Search results for: multiple classifiers
4406 Multimodal Data Fusion Techniques in Audiovisual Speech Recognition
Authors: Hadeer M. Sayed, Hesham E. El Deeb, Shereen A. Taie
Abstract:
In the big data era, we are facing a diversity of datasets from different sources in different domains that describe a single life event. These datasets consist of multiple modalities, each of which has a different representation, distribution, scale, and density. Multimodal fusion is the concept of integrating information from multiple modalities in a joint representation with the goal of predicting an outcome through a classification task or regression task. In this paper, multimodal fusion techniques are classified into two main classes: model-agnostic techniques and model-based approaches. It provides a comprehensive study of recent research in each class and outlines the benefits and limitations of each of them. Furthermore, the audiovisual speech recognition task is expressed as a case study of multimodal data fusion approaches, and the open issues through the limitations of the current studies are presented. This paper can be considered a powerful guide for interested researchers in the field of multimodal data fusion and audiovisual speech recognition particularly.Keywords: multimodal data, data fusion, audio-visual speech recognition, neural networks
Procedia PDF Downloads 1114405 Multiple Institutional Logics and the Ability of Institutional Entrepreneurs: An Analysis in the Turkish Education Field
Authors: Miraç Savaş Turhan, Ali Danişman
Abstract:
Recently scholars of new institutional theory have used institutional logics perspective to explain the contradictory practices in modern western societies. Accordingly, distinct institutional logics are embedded in central institutions such as the market, state, democracy, family, and religion. They guide individual and organizational actors and constraint their behaviors in a particular organizational field. Through this perspective, actors are assumed to have a situated, embedded, boundedly intentional, and adaptive role against the structure in social, cultural and political context. On the other hand, over a decade, there is an emerging attempt focusing on the role of actors on creating, maintaining, and changing the institutions. Such attempts brought out the concept of institutional entrepreneurs to explain the role of individual actors in relation to institutions. Institutional entrepreneurs are individuals, groups of individuals, organizations or groups of organizations that are able to initiate some actions to build, maintain or change institutions. While recent studies on institutional logics perspective have attempted to explain roles of entrepreneurial actors who have resources and skills, little is known about the effects of multiple institutional logics on the ability of institutional entrepreneurs. In this study, we aim to find out that how multiple institutional logics affect the ability of institutional entrepreneurs during the process of institutional change. We examine this issue in the Turkish Education Field. While institutional logics were identified based on the previous studies in the education field, the actions taken by Turkish National Education Ministry from 2003 to 2013 was examined through content analysis The early results indicate that there are remarkable shift and contradictions in the ability of institutional entrepreneur in taking actions to change the field in relationship to balance of power shift among the carriers of institutional logics.Keywords: institutional theory, institutional logics, institutional entrepreneurs, Turkish national education
Procedia PDF Downloads 3524404 Attempts for the Synthesis of Indol-Ring Fluorinated Tryptophan Derivatives to Enhance the Activity of Antimicrobial Peptides
Authors: Anita K. Kovacs, Peter Hegyes, Zsolt Bozso, Gabor Toth
Abstract:
Fluorination has been used extensively by the pharmaceutical industry as a strategy to improve the pharmacokinetics of drugs due to its effectiveness in increasing the potency of antimicrobial peptides (AMPs). Multiple-fluorinated indole-ring-containing tryptophan derivatives have the potential of having better antimicrobial activity than the widely used mono-fluorinated indole-ring containing tryptophan derivatives, but they are not available commercially. Therefore, our goal is to synthesize multiple-fluorinated indole-ring containing tryptophan derivatives to incorporate them into AMPs to enhance their antimicrobial activity. During our work, we are trying several methods (classical organic synthesis, enzymic synthesis, and solid phase peptide synthesis) for the synthesis of the said compounds, with mixed results. With classical organic synthesis (four different routes), we did not get the desired results. The reaction of serin with substituted indole in the presence of acetic anhydride led to racemic tryptophane; with the reaction of protected serin with indole in the presence of nickel complex was unsuccessful; the reaction of serin containing protected dipeptide with disuccinimidyl carbonate we achieved a tryptophane containing dipeptide, its chiral purity is being examined; the reaction of alcohol with substituted indole in the presence of copper complex was successful, but it was only a test reaction, we could not reproduce the same result with serine. The undergoing tryptophan-synthase method has shown some potential, but our work has not been finished yet. The successful synthesis of the desired multiple-fluorinated indole-ring-containing tryptophan will be followed by solid phase peptide synthesis in order to incorporate it into AMPs to enhance their antimicrobial activity. The successful completion of these phases will mean the possibility of manufacturing new, effective AMPs.Keywords: halogenation, fluorination, tryptophan, enhancement of antimicrobial activity
Procedia PDF Downloads 964403 Influences of Victimization Experiences on Delinquency: Comparison between Young Offenders and Non-Offenders
Authors: Yoshihiro Horio
Abstract:
Many young offenders grow up in difficult environments. It has often been suggested that many young offenders are victims of abuse. However, there were restricted to abuse or family’s problem. Little research has examined data on ‘multiple victimization’ experiences of young offenders. Thus, this study investigated the victimization experiences of young offenders, including child abuse at home, bullying at school, and crime in the community. Specifically, the number of victimization experiences of young offenders was compared with those of non-delinquents at home, school, and in the community. It was found that young offenders experienced significantly more victimization than non-delinquents. Additionally, the influence of childhood victimization on later misconduct and/or delinquency was examined, then it was founded that victimization experiences to be a risk factor for subsequent delinquency. The hierarchical multiple regression analysis showed that young offenders who had a strong emotional reaction to their experience of abuse began their misconduct at an earlier age. If juveniles start their misconduct early, the degree of delinquency will increase. The anger of young offenders was stronger than that of non-delinquents. A strong emotion of anger may be related to juvenile delinquency.Keywords: abuse, bullying, delinquency, victimization, young offenders
Procedia PDF Downloads 2434402 Quantitative Trait Loci Analysis in Multiple Sorghum Mapping Populations Facilitates the Dissection of Genetic Control of Drought Tolerance Related Traits in Sorghum [Sorghum bicolor (Moench)]
Authors: Techale B., Hongxu Dong, Mihrete Getinet, Aregash Gabizew, Andrew H. Paterson, Kassahun Bantte
Abstract:
The genetic architecture of drought tolerance is expected to involve multiple loci that are unlikely to all segregate for alternative alleles in a single bi-parental population. Therefore, the identification of quantitative trait loci (QTL) that are expressed in diverse genetic backgrounds of multiple bi-parental populations provides evidence about both background-specific and common genetic variants. The purpose of this study was to map QTL related to drought tolerance using three connected mapping populations of different genetic backgrounds to gain insight into the genomic landscape of this important trait in elite Ethiopian germplasm. The three bi-parental populations, each with 207 F₂:₃ lines, were evaluated using an alpha lattice design with two replications under two moisture stress environments. Drought tolerance related traits were analyzed separately for each population using composite interval mapping, finding a total of 105 QTLs. All the QTLs identified from individual populations were projected on a combined consensus map, comprising a total of 25 meta QTLs for seven traits. The consensus map allowed us to deduce locations of a larger number of markers than possible in any individual map, providing a reference for genetic studies in different genetic backgrounds. The mQTL identified in this study could be used for marker-assisted breeding programs in sorghum after validation. Only one trait, reduced leaf senescence, showed a striking bias of allele distribution, indicating substantial standing variation among present varieties that might be employed in improving drought tolerance of Ethiopian and other sorghums.Keywords: Drought tolerance , Mapping populations, Meta QTL, QTL mapping, Sorghum
Procedia PDF Downloads 1804401 The Use of Boosted Multivariate Trees in Medical Decision-Making for Repeated Measurements
Authors: Ebru Turgal, Beyza Doganay Erdogan
Abstract:
Machine learning aims to model the relationship between the response and features. Medical decision-making researchers would like to make decisions about patients’ course and treatment, by examining the repeated measurements over time. Boosting approach is now being used in machine learning area for these aims as an influential tool. The aim of this study is to show the usage of multivariate tree boosting in this field. The main reason for utilizing this approach in the field of decision-making is the ease solutions of complex relationships. To show how multivariate tree boosting method can be used to identify important features and feature-time interaction, we used the data, which was collected retrospectively from Ankara University Chest Diseases Department records. Dataset includes repeated PF ratio measurements. The follow-up time is planned for 120 hours. A set of different models is tested. In conclusion, main idea of classification with weighed combination of classifiers is a reliable method which was shown with simulations several times. Furthermore, time varying variables will be taken into consideration within this concept and it could be possible to make accurate decisions about regression and survival problems.Keywords: boosted multivariate trees, longitudinal data, multivariate regression tree, panel data
Procedia PDF Downloads 2034400 The Development of Integrated Real-Life Video and Animation with Addie Based on Constructive for Improving Students’ Mastery Concept in Rotational Dynamics
Authors: Silka Abyadati, Dadi Rusdiana, Enjang Akhmad Juanda
Abstract:
This study aims to investigate the students’ mastery concepts enhancement between students who are studying by using Integrated Real-Life Video and Animation (IRVA) and students who are studying without using IRVA. The development of IRVA is conducted by five stages: Analyze, Design, Development, Implementation and Evaluation (ADDIE) based on constructivist for Rotational Dynamics material in Physics learning. A constructivist model-based learning used is Interpretation Construction (ICON), which has the following phases: 1) Observation, 2) Construction interpretation, 3) Contextualization prior knowledge, 4) Conflict cognitive, 5) Learning cognitive, 6) Collaboration, 7) Multiple interpretation, 8) Multiple manifestation. The IRVA is developed for the stages of observation, cognitive conflict and cognitive learning. The sample of this study consisted of 32 students experimental group and a control group of 32 students in class XI of the school year 2015/2016 in one of Senior High Schools Bandung. The study was conducted by giving the pretest and posttest in the form of 20 items of multiple choice questions to determine the enhancement of mastery concept of Rotational Dynamics. Hypothesis testing is done by using T-test on the value of N-gain average of mastery concepts. The results showed that there is a significant difference in an enhancement of students’ mastery concepts between students who are studying by using IRVA and students who are studying without IRVA. Students in the experimental group increased by 0.468 while students in the control group increased by 0.207.Keywords: ADDIE, constructivist learning, Integrated Real-Life Video and Animation, mastery concepts, rotational dynamics
Procedia PDF Downloads 2314399 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking
Authors: Jinsiang Shaw, Pik-Hoe Chen
Abstract:
This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting
Procedia PDF Downloads 3334398 Exploring Reading into Writing: A Corpus-Based Analysis of Postgraduate Students’ Literature Review Essays
Authors: Tanzeela Anbreen, Ammara Maqsood
Abstract:
Reading into writing is one of university students' most required academic skills. The current study explored postgraduate university students’ writing quality using a corpus-based approach. Twelve postgraduate students’ literature review essays were chosen for the corpus-based analysis. These essays were chosen because students had to incorporate multiple reading sources in these essays, which was a new writing exercise for them. The students were provided feedback at least two times which comprised of the written comments by the tutor highlighting the areas of improvement and also by using the ‘track changes’ function. This exercise was repeated two times, and students submitted two drafts. This investigation included only the finally submitted work of the students. A corpus-based approach was adopted to analyse the essays because it promotes autonomous discovery and personalised learning. The aim of this analysis was to understand the existing level of students’ writing before the start of their postgraduate thesis. Text Inspector was used to analyse the quality of essays. With the help of the Text Inspector tool, the vocabulary used in the essays was compared to the English Vocabulary Profile (EVP), which describes what learners know and can do at each Common European Framework of Reference (CEFR) level. Writing quality was also measured for the Flesch reading ease score, which is a standard to describe the ease of understanding the writing content. The results reflected that students found writing essays using multiple sources challenging. In most essays, the vocabulary level achieved was between B1-B2 of the CEFL level. The study recommends that students need extensive training in developing academic writing skills, particularly in writing the literature review type assignment, which requires multiple sources citations.Keywords: literature review essays, postgraduate students, corpus-based analysis, vocabulary proficiency
Procedia PDF Downloads 734397 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 3394396 Optical Properties of a One Dimensional Graded Photonic Structure Based on Material Length Redistribution
Authors: Danny Manuel Calvo Velasco, Robert Sanchez Cano
Abstract:
By using the transference matrix formalism, in this work, it is presented the study of the optical properties of the 1D graded structure, constructed by multiple bi-layers of dielectric and air, considering a redistribution of the material lengths following an arithmetic progression as a function of two parameters. It is presented a factorization for the transference matrices for the graded structure, which allows the interpretation of their optical properties in terms of the properties of simpler structures. It is shown that the graded structure presents new transmission peaks, which can be controlled by the parameter values located in frequencies for which a periodic system has a photonic bandgap. This result is extended to the case of a photonic crystal for which the unitary cell is the proposed graded structure, showing new transmission bands which are due to the multiple new sub-structures present in the system. Also, for the TE polarization, it is observed transmission bands' low frequencies which present low variation of its width and position with the incidence angle. It is expected that these results could guide a route in the design of new photonic devices.Keywords: graded, material redistribution, photonic system, transference matrix
Procedia PDF Downloads 1394395 Impact of Instrument Transformer Secondary Connections on Performance of Protection System: Experiences from Indian POWERGRID
Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh, Sandeep Yadav
Abstract:
Protective relays are commonly connected to the secondary windings of instrument transformers, i.e., current transformers (CTs) and/or capacitive voltage transformers (CVTs). The purpose of CT and CVT is to provide galvanic isolation from high voltages and reduce primary currents and voltages to a nominal quantity recognized by the protective relays. Selecting the correct instrument transformers for an application is imperative: failing to do so may compromise the relay’s performance, as the output of the instrument transformer may no longer be an accurately scaled representation of the primary quantity. Having an accurately rated instrument transformer is of no use if these devices are not properly connected. The performance of the protective relay is reliant on its programmed settings and on the current and voltage inputs from the instrument transformers secondary. This paper will help in understanding the fundamental concepts of the connections of Instrument Transformers to the protection relays and the effect of incorrect connection on the performance of protective relays. Multiple case studies of protection system mal-operations due to incorrect connections of instrument transformers will be discussed in detail in this paper. Apart from the connection issue of instrument transformers to protective relays, this paper will also discuss the effect of multiple earthing of CTs and CVTs secondary on the performance of the protection system. Case studies presented in this paper will help the readers to analyse the problem through real-world challenges in complex power system networks. This paper will also help the protection engineer in better analysis of disturbance records. CT and CVT connection errors can lead to undesired operations of protection systems. However, many of these operations can be avoided by adhering to industry standards and implementing tried-and-true field testing and commissioning practices. Understanding the effect of missing neutral of CVT, multiple earthing of CVT secondary, and multiple grounding of CT star points on the performance of the protection system through real-world case studies will help the protection engineer in better commissioning the protection system and maintenance of the protection system.Keywords: bus reactor, current transformer, capacitive voltage transformer, distance protection, differential protection, directional earth fault, disturbance report, instrument transformer, ICT, REF protection, shunt reactor, voltage selection relay, VT fuse failure
Procedia PDF Downloads 814394 Youth Intelligent Personal Decision Aid
Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif
Abstract:
Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid
Procedia PDF Downloads 6324393 Applying Swanson's Theory of Caring to Manage Multiple Trauma Patient
Authors: Hsin-Yi Lo, Chia-Yu Hsu
Abstract:
This article is the nursing experience of a multiple trauma case using Swanson's theory of caring, the nursing period is from May 31 to June 4, 2021, collect data through observation, written talks, interviews, listening, direct care and physical assessment, established cases with health problems such as acute pain, impaired tissue integrity, and anxiety. Nursing process including, evaluate the pain index with the pain assessment scale, assist in acupoint massage, use a corset to fix the wound, and give the patient listening to favorite radio programs to divert attention and relieve pain problems; promote wound healing and avoid infection by assessing wound condition and exudation, changing dressings with aseptic technique, and providing appropriate dressings; encourage patients to express their feelings, provide companionship, and assist in self-care and participation in treatment plans, to enable the case to overcome the anxiety caused by being admitted to the intensive care unit for the first time and not knowing about the disease, and assist the case to overcome the injury caused by the accident and return to normal life. There is no video equipment in the intensive care unit during the nursing period. In response to the problem that family visits cannot be opened during the epidemic, it is a limitation this time. It is recommended that the hospital take this into consideration in the future. In the post-epidemic era, it can reduce the risk of various infections for patients and family members. Traveling between home and hospital, improving the quality of high-quality and technological care.Keywords: swanson's theory of caring, multiple trauma, anxiety, nursing experience
Procedia PDF Downloads 794392 Lifelong Multiple Victimization among Native and Immigrant Women in Portugal: Prevalence and Emotional (Dis)Adjustment
Authors: Mariana Goncalves, Marlene Matos
Abstract:
Despite the scientific attention that it has received, the research on the victimization of women continues to neglect some factors that may enhance the risk of women to victimization. This study sought to identify the prevalence and the lifelong trajectories of multiply victimized women (childhood, adolescence, and adulthood), the co-occurrence of different types of victimization, the contexts of occurrence and emotional adjustment and resilience. We used a convenience sample of 120 women multiply victimized, including 35 Portuguese natives and 85 immigrant women (e.g., Brazilian, African) who were recruited from support institutions and shelters. The results documented the similarities and differences concerning victimization between these groups and the intersectional factors that may elucidate vulnerability to victimization. There was a high co-occurrence of types of victimization, particularly in adulthood. The victimization reported occurred frequently in different contexts: familiar, workplace and helping institutions. A higher number of victimization experiences was related with more emotional symptomatology, less familiar cohesion and less social resources. The implications of the results are discussed.Keywords: multiple victimization, lifetime, natives, immigrants, prevalence, emotional adjustment
Procedia PDF Downloads 3664391 Images Selection and Best Descriptor Combination for Multi-Shot Person Re-Identification
Authors: Yousra Hadj Hassen, Walid Ayedi, Tarek Ouni, Mohamed Jallouli
Abstract:
To re-identify a person is to check if he/she has been already seen over a cameras network. Recently, re-identifying people over large public cameras networks has become a crucial task of great importance to ensure public security. The vision community has deeply investigated this area of research. Most existing researches rely only on the spatial appearance information from either one or multiple person images. Actually, the real person re-id framework is a multi-shot scenario. However, to efficiently model a person’s appearance and to choose the best samples to remain a challenging problem. In this work, an extensive comparison of descriptors of state of the art associated with the proposed frame selection method is studied. Specifically, we evaluate the samples selection approach using multiple proposed descriptors. We show the effectiveness and advantages of the proposed method by extensive comparisons with related state-of-the-art approaches using two standard datasets PRID2011 and iLIDS-VID.Keywords: camera network, descriptor, model, multi-shot, person re-identification, selection
Procedia PDF Downloads 2784390 Robust Recognition of Locomotion Patterns via Data-Driven Machine Learning in the Cloud Environment
Authors: Shinoy Vengaramkode Bhaskaran, Kaushik Sathupadi, Sandesh Achar
Abstract:
Human locomotion recognition is important in a variety of sectors, such as robotics, security, healthcare, fitness tracking and cloud computing. With the increasing pervasiveness of peripheral devices, particularly Inertial Measurement Units (IMUs) sensors, researchers have attempted to exploit these advancements in order to precisely and efficiently identify and categorize human activities. This research paper introduces a state-of-the-art methodology for the recognition of human locomotion patterns in a cloud environment. The methodology is based on a publicly available benchmark dataset. The investigation implements a denoising and windowing strategy to deal with the unprocessed data. Next, feature extraction is adopted to abstract the main cues from the data. The SelectKBest strategy is used to abstract optimal features from the data. Furthermore, state-of-the-art ML classifiers are used to evaluate the performance of the system, including logistic regression, random forest, gradient boosting and SVM have been investigated to accomplish precise locomotion classification. Finally, a detailed comparative analysis of results is presented to reveal the performance of recognition models.Keywords: artificial intelligence, cloud computing, IoT, human locomotion, gradient boosting, random forest, neural networks, body-worn sensors
Procedia PDF Downloads 114389 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture
Authors: Yong Xue, Daniel A. Menascé
Abstract:
Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain
Procedia PDF Downloads 5314388 Water Dumpflood into Multiple Low-Pressure Gas Reservoirs
Authors: S. Lertsakulpasuk, S. Athichanagorn
Abstract:
As depletion-drive gas reservoirs are abandoned when there is insufficient production rate due to pressure depletion, waterflooding has been proposed to increase the reservoir pressure in order to prolong gas production. Due to high cost, water injection may not be economically feasible. Water dumpflood into gas reservoirs is a new promising approach to increase gas recovery by maintaining reservoir pressure with much cheaper costs than conventional waterflooding. Thus, a simulation study of water dumpflood into multiple nearly abandoned or already abandoned thin-bedded gas reservoirs commonly found in the Gulf of Thailand was conducted to demonstrate the advantage of the proposed method and to determine the most suitable operational parameters for reservoirs having different system parameters. A reservoir simulation model consisting of several thin-layered depletion-drive gas reservoirs and an overlying aquifer was constructed in order to investigate the performance of the proposed method. Two producers were initially used to produce gas from the reservoirs. One of them was later converted to a dumpflood well after gas production rate started to decline due to continuous reduction in reservoir pressure. The dumpflood well was used to flow water from the aquifer to increase pressure of the gas reservoir in order to drive gas towards producer. Two main operational parameters which are wellhead pressure of producer and the time to start water dumpflood were investigated to optimize gas recovery for various systems having different gas reservoir dip angles, well spacings, aquifer sizes, and aquifer depths. This simulation study found that water dumpflood can increase gas recovery up to 12% of OGIP depending on operational conditions and system parameters. For the systems having a large aquifer and large distance between wells, it is best to start water dumpflood when the gas rate is still high since the long distance between the gas producer and dumpflood well helps delay water breakthrough at producer. As long as there is no early water breakthrough, the earlier the energy is supplied to the gas reservoirs, the better the gas recovery. On the other hand, for the systems having a small or moderate aquifer size and short distance between the two wells, performing water dumpflood when the rate is close to the economic rate is better because water is more likely to cause an early breakthrough when the distance is short. Water dumpflood into multiple nearly-depleted or depleted gas reservoirs is a novel study. The idea of using water dumpflood to increase gas recovery has been mentioned in the literature but has never been investigated. This detailed study will help a practicing engineer to understand the benefits of such method and can implement it with minimum cost and risk.Keywords: dumpflood, increase gas recovery, low-pressure gas reservoir, multiple gas reservoirs
Procedia PDF Downloads 4444387 Study of the Biological Activity of a Ganglioside-Containing Drug (Cronassil) in an Experimental Model of Multiple Sclerosis
Authors: Hasmik V. Zanginyan, Gayane S. Ghazaryan, Laura M. Hovsepyan
Abstract:
Experimental autoimmune encephalomyelitis (EAE) is an inflammatory demyelinating disease of the central nervous system that is induced in laboratory animals by developing an immune response against myelin epitopes. The typical clinical course is ascending palsy, which correlates with inflammation and tissue damage in the thoracolumbar spinal cord, although the optic nerves and brain (especially the subpial white matter and brainstem) are also often affected. With multiple sclerosis, there is a violation of lipid metabolism in myelin. When membrane lipids (glycosphingolipids, phospholipids) are disturbed, metabolites not only play a structural role in membranes but are also sources of secondary mediators that transmit multiple cellular signals. The purpose of this study was to investigate the effect of ganglioside as a therapeutic agent in experimental multiple sclerosis. The biological activity of a ganglioside-containing medicinal preparation (Cronassial) was evaluated in an experimental model of multiple sclerosis in laboratory animals. An experimental model of multiple sclerosis in rats was obtained by immunization with myelin basic protein (MBP), as well as homogenization of the spinal cord or brain. EAE was induced by administering a mixture of an encephalitogenic mixture (EGM) with Complete Freund’s Adjuvant. Mitochondrial fraction was isolated in a medium containing 0,25 M saccharose and 0, 01 M tris buffer, pH - 7,4, by a method of differential centrifugation on a K-24 centrifuge. Glutathione peroxidase activity was assessed by reduction reactions of hydrogen peroxide (H₂O₂) and lipid hydroperoxides (ROOH) in the presence of GSH. LPO activity was assessed by the amount of malondialdehyde (MDA) in the total homogenate and mitochondrial fraction of the spinal cord and brain of control and experimental autoimmune encephalomyelitis rats. MDA was assessed by a reaction with Thiobarbituric acid. For statistical data analysis on PNP, SPSS (Statistical Package for Social Science) package was used. The nature of the distribution of the obtained data was determined by the Kolmogorov-Smirnov criterion. The comparative analysis was performed using a nonparametric Mann-Whitney test. The differences were statistically significant when р ≤ 0,05 or р ≤ 0,01. Correlational analysis was conducted using a nonparametric Spearman test. In the work, refrigeratory centrifuge, spectrophotometer LKB Biochrom ULTROSPECII (Sweden), pH-meter PL-600 mrc (Israel), guanosine, and ATP (Sigma). The study of the process of lipid peroxidation in the total homogenate of the brain and spinal cord in experimental animals revealed an increase in the content of malonic dialdehyde. When applied, Cronassial observed normalization of lipid peroxidation processes. Reactive oxygen species, causing lipid peroxidation processes, can be toxic both for neurons and for oligodendrocytes that form myelin, causing a violation of their lipid composition. The high content of lipids in the brain and the uniqueness of their structure determines the nature of the development of LPO processes. The lipid layer of cellular and intracellular membranes performs two main functions -barrier and matrix (structural). Damage to the barrier leads to dysregulation of intracellular processes and severe disorders of cellular functions.Keywords: experimental autoimmune encephalomyelitis, multiple sclerosis, neuroinflammation, therapy
Procedia PDF Downloads 924386 Exploring Data Leakage in EEG Based Brain-Computer Interfaces: Overfitting Challenges
Authors: Khalida Douibi, Rodrigo Balp, Solène Le Bars
Abstract:
In the medical field, applications related to human experiments are frequently linked to reduced samples size, which makes the training of machine learning models quite sensitive and therefore not very robust nor generalizable. This is notably the case in Brain-Computer Interface (BCI) studies, where the sample size rarely exceeds 20 subjects or a few number of trials. To address this problem, several resampling approaches are often used during the data preparation phase, which is an overly critical step in a data science analysis process. One of the naive approaches that is usually applied by data scientists consists in the transformation of the entire database before the resampling phase. However, this can cause model’ s performance to be incorrectly estimated when making predictions on unseen data. In this paper, we explored the effect of data leakage observed during our BCI experiments for device control through the real-time classification of SSVEPs (Steady State Visually Evoked Potentials). We also studied potential ways to ensure optimal validation of the classifiers during the calibration phase to avoid overfitting. The results show that the scaling step is crucial for some algorithms, and it should be applied after the resampling phase to avoid data leackage and improve results.Keywords: data leackage, data science, machine learning, SSVEP, BCI, overfitting
Procedia PDF Downloads 1534385 A Proposal of Multi-modal Teaching Model for College English
Authors: Huang Yajing
Abstract:
Multimodal discourse refers to the phenomenon of using various senses such as hearing, vision, and touch to communicate through various means and symbolic resources such as language, images, sounds, and movements. With the development of modern technology and multimedia, language and technology have become inseparable, and foreign language teaching is becoming more and more modal. Teacher-student communication resorts to multiple senses and uses multiple symbol systems to construct and interpret meaning. The classroom is a semiotic space where multimodal discourses are intertwined. College English multi-modal teaching is to rationally utilize traditional teaching methods while mobilizing and coordinating various modern teaching methods to form a joint force to promote teaching and learning. Multimodal teaching makes full and reasonable use of various meaning resources and can maximize the advantages of multimedia and network environments. Based upon the above theories about multimodal discourse and multimedia technology, the present paper will propose a multi-modal teaching model for college English in China.Keywords: multimodal discourse, multimedia technology, English education, applied linguistics
Procedia PDF Downloads 684384 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 1184383 Analysis of Labor Behavior Effect on Occupational Health and Safety Management by Multiple Linear Regression
Authors: Yulinda Rizky Pratiwi, Fuji Anugrah Emily
Abstract:
Management of Occupational Safety and Health (OSH) are appropriately applied properly by all workers and pekarya in the company. K3 management application also has become very important to prevent accidents. Violation of the rules regarding the K3 has often occurred from time to time. By 2015 the number of occurrences of a violation of the K3 or so-called unsafe action tends to increase. Until finally in January 2016, the number increased drastically unsafe action. Trigger increase in the number of unsafe action is a decrease in the quality of management practices K3. While the application of K3 management performed by each individual thought to be influenced by the attitude and observation guide the actions of each of the individual. In addition to the decline in the quality of K3 management application may result in increased likelihood of accidents and losses for the company as well as the local co-workers. The big difference in the number of unsafe action is very significant in the month of January 2016, making the company Pertamina as the national oil company must do a lot of effort to keep track of how the implementation of K3 management on every worker and pekarya, one at PT Pertamina EP Cepu Field Asset IV. To consider the effort to control the implementation of K3 management can be seen from the attitude and observation guide the actions of the workers and pekarya. By using Multiple Linear Regression can be seen the influence of attitude and action observation guide workers and pekarya the K3 management application that has been done. The results showed that scores K3 management application of each worker and pekarya will increase by 0.764 if the score pekarya worker attitudes and increase one unit, whereas if the score Reassurance action guidelines and pekarya workers increased by one unit then the score management application K3 will increase by 0.754.Keywords: occupational safety and health, management of occupational safety and health, unsafe action, multiple linear regression
Procedia PDF Downloads 2304382 Skull Extraction for Quantification of Brain Volume in Magnetic Resonance Imaging of Multiple Sclerosis Patients
Authors: Marcela De Oliveira, Marina P. Da Silva, Fernando C. G. Da Rocha, Jorge M. Santos, Jaime S. Cardoso, Paulo N. Lisboa-Filho
Abstract:
Multiple Sclerosis (MS) is an immune-mediated disease of the central nervous system characterized by neurodegeneration, inflammation, demyelination, and axonal loss. Magnetic resonance imaging (MRI), due to the richness in the information details provided, is the gold standard exam for diagnosis and follow-up of neurodegenerative diseases, such as MS. Brain atrophy, the gradual loss of brain volume, is quite extensive in multiple sclerosis, nearly 0.5-1.35% per year, far off the limits of normal aging. Thus, the brain volume quantification becomes an essential task for future analysis of the occurrence atrophy. The analysis of MRI has become a tedious and complex task for clinicians, who have to manually extract important information. This manual analysis is prone to errors and is time consuming due to various intra- and inter-operator variability. Nowadays, computerized methods for MRI segmentation have been extensively used to assist doctors in quantitative analyzes for disease diagnosis and monitoring. Thus, the purpose of this work was to evaluate the brain volume in MRI of MS patients. We used MRI scans with 30 slices of the five patients diagnosed with multiple sclerosis according to the McDonald criteria. The computational methods for the analysis of images were carried out in two steps: segmentation of the brain and brain volume quantification. The first image processing step was to perform brain extraction by skull stripping from the original image. In the skull stripper for MRI images of the brain, the algorithm registers a grayscale atlas image to the grayscale patient image. The associated brain mask is propagated using the registration transformation. Then this mask is eroded and used for a refined brain extraction based on level-sets (edge of the brain-skull border with dedicated expansion, curvature, and advection terms). In the second step, the brain volume quantification was performed by counting the voxels belonging to the segmentation mask and converted in cc. We observed an average brain volume of 1469.5 cc. We concluded that the automatic method applied in this work can be used for the brain extraction process and brain volume quantification in MRI. The development and use of computer programs can contribute to assist health professionals in the diagnosis and monitoring of patients with neurodegenerative diseases. In future works, we expect to implement more automated methods for the assessment of cerebral atrophy and brain lesions quantification, including machine-learning approaches. Acknowledgements: This work was supported by a grant from Brazilian agency Fundação de Amparo à Pesquisa do Estado de São Paulo (number 2019/16362-5).Keywords: brain volume, magnetic resonance imaging, multiple sclerosis, skull stripper
Procedia PDF Downloads 1464381 Predictors of School Safety Awareness among Malaysian Primary School Teachers
Authors: Ssekamanya, Mastura Badzis, Khamsiah Ismail, Dayang Shuzaidah Bt Abduludin
Abstract:
With rising incidents of school violence worldwide, educators and researchers are trying to understand and find ways to enhance the safety of children at school. The purpose of this study was to investigate the extent to which the demographic variables of gender, age, length of service, position, academic qualification, and school location predicted teachers’ awareness about school safety practices in Malaysian primary schools. A stratified random sample of 380 teachers was selected in the central Malaysian states of Kuala Lumpur and Selangor. Multiple regression analysis revealed that none of the factors was a good predictor of awareness about school safety training, delivery methods of school safety information, and available school safety programs. Awareness about school safety activities was significantly predicted by school location (whether the school was located in a rural or urban area). While these results may reflect a general lack of awareness about school safety among primary school teachers in the selected locations, a national study needs to be conducted for the whole country.Keywords: school safety awareness, predictors of school safety, multiple regression analysis, malaysian primary schools
Procedia PDF Downloads 4684380 Towards End-To-End Disease Prediction from Raw Metagenomic Data
Authors: Maxence Queyrel, Edi Prifti, Alexandre Templier, Jean-Daniel Zucker
Abstract:
Analysis of the human microbiome using metagenomic sequencing data has demonstrated high ability in discriminating various human diseases. Raw metagenomic sequencing data require multiple complex and computationally heavy bioinformatics steps prior to data analysis. Such data contain millions of short sequences read from the fragmented DNA sequences and stored as fastq files. Conventional processing pipelines consist in multiple steps including quality control, filtering, alignment of sequences against genomic catalogs (genes, species, taxonomic levels, functional pathways, etc.). These pipelines are complex to use, time consuming and rely on a large number of parameters that often provide variability and impact the estimation of the microbiome elements. Training Deep Neural Networks directly from raw sequencing data is a promising approach to bypass some of the challenges associated with mainstream bioinformatics pipelines. Most of these methods use the concept of word and sentence embeddings that create a meaningful and numerical representation of DNA sequences, while extracting features and reducing the dimensionality of the data. In this paper we present an end-to-end approach that classifies patients into disease groups directly from raw metagenomic reads: metagenome2vec. This approach is composed of four steps (i) generating a vocabulary of k-mers and learning their numerical embeddings; (ii) learning DNA sequence (read) embeddings; (iii) identifying the genome from which the sequence is most likely to come and (iv) training a multiple instance learning classifier which predicts the phenotype based on the vector representation of the raw data. An attention mechanism is applied in the network so that the model can be interpreted, assigning a weight to the influence of the prediction for each genome. Using two public real-life data-sets as well a simulated one, we demonstrated that this original approach reaches high performance, comparable with the state-of-the-art methods applied directly on processed data though mainstream bioinformatics workflows. These results are encouraging for this proof of concept work. We believe that with further dedication, the DNN models have the potential to surpass mainstream bioinformatics workflows in disease classification tasks.Keywords: deep learning, disease prediction, end-to-end machine learning, metagenomics, multiple instance learning, precision medicine
Procedia PDF Downloads 1254379 The Sexual Knowledge, Attitudes and Behaviors of College Students from Only-Child Families: A National Survey in China
Authors: Jiashu Shen
Abstract:
This study aims at exploring the characteristics of sexual knowledge, attitudes, and behaviors of Chinese college students from the 'one-child' families compared with those with siblings. This study utilized the data from the 'National College Student Survey on Sexual and Reproductive Health 2019'. Multiple logistic regression analyses were used to assess the association between the 'only-child' and their sexual knowledge, sexual attitudes, sexual behaviors, and risky sexual behaviors (RSB) stratified by sex and home regions, respectively. Compared with students with siblings, the 'only-child' students scored higher in sex-related knowledge (only-child students: 4.49 ± 2.28, students with siblings: 3.60 ± 2.27). Stronger associations between only-child and more liberal sexual attitudes were found in urban areas, including the approval of premarital sexual intercourse (OR: 1.51, 95% CI: 1.50-1.65) and multiple sexual partners (OR: 1.85, 95% CI: 1.72-1.99). For risky sexual behaviors, being only-child is more likely to use condoms in first sexual intercourse, especially among male students (OR: 0.68, 95% CI: 0.58-0.80). Only-child students are more likely to have more sexual knowledge, more liberal sexual attitude, and less risky sexual behavior. Further health policy and sex education should focus more on students with siblings.Keywords: attitudes and behaviors, only-child students, sexual knowledge, students with siblings
Procedia PDF Downloads 1824378 Software Quality Assurance in 5G Technology-Redefining Wireless Communication: A Comprehensive Survey
Authors: Sumbal Riaz, Sardar-un-Nisa, Mehreen Sirshar
Abstract:
5G - The 5th generation of mobile phone and data communication standards is the next edge of innovation for whole mobile industry. 5G is Real Wireless World System and it will provide a totally wireless communication system all over the world without limitations. 5G uses many 4g technologies and it will hit the market in 2020. This research is the comprehensive survey on the quality parameters of 5G technology.5G provide High performance, Interoperability, easy roaming, fully converged services, friendly interface and scalability at low cost. To meet the traffic demands in future fifth generation wireless communications systems will include i) higher densification of heterogeneous networks with massive deployment of small base stations supporting various Radio Access Technologies (RATs), ii) use of massive Multiple Input Multiple Output (MIMO) arrays, iii) use of millimetre Wave spectrum where larger wider frequency bands are available, iv) direct device to device (D2D) communication, v) simultaneous transmission and reception, vi) cognitive radio technology.Keywords: 5G, 5th generation, innovation, standard, wireless communication
Procedia PDF Downloads 4444377 Online Handwritten Character Recognition for South Indian Scripts Using Support Vector Machines
Authors: Steffy Maria Joseph, Abdu Rahiman V, Abdul Hameed K. M.
Abstract:
Online handwritten character recognition is a challenging field in Artificial Intelligence. The classification success rate of current techniques decreases when the dataset involves similarity and complexity in stroke styles, number of strokes and stroke characteristics variations. Malayalam is a complex south indian language spoken by about 35 million people especially in Kerala and Lakshadweep islands. In this paper, we consider the significant feature extraction for the similar stroke styles of Malayalam. This extracted feature set are suitable for the recognition of other handwritten south indian languages like Tamil, Telugu and Kannada. A classification scheme based on support vector machines (SVM) is proposed to improve the accuracy in classification and recognition of online malayalam handwritten characters. SVM Classifiers are the best for real world applications. The contribution of various features towards the accuracy in recognition is analysed. Performance for different kernels of SVM are also studied. A graphical user interface has developed for reading and displaying the character. Different writing styles are taken for each of the 44 alphabets. Various features are extracted and used for classification after the preprocessing of input data samples. Highest recognition accuracy of 97% is obtained experimentally at the best feature combination with polynomial kernel in SVM.Keywords: SVM, matlab, malayalam, South Indian scripts, onlinehandwritten character recognition
Procedia PDF Downloads 574