Search results for: Support Vector Machines (SVM)
7710 Ophthalmic Hashing Based Supervision of Glaucoma and Corneal Disorders Imposed on Deep Graphical Model
Authors: P. S. Jagadeesh Kumar, Yang Yung, Mingmin Pan, Xianpei Li, Wenli Hu
Abstract:
Glaucoma is impelled by optic nerve mutilation habitually represented as cupping and visual field injury frequently with an arcuate pattern of mid-peripheral loss, subordinate to retinal ganglion cell damage and death. Glaucoma is the second foremost cause of blindness and the chief cause of permanent blindness worldwide. Consequently, all-embracing study into the analysis and empathy of glaucoma is happening to escort deep learning based neural network intrusions to deliberate this substantial optic neuropathy. This paper advances an ophthalmic hashing based supervision of glaucoma and corneal disorders preeminent on deep graphical model. Ophthalmic hashing is a newly proposed method extending the efficacy of visual hash-coding to predict glaucoma corneal disorder matching, which is the faster than the existing methods. Deep graphical model is proficient of learning interior explications of corneal disorders in satisfactory time to solve hard combinatoric incongruities using deep Boltzmann machines.Keywords: corneal disorders, deep Boltzmann machines, deep graphical model, glaucoma, neural networks, ophthalmic hashing
Procedia PDF Downloads 2507709 Optimizing Water Consumption of a Washer-Dryer Which Contains Water Condensation Technology under a Constraint of Energy Consumption and Drying Performance
Authors: Aysegul Sarac
Abstract:
Washer-dryers are the machines which can either wash the laundries or can dry them. In other words, we can define a washer-dryer as a washing machine and a dryer in one machine. Washing machines are characterized by the loading capacity, cabinet depth and spin speed. Dryers are characterized by the drying technology. On the other hand, energy efficiency, water consumption, and noise levels are main characteristics that influence customer decisions to buy washers. Water condensation technology is the most common drying technology existing in the washer-dryer market. Water condensation technology uses water to dry the laundry inside the machine. Thus, in this type of the drying technology water consumption is at high levels comparing other technologies. Water condensation technology sprays cold water in the drum to condense the humidity of hot weather in order to dry the laundry inside. Thus, water consumption influences the drying performance. The scope of this study is to optimize water consumption during drying process under a constraint of energy consumption and drying performance. We are using 6-Sigma methodology to find the optimum water consumption by comparing drying performances of different drying algorithms.Keywords: optimization, 6-Sigma methodology, washer-dryers, water condensation technology
Procedia PDF Downloads 3607708 Teaching Young Learners How to Work Together: Pedagogical Ideas for Language Teachers
Authors: Tomas Kos
Abstract:
An increasing body of research has explored patterns of interaction and peer support among young learners. Although some studies suggest that young learners can collaborate and support each other, other studies indicate that young learners may lack the ability to work together and support one another when interacting on classroom tasks. Moreover, despite the claims that peer collaboration is conducive to learning, studies have not paid enough attention to the “how” to enhance peer collaboration on classroom tasks. To fill this gap, this “how-to” article proposes that teaching young learners how to work together is a powerful pedagogical tool that can greatly improve collaborative behavior and a sense of mutuality among young learners. This article will pay particular attention to primary schools and the context of English as a foreign language. It will first review literature related to patterns of interaction and peer support conducted in the cognitive and sociocultural framework. It will then address what it actually means to collaborate. At the heart of the article, it will discuss some practical pedagogical ideas for language teachers, which entail teaching collaborative principles and strategies that will help their students to support each other and engage in communication with each other.Keywords: young learners, peer collaboration, peer interaction, peer support, patterns of interaction
Procedia PDF Downloads 1577707 Tackling the Digital Divide: Enhancing Video Consultation Access for Digital Illiterate Patients in the Hospital
Authors: Wieke Ellen Bouwes
Abstract:
This study aims to unravel which factors enhance accessibility of video consultations (VCs) for patients with low digital literacy. Thirteen in-depth interviews with patients, hospital employees, eHealth experts, and digital support organizations were held. Patients with low digital literacy received in-home support during real-time video consultations and are observed during the set-up of these consultations. Key findings highlight the importance of patient acceptance, emphasizing video consultations benefits and avoiding standardized courses. The lack of a uniform video consultation system across healthcare providers poses a barrier. Familiarity with support organizations – to support patients in usage of digital tools - among healthcare practitioners enhances accessibility. Moreover, considerations regarding the Dutch General Data Protection Regulation (GDPR) law influence support patients receive. Also, provider readiness to use video consultations influences patient access. Further, alignment between learning styles and support methods seems to determine abilities to learn how to use video consultations. Future research could delve into tailored learning styles and technological solutions for remote access to further explore effectiveness of learning methods.Keywords: video consultations, digital literacy skills, effectiveness of support, intra- and inter-organizational relationships, patient acceptance of video consultations
Procedia PDF Downloads 747706 Beyond Sport: Understanding the Retirement Experiences and Support Needs of Retired Elite Athletes
Authors: Nadia Jurkovic, Sarven McLinton, Alyson Crozier, Amber Mosewich, Ed O'Connor
Abstract:
Retiring from elite sport can have detrimental effects on the mental health and life satisfaction of retired elite athletes. To aid in this transition, sporting organisations use retirement interventions. The aim of this study is to understand the experience of elite sport retirement from a holistic perspective, exploring the experiences of retiring athletes, retired athletes, and sport support staff. A secondary aim is used to uncover any recommendations both retiring/retired athletes and sport support staff suggest towards improving retirement programs or interventions. A total of N=15 participants took part in semi-structured interviews to explore their experiences with sport retirement. Retiring and retired elite athletes were asked about how they felt during their transition into retirement, and sport support staff were asked about their experience working with retiring athletes. Data collection and iterative qualitative analysis are still ongoing; however, it is anticipated that the final key themes to emerge will include isolation, identity loss, and lack of support, with varying sub-themes such as organisational support and family support. Relationships across and within themes will be explored within the study. The anticipated findings present retiring from elite sports as a challenging life and career transition; however, current support and resources for elite athletes are not addressing the core difficulties experienced by retiring elite athletes. The findings of this study will inform future development of new co-designed elite sport retirement interventions.Keywords: elite athlete, retired elite athlete, retirement interventions, transition into retirement, interviews
Procedia PDF Downloads 137705 An Optimization Model for Waste Management in Demolition Works
Authors: Eva Queheille, Franck Taillandier, Nadia Saiyouri
Abstract:
Waste management has become a major issue in demolition works, because of its environmental impact (energy consumption, resource consumption, pollution…). However, improving waste management requires to take also into account the overall demolition process and to consider demolition main objectives (e.g. cost, delay). Establishing a strategy with these conflicting objectives (economic and environment) remains complex. In order to provide a decision-support for demolition companies, a multi-objective optimization model was developed. In this model, a demolition strategy is computed from a set of 80 decision variables (worker team composition, machines, treatment for each type of waste, choice of treatment platform…), which impacts the demolition objectives. The model has experimented on a real-case study (demolition of several buildings in France). To process the optimization, different optimization algorithms (NSGA2, MOPSO, DBEA…) were tested. Results allow the engineer in charge of this case, to build a sustainable demolition strategy without affecting cost or delay.Keywords: deconstruction, life cycle assessment, multi-objective optimization, waste management
Procedia PDF Downloads 1527704 On One New Solving Approach of the Plane Mixed Problem for an Elastic Semistrip
Authors: Natalia D. Vaysfel’d, Zinaida Y. Zhuravlova
Abstract:
The loaded plane elastic semistrip, the lateral boundaries of which are fixed, is considered. The integral transformations are applied directly to Lame’s equations. It leads to one dimensional boundary value problem in the transformations’ domain which is formulated as a vector one. With the help of the matrix differential calculation’s apparatus and apparatus of Green matrix function the exact solution of a vector problem is constructed. After the satisfying the boundary condition at the semi strip’s edge the problem is reduced to the solving of the integral singular equation with regard of the unknown stress at the semis trip’s edge. The equation is solved with the orthogonal polynomials method that takes into consideration the real singularities of the solution at the ends of integration interval. The normal stress at the edge of the semis trip were calculated and analyzed.Keywords: semi strip, Green's Matrix, fourier transformation, orthogonal polynomials method
Procedia PDF Downloads 4317703 CRISPR-DT: Designing gRNAs for the CRISPR-Cpf1 System with Improved Target Efficiency and Specificity
Authors: Houxiang Zhu, Chun Liang
Abstract:
The CRISPR-Cpf1 system has been successfully applied in genome editing. However, target efficiency of the CRISPR-Cpf1 system varies among different gRNA sequences. The published CRISPR-Cpf1 gRNA data was reanalyzed. Many sequences and structural features of gRNAs (e.g., the position-specific nucleotide composition, position-nonspecific nucleotide composition, GC content, minimum free energy, and melting temperature) correlated with target efficiency were found. Using machine learning technology, a support vector machine (SVM) model was created to predict target efficiency for any given gRNAs. The first web service application, CRISPR-DT (CRISPR DNA Targeting), has been developed to help users design optimal gRNAs for the CRISPR-Cpf1 system by considering both target efficiency and specificity. CRISPR-DT will empower researchers in genome editing.Keywords: CRISPR-Cpf1, genome editing, target efficiency, target specificity
Procedia PDF Downloads 2627702 Modeling and Power Control of DFIG Used in Wind Energy System
Authors: Nadia Ben Si Ali, Nadia Benalia, Nora Zerzouri
Abstract:
Wind energy generation has attracted great interests in recent years. Doubly Fed Induction Generator (DFIG) for wind turbines are largely deployed because variable-speed wind turbines have many advantages over fixed-speed generation such as increased energy capture, operation at maximum power point, improved efficiency, and power quality. This paper presents the operation and vector control of a Doubly-fed Induction Generator (DFIG) system where the stator is connected directly to a stiff grid and the rotor is connected to the grid through bidirectional back-to-back AC-DC-AC converter. The basic operational characteristics, mathematical model of the aerodynamic system and vector control technique which is used to obtain decoupled control of powers are investigated using the software Mathlab/Simulink.Keywords: wind turbine, Doubly Fed Induction Generator, wind speed controller, power system stability
Procedia PDF Downloads 3797701 Near Optimal Closed-Loop Guidance Gains Determination for Vector Guidance Law, from Impact Angle Errors and Miss Distance Considerations
Authors: Karthikeyan Kalirajan, Ashok Joshi
Abstract:
An optimization problem is to setup to maximize the terminal kinetic energy of a maneuverable reentry vehicle (MaRV). The target location, the impact angle is given as constraints. The MaRV uses an explicit guidance law called Vector guidance. This law has two gains which are taken as decision variables. The problem is to find the optimal value of these gains which will result in minimum miss distance and impact angle error. Using a simple 3DOF non-rotating flat earth model and Lockheed martin HP-MARV as the reentry vehicle, the nature of solutions of the optimization problem is studied. This is achieved by carrying out a parametric study for a range of closed loop gain values and the corresponding impact angle error and the miss distance values are generated. The results show that there are well defined lower and upper bounds on the gains that result in near optimal terminal guidance solution. It is found from this study, that there exist common permissible regions (values of gains) where all constraints are met. Moreover, the permissible region lies between flat regions and hence the optimization algorithm has to be chosen carefully. It is also found that, only one of the gain values is independent and that the other dependent gain value is related through a simple straight-line expression. Moreover, to reduce the computational burden of finding the optimal value of two gains, a guidance law called Diveline guidance is discussed, which uses single gain. The derivation of the Diveline guidance law from Vector guidance law is discussed in this paper.Keywords: Marv guidance, reentry trajectory, trajectory optimization, guidance gain selection
Procedia PDF Downloads 4277700 Monitoring Future Climate Changes Pattern over Major Cities in Ghana Using Coupled Modeled Intercomparison Project Phase 5, Support Vector Machine, and Random Forest Modeling
Authors: Stephen Dankwa, Zheng Wenfeng, Xiaolu Li
Abstract:
Climate change is recently gaining the attention of many countries across the world. Climate change, which is also known as global warming, referring to the increasing in average surface temperature has been a concern to the Environmental Protection Agency of Ghana. Recently, Ghana has become vulnerable to the effect of the climate change as a result of the dependence of the majority of the population on agriculture. The clearing down of trees to grow crops and burning of charcoal in the country has been a contributing factor to the rise in temperature nowadays in the country as a result of releasing of carbon dioxide and greenhouse gases into the air. Recently, petroleum stations across the cities have been on fire due to this climate changes and which have position Ghana in a way not able to withstand this climate event. As a result, the significant of this research paper is to project how the rise in the average surface temperature will be like at the end of the mid-21st century when agriculture and deforestation are allowed to continue for some time in the country. This study uses the Coupled Modeled Intercomparison Project phase 5 (CMIP5) experiment RCP 8.5 model output data to monitor the future climate changes from 2041-2050, at the end of the mid-21st century over the ten (10) major cities (Accra, Bolgatanga, Cape Coast, Koforidua, Kumasi, Sekondi-Takoradi, Sunyani, Ho, Tamale, Wa) in Ghana. In the models, Support Vector Machine and Random forest, where the cities as a function of heat wave metrics (minimum temperature, maximum temperature, mean temperature, heat wave duration and number of heat waves) assisted to provide more than 50% accuracy to predict and monitor the pattern of the surface air temperature. The findings identified were that the near-surface air temperature will rise between 1°C-2°C (degrees Celsius) over the coastal cities (Accra, Cape Coast, Sekondi-Takoradi). The temperature over Kumasi, Ho and Sunyani by the end of 2050 will rise by 1°C. In Koforidua, it will rise between 1°C-2°C. The temperature will rise in Bolgatanga, Tamale and Wa by 0.5°C by 2050. This indicates how the coastal and the southern part of the country are becoming hotter compared with the north, even though the northern part is the hottest. During heat waves from 2041-2050, Bolgatanga, Tamale, and Wa will experience the highest mean daily air temperature between 34°C-36°C. Kumasi, Koforidua, and Sunyani will experience about 34°C. The coastal cities (Accra, Cape Coast, Sekondi-Takoradi) will experience below 32°C. Even though, the coastal cities will experience the lowest mean temperature, they will have the highest number of heat waves about 62. Majority of the heat waves will last between 2 to 10 days with the maximum 30 days. The surface temperature will continue to rise by the end of the mid-21st century (2041-2050) over the major cities in Ghana and so needs to be addressed to the Environmental Protection Agency in Ghana in order to mitigate this problem.Keywords: climate changes, CMIP5, Ghana, heat waves, random forest, SVM
Procedia PDF Downloads 2007699 An Improved Face Recognition Algorithm Using Histogram-Based Features in Spatial and Frequency Domains
Authors: Qiu Chen, Koji Kotani, Feifei Lee, Tadahiro Ohmi
Abstract:
In this paper, we propose an improved face recognition algorithm using histogram-based features in spatial and frequency domains. For adding spatial information of the face to improve recognition performance, a region-division (RD) method is utilized. The facial area is firstly divided into several regions, then feature vectors of each facial part are generated by Binary Vector Quantization (BVQ) histogram using DCT coefficients in low frequency domains, as well as Local Binary Pattern (LBP) histogram in spatial domain. Recognition results with different regions are first obtained separately and then fused by weighted averaging. Publicly available ORL database is used for the evaluation of our proposed algorithm, which is consisted of 40 subjects with 10 images per subject containing variations in lighting, posing, and expressions. It is demonstrated that face recognition using RD method can achieve much higher recognition rate.Keywords: binary vector quantization (BVQ), DCT coefficients, face recognition, local binary patterns (LBP)
Procedia PDF Downloads 3497698 The Effect of Emotional Support towards Quality of Work Life on Balinese Working Women
Authors: I. Ketut Yoga Adityawira, Putu Ayu Novia Viorica, Komang Rahayu Indrawati
Abstract:
In addition to work and take care of the family, Balinese women also have a role to participate in social activities in Bali. So this will have an impact on the quality of work life of Balinese women. One way to reduce the impact of the fulfillment of the role of Balinese women namely through emotional support. The aim of this research is to find out the effect of emotional support towards the quality of work life on Balinese working women. Data were retrieved by quasi-experimental method with pretest-posttest design. Data were analyzed by Analysis of Variance (ANOVA) through SPSS 17.0 for Windows. The number of subjects in this research is 30 people with the criteria: Balinese Women, aged 27 to 55 years old, have a minimum of two years experience of work and has been married. The analysis showed that there is no effect of emotional support towards the quality of work life on Balinese working women, with information there is no significant of probability value p = 0.304 (p > 0.05).Keywords: Balinese women, emotional support, quality of work life, working women
Procedia PDF Downloads 2087697 A Technique for Image Segmentation Using K-Means Clustering Classification
Authors: Sadia Basar, Naila Habib, Awais Adnan
Abstract:
The paper presents the Technique for Image Segmentation Using K-Means Clustering Classification. The presented algorithms were specific, however, missed the neighboring information and required high-speed computerized machines to run the segmentation algorithms. Clustering is the process of partitioning a group of data points into a small number of clusters. The proposed method is content-aware and feature extraction method which is able to run on low-end computerized machines, simple algorithm, required low-quality streaming, efficient and used for security purpose. It has the capability to highlight the boundary and the object. At first, the user enters the data in the representation of the input. Then in the next step, the digital image is converted into groups clusters. Clusters are divided into many regions. The same categories with same features of clusters are assembled within a group and different clusters are placed in other groups. Finally, the clusters are combined with respect to similar features and then represented in the form of segments. The clustered image depicts the clear representation of the digital image in order to highlight the regions and boundaries of the image. At last, the final image is presented in the form of segments. All colors of the image are separated in clusters.Keywords: clustering, image segmentation, K-means function, local and global minimum, region
Procedia PDF Downloads 3767696 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 1147695 FMR1 Gene Carrier Screening for Premature Ovarian Insufficiency in Females: An Indian Scenario
Authors: Sarita Agarwal, Deepika Delsa Dean
Abstract:
Like the task of transferring photo images to artistic images, image-to-image translation aims to translate the data to the imitated data which belongs to the target domain. Neural Style Transfer and CycleGAN are two well-known deep learning architectures used for photo image-to-art image transfer. However, studies involving these two models concentrate on one-to-one domain translation, not one-to-multi domains translation. Our study tries to investigate deep learning architectures, which can be controlled to yield multiple artistic style translation only by adding a conditional vector. We have expanded CycleGAN and constructed Conditional CycleGAN for 5 kinds of categories translation. Our study found that the architecture inserting conditional vector into the middle layer of the Generator could output multiple artistic images.Keywords: genetic counseling, FMR1 gene, fragile x-associated primary ovarian insufficiency, premutation
Procedia PDF Downloads 1317694 Cross-Sectional Analysis of Partner Support and Contraceptive Use in Adolescent Females
Authors: Ketan Tamirisa, Kathleen P. Tebb
Abstract:
In the U.S., annually, there are over 1 million pregnancies in teenagers and most (85%) are unintended. The need for proactive prevention measures is imperative to support adolescents with their pregnancy prevention and family planning goals. To date, there is limited research examining the extent to which support from a sexual partner(s) influences contraceptive use. To address this gap, this study assessed the relationship between sexually active adolescents, sex-assigned birth as female, and their perceived support from their sexual partner(s) about their contraceptive use in the last three months. Baseline data from sexually active adolescent females, between 13-19 years who were not currently using a long-acting contraceptive device, were recruited from 32 school-based health centers (SBHCs) in seven states in the U.S. as part of a larger study to evaluate Health-E You/ Salud iTuTM, a web-based contraceptive decision support tool. Fisher’s exact test assessed the cross-sectional association between perceived sexual partner support of contraceptive use in the past three months (felt no support, felt little support, and felt a lot of support), and current use of non-barrier contraception. A total of 91 sexually active adolescent females were eligible and completed the baseline survey. The mean age was 16.7 and nearly half (49.3%) were Hispanic/Latina. Most (85.9%) indicated it was very important to avoid becoming pregnant. A total of 60 participants (65.9%) reported use of non-barrier contraception. Of these, most used birth control pills (n=26), followed by Depo-Provera injection (n=12), patch (n=1), and ring (n=1). Most of the participants (80.2%) indicated that they perceived a lot of support from their partners and 19.8% reported no or little support. Among those reporting a lot of support, 69.9% (51/73) reported current use of non-barrier contraception compared to 50% (9/18) who felt no/little support and reported contraceptive use. This difference approached but did not reach statistical significance (p=0.096). Results from this preliminary data indicate that many adolescents who are coming in for care at SBHCs are at risk of unintended pregnancy. Many participants also reported a lot of support from their sexual partner(s) to use contraception. While the associations only approached significance, this is likely due to the small sample size. This and future research can better understand this association to inform interventions aimed at sexual partners to strengthen education and social support, increase healthcare accessibility, and ultimately reduce rates of unintended pregnancy.Keywords: adolescents, contraception, pregnancy, SBHCs, sexual partners
Procedia PDF Downloads 457693 Acceleration-Based Motion Model for Visual Simultaneous Localization and Mapping
Authors: Daohong Yang, Xiang Zhang, Lei Li, Wanting Zhou
Abstract:
Visual Simultaneous Localization and Mapping (VSLAM) is a technology that obtains information in the environment for self-positioning and mapping. It is widely used in computer vision, robotics and other fields. Many visual SLAM systems, such as OBSLAM3, employ a constant-speed motion model that provides the initial pose of the current frame to improve the speed and accuracy of feature matching. However, in actual situations, the constant velocity motion model is often difficult to be satisfied, which may lead to a large deviation between the obtained initial pose and the real value, and may lead to errors in nonlinear optimization results. Therefore, this paper proposed a motion model based on acceleration, which can be applied on most SLAM systems. In order to better describe the acceleration of the camera pose, we decoupled the pose transformation matrix, and calculated the rotation matrix and the translation vector respectively, where the rotation matrix is represented by rotation vector. We assume that, in a short period of time, the changes of rotating angular velocity and translation vector remain the same. Based on this assumption, the initial pose of the current frame is estimated. In addition, the error of constant velocity model was analyzed theoretically. Finally, we applied our proposed approach to the ORBSLAM3 system and evaluated two sets of sequences on the TUM dataset. The results showed that our proposed method had a more accurate initial pose estimation and the accuracy of ORBSLAM3 system is improved by 6.61% and 6.46% respectively on the two test sequences.Keywords: error estimation, constant acceleration motion model, pose estimation, visual SLAM
Procedia PDF Downloads 947692 Vectorial Capacity and Age Determination of Anopheles Maculipinnis S. L. (Diptera: Culicidae), in Esfahan and Chahar Mahal and Bakhtiari Provinces, Central Iran
Authors: Fariba Sepahvand, Seyed Hassan Moosa-kazemi
Abstract:
The objective was to determine the population dynamics of Anopheles maculipinnis s.l. in relation to probable malaria transmission. The study was carried out in three villages in Isfahan and charmahal bakhteari provinces of Iran, from April to March 2014. Mosquitoes were collected by Total catch, Human and Animal bait collection. An. maculipinnis play as a dominant vector with exophagic and endophilic behavior. Ovary dissection revealed four dilatations indicate at least 9% of the population can reach to the dangerous age to potentially malaria transmission. Two peaks of blood feeding were observed, 9.00-10.00 P.M, and the 12.00-00.01 A.M. The gonotrophic cycle, survival rate, life expectancy of the species was 4, 0.82 and five days, respectively. Vectorial capacity was measured as 0.028. In conclusion, moderate climatic conditions support the persistence, density and longevity of An maculipinnis s.l. could result in more significant malaria transmission.Keywords: age determination, Anopheles maculipinnis, center of Iran, Malaria
Procedia PDF Downloads 2467691 A Nonlinear Feature Selection Method for Hyperspectral Image Classification
Authors: Pei-Jyun Hsieh, Cheng-Hsuan Li, Bor-Chen Kuo
Abstract:
For hyperspectral image classification, feature reduction is an important pre-processing for avoiding the Hughes phenomena due to the difficulty for collecting training samples. Hence, lots of researches developed feature selection methods such as F-score, HSIC (Hilbert-Schmidt Independence Criterion), and etc., to improve hyperspectral image classification. However, most of them only consider the class separability in the original space, i.e., a linear class separability. In this study, we proposed a nonlinear class separability measure based on kernel trick for selecting an appropriate feature subset. The proposed nonlinear class separability was formed by a generalized RBF kernel with different bandwidths with respect to different features. Moreover, it considered the within-class separability and the between-class separability. A genetic algorithm was applied to tune these bandwidths such that the smallest with-class separability and the largest between-class separability simultaneously. This indicates the corresponding feature space is more suitable for classification. In addition, the corresponding nonlinear classification boundary can separate classes very well. These optimal bandwidths also show the importance of bands for hyperspectral image classification. The reciprocals of these bandwidths can be viewed as weights of bands. The smaller bandwidth, the larger weight of the band, and the more importance for classification. Hence, the descending order of the reciprocals of the bands gives an order for selecting the appropriate feature subsets. In the experiments, three hyperspectral image data sets, the Indian Pine Site data set, the PAVIA data set, and the Salinas A data set, were used to demonstrate the selected feature subsets by the proposed nonlinear feature selection method are more appropriate for hyperspectral image classification. Only ten percent of samples were randomly selected to form the training dataset. All non-background samples were used to form the testing dataset. The support vector machine was applied to classify these testing samples based on selected feature subsets. According to the experiments on the Indian Pine Site data set with 220 bands, the highest accuracies by applying the proposed method, F-score, and HSIC are 0.8795, 0.8795, and 0.87404, respectively. However, the proposed method selects 158 features. F-score and HSIC select 168 features and 217 features, respectively. Moreover, the classification accuracies increase dramatically only using first few features. The classification accuracies with respect to feature subsets of 10 features, 20 features, 50 features, and 110 features are 0.69587, 0.7348, 0.79217, and 0.84164, respectively. Furthermore, only using half selected features (110 features) of the proposed method, the corresponding classification accuracy (0.84168) is approximate to the highest classification accuracy, 0.8795. For other two hyperspectral image data sets, the PAVIA data set and Salinas A data set, we can obtain the similar results. These results illustrate our proposed method can efficiently find feature subsets to improve hyperspectral image classification. One can apply the proposed method to determine the suitable feature subset first according to specific purposes. Then researchers can only use the corresponding sensors to obtain the hyperspectral image and classify the samples. This can not only improve the classification performance but also reduce the cost for obtaining hyperspectral images.Keywords: hyperspectral image classification, nonlinear feature selection, kernel trick, support vector machine
Procedia PDF Downloads 2657690 The Effect of Occupational Calling and Social Support on the Anxiety of Navies Who Are Sent Overseas
Authors: Yonguk L. Park, Jeonghoon Seol
Abstract:
The Republic of Korea is facing a special situation as it is the only divided country in the world. Even though Korea is facing such unstable circumstances in terms of a foreign diplomacy situation, Korea is one of the countries who, in concern for world peace, have been sending troops overseas. The troops spend more than a year at sea and may suffer from different types of psychological disorders. The purpose of this study is to try to find factors that promote psychological well-being of troops and improve their psychological health. We investigated the effect of dispatch sailors’ occupational calling and social support on anxiety before they are sent overseas and also examined the interaction between occupational calling and social support on anxiety. One hundred thirty-eight dispatched sailors participated in this study, wherein they completed the Korean calling scale, multifaceted social support scale, and anxiety scale –Y form. We analyzed the data using hierarchical regression. The results showed that after controlling gender, marital status, and the previous experiences of dispatch, those who have a higher level of occupational calling and perceived social support experienced a low level of anxiety before they are sent (β = -.276, β = -.395). Furthermore, we examined the interaction effect. If the troops’ perceived social support is high, they experience a low level of anxiety—even if they have a low level of occupational calling. This study confirms that both occupational calling and social support reduce the level of anxiety of the troops. The research provides meaningful information in understanding those who serve in the Navy’s distinctive situations and contributes to improving their psychological well-being. We suggest that sailors undergo training to have a higher occupational calling and healthy relationships with friends, families, and co-workers who provide emotional and social support.Keywords: navy, occupational calling, social support, anxiety
Procedia PDF Downloads 2557689 Identifying Learning Support Patterns for Enhancing Quality Outputs in Massive Open Online Courses
Authors: Cristina Galván-Fernández, Elena Barberà, Jingjing Zhang
Abstract:
In recent years, MOOCs have been in the spotlight for its high drop-out rates, which potentially impact on the quality of the learning experience. This study attempts to explore how learning support can be used to keep student retention, and in turn to improve the quality of learning in MOOCs. In this study, the patterns of learning support were identified from a total of 4202592 units of video sessions, clickstream data of 25600 students, and 382 threads generated in 10 forums (optional and mandatory) in five different types of MOOCs (e.g. conventional MOOCs, professional MOOCs, and informal MOOCs). The results of this study have shown a clear correlation between the types of MOOCs, the design framework of the MOOCs, and the learning support. The patterns of tutor-peer interaction are identified, and are found to be highly correlated with student retention in all five types of MOOCs. In addition, different patterns of ‘good’ students were identified, which could potentially inform the instruction design of MOOCs.Keywords: higher education, learning support, MOOC, retention
Procedia PDF Downloads 3357688 Reliability of Social Support Measurement Modification of the BC-SSAS among Women with Breast Cancer Who Undergone Chemotherapy in Selected Hospital, Central Java, Indonesia
Authors: R. R. Dewi Rahmawaty Aktyani Putri, Earmporn Thongkrajai, Dedy Purwito
Abstract:
There were many instruments have been developed to assess social support which has the different dimension in breast cancer patients. The Issue of measurement is a challenge to determining the component of dimensional concept, defining the unit of measurement, and establishing the validity and reliability of the measurement. However, the instruments where need to know how much support which obtained and perceived among women with breast cancer who undergone chemotherapy which it can help nurses to prevent of non-adherence in chemotherapy. This study aimed to measure the reliability of BC-SSAS instrument among 30 Indonesian women with breast cancer aged 18 years and above who undergone chemotherapy for six cycles in the oncological unit of Outpatient Department (OPD), Margono Soekardjo Hospital, Central Java, Indonesia. Data were collected during October to December 2015 by using modified the Breast Cancer Social Support Assessment (BC-SSAS). The Cronbach’s alpha analysis was carried out to measure internal consistency for reliability test of BC-SSAS instrument. This study used five experts for content validity index. The results showed that for content validity, I-CVI was 0.98 and S-CVI was 0.98; Cronbach’s alpha value was 0.971 and the Cronbach’s alpha coefficients for the subscales were high, with 0.903 for emotional support, 0.865 for informational support, 0.901 for tangible support, 0.897 for appraisal support and 0.884 for positive interaction support. The results confirmed that the BC-SSAS instrument has high reliability. BC-SSAS instruments were reliable and can be used in health care services to measure the social support received and perceived among women with breast cancer who undergone chemotherapy so that preventive interventions can be developed and the quality of health services can be improved.Keywords: BC-SSAS, women with breast cancer, chemotherapy, Indonesia
Procedia PDF Downloads 3627687 Iris Recognition Based on the Low Order Norms of Gradient Components
Authors: Iman A. Saad, Loay E. George
Abstract:
Iris pattern is an important biological feature of human body; it becomes very hot topic in both research and practical applications. In this paper, an algorithm is proposed for iris recognition and a simple, efficient and fast method is introduced to extract a set of discriminatory features using first order gradient operator applied on grayscale images. The gradient based features are robust, up to certain extents, against the variations may occur in contrast or brightness of iris image samples; the variations are mostly occur due lightening differences and camera changes. At first, the iris region is located, after that it is remapped to a rectangular area of size 360x60 pixels. Also, a new method is proposed for detecting eyelash and eyelid points; it depends on making image statistical analysis, to mark the eyelash and eyelid as a noise points. In order to cover the features localization (variation), the rectangular iris image is partitioned into N overlapped sub-images (blocks); then from each block a set of different average directional gradient densities values is calculated to be used as texture features vector. The applied gradient operators are taken along the horizontal, vertical and diagonal directions. The low order norms of gradient components were used to establish the feature vector. Euclidean distance based classifier was used as a matching metric for determining the degree of similarity between the features vector extracted from the tested iris image and template features vectors stored in the database. Experimental tests were performed using 2639 iris images from CASIA V4-Interival database, the attained recognition accuracy has reached up to 99.92%.Keywords: iris recognition, contrast stretching, gradient features, texture features, Euclidean metric
Procedia PDF Downloads 3357686 Morality in Actual Behavior: The Moderation Effect of Identification with the Ingroup and Religion on Norm Compliance
Authors: Shauma L. Tamba
Abstract:
This study examined whether morality is the most important aspect in actual behavior. The prediction was that people tend to behave in line with moral (as compared to competence) norms, especially when such norms are presented by their ingroup. The actual behavior that was tested was support for a military intervention without a mandate from the UN. In addition, this study also examined whether identification with the ingroup and religion moderated the effect of group and norm on support for the norm that was prescribed by their ingroup. The prediction was that those who identified themselves higher with the ingroup moral would show a higher support for the norm. Furthermore, the prediction was also that those who have religion would show a higher support for the norm in the ingroup moral rather than competence. In an online survey, participants were asked to read a scenario in which a military intervention without a mandate was framed as either the moral (but stupid) or smart (but immoral) thing to do by members of their own (ingroup) or another (outgroup) society. This study found that when people identified themselves with the smart (but immoral) norm, they showed a higher support for the norm. However, when people identified themselves with the moral (but stupid) norm, they tend to show a lesser support towards the norm. Most of the results in the study did not support the predictions. Possible explanations and implications are discussed.Keywords: morality, competence, ingroup identification, religion, group norm
Procedia PDF Downloads 4087685 The Effect of Second Victim-Related Distress on Work-Related Outcomes in Tertiary Care, Kelantan, Malaysia
Authors: Ahmad Zulfahmi Mohd Kamaruzaman, Mohd Ismail Ibrahim, Ariffin Marzuki Mokhtar, Maizun Mohd Zain, Saiful Nazri Satiman, Mohd Najib Majdi Yaacob
Abstract:
Background: Aftermath any patient safety incidents, the involved healthcare providers possibly sustained second victim-related distress (second victim distress and reduced their professional efficacy), with subsequent negative work-related outcomes or vice versa cultivating resilience. This study aimed to investigate the factors affecting negative work-related outcomes and resilience, with the triad of support; colleague, supervisor, and institutional support as the hypothetical mediators. Methods: This was a cross sectional study recruiting a total of 733 healthcare providers from three tertiary care in Kelantan, Malaysia. Three steps of hierarchical linear regression were developed for each outcome; negative work-related outcomes and resilience. Then, four multiple mediator models of support triad were analyzed. Results: Second victim distress, professional efficacy, and the support triad contributed significantly for each regression model. In the pathway of professional efficacy on each negative work-related outcomes and resilience, colleague support partially mediated the relationship. As for second victim distress on negative work related outcomes, colleague and supervisor support were the partial mediator, and on resilience; all support triad also produced a similar effect. Conclusion: Second victim distress, professional efficacy, and the support triad influenced the relationship with the negative work-related outcomes and resilience. Support triad as the mediators ameliorated the effect in between and explained the urgency of having good support for recovery post encountering patient safety incidents.Keywords: second victims, patient safety incidents, hierarchical linear regression, mediation, support
Procedia PDF Downloads 1097684 The Link between Money Market and Economic Growth in Nigeria: Vector Error Correction Model Approach
Authors: Uyi Kizito Ehigiamusoe
Abstract:
The paper examines the impact of money market on economic growth in Nigeria using data for the period 1980-2012. Econometrics techniques such as Ordinary Least Squares Method, Johanson’s Co-integration Test and Vector Error Correction Model were used to examine both the long-run and short-run relationship. Evidence from the study suggest that though a long-run relationship exists between money market and economic growth, but the present state of the Nigerian money market is significantly and negatively related to economic growth. The link between the money market and the real sector of the economy remains very weak. This implies that the market is not yet developed enough to produce the needed growth that will propel the Nigerian economy because of several challenges. It was therefore recommended that government should create the appropriate macroeconomic policies, legal framework and sustain the present reforms with a view to developing the market so as to promote productive activities, investments, and ultimately economic growth.Keywords: economic growth, investments, money market, money market challenges, money market instruments
Procedia PDF Downloads 3447683 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 2597682 Data Security and Privacy Challenges in Cloud Computing
Authors: Amir Rashid
Abstract:
Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud
Procedia PDF Downloads 2997681 Features Vector Selection for the Recognition of the Fragmented Handwritten Numeric Chains
Authors: Salim Ouchtati, Aissa Belmeguenai, Mouldi Bedda
Abstract:
In this study, we propose an offline system for the recognition of the fragmented handwritten numeric chains. Firstly, we realized a recognition system of the isolated handwritten digits, in this part; the study is based mainly on the evaluation of neural network performances, trained with the gradient backpropagation algorithm. The used parameters to form the input vector of the neural network are extracted from the binary images of the isolated handwritten digit by several methods: the distribution sequence, sondes application, the Barr features, and the centered moments of the different projections and profiles. Secondly, the study is extended for the reading of the fragmented handwritten numeric chains constituted of a variable number of digits. The vertical projection was used to segment the numeric chain at isolated digits and every digit (or segment) was presented separately to the entry of the system achieved in the first part (recognition system of the isolated handwritten digits).Keywords: features extraction, handwritten numeric chains, image processing, neural networks
Procedia PDF Downloads 265