411 New Coordinate System for Countries with Big Territories

Authors: Mohammed Sabri Ali Akresh

Abstract:

The modern technologies and developments in computer and Global Positioning System (GPS) as well as Geographic Information System (GIS) and total station TS. This paper presents a new proposal for coordinates system by a harmonic equations “United projections”, which have five projections (Mercator, Lambert, Russell, Lagrange, and compound of projection) in one zone coordinate system width 14 degrees, also it has one degree for overlap between zones, as well as two standards parallels for zone from 10 S to 45 S. Also this paper presents two cases; first case is to compare distances between a new coordinate system and UTM, second case creating local coordinate system for the city of Sydney to measure the distances directly from rectangular coordinates using projection of Mercator, Lambert and UTM.

Keywords: harmonic equations, coordinate system, projections, algorithms, parallels

Procedia PDF Downloads 473
19410 Parameter Identification Analysis in the Design of Rock Fill Dams

Authors: G. Shahzadi, A. Soulaimani

Abstract:

This research work aims to identify the physical parameters of the constitutive soil model in the design of a rockfill dam by inverse analysis. The best parameters of the constitutive soil model, are those that minimize the objective function, defined as the difference between the measured and numerical results. The Finite Element code (Plaxis) has been utilized for numerical simulation. Polynomial and neural network-based response surfaces have been generated to analyze the relationship between soil parameters and displacements. The performance of surrogate models has been analyzed and compared by evaluating the root mean square error. A comparative study has been done based on objective functions and optimization techniques. Objective functions are categorized by considering measured data with and without uncertainty in instruments, defined by the least square method, which estimates the norm between the predicted displacements and the measured values. Hydro Quebec provided data sets for the measured values of the Romaine-2 dam. Stochastic optimization, an approach that can overcome local minima, and solve non-convex and non-differentiable problems with ease, is used to obtain an optimum value. Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) are compared for the minimization problem, although all these techniques take time to converge to an optimum value; however, PSO provided the better convergence and best soil parameters. Overall, parameter identification analysis could be effectively used for the rockfill dam application and has the potential to become a valuable tool for geotechnical engineers for assessing dam performance and dam safety.

Keywords: Rockfill dam, parameter identification, stochastic analysis, regression, PLAXIS

Procedia PDF Downloads 146
19409 Pill-Box Dispenser as a Strategy for Therapeutic Management: A Qualitative Evaluation

Authors: Bruno R. Mendes, Francisco J. Caldeira, Rita S. Luís

Abstract:

Population ageing is directly correlated to an increase in medicine consumption. Beyond the latter and the polymedicated profile of elderly, it is possible to see a need for pharmacotherapeutic monitoring due to cognitive and physical impairment. In this sense, the tracking, organization and administration of medicines become a daily challenge and the pill-box dispenser system a solution. The pill-box dispenser (system) consists in a small compartmentalized container to unit dose organization, which means a container able to correlate the patient’s prescribed dose regimen and the time schedule of intake. In many European countries, this system is part of pharmacist’s role in clinical pharmacy. Despite this simple solution, therapy compliance is only possible if the patient adheres to the system, so it is important to establish a qualitative and quantitative analysis on the perception of the patient on the benefits and risks of the pill-box dispenser as well as the identification of the ideal system. The analysis was conducted through an observational study, based on the application of a standardized questionnaire structured with the numerical scale of Likert (5 levels) and previously validated on the population. The study was performed during a limited period of time and under a randomized sample of 188 participants. The questionnaire consisted of 22 questions: 6 background measures and 16 specific measures. The standards for the final comparative analysis were obtained through the state-of-the-art on the subject. The study carried out using the Likert scale afforded a degree of agreement and discordance between measures (Sample vs. Standard) of 56,25% and 43,75%, respectively. It was concluded that the pill-box dispenser has greater acceptance among a younger population, that was not the initial target of the system. However, this allows us to guarantee a high adherence in the future. Additionally, it was noted that the cost associated with this service is not a limiting factor for its use. The pill-box dispenser system, as currently implemented, demonstrates an important weakness regarding the quality and effectiveness of the medicines, which is not understood by the patient, revealing a significant lack of literacy when it concerns with medicine area. The characteristics of an ideal system remain unchanged, which means that the size, appearance and availability of information in the pill-box continue to be indispensable elements for the compliance with the system. The pill-box dispenser remains unsuitable regarding container size and the type of treatment to which it applies. Despite that, it might be a future standard for clinical pharmacy, allowing a differentiation of the pharmacist role, as well as a wider range of applications to other age groups and treatments.

Keywords: clinical pharmacy, medicines, patient safety, pill-box dispenser

Procedia PDF Downloads 197
19408 Analyze and Visualize Eye-Tracking Data

Authors: Aymen Sekhri, Emmanuel Kwabena Frimpong, Bolaji Mubarak Ayeyemi, Aleksi Hirvonen, Matias Hirvonen, Tedros Tesfay Andemichael

Abstract:

Fixation identification, which involves isolating and identifying fixations and saccades in eye-tracking protocols, is an important aspect of eye-movement data processing that can have a big impact on higher-level analyses. However, fixation identification techniques are frequently discussed informally and rarely compared in any meaningful way. With two state-of-the-art algorithms, we will implement fixation detection and analysis in this work. The velocity threshold fixation algorithm is the first algorithm, and it identifies fixation based on a threshold value. For eye movement detection, the second approach is U'n' Eye, a deep neural network algorithm. The goal of this project is to analyze and visualize eye-tracking data from an eye gaze dataset that has been provided. The data was collected in a scenario in which individuals were shown photos and asked whether or not they recognized them. The results of the two-fixation detection approach are contrasted and visualized in this paper.

Keywords: human-computer interaction, eye-tracking, CNN, fixations, saccades

Procedia PDF Downloads 135
19407 Geographic Information System and Ecotourism Sites Identification of Jamui District, Bihar, India

Authors: Anshu Anshu

Abstract:

In the red corridor famed for the Left Wing Extremism, lies small district of Jamui in Bihar, India. The district lies at 24º20´ N latitude and 86º13´ E longitude, covering an area of 3,122.8 km2 The undulating topography, with widespread forests provides pristine environment for invigorating experience of tourists. Natural landscape in form of forests, wildlife, rivers, and cultural landscape dotted with historical and religious places is highly purposive for tourism. The study is primarily related to the identification of potential ecotourism sites, using Geographic Information System. Data preparation, analysis and finally identification of ecotourism sites is done. Secondary data used is Survey of India Topographical Sheets with R.F.1:50,000 covering the area of Jamui district. District Census Handbook, Census of India, 2011; ERDAS Imagine and Arc View is used for digitization and the creation of DEM’s (Digital Elevation Model) of the district, depicting the relief and topography and generate thematic maps. The thematic maps have been refined using the geo-processing tools. Buffer technique has been used for the accessibility analysis. Finally, all the maps, including the Buffer maps were overlaid to find out the areas which have potential for the development of ecotourism sites in the Jamui district. Spatial data - relief, slopes, settlements, transport network and forests of Jamui District were marked and identified, followed by Buffer Analysis that was used to find out the accessibility of features like roads, railway stations to the sites available for the development of ecotourism destinations. Buffer analysis is also carried out to get the spatial proximity of major river banks, lakes, and dam sites to be selected for promoting sustainable ecotourism. Overlay Analysis is conducted using the geo-processing tools. Digital Terrain Model (DEM) generated and relevant themes like roads, forest areas and settlements were draped on the DEM to make an assessment of the topography and other land uses of district to delineate potential zones of ecotourism development. Development of ecotourism in Jamui faces several challenges. The district lies in the portion of Bihar that is part of ‘red corridor’ of India. The hills and dense forests are the prominent hideouts and training ground for the extremists. It is well known that any kind of political instability, war, acts of violence directly influence the travel propensity and hinders all kind of non-essential travels to these areas. The development of ecotourism in the district can bring change and overall growth in this area with communities getting more involved in economically sustainable activities. It is a known fact that poverty and social exclusion are the main force that pushes people, resorting towards violence. All over the world tourism has been used as a tool to eradicate poverty and generate good will among people. Tourism, in sustainable form should be promoted in the district to integrate local communities in the development process and to distribute fruits of development with equity.

Keywords: buffer analysis, digital elevation model, ecotourism, red corridor

Procedia PDF Downloads 259
19406 An Analysis of Conversation Structure of Oprah Winfrey and Justin Bieber Utterances on The Oprah Winfrey Show

Authors: Najib Khumaidillah

Abstract:

A conversation needs skills to create the good flow of it. The skills also need to be paid attention by a host like Oprah Winfrey and Justin Bieber as an artist. This study is aimed at describing turn taking strategies and adjacency pairs used by the speakers. The data are from one segment of The Oprah Winfrey Show’s transcription with Justin Bieber. Those are analyzed by Stenstorm’s turn taking theories and adjacency pairs theories. From the analysis, it was found that both speakers use various turn taking strategies and adjacency pairs. These findings are hoped to be an example for non-native English speaker in doing English conversation and advance people’s comprehension of how to organize good conversation structure.

Keywords: adjacency pairs, conversation structure, the Oprah Winfrey show, turn taking

Procedia PDF Downloads 195
19405 Soil Parameters Identification around PMT Test by Inverse Analysis

Authors: I. Toumi, Y. Abed, A. Bouafia

Abstract:

This paper presents a methodology for identifying the cohesive soil parameters that takes into account different constitutive equations. The procedure, applied to identify the parameters of generalized Prager model associated to the Drucker & Prager failure criterion from a pressuremeter expansion curve, is based on an inverse analysis approach, which consists of minimizing the function representing the difference between the experimental curve and the simulated curve using a simplex algorithm. The model response on pressuremeter path and its identification from experimental data lead to the determination of the friction angle, the cohesion and the Young modulus. Some parameters effects on the simulated curves and stresses path around pressuremeter probe are presented. Comparisons between the parameters determined with the proposed method and those obtained by other means are also presented.

Keywords: cohesive soils, cavity expansion, pressuremeter test, finite element method, optimization procedure, simplex algorithm

Procedia PDF Downloads 294
19404 Language Switching Errors of Bilinguals: Role of Top down and Bottom up Process

Authors: Numra Qayyum, Samina Sarwat, Noor ul Ain

Abstract:

Bilingual speakers generally can speak both languages with the same competency without mixing them intentionally and making mistakes, but sometimes errors occur in language selection. This quantitative study particularly deals with the language errors made by Urdu-English bilinguals. In this research, researchers have given special attention to the part played by bottom-up priming and top-down cognitive control in these errors. Unstable Urdu-English bilingual participants termed pictures and were prompted to shift from one language to another under the pressure of time. Different situations were given to manipulate the participants. The long and short runs trials of the same language were also given before switching to another language. The study is concluded with the findings that bilinguals made more errors when switching to the first language from their second language, and these errors are large in number, especially when a speaker is switching from L2 (second language) to L1 (first language) after a long run. When the switching is reversed, i.e., from L2 to LI, it had no effect at all. These results gave the clear responsibility of all these errors to top-down cognitive control.

Keywords: bottom up priming, language error, language switching, top down cognitive control

Procedia PDF Downloads 137
19403 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 339
19402 Stereotypical Motor Movement Recognition Using Microsoft Kinect with Artificial Neural Network

Authors: M. Jazouli, S. Elhoufi, A. Majda, A. Zarghili, R. Aalouane

Abstract:

Autism spectrum disorder is a complex developmental disability. It is defined by a certain set of behaviors. Persons with Autism Spectrum Disorders (ASD) frequently engage in stereotyped and repetitive motor movements. The objective of this article is to propose a method to automatically detect this unusual behavior. Our study provides a clinical tool which facilitates for doctors the diagnosis of ASD. We focus on automatic identification of five repetitive gestures among autistic children in real time: body rocking, hand flapping, fingers flapping, hand on the face and hands behind back. In this paper, we present a gesture recognition system for children with autism, which consists of three modules: model-based movement tracking, feature extraction, and gesture recognition using artificial neural network (ANN). The first one uses the Microsoft Kinect sensor, the second one chooses points of interest from the 3D skeleton to characterize the gestures, and the last one proposes a neural connectionist model to perform the supervised classification of data. The experimental results show that our system can achieve above 93.3% recognition rate.

Keywords: ASD, artificial neural network, kinect, stereotypical motor movements

Procedia PDF Downloads 306
19401 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves

Authors: Mohammad Reza Ebrahimi

Abstract:

In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.

Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location

Procedia PDF Downloads 186
19400 Biochemical Identification and Study of Antibiotic Resistance in Isolated Bacteria from WWTP TIMGAD

Authors: Abdessemed Zineb, Atia Yahia, Yeza Salima

Abstract:

Water is self-purified by activated sludge process which makes its uniqueness. The main goal is the microbial biocenosis study of the input and output water of the waste water treatment system plant Timgad. 89.47% of the identified biocenosis belongs to ɤ-Proteobacteria while the remaining 10.52 % is equally divided between α-Proteobacteria and β-Proteobacteria. The antibiotics susceptibility profiles reveal that over 30 % are wild strains while the penicillinases are often present (11.30-20 %) with also other profiles. This proportion is worrying that the water discharged join the Oued Soltez used for irrigation. This disadvantage involves the installation of a chlorination step.

Keywords: activated sludge, biocenosis, antibiotics profiles, penicillinases, physic-chemical quality

Procedia PDF Downloads 305
19399 Theoretical and ML-Driven Identification of a Mispriced Credit Risk

Authors: Yuri Katz, Kun Liu, Arunram Atmacharan

Abstract:

Due to illiquidity, mispricing on Credit Markets is inevitable. This creates huge challenges to banks and investors as they seek to find new ways of risk valuation and portfolio management in a post-credit crisis world. Here, we analyze the difference in behavior of the spread-to-maturity in investment and high-yield categories of US corporate bonds between 2014 and 2023. Deviation from the theoretical dependency of this measure in the universe under study allows to identify multiple cases of mispriced credit risk. Remarkably, we observe mispriced bonds in both categories of credit ratings. This identification is supported by the application of the state-of-the-art machine learning model in more than 90% of cases. Noticeably, the ML-driven model-based forecasting of a category of bond’s credit ratings demonstrate an excellent out-of-sample accuracy (AUC = 98%). We believe that these results can augment conventional valuations of credit portfolios.

Keywords: credit risk, credit ratings, bond pricing, spread-to-maturity, machine learning

Procedia PDF Downloads 80
19398 Geophysical Mapping of the Groundwater Aquifer System in Gode Area, Northeastern Hosanna, Ethiopia

Authors: Esubalew Yehualaw Melaku

Abstract:

In this study, two basic geophysical methods are applied for mapping the groundwater aquifer system in the Gode area along the Guder River, northeast of Hosanna town, near the western margin of the Central Main Ethiopian Rift. The main target of the study is to map the potential aquifer zone and investigate the groundwater potential for current and future development of the resource in the Gode area. The geophysical methods employed in this study include, Vertical Electrical Sounding (VES) and magnetic survey techniques. Electrical sounding was used to examine and map the depth to the potential aquifer zone of the groundwater and its distribution over the area. On the other hand, a magnetic survey was used to delineate contact between lithologic units and geological structures. The 2D magnetic modeling and the geoelectric sections are used for the identification of weak zones, which control the groundwater flow and storage system. The geophysical survey comprises of twelve VES readings collected by using a Schlumberger array along six profile lines and more than four hundred (400) magnetic readings at about 10m station intervals along four profiles and 20m along three random profiles. The study result revealed that the potential aquifer in the area is obtained at a depth range from 45m to 92m. This is the response of the highly weathered/ fractured ignimbrite and pumice layer with sandy soil, which is the main water-bearing horizon. Overall, in the neighborhood of four VES points, VES- 2, VES- 3, VES-10, and VES-11, shows good water-bearing zones in the study area.

Keywords: vertical electrical sounding, magnetic survey, aquifer, groundwater potential

Procedia PDF Downloads 128
19397 Automatic Differentiation of Ultrasonic Images of Cystic and Solid Breast Lesions

Authors: Dmitry V. Pasynkov, Ivan A. Egoshin, Alexey A. Kolchev, Ivan V. Kliouchkin

Abstract:

In most cases, typical cysts are easily recognized at ultrasonography. The specificity of this method for typical cysts reaches 98%, and it is usually considered as gold standard for typical cyst diagnosis. However, it is necessary to have all the following features to conclude the typical cyst: clear margin, the absence of internal echoes and dorsal acoustic enhancement. At the same time, not every breast cyst is typical. It is especially characteristic for protein-contained cysts that may have significant internal echoes. On the other hand, some solid lesions (predominantly malignant) may have cystic appearance and may be falsely accepted as cysts. Therefore we tried to develop the automatic method of cystic and solid breast lesions differentiation. Materials and methods. The input data were the ultrasonography digital images with the 256-gradations of gray color (Medison SA8000SE, Siemens X150, Esaote MyLab C). Identification of the lesion on these images was performed in two steps. On the first one, the region of interest (or contour of lesion) was searched and selected. Selection of such region is carried out using the sigmoid filter where the threshold is calculated according to the empirical distribution function of the image brightness and, if necessary, it was corrected according to the average brightness of the image points which have the highest gradient of brightness. At the second step, the identification of the selected region to one of lesion groups by its statistical characteristics of brightness distribution was made. The following characteristics were used: entropy, coefficients of the linear and polynomial regression, quantiles of different orders, an average gradient of brightness, etc. For determination of decisive criterion of belonging to one of lesion groups (cystic or solid) the training set of these characteristics of brightness distribution separately for benign and malignant lesions were received. To test our approach we used a set of 217 ultrasonic images of 107 cystic (including 53 atypical, difficult for bare eye differentiation) and 110 solid lesions. All lesions were cytologically and/or histologically confirmed. Visual identification was performed by trained specialist in breast ultrasonography. Results. Our system correctly distinguished all (107, 100%) typical cysts, 107 of 110 (97.3%) solid lesions and 50 of 53 (94.3%) atypical cysts. On the contrary, with the bare eye it was possible to identify correctly all (107, 100%) typical cysts, 96 of 110 (87.3%) solid lesions and 32 of 53 (60.4%) atypical cysts. Conclusion. Automatic approach significantly surpasses the visual assessment performed by trained specialist. The difference is especially large for atypical cysts and hypoechoic solid lesions with the clear margin. This data may have a clinical significance.

Keywords: breast cyst, breast solid lesion, differentiation, ultrasonography

Procedia PDF Downloads 270