Search results for: complete tripartite graph
2294 Simulation of Pedestrian Service Time at Different Delay Times
Authors: Imran Badshah
Abstract:
Pedestrian service time reflects the performance of the facility, and it’s a key parameter to analyze the capability of facilities provided to serve pedestrians. The level of service of pedestrians (LOS) mainly depends on pedestrian time and safety. The pedestrian time utilized by taking a service is mainly influenced by the number of available services and the time utilized by each pedestrian in receiving a service; that is called a delay time. In this paper, we analyzed the simulated pedestrian service time with different delay times. A simulation is performed in AnyLogic by developing a model that reflects the real scenario of pedestrian services such as ticket machine gates at rail stations, airports, shopping malls, and cinema halls. The simulated pedestrian time is determined for various delay values. The simulated result shows how pedestrian time changes with the delay pattern. The histogram and time plot graph of a model gives the mean, maximum and minimum values of the pedestrian time. This study helps us to check the behavior of pedestrian time at various services such as subway stations, airports, shopping malls, and cinema halls.Keywords: agent-based simulation, anylogic model, pedestrian behavior, time delay
Procedia PDF Downloads 2102293 Applying Multiple Kinect on the Development of a Rapid 3D Mannequin Scan Platform
Authors: Shih-Wen Hsiao, Yi-Cheng Tsao
Abstract:
In the field of reverse engineering and creative industries, applying 3D scanning process to obtain geometric forms of the objects is a mature and common technique. For instance, organic objects such as faces and nonorganic objects such as products could be scanned to acquire the geometric information for further application. However, although the data resolution of 3D scanning device is increasing and there are more and more abundant complementary applications, the penetration rate of 3D scanning for the public is still limited by the relative high price of the devices. On the other hand, Kinect, released by Microsoft, is known for its powerful functions, considerably low price, and complete technology and database support. Therefore, related studies can be done with the applying of Kinect under acceptable cost and data precision. Due to the fact that Kinect utilizes optical mechanism to extracting depth information, limitations are found due to the reason of the straight path of the light. Thus, various angles are required sequentially to obtain the complete 3D information of the object when applying a single Kinect for 3D scanning. The integration process which combines the 3D data from different angles by certain algorithms is also required. This sequential scanning process costs much time and the complex integration process often encounter some technical problems. Therefore, this paper aimed to apply multiple Kinects simultaneously on the field of developing a rapid 3D mannequin scan platform and proposed suggestions on the number and angles of Kinects. In the content, a method of establishing the coordination based on the relation between mannequin and the specifications of Kinect is proposed, and a suggestion of angles and number of Kinects is also described. An experiment of applying multiple Kinect on the scanning of 3D mannequin is constructed by Microsoft API, and the results show that the time required for scanning and technical threshold can be reduced in the industries of fashion and garment design.Keywords: 3D scan, depth sensor, fashion and garment design, mannequin, multiple Kinect sensor
Procedia PDF Downloads 3662292 Temperature Dependence of Relative Permittivity: A Measurement Technique Using Split Ring Resonators
Authors: Sreedevi P. Chakyar, Jolly Andrews, V. P. Joseph
Abstract:
A compact method for measuring the relative permittivity of a dielectric material at different temperatures using a single circular Split Ring Resonator (SRR) metamaterial unit working as a test probe is presented in this paper. The dielectric constant of a material is dependent upon its temperature and the LC resonance of the SRR depends on its dielectric environment. Hence, the temperature of the dielectric material in contact with the resonator influences its resonant frequency. A single SRR placed between transmitting and receiving probes connected to a Vector Network Analyser (VNA) is used as a test probe. The dependence of temperature between 30 oC and 60 oC on resonant frequency of SRR is analysed. Relative permittivities ‘ε’ of test samples for different temperatures are extracted from a calibration graph drawn between the relative permittivity of samples of known dielectric constant and their corresponding resonant frequencies. This method is found to be an easy and efficient technique for analysing the temperature dependent permittivity of different materials.Keywords: metamaterials, negative permeability, permittivity measurement techniques, split ring resonators, temperature dependent dielectric constant
Procedia PDF Downloads 4122291 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3982290 Calpoly Autonomous Transportation Experience: Software for Driverless Vehicle Operating on Campus
Authors: F. Tang, S. Boskovich, A. Raheja, Z. Aliyazicioglu, S. Bhandari, N. Tsuchiya
Abstract:
Calpoly Autonomous Transportation Experience (CATE) is a driverless vehicle that we are developing to provide safe, accessible, and efficient transportation of passengers throughout the Cal Poly Pomona campus for events such as orientation tours. Unlike the other self-driving vehicles that are usually developed to operate with other vehicles and reside only on the road networks, CATE will operate exclusively on walk-paths of the campus (potentially narrow passages) with pedestrians traveling from multiple locations. Safety becomes paramount as CATE operates within the same environment as pedestrians. As driverless vehicles assume greater roles in today’s transportation, this project will contribute to autonomous driving with pedestrian traffic in a highly dynamic environment. The CATE project requires significant interdisciplinary work. Researchers from mechanical engineering, electrical engineering and computer science are working together to attack the problem from different perspectives (hardware, software and system). In this abstract, we describe the software aspects of the project, with a focus on the requirements and the major components. CATE shall provide a GUI interface for the average user to interact with the car and access its available functionalities, such as selecting a destination from any origin on campus. We have developed an interface that provides an aerial view of the campus map, the current car location, routes, and the goal location. Users can interact with CATE through audio or manual inputs. CATE shall plan routes from the origin to the selected destination for the vehicle to travel. We will use an existing aerial map for the campus and convert it to a spatial graph configuration where the vertices represent the landmarks and edges represent paths that the car should follow with some designated behaviors (such as stay on the right side of the lane or follow an edge). Graph search algorithms such as A* will be implemented as the default path planning algorithm. D* Lite will be explored to efficiently recompute the path when there are any changes to the map. CATE shall avoid any static obstacles and walking pedestrians within some safe distance. Unlike traveling along traditional roadways, CATE’s route directly coexists with pedestrians. To ensure the safety of the pedestrians, we will use sensor fusion techniques that combine data from both lidar and stereo vision for obstacle avoidance while also allowing CATE to operate along its intended route. We will also build prediction models for pedestrian traffic patterns. CATE shall improve its location and work under a GPS-denied situation. CATE relies on its GPS to give its current location, which has a precision of a few meters. We have implemented an Unscented Kalman Filter (UKF) that allows the fusion of data from multiple sensors (such as GPS, IMU, odometry) in order to increase the confidence of localization. We also noticed that GPS signals can easily get degraded or blocked on campus due to high-rise buildings or trees. UKF can also help here to generate a better state estimate. In summary, CATE will provide on-campus transportation experience that coexists with dynamic pedestrian traffic. In future work, we will extend it to multi-vehicle scenarios.Keywords: driverless vehicle, path planning, sensor fusion, state estimate
Procedia PDF Downloads 1442289 Photoactivated Chromophore for Keratitis-Cross Linking Window Absorption Alone versus Combined Pack-CXL Window Absorption and Standard Anti-microbial Therapy for Treatment of Infectious Keratitis: A Prospective Study
Authors: Mohammed M. Mahdy Tawfeek
Abstract:
Objective: The aim of this work is to compare the outcome of photoactivated chromophore for keratitis-cross linking (PACK-CXL) window absorption (WA) alone with combined PACK-CXL WA and standard anti-microbial therapy (SAT) for the treatment of infectious keratitis. Patients and Methods: This is a randomized prospective comparative clinical trial. Thirty eyes with clinically suspected infectious keratitis were randomly assigned into two equal groups of 15 eyes each: Group (A) was treated by PACK-CXL WA alone and group (B) was treated by PACK-CXL WA combined with SAT. Identification of organisms was made by lab study before treatment. Corneal healing was evaluated by corneal examination and anterior segment OCT (AS-OCT). Written informed consent was obtained from all participants and the study was approved by the research ethics committee of the Faculty of Medicine, Zagazig University. The work has been carried out in accordance with The Code of Ethics of the World Medical Association (Declaration of Helsinki) for studies involving humans. Results: Complete healing and resolution (Successful treatment) were observed in 10 eyes (66.7%) of a group (A) and 14 eyes (93.3%) of group (B) and failure was observed in 5 eyes (33.3%) of a group (A) and one eye (6.67%) of group (B). They were statistically significant (P =0.042 and 0.003) in a comparison between both groups regarding success and failure of treatment, respectively. Complete corneal healing was reported in the third month postoperatively in 10 eyes (66.7%) of group (A) and 14 eyes (93.3%) of group (B). Complications were absent in 12 patients (80%) in group (A) and 14 patients (93.3%) of group (B); however, perforation and impending perforation were found in 3 patients of group (A) and only one patient of group (B). Conclusion: PACK-CXL is a promising, non-invasive treatment option for infectious keratitis, especially when performed with the window absorption (WA) technique, either alone or combined with SAT. It has a synergistic effect with a standard antimicrobial treatment that gives good outcome results in the treatment of infectious keratitis. Also, it avoids the antibiotics resistance that has become rapidly spreading worldwide.Keywords: corneal cross linking, infectious keratitis, PACK-CXL, window absorption
Procedia PDF Downloads 1402288 Self-Organizing Maps for Exploration of Partially Observed Data and Imputation of Missing Values in the Context of the Manufacture of Aircraft Engines
Authors: Sara Rejeb, Catherine Duveau, Tabea Rebafka
Abstract:
To monitor the production process of turbofan aircraft engines, multiple measurements of various geometrical parameters are systematically recorded on manufactured parts. Engine parts are subject to extremely high standards as they can impact the performance of the engine. Therefore, it is essential to analyze these databases to better understand the influence of the different parameters on the engine's performance. Self-organizing maps are unsupervised neural networks which achieve two tasks simultaneously: they visualize high-dimensional data by projection onto a 2-dimensional map and provide clustering of the data. This technique has become very popular for data exploration since it provides easily interpretable results and a meaningful global view of the data. As such, self-organizing maps are usually applied to aircraft engine condition monitoring. As databases in this field are huge and complex, they naturally contain multiple missing entries for various reasons. The classical Kohonen algorithm to compute self-organizing maps is conceived for complete data only. A naive approach to deal with partially observed data consists in deleting items or variables with missing entries. However, this requires a sufficient number of complete individuals to be fairly representative of the population; otherwise, deletion leads to a considerable loss of information. Moreover, deletion can also induce bias in the analysis results. Alternatively, one can first apply a common imputation method to create a complete dataset and then apply the Kohonen algorithm. However, the choice of the imputation method may have a strong impact on the resulting self-organizing map. Our approach is to address simultaneously the two problems of computing a self-organizing map and imputing missing values, as these tasks are not independent. In this work, we propose an extension of self-organizing maps for partially observed data, referred to as missSOM. First, we introduce a criterion to be optimized, that aims at defining simultaneously the best self-organizing map and the best imputations for the missing entries. As such, missSOM is also an imputation method for missing values. To minimize the criterion, we propose an iterative algorithm that alternates the learning of a self-organizing map and the imputation of missing values. Moreover, we develop an accelerated version of the algorithm by entwining the iterations of the Kohonen algorithm with the updates of the imputed values. This method is efficiently implemented in R and will soon be released on CRAN. Compared to the standard Kohonen algorithm, it does not come with any additional cost in terms of computing time. Numerical experiments illustrate that missSOM performs well in terms of both clustering and imputation compared to the state of the art. In particular, it turns out that missSOM is robust to the missingness mechanism, which is in contrast to many imputation methods that are appropriate for only a single mechanism. This is an important property of missSOM as, in practice, the missingness mechanism is often unknown. An application to measurements on one type of part is also provided and shows the practical interest of missSOM.Keywords: imputation method of missing data, partially observed data, robustness to missingness mechanism, self-organizing maps
Procedia PDF Downloads 1512287 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm
Authors: Haozhe Xiang
Abstract:
With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.Keywords: deep learning, graph convolutional network, attention mechanism, LSTM
Procedia PDF Downloads 702286 Prediction of Fillet Weight and Fillet Yield from Body Measurements and Genetic Parameters in a Complete Diallel Cross of Three Nile Tilapia (Oreochromis niloticus) Strains
Authors: Kassaye Balkew Workagegn, Gunnar Klemetsdal, Hans Magnus Gjøen
Abstract:
In this study, the first objective was to investigate whether non-lethal or non-invasive methods, utilizing body measurements, could be used to efficiently predict fillet weight and fillet yield for a complete diallel cross of three Nile tilapia (Oreochromis niloticus) strains collected from three Ethiopian Rift Valley lakes, Lakes Ziway, Koka and Chamo. The second objective was to estimate heritability of body weight, actual and predicted fillet traits, as well as genetic correlations between these traits. A third goal was to estimate additive, reciprocal, and heterosis effects for body weight and the various fillet traits. As in females, early sexual maturation was widespread, only 958 male fish from 81 full-sib families were used, both for the prediction of fillet traits and in genetic analysis. The prediction equations from body measurements were established by forward regression analysis, choosing models with the least predicted residual error sums of squares (PRESS). The results revealed that body measurements on live Nile tilapia is well suited to predict fillet weight but not fillet yield (R²= 0.945 and 0.209, respectively), but both models were seemingly unbiased. The genetic analyses were carried out with bivariate, multibreed models. Body weight, fillet weight, and predicted fillet weight were all estimated with a heritability ranged from 0.23 to 0.28, and with genetic correlations close to one. Contrary, fillet yield was only to a minor degree heritable (0.05), while predicted fillet yield obtained a heritability of 0.19, being a resultant of two body weight variables known to have high heritability. The latter trait was estimated with genetic correlations to body weight and fillet weight traits larger than 0.82. No significant differences among strains were found for their additive genetic, reciprocal, or heterosis effects, while total heterosis effects were estimated as positive and significant (P < 0.05). As a conclusion, prediction of prediction of fillet weight based on body measurements is possible, but not for fillet yield.Keywords: additive, fillet traits, genetic correlation, heritability, heterosis, prediction, reciprocal
Procedia PDF Downloads 1872285 Travel Planning in Public Transport Networks Applying the Algorithm A* for Metropolitan District of Quito
Authors: M. Fernanda Salgado, Alfonso Tierra, Wilbert Aguilar
Abstract:
The present project consists in applying the informed search algorithm A star (A*) to solve traveler problems, applying it by urban public transportation routes. The digitization of the information allowed to identify 26% of the total of routes that are registered within the Metropolitan District of Quito. For the validation of this information, data were taken in field on the travel times and the difference with respect to the times estimated by the program, resulting in that the difference between them was not greater than 2:20 minutes. We validate A* algorithm with the Dijkstra algorithm, comparing nodes vectors based on the public transport stops, the validation was established through the student t-test hypothesis. Then we verified that the times estimated by the program using the A* algorithm are similar to those registered on field. Furthermore, we review the performance of the algorithm generating iterations in both algorithms. Finally, with these iterations, a hypothesis test was carried out again with student t-test where it was concluded that the iterations of the base algorithm Dijsktra are greater than those generated by the algorithm A*.Keywords: algorithm A*, graph, mobility, public transport, travel planning, routes
Procedia PDF Downloads 2392284 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 3932283 Synergism in the Inquiry Lab: An Analysis of Time Targets and Achievement
Authors: John M. Basey, Clinton D. Francis, Maxwell B. Joseph
Abstract:
After gathering data from experimental procedures, inquiry-oriented-science labs often allow students the freedom to stay and complete the write up in class or leave lab early and complete the write up later. Teachers must decide whether to allow students this freedom to self-regulate this time. Student interviews have indicated four time-target strategies that may influence how students utilize this time: grade-target-A, grade-target-C, time-limited, and proficiency. The hypothesis tested was that variability in class composition relative to the four grade-target strategies has an impact on when students leave class, which in turn may influence their overall learning as exemplified by grades. Students were divided into the four indicated groups with a survey. Class composition and the GTA teaching the class had significant impacts on how long students stayed in class with class composition having the greatest impact. A factor analysis identified two factors. Factor 1 included classes with percentages of grade-target students opposite time-limited/proficiency students and explained 43% of the variance. Factor 2 included classes with percentages of grade-target-A/proficiency students opposite grade-target-C students and explained 33% of the variance. Students who stayed longer received significantly higher grades (P = 0.008) with no significant relationships between grade and Factor 1 or Factor 2 (P > 0.05). The time students stayed in class was significantly positively related to Factor 1 (P = 0.006) and significantly negatively related to Factor 2 (P = 0.008). These results support the hypothesis and indicate that teachers may want to know the composition of student-target strategies before deciding on how to have students allocate study time at the end of inquiry-oriented labs. According to these results, ideal classes for self-regulation have a high proportion of proficiency and time-limited students and a low proportion of grade-target students, or a high proportion of grade-target-A and proficiency students and a low proportion of grade-target-C students. Non-ideal classes for self-regulation were comprised of the inverse proportions.Keywords: grades, inquiry lab design, synergism in student motivation, class composition
Procedia PDF Downloads 1272282 Classification of Poverty Level Data in Indonesia Using the Naïve Bayes Method
Authors: Anung Style Bukhori, Ani Dijah Rahajoe
Abstract:
Poverty poses a significant challenge in Indonesia, requiring an effective analytical approach to understand and address this issue. In this research, we applied the Naïve Bayes classification method to examine and classify poverty data in Indonesia. The main focus is on classifying data using RapidMiner, a powerful data analysis platform. The analysis process involves data splitting to train and test the classification model. First, we collected and prepared a poverty dataset that includes various factors such as education, employment, and health..The experimental results indicate that the Naïve Bayes classification model can provide accurate predictions regarding the risk of poverty. The use of RapidMiner in the analysis process offers flexibility and efficiency in evaluating the model's performance. The classification produces several values to serve as the standard for classifying poverty data in Indonesia using Naive Bayes. The accuracy result obtained is 40.26%, with a moderate recall result of 35.94%, a high recall result of 63.16%, and a low recall result of 38.03%. The precision for the moderate class is 58.97%, for the high class is 17.39%, and for the low class is 58.70%. These results can be seen from the graph below.Keywords: poverty, classification, naïve bayes, Indonesia
Procedia PDF Downloads 552281 Solution to Riemann Hypothesis Critical Strip Zone Using Non-Linear Complex Variable Functions
Authors: Manojkumar Sabanayagam
Abstract:
The Riemann hypothesis is an unsolved millennium problem and the search for a solution to the Riemann hypothesis is to study the pattern of prime number distribution. The scope of this paper is to identify the solution for the critical strip and the critical line axis, which has the non-trivial zero solutions using complex plane functions. The Riemann graphical plot is constructed using a linear complex variable function (X+iY) and is applicable only when X>1. But the investigation shows that complex variable behavior has two zones. The first zone is the transformation zone, where the definition of the complex plane should be a non-linear variable which is the critical strip zone in the graph (X=0 to 1). The second zone is the transformed zone (X>1) defined using linear variables conventionally. This paper deals with the Non-linear function in the transformation zone derived using cosine and sinusoidal time lag w.r.t imaginary number ‘i’. The alternate complex variable (Cosθ+i Sinθ) is used to understand the variables in the critical strip zone. It is concluded that the non-trivial zeros present in the Real part 0.5 are because the linear function is not the correct approach in the critical strip. This paper provides the solution to Reimann's hypothesis.Keywords: Reimann hypothesis, critical strip, complex plane, transformation zone
Procedia PDF Downloads 2082280 A Mobile Application for Analyzing and Forecasting Crime Using Autoregressive Integrated Moving Average with Artificial Neural Network
Authors: Gajaanuja Megalathan, Banuka Athuraliya
Abstract:
Crime is one of our society's most intimidating and threatening challenges. With the majority of the population residing in cities, many experts and data provided by local authorities suggest a rapid increase in the number of crimes committed in these cities in recent years. There has been an increasing graph in the crime rates. People living in Sri Lanka have the right to know the exact crime rates and the crime rates in the future of the place they are living in. Due to the current economic crisis, crime rates have spiked. There have been so many thefts and murders recorded within the last 6-10 months. Although there are many sources to find out, there is no solid way of searching and finding out the safety of the place. Due to all these reasons, there is a need for the public to feel safe when they are introduced to new places. Through this research, the author aims to develop a mobile application that will be a solution to this problem. It is mainly targeted at tourists, and people who recently relocated will gain advantage of this application. Moreover, the Arima Model combined with ANN is to be used to predict crime rates. From the past researchers' works, it is evidently clear that they haven’t used the Arima model combined with Artificial Neural Networks to forecast crimes.Keywords: arima model, ANN, crime prediction, data analysis
Procedia PDF Downloads 1312279 Wall Shear Stress Under an Impinging Planar Jet Using the Razor Blade Technique
Authors: A. Ritcey, J. R. Mcdermid, S. Ziada
Abstract:
Wall shear stress was experimentally measured under a planar impinging air jet as a function of jet Reynolds number (Rejet = 5000, 8000, 11000) and different normalized impingement distances (H/D = 4, 6, 8, 10, 12) using the razor blade technique to complete a parametric study. The wall pressure, wall pressure gradient, and wall shear stress information were obtained.Keywords: experimental fluid mechanics, impinging planar jets, skin friction factor, wall shear stress
Procedia PDF Downloads 3222278 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 3052277 Superconductor-Insulator Transition in Disordered Spin-1/2 Systems
Authors: E. Cuevas, M. Feigel'man, L. Ioffe, M. Mezard
Abstract:
The origin of continuous energy spectrum in large disordered interacting quantum systems is one of the key unsolved problems in quantum physics. While small quantum systems with discrete energy levels are noiseless and stay coherent forever in the absence of any coupling to external world, most large-scale quantum systems are able to produce thermal bath, thermal transport and excitation decay. This intrinsic decoherence is manifested by a broadening of energy levels which acquire a finite width. The important question is: What is the driving force and mechanism of transition(s) between two different types of many-body systems - with and without decoherence and thermal transport? Here, we address this question via two complementary approaches applied to the same model of quantum spin-1/2 system with XY-type exchange interaction and random transverse field. Namely, we develop analytical theory for this spin model on a Bethe lattice and implement numerical study of exact level statistics for the same spin model on random graph. This spin model is relevant to the study of pseudogaped superconductivity and S-I transition in some amorphous materials.Keywords: strongly correlated electrons, quantum phase transitions, superconductor, insulator
Procedia PDF Downloads 5822276 Field Study of Chlorinated Aliphatic Hydrocarbons Degradation in Contaminated Groundwater via Micron Zero-Valent Iron Coupled with Biostimulation
Authors: Naijin Wu, Peizhong Li, Haijian Wang, Wenxia Wei, Yun Song
Abstract:
Chlorinated aliphatic hydrocarbons (CAHs) pollution poses a severe threat to human health and is persistent in groundwater. Although chemical reduction or bioremediation is effective, it is still hard to achieve their complete and rapid dechlorination. Recently, the combination of zero-valent iron and biostimulation has been considered to be one of the most promising strategies, but field studies of this technology are scarce. In a typical site contaminated by various types of CAHs, basic physicochemical parameters of groundwater, CAHs and their product concentrations, and microbial abundance and diversity were monitored after a remediation slurry containing both micron zero-valent iron (mZVI) and biostimulation components were directly injected into the aquifer. Results showed that groundwater could form and keep low oxidation-reduction potential (ORP), a neutral pH, and anoxic conditions after different degrees of fluctuations, which was benefit for the reductive dechlorination of CAHs. The injection also caused an obvious increase in the total organic carbon (TOC) concentration and sulfate reduction. After 253 days post-injection, the mean concentration of total chlorinated ethylene (CEE) from two monitoring wells decreased from 304 μg/L to 8 μg/L, and total chlorinated ethane (CEA) decreased from 548 μg/L to 108 μg/L. Occurrence of chloroethane (CA) suggested that hydrogenolysis dechlorination was one of the main degradation pathways for CEA, and also hints that biological dechlorination was activated. A significant increase of ethylene at day 67 post-injection indicated that dechlorination was complete. Additionally, the total bacterial counts increased by 2-3 orders of magnitude after 253 days post-injection. And the microbial species richness decreased and gradually changed to anaerobic/fermentative bacteria. The relative abundance of potential degradation bacteria increased corresponding to the degradation of CAHs. This work demonstrates that mZVI and biostimulation can be combined to achieve the efficient removal of various CAHs from contaminated groundwater sources.Keywords: chlorinated aliphatic hydrocarbons, groundwater, field study, zero-valent iron, biostimulation
Procedia PDF Downloads 1652275 Framework Proposal on How to Use Game-Based Learning, Collaboration and Design Challenges to Teach Mechatronics
Authors: Michael Wendland
Abstract:
This paper presents a framework to teach a methodical design approach by the help of using a mixture of game-based learning, design challenges and competitions as forms of direct assessment. In today’s world, developing products is more complex than ever. Conflicting goals of product cost and quality with limited time as well as post-pandemic part shortages increase the difficulty. Common design approaches for mechatronic products mitigate some of these effects by helping the users with their methodical framework. Due to the inherent complexity of these products, the number of involved resources and the comprehensive design processes, students very rarely have enough time or motivation to experience a complete approach in one semester course. But, for students to be successful in the industrial world, it is crucial to know these methodical frameworks and to gain first-hand experience. Therefore, it is necessary to teach these design approaches in a real-world setting and keep the motivation high as well as learning to manage upcoming problems. This is achieved by using a game-based approach and a set of design challenges that are given to the students. In order to mimic industrial collaboration, they work in teams of up to six participants and are given the main development target to design a remote-controlled robot that can manipulate a specified object. By setting this clear goal without a given solution path, a constricted time-frame and limited maximal cost, the students are subjected to similar boundary conditions as in the real world. They must follow the methodical approach steps by specifying requirements, conceptualizing their ideas, drafting, designing, manufacturing and building a prototype using rapid prototyping. At the end of the course, the prototypes will be entered into a contest against the other teams. The complete design process is accompanied by theoretical input via lectures which is immediately transferred by the students to their own design problem in practical sessions. To increase motivation in these sessions, a playful learning approach has been chosen, i.e. designing the first concepts is supported by using lego construction kits. After each challenge, mandatory online quizzes help to deepen the acquired knowledge of the students and badges are awarded to those who complete a quiz, resulting in higher motivation and a level-up on a fictional leaderboard. The final contest is held in presence and involves all teams with their functional prototypes that now need to contest against each other. Prices for the best mechanical design, the most innovative approach and for the winner of the robotic contest are awarded. Each robot design gets evaluated with regards to the specified requirements and partial grades are derived from the results. This paper concludes with a critical review of the proposed framework, the game-based approach for the designed prototypes, the reality of the boundary conditions, the problems that occurred during the design and manufacturing process, the experiences and feedback of the students and the effectiveness of their collaboration as well as a discussion of the potential transfer to other educational areas.Keywords: design challenges, game-based learning, playful learning, methodical framework, mechatronics, student assessment, constructive alignment
Procedia PDF Downloads 672274 Comparison of 18F-FDG and 11C-Methionine PET-CT for Assessment of Response to Neoadjuvant Chemotherapy in Locally Advanced Breast Carcinoma
Authors: Sonia Mahajan Dinesh, Anant Dinesh, Madhavi Tripathi, Vinod Kumar Ramteke, Rajnish Sharma, Anupam Mondal
Abstract:
Background: Neo-adjuvant chemotherapy plays an important role in treatment of breast cancer by decreasing the tumour load and it offers an opportunity to evaluate response of primary tumour to chemotherapy. Standard anatomical imaging modalities are unable to accurately reflect the response to chemotherapy until several cycles of drug treatment have been completed. Metabolic imaging using tracers like 18F-fluorodeoxyglucose (FDG) as a marker of glucose metabolism or amino acid tracers like L-methyl-11C methionine (MET) have potential role for the measurement of treatment response. In this study, our objective was to compare these two PET tracers for assessment of response to neoadjuvant chemotherapy, in locally advanced breast carcinoma. Methods: In our prospective study, 20 female patients with histology proven locally advanced breast carcinoma underwent PET-CT imaging using FDG and MET before and after three cycles of neoadjuvant chemotherapy (CAF regimen). Thereafter, all patients were taken for MRM and the resected specimen was sent for histo-pathological analysis. Tumour response to the neoadjuvant chemotherapy was evaluated by PET-CT imaging using PERCIST criteria and correlated with histological results. Responses calculated were compared for statistical significance using paired t- test. Results: Mean SUVmax for primary lesion in FDG PET and MET PET was 15.88±11.12 and 5.01±2.14 respectively (p<0.001) and for axillary lymph nodes was 7.61±7.31 and 2.75±2.27 respectively (p=0.001). Statistically significant response in primary tumour and axilla was noted on both FDG and MET PET after three cycles of NAC. Complete response in primary tumour was seen in only 1 patient in FDG and 7 patients in MET PET (p=0.001) whereas there was no histological complete resolution of tumor in any patient. Response to therapy in axillary nodes noted on both PET scans were similar (p=0.45) and correlated well with histological findings. Conclusions: For the primary breast tumour, FDG PET has a higher sensitivity and accuracy than MET PET and for axilla both have comparable sensitivity and specificity. FDG PET shows higher target to background ratios so response is better predicted for primary breast tumour and axilla. Also, FDG-PET is widely available and has the advantage of a whole body evaluation in one study.Keywords: 11C-methionine, 18F-FDG, breast carcinoma, neoadjuvant chemotherapy
Procedia PDF Downloads 5102273 Wind Speed Data Analysis in Colombia in 2013 and 2015
Authors: Harold P. Villota, Alejandro Osorio B.
Abstract:
The energy meteorology is an area for study energy complementarity and the use of renewable sources in interconnected systems. Due to diversify the energy matrix in Colombia with wind sources, is necessary to know the data bases about this one. However, the time series given by 260 automatic weather stations have empty, and no apply data, so the purpose is to fill the time series selecting two years to characterize, impute and use like base to complete the data between 2005 and 2020.Keywords: complementarity, wind speed, renewable, colombia, characteri, characterization, imputation
Procedia PDF Downloads 1642272 Effects of Twitter Interactions on Self-Esteem and Narcissistic Behaviour
Authors: Leena-Maria Alyedreessy
Abstract:
Self-esteem is thought to be determined by ones’ own feeling of being included, liked and accepted by others. This research explores whether this concept may also be applied in the virtual world and assesses whether there is any relationship between Twitter users' self-esteem and the amount of interactions they receive. 20 female Arab participants were given a survey asking them about their Twitter interactions and their feelings of having an imagined audience to fill out and a Rosenberg Self-Esteem Assessment to complete. After completion and statistical analysis, results showed a significant correlation between the feeling of being Twitter elite, the feeling of having a lot of people listening to your tweets and having a lot of interactions with high self-esteem. However, no correlations were detected for low-self-esteem and low interactions.Keywords: twitter, social media, self-esteem, narcissism, interactions
Procedia PDF Downloads 4122271 Supporting Students with Autism Spectrum Disorder: A Model of Partnership and Capacity Building in Hong Kong
Authors: Irene T. Ho
Abstract:
Students with Autism Spectrum Disorder (ASD) studying in mainstream schools often face difficulties adjusting to school life and teachers often find it challenging to meet the needs of these students. The Hong Kong Jockey Club Autism Support Network (JC A-Connect) is an initiative launched in 2015 to enhance support for students with ASD as well as their families and schools. The School Support Programme of the Project aims at building the capacity of schools to provide quality education for these students. The present report provides a summary of the main features of the support model and the related evaluation results. The school support model was conceptualized in response to four observed needs: (1) inadequate teacher expertise in dealing with the related challenges, (2) the need to promote evidence-based practices in schools, (3) less than satisfactory home-school collaboration and whole-school participation, and (4) lack of concerted effort by different parties involved in providing support to schools. The resulting model had partnership and capacity building as two guiding tenets for the School Support Programme. There were two levels of partnership promoted in the project. At the programme support level, a platform that enables effective collaboration among major stakeholders was established, including the funding body that provides the necessary resources, the Education Bureau that helps to engage schools, university experts who provide professional leadership and research support, as well as non-governmental organization (NGO) professionals who provide services to the schools. At the programme implementation level, tripartite collaboration among teachers, parents and professionals was emphasized. This notion of partnership permeated efforts at capacity building targeting students with ASD, school personnel, parents and peers. During 2015 to 2018, school-based programmes were implemented in over 400 primary and secondary schools with the following features: (1) spiral Tier 2 (group) training for students with ASD to enhance their adaptive skills, led by professionals but with strong teacher involvement to promote transfer of knowledge and skills; (2) supplementary programmes for teachers, parents and peers to enhance their capability to support students with ASD; and (3) efforts at promoting continuing or transfer of learning, on the part of both students and teachers, to Tier 1 (classroom practice) and Tier 3 (individual training) contexts. Over 5,000 students participated in the Programme, representing about 50% of students diagnosed with ASD in mainstream public sector schools in Hong Kong. Results showed that the Programme was effective in helping students improve to various extents at three levels: achievement of specific training goals, improvement in adaptive skills in school, and change in ASD symptoms. The sense of competence of teachers and parents in dealing with ASD-related issues, measured by self-report rating scales, was also significantly enhanced. Moreover, effects on enhancing the school system to provide support for students with ASD, assessed according to indicators of inclusive education, were seen. The process and results of this Programme illustrate how obstacles to inclusive education for students with ASD could be overcome by strengthening the necessary partnerships and building the required capabilities of all parties concerned.Keywords: autism, school support, skills training, teacher development, three-tier model
Procedia PDF Downloads 972270 Geriatric Nutrition: An Important Marker for Oral Health Related Quality of Life of Complete Denture Patients
Authors: Rajlakshmi Banerjee, Sujoy Banerjee
Abstract:
The prevalence of malnutrition, as the most common cause of morbidity and mortality increases with old age, especially in developing countries like India, because of many factors out of which dentate status is one. It affects diet, nutritional status and general health due to reduced chewing ability and poor food choices. Aim and Objective: This study aimed to evaluate the effect of nutritional status, dietary intake on the Oral Health-related Quality of life (OHRQoL) of elderly edentulous complete denture wearing patients and to know whether they are at a higher risk of malnutrition. The objective was to assess the need to include dietary and nutritional counselling during Prosthodontic rehabilitation of elderly edentulous patients. Materials and method: A cross-sectional study was conducted among 200 elderly denture wearing patients above 60 yrs of age from Nagpur, Maharashtra. The majority of study subjects (60%) were between the age group 60 and 75 years. Mini-Nutritional Assessment (MNA) Questionnaire was used to assess nutritional status and General Oral Health Assessment Index (GOHAI) questionnaire was used to determine the Oral health related Quality of life of these patients.Descriptive statistics was used to analyze data using SPSS version 21. Results: Among the assessed subjects, nearly 80% of them had total scores of GOHAI between 12 and 57 which require ‘needed dental care.’ As per MNA, 10.5% had adequate nutrition, 70 % were at risk of malnutrition, and remaining 19.5 % of subjects were malnourished. There was a significant correlation between GOHAI and MNA scores. A strong association was found between mean GOHAI and MNA scores and thereby nutritional status and OHRQOL.Conclusion: The use of conventional dentures increases the risk of malnutrition in the elderly due to inability to eat and chew food properly and therefore severely affecting the quality of life. Dietary analysis and counselling should be strictly incorporated into geriatric treatment planning during Prosthetic rehabilitation.Keywords: general oral health assessment index, General Oral Health Assessment Index (GOHAI), nutritional assessment, mini-nutritional assessment, Mini-Nutritional Assessment (MNA), quality of life
Procedia PDF Downloads 2602269 Influence Zone of Strip Footing on Untreated and Cement Treated Sand Mat Underlain by Soft Clay (2nd reviewed)
Authors: Sharifullah Ahmed
Abstract:
Shallow foundation on soft soils without ground improvement can represent a high level of settlement. In such a case, an alternative to pile foundations may be shallow strip footings placed on a soil system in which the upper layer is untreated or cement-treated compacted sand to limit the settlement within a permissible level. This research work deals with a rigid plane-strain strip footing of 2.5m width placed on a soil consisting of untreated or cement treated sand layer underlain by homogeneous soft clay. Both the thin and thick compared the footing width was considered. The soft inorganic cohesive NC clay layer is considered undrained for plastic loading stages and drained in consolidation stages, and the sand layer is drained in all loading stages. FEM analysis was done using PLAXIS 2D Version 8.0 with a model consisting of clay deposits of 15m thickness and 18m width. The soft clay layer was modeled using the Hardening Soil Model, Soft Soil Model, Soft Soil Creep model, and the upper improvement layer was modeled using only the Hardening Soil Model. The system is considered fully saturated. The value of natural void ratio 1.2 is used. Total displacement fields of strip footing and subsoil layers in the case of Untreated and Cement treated Sand as Upper layer are presented. For Hi/B =0.6 or above, the distribution of major deformation within an upper layer and the influence zone of footing is limited in an upper layer which indicates the complete effectiveness of the upper layer in bearing the foundation effectively in case of the untreated upper layer. For Hi/B =0.3 or above, the distribution of major deformation occurred within an upper layer, and the function of footing is limited in the upper layer. This indicates the complete effectiveness of the cement-treated upper layer. Brittle behavior of cemented sand and fracture or cracks is not considered in this analysis.Keywords: displacement, ground improvement, influence depth, PLAXIS 2D, primary and secondary settlement, sand mat, soft clay
Procedia PDF Downloads 932268 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation
Authors: Sopheak Sorn, Kwok Yip Szeto
Abstract:
Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio
Procedia PDF Downloads 4192267 The First Complete Mitochondrial Genome of Melon Thrips, Thrips palmi (Thripinae: Thysanoptera): Vector for Tospoviruses
Authors: Kaomud Tyagi, Rajasree Chakraborty, Shantanu Kundu, Devkant Singha, Kailash Chandra, Vikas Kumar
Abstract:
The melon thrips, Thrips palmi is a serious pest of a wide range of agriculture crops and also act as vectors for plant viruses (genus Tospovirus, family Bunyaviridae). More molecular data on this species is required to understand the cryptic speciation and evolutionary affiliations. Mitochondrial genomes have been widely used in phylogenetic and evolutionary studies in insect. So far, mitogenomes of five thrips species (Anaphothrips obscurus, Frankliniella intonsa, Frankliniella occidentalis, Scirtothrips dorsalis and Thrips imaginis) is available in the GenBank database. In this study, we sequenced the first complete mitogenome T. palmi and compared it with available thrips mitogenomes. We assembled the mitogenome from the whole genome sequencing data generated using Illumina Hiseq2500. Annotation was performed using MITOS web-server to estimate the location of protein coding genes (PCGs), transfer RNA (tRNAs), ribosomal RNAs (rRNAs) and their secondary structures. The boundaries of PCGs and rRNAs was confirmed manually in NCBI. Phylogenetic analyses were performed using the 13 PCGs data using maximum likelihood (ML) in PAUP, and Bayesian inference (BI) in MrBayes 3.2. The complete mitogenome of T. palmi was 15,333 base pairs (bp), which was greater than the genomes of A. obscurus (14,890bp), F. intonsa (15,215 bp), F. occidentalis (14,889 bp) and S. dorsalis South Asia strain (SA1) (14,283 bp), but smaller than the genomes of T. imaginis (15,407 bp) and S. dorsalis East Asia strain (EA1) (15,343bp). Like in other thrips species, the mitochondrial genome of T. palmi was represented by 37 genes, including 13 PCGs, large and small ribosomal RNA (rrnL and rrnS) genes, 22 transfer RNA (tRNAs) genes (with one extra gene for trn-Serine) and two A+T-rich control regions (CR1 and CR2). Thirty one genes were observed on heavy (H) strand and six genes on the light (L) strand. The six tRNA genes (trnG,trnK, trnY, trnW, trnF, and trnH) were found to be conserved in all thrips species mitogenomes in their locations relative to a protein-coding or rRNA gene upstream or downstream. The gene arrangements of T. palmi is very close to T. imaginis except the rearrangements in tRNAs genes: trnR (arginine), and trnE (glutamic acid) were found to be located between cox3 and CR2 in T. imaginis which were translocated between atp6 and CR1 in T. palmi; trnL1 (Leucine) and trnS1(Serine) were located between atp6 and CR1 in T. imaginis which were translocated between cox3 and CR2 in T. palmi. The location of CR1 upstream of nad5 gene was suggested to be ancestral condition of the thrips species in subfamily Thripinae, was also observed in T. palmi. Both the Maximum likelihood (ML) and Bayesian Inference (BI) phylogenetic trees generated resulted in similar topologies. The T. palmi was clustered with T. imaginis. We concluded that more molecular data on the diverse thrips species from different hierarchical level is needed, to understand the phylogenetic and evolutionary relationships among them.Keywords: thrips, comparative mitogenomics, gene rearrangements, phylogenetic analysis
Procedia PDF Downloads 1682266 Laparoscopic Uterovaginal Anastomosis in Cervicovaginal Agenesis
Authors: Anamika Choudhary, Neha Qurrat Ain
Abstract:
Background: Congenital agenesis of uterine cervix is a rare anomaly often associated with partial or complete agenesis of vagina. Here is a case report of a 14 year old girl who presented with primary amenorrhea and cyclical abdominal pain since last one year with suprapubic mass palpable. On examination complete absence of a vagina was found, and ultrasound along with magnetic resonance imaging (MRI) suggested cervicovaginal agenesis associated with cryptomenorrhea, which resulted in hematometra and b/l hematosalpinx with pelvic endometriosis. After proper counseling regarding anastomosis failure and the need for future laprotomy or hysterectomy, the patient planned for laparoscopic uterovaginal anastomosis with modified McIndoe vaginoplasty with split skin graft. Case Summary: Chief complaint: The 14 year old girl presented with primary amenorrhea and cyclical abdominal pain. Diagnosis:On history, examination and investigations we made differential diagnoses of cervicovaginal agenesis, cervicovaginal atresia. Post operatively, we concluded it’s a cervicovaginal agenesis. Intervention: Laparoscopic uterovaginal anastomosis was done, and neovagina was created using split skin graft from the thigh and silicone stent. The graft was kept patent, and restenosis was prevented using a dental mould as vaginal dilator. Outcome: Postoperatively 1 year follow-up has been done. We have observed successful uterovaginal anastomosis and good uptake of graft. We also observed the resumption of normal menstrual bleeding. Currently, there has been no restenosis, abnormal vaginal discharge and decreased dysmenorrhea. Conclusion: Laparoscopic-assisted uterovaginal anastomosis can be the treatment of choice in patients with cervical agenesis and atresia instead of hysterectomy, thereby preserving the reproductive function. This conservative approach has better outcomes, as stated in the procedure below. The procedure is successful insofar as the resumption of menstrual function. However, long-term reproductive outcomes, progression of endometriosis, functioning of fallopian tubes, and sexual life in these girls will require further follow-up.Keywords: cervicovaginal agenesis, uterovaginal anastomosis, dental mould, silicon stent
Procedia PDF Downloads 222265 A Novel Machine Learning Approach to Aid Agrammatism in Non-fluent Aphasia
Authors: Rohan Bhasin
Abstract:
Agrammatism in non-fluent Aphasia Cases can be defined as a language disorder wherein a patient can only use content words ( nouns, verbs and adjectives ) for communication and their speech is devoid of functional word types like conjunctions and articles, generating speech of with extremely rudimentary grammar . Past approaches involve Speech Therapy of some order with conversation analysis used to analyse pre-therapy speech patterns and qualitative changes in conversational behaviour after therapy. We describe this approach as a novel method to generate functional words (prepositions, articles, ) around content words ( nouns, verbs and adjectives ) using a combination of Natural Language Processing and Deep Learning algorithms. The applications of this approach can be used to assist communication. The approach the paper investigates is : LSTMs or Seq2Seq: A sequence2sequence approach (seq2seq) or LSTM would take in a sequence of inputs and output sequence. This approach needs a significant amount of training data, with each training data containing pairs such as (content words, complete sentence). We generate such data by starting with complete sentences from a text source, removing functional words to get just the content words. However, this approach would require a lot of training data to get a coherent input. The assumptions of this approach is that the content words received in the inputs of both text models are to be preserved, i.e, won't alter after the functional grammar is slotted in. This is a potential limit to cases of severe Agrammatism where such order might not be inherently correct. The applications of this approach can be used to assist communication mild Agrammatism in non-fluent Aphasia Cases. Thus by generating these function words around the content words, we can provide meaningful sentence options to the patient for articulate conversations. Thus our project translates the use case of generating sentences from content-specific words into an assistive technology for non-Fluent Aphasia Patients.Keywords: aphasia, expressive aphasia, assistive algorithms, neurology, machine learning, natural language processing, language disorder, behaviour disorder, sequence to sequence, LSTM
Procedia PDF Downloads 164