Search results for: behavior detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9704

Search results for: behavior detection

9164 Cultural and Legal Aspects of the Fight against Corruption in the World

Authors: Mustafina-Bredikhina Diana, Kuznetsova Olga

Abstract:

Corruption as a social phenomenon is obviously a serious barrier to the development of a prosperous society and the economic development of the country as a whole. It is extremely important to analyze the influence of culture on the level of corruption in different countries and assesses the influence of culture, religion, and mentality on corrupt behavior and their perception in society. Corruption should be considered in relation to the public consciousness, which is formed in certain socio-historical conditions and cultural traditions. Often, society, formally condemning corruption, reproduces obvious corrupt behavior at the personal level of its individual members. Based on a brief analysis of the major corruption scandals and the corruption counting system of countries, the authors conclude that culture, mentality, and religion, while playing an important role in the formation of public consciousness of the concept of "corrupt behavior" are not decisive. It is more important to build a dialogue between the authorities and society, creating a uniform rejection of corrupt behavior.

Keywords: corruption, culture, corrupt behavior, perception of corruption, religion

Procedia PDF Downloads 95
9163 The Relationship between Self-Injury Behavior and Social Skills among Children with Mild Intellectual Disability in the State of Kuwait

Authors: Farah Al-Shatti, Elsayed El-Khamisi, Nabel Suleiman

Abstract:

The study aimed at identifying the relationship between self-injury behavior and social skills among children with mild intellectual disability (ID) in the state of Kuwait. The sample of the study consisted of 65 males and females with ID; their ages ranged between 8 to 12 years. The study used a measure for rating self-injury behavior designed by the researcher; and a measure for rating social skills was designed. The results of the study showed that there was an increase in the percentages of the two dimensions of the self-injury behavior for children with ID; the self-injury behavior by child’s own body was higher than the self-injury behavior by environmental tools, additionally the results showed that there were statistically significant differences between males and females on the dimensions and total scorer of self-injury scale favor the males, and there were statistically significant differences between them on the dimensions of the social skills and total score favor the females, It also indicated that there was statistically significant negative relationship between the dimensions of the self-injury and the dimensions of the social skills for children with intellectual disability.

Keywords: mild intellectual disability, self injury behavior, social skills, state of Kuwait

Procedia PDF Downloads 349
9162 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 353
9161 Spiking Behavior in Memristors with Shared Top Electrode Configuration

Authors: B. Manoj Kumar, C. Malavika, E. S. Kannan

Abstract:

The objective of this study is to investigate the switching behavior of two vertically aligned memristors connected by a shared top electrode, a configuration that significantly deviates from the conventional single oxide layer sandwiched between two electrodes. The device is fabricated by bridging copper electrodes with mechanically exfoliated van der Waals metal (specifically tantalum disulfide and tantalum diselenide). The device demonstrates threshold-switching behavior in its I-V characteristics. When the input voltage signal is ramped with voltages below the threshold, the output current shows spiking behavior, resembling integrated and firing actions without extra circuitry. We also investigated the self-reset behavior of the device. Using a continuous constant voltage bias, we activated the device to the firing state. After removing the bias and reapplying it shortly afterward, the current returned to its initial state. This indicates that the device can spontaneously return to its resting state. The outcome of this investigation offers a fresh perspective on memristor-based device design and an efficient method to construct hardware for neuromorphic computing systems.

Keywords: integrated and firing, memristor, spiking behavior, threshold switching

Procedia PDF Downloads 64
9160 A Structural Model to Examine Hotel Image and Overall Satisfaction on Future Behavior of Customers

Authors: Nimit Soonsan

Abstract:

Hotel image is a key business issue in today’s hotel market and has been increasingly been recognized as a valuable and inimitable source of competitive advantage by many hotel. The current study attempted to develop and test a relationship of hotel image, overall satisfaction, and future behavior. Based on the above concepts, this paper hypothesizes the correlations among four constructs, namely, hotel image and overall satisfaction as antecedents of future behavior that positive word-of-mouth and intention to revisit. This study surveyed for a sample of 244 international customers staying budget hotel in Phuket, Thailand and using a structural equation modeling identified relationship between hotel image, overall satisfaction and future behavior. The major finding of structural equation modeling indicates that hotel image directly affects overall satisfaction and indirectly affects future behavior that positive word-of-mouth and intention to revisit. In addition, overall satisfaction had significant influence on future behavior that positive word-of-mouth and intention to revisit, and the mediating role of overall satisfaction is also confirmed in this study. Managerial implications are provided, limitations noted, and future research directions suggested.

Keywords: hotel image, satisfaction, word-of-mouth, revisit

Procedia PDF Downloads 240
9159 A Supervised Approach for Detection of Singleton Spam Reviews

Authors: Atefeh Heydari, Mohammadali Tavakoli, Naomie Salim

Abstract:

In recent years, we have witnessed that online reviews are the most important source of customers’ opinion. They are progressively more used by individuals and organisations to make purchase and business decisions. Unfortunately, for the reason of profit or fame, frauds produce deceptive reviews to hoodwink potential customers. Their activities mislead not only potential customers to make appropriate purchasing decisions and organisations to reshape their business, but also opinion mining techniques by preventing them from reaching accurate results. Spam reviews could be divided into two main groups, i.e. multiple and singleton spam reviews. Detecting a singleton spam review that is the only review written by a user ID is extremely challenging due to lack of clue for detection purposes. Singleton spam reviews are very harmful and various features and proofs used in multiple spam reviews detection are not applicable in this case. Current research aims to propose a novel supervised technique to detect singleton spam reviews. To achieve this, various features are proposed in this study and are to be combined with the most appropriate features extracted from literature and employed in a classifier. In order to compare the performance of different classifiers, SVM and naive Bayes classification algorithms were used for model building. The results revealed that SVM was more accurate than naive Bayes and our proposed technique is capable to detect singleton spam reviews effectively.

Keywords: classification algorithms, Naïve Bayes, opinion review spam detection, singleton review spam detection, support vector machine

Procedia PDF Downloads 309
9158 Signal Processing of the Blood Pressure and Characterization

Authors: Hadj Abd El Kader Benghenia, Fethi Bereksi Reguig

Abstract:

In clinical medicine, blood pressure, raised blood hemodynamic monitoring is rich pathophysiological information of cardiovascular system, of course described through factors such as: blood volume, arterial compliance and peripheral resistance. In this work, we are interested in analyzing these signals to propose a detection algorithm to delineate the different sequences and especially systolic blood pressure (SBP), diastolic blood pressure (DBP), and the wave and dicrotic to do their analysis in order to extract the cardiovascular parameters.

Keywords: blood pressure, SBP, DBP, detection algorithm

Procedia PDF Downloads 439
9157 Experimental and Numerical Investigations on Flexural Behavior of Macro-Synthetic FRC

Authors: Ashkan Shafee, Ahamd Fahimifar, Sajjad V. Maghvan

Abstract:

Promotion of the Fiber Reinforced Concrete (FRC) as a construction material for civil engineering projects has invoked numerous researchers to investigate their mechanical behavior. Even though there is satisfactory information about the effects of fiber type and length, concrete mixture, casting type and other variables on the strength and deformability parameters of FRC, the numerical modeling of such materials still needs research attention. The focus of this study is to investigate the feasibility of Concrete Damaged Plasticity (CDP) model in prediction of Macro-synthetic FRC structures behavior. CDP model requires the tensile behavior of concrete to be well characterized. For this purpose, a series of uniaxial direct tension and four point bending tests were conducted on the notched specimens to define bilinear tension softening (post-peak tension stress-strain) behavior. With these parameters obtained, the flexural behavior of macro-synthetic FRC beams were modeled and the results showed a good agreement with the experimental measurements.

Keywords: concrete damaged plasticity, fiber reinforced concrete, finite element modeling, macro-synthetic fibers, uniaxial tensile test

Procedia PDF Downloads 419
9156 Automating 2D CAD to 3D Model Generation Process: Wall pop-ups

Authors: Mohit Gupta, Chialing Wei, Thomas Czerniawski

Abstract:

In this paper, we have built a neural network that can detect walls on 2D sheets and subsequently create a 3D model in Revit using Dynamo. The training set includes 3500 labeled images, and the detection algorithm used is YOLO. Typically, engineers/designers make concentrated efforts to convert 2D cad drawings to 3D models. This costs a considerable amount of time and human effort. This paper makes a contribution in automating the task of 3D walls modeling. 1. Detecting Walls in 2D cad and generating 3D pop-ups in Revit. 2. Saving designer his/her modeling time in drafting elements like walls from 2D cad to 3D representation. An object detection algorithm YOLO is used for wall detection and localization. The neural network is trained over 3500 labeled images of size 256x256x3. Then, Dynamo is interfaced with the output of the neural network to pop-up 3D walls in Revit. The research uses modern technological tools like deep learning and artificial intelligence to automate the process of generating 3D walls without needing humans to manually model them. Thus, contributes to saving time, human effort, and money.

Keywords: neural networks, Yolo, 2D to 3D transformation, CAD object detection

Procedia PDF Downloads 144
9155 The Convergence of IoT and Machine Learning: A Survey of Real-time Stress Detection System

Authors: Shreyas Gambhirrao, Aditya Vichare, Aniket Tembhurne, Shahuraj Bhosale

Abstract:

In today's rapidly evolving environment, stress has emerged as a significant health concern across different age groups. Stress that isn't controlled, whether it comes from job responsibilities, health issues, or the never-ending news cycle, can have a negative effect on our well-being. The problem is further aggravated by the ongoing connection to technology. In this high-tech age, identifying and controlling stress is vital. In order to solve this health issue, the study focuses on three key metrics for stress detection: body temperature, heart rate, and galvanic skin response (GSR). These parameters along with the Support Vector Machine classifier assist the system to categorize stress into three groups: 1) Stressed, 2) Not stressed, and 3) Moderate stress. Proposed training model, a NodeMCU combined with particular sensors collects data in real-time and rapidly categorizes individuals based on their stress levels. Real-time stress detection is made possible by this creative combination of hardware and software.

Keywords: real time stress detection, NodeMCU, sensors, heart-rate, body temperature, galvanic skin response (GSR), support vector machine

Procedia PDF Downloads 72
9154 QoS-CBMG: A Model for e-Commerce Customer Behavior

Authors: Hoda Ghavamipoor, S. Alireza Hashemi Golpayegani

Abstract:

An approach to model the customer interaction with e-commerce websites is presented. Considering the service quality level as a predictive feature, we offer an improved method based on the Customer Behavior Model Graph (CBMG), a state-transition graph model. To derive the Quality of Service sensitive-CBMG (QoS-CBMG) model, process-mining techniques is applied to pre-processed website server logs which are categorized as ‘buy’ or ‘visit’. Experimental results on an e-commerce website data confirmed that the proposed method outperforms CBMG based method.

Keywords: customer behavior model, electronic commerce, quality of service, customer behavior model graph, process mining

Procedia PDF Downloads 416
9153 The Impact of Window Opening Occupant Behavior Models on Building Energy Performance

Authors: Habtamu Tkubet Ebuy

Abstract:

Purpose Conventional dynamic energy simulation tools go beyond the static dimension of simplified methods by providing better and more accurate prediction of building performance. However, their ability to forecast actual performance is undermined by a low representation of human interactions. The purpose of this study is to examine the potential benefits of incorporating information on occupant diversity into occupant behavior models used to simulate building performance. The co-simulation of the stochastic behavior of the occupants substantially increases the accuracy of the simulation. Design/methodology/approach In this article, probabilistic models of the "opening and closing" behavior of the window of inhabitants have been developed in a separate multi-agent platform, SimOcc, and implemented in the building simulation, TRNSYS, in such a way that the behavior of the window with the interconnectivity can be reflected in the simulation analysis of the building. Findings The results of the study prove that the application of complex behaviors is important to research in predicting actual building performance. The results aid in the identification of the gap between reality and existing simulation methods. We hope this study and its results will serve as a guide for researchers interested in investigating occupant behavior in the future. Research limitations/implications Further case studies involving multi-user behavior for complex commercial buildings need to more understand the impact of the occupant behavior on building performance. Originality/value This study is considered as a good opportunity to achieve the national strategy by showing a suitable tool to help stakeholders in the design phase of new or retrofitted buildings to improve the performance of office buildings.

Keywords: occupant behavior, co-simulation, energy consumption, thermal comfort

Procedia PDF Downloads 104
9152 A Comparison of YOLO Family for Apple Detection and Counting in Orchards

Authors: Yuanqing Li, Changyi Lei, Zhaopeng Xue, Zhuo Zheng, Yanbo Long

Abstract:

In agricultural production and breeding, implementing automatic picking robot in orchard farming to reduce human labour and error is challenging. The core function of it is automatic identification based on machine vision. This paper focuses on apple detection and counting in orchards and implements several deep learning methods. Extensive datasets are used and a semi-automatic annotation method is proposed. The proposed deep learning models are in state-of-the-art YOLO family. In view of the essence of the models with various backbones, a multi-dimensional comparison in details is made in terms of counting accuracy, mAP and model memory, laying the foundation for realising automatic precision agriculture.

Keywords: agricultural object detection, deep learning, machine vision, YOLO family

Procedia PDF Downloads 197
9151 Utilizing Temporal and Frequency Features in Fault Detection of Electric Motor Bearings with Advanced Methods

Authors: Mohammad Arabi

Abstract:

The development of advanced technologies in the field of signal processing and vibration analysis has enabled more accurate analysis and fault detection in electrical systems. This research investigates the application of temporal and frequency features in detecting faults in electric motor bearings, aiming to enhance fault detection accuracy and prevent unexpected failures. The use of methods such as deep learning algorithms and neural networks in this process can yield better results. The main objective of this research is to evaluate the efficiency and accuracy of methods based on temporal and frequency features in identifying faults in electric motor bearings to prevent sudden breakdowns and operational issues. Additionally, the feasibility of using techniques such as machine learning and optimization algorithms to improve the fault detection process is also considered. This research employed an experimental method and random sampling. Vibration signals were collected from electric motors under normal and faulty conditions. After standardizing the data, temporal and frequency features were extracted. These features were then analyzed using statistical methods such as analysis of variance (ANOVA) and t-tests, as well as machine learning algorithms like artificial neural networks and support vector machines (SVM). The results showed that using temporal and frequency features significantly improves the accuracy of fault detection in electric motor bearings. ANOVA indicated significant differences between normal and faulty signals. Additionally, t-tests confirmed statistically significant differences between the features extracted from normal and faulty signals. Machine learning algorithms such as neural networks and SVM also significantly increased detection accuracy, demonstrating high effectiveness in timely and accurate fault detection. This study demonstrates that using temporal and frequency features combined with machine learning algorithms can serve as an effective tool for detecting faults in electric motor bearings. This approach not only enhances fault detection accuracy but also simplifies and streamlines the detection process. However, challenges such as data standardization and the cost of implementing advanced monitoring systems must also be considered. Utilizing temporal and frequency features in fault detection of electric motor bearings, along with advanced machine learning methods, offers an effective solution for preventing failures and ensuring the operational health of electric motors. Given the promising results of this research, it is recommended that this technology be more widely adopted in industrial maintenance processes.

Keywords: electric motor, fault detection, frequency features, temporal features

Procedia PDF Downloads 46
9150 Humeral Head and Scapula Detection in Proton Density Weighted Magnetic Resonance Images Using YOLOv8

Authors: Aysun Sezer

Abstract:

Magnetic Resonance Imaging (MRI) is one of the advanced diagnostic tools for evaluating shoulder pathologies. Proton Density (PD)-weighted MRI sequences prove highly effective in detecting edema. However, they are deficient in the anatomical identification of bones due to a trauma-induced decrease in signal-to-noise ratio and blur in the traumatized cortices. Computer-based diagnostic systems require precise segmentation, identification, and localization of anatomical regions in medical imagery. Deep learning-based object detection algorithms exhibit remarkable proficiency in real-time object identification and localization. In this study, the YOLOv8 model was employed to detect humeral head and scapular regions in 665 axial PD-weighted MR images. The YOLOv8 configuration achieved an overall success rate of 99.60% and 89.90% for detecting the humeral head and scapula, respectively, with an intersection over union (IoU) of 0.5. Our findings indicate a significant promise of employing YOLOv8-based detection for the humerus and scapula regions, particularly in the context of PD-weighted images affected by both noise and intensity inhomogeneity.

Keywords: YOLOv8, object detection, humerus, scapula, IRM

Procedia PDF Downloads 66
9149 YOLO-IR: Infrared Small Object Detection in High Noise Images

Authors: Yufeng Li, Yinan Ma, Jing Wu, Chengnian Long

Abstract:

Infrared object detection aims at separating small and dim target from clutter background and its capabilities extend beyond the limits of visible light, making it invaluable in a wide range of applications such as improving safety, security, efficiency, and functionality. However, existing methods are usually sensitive to the noise of the input infrared image, leading to a decrease in target detection accuracy and an increase in the false alarm rate in high-noise environments. To address this issue, an infrared small target detection algorithm called YOLO-IR is proposed in this paper to improve the robustness to high infrared noise. To address the problem that high noise significantly reduces the clarity and reliability of target features in infrared images, we design a soft-threshold coordinate attention mechanism to improve the model’s ability to extract target features and its robustness to noise. Since the noise may overwhelm the local details of the target, resulting in the loss of small target features during depth down-sampling, we propose a deep and shallow feature fusion neck to improve the detection accuracy. In addition, because the generalized Intersection over Union (IoU)-based loss functions may be sensitive to noise and lead to unstable training in high-noise environments, we introduce a Wasserstein-distance based loss function to improve the training of the model. The experimental results show that YOLO-IR achieves a 5.0% improvement in recall and a 6.6% improvement in F1-score over existing state-of-art model.

Keywords: infrared small target detection, high noise, robustness, soft-threshold coordinate attention, feature fusion

Procedia PDF Downloads 72
9148 Comparative Analysis of Dissimilarity Detection between Binary Images Based on Equivalency and Non-Equivalency of Image Inversion

Authors: Adnan A. Y. Mustafa

Abstract:

Image matching is a fundamental problem that arises frequently in many aspects of robot and computer vision. It can become a time-consuming process when matching images to a database consisting of hundreds of images, especially if the images are big. One approach to reducing the time complexity of the matching process is to reduce the search space in a pre-matching stage, by simply removing dissimilar images quickly. The Probabilistic Matching Model for Binary Images (PMMBI) showed that dissimilarity detection between binary images can be accomplished quickly by random pixel mapping and is size invariant. The model is based on the gamma binary similarity distance that recognizes an image and its inverse as containing the same scene and hence considers them to be the same image. However, in many applications, an image and its inverse are not treated as being the same but rather dissimilar. In this paper, we present a comparative analysis of dissimilarity detection between PMMBI based on the gamma binary similarity distance and a modified PMMBI model based on a similarity distance that does distinguish between an image and its inverse as being dissimilar.

Keywords: binary image, dissimilarity detection, probabilistic matching model for binary images, image mapping

Procedia PDF Downloads 153
9147 An Android Application for ECG Monitoring and Evaluation Using Pan-Tompkins Algorithm

Authors: Cebrail Çiflikli, Emre Öner Tartan

Abstract:

Parallel to the fast worldwide increase of elderly population and spreading unhealthy life habits, there is a significant rise in the number of patients and health problems. The supervision of people who have health problems and oversight in detection of people who have potential risks, bring a considerable cost to health system and increase workload of physician. To provide an efficient solution to this problem, in the recent years mobile applications have shown their potential for wide usage in health monitoring. In this paper we present an Android mobile application that records and evaluates ECG signal using Pan-Tompkins algorithm for QRS detection. The application model includes an alarm mechanism that is proposed to be used for sending message including abnormality information and location information to health supervisor.

Keywords: Android mobile application, ECG monitoring, QRS detection, Pan-Tompkins Algorithm

Procedia PDF Downloads 233
9146 Distorted Document Images Dataset for Text Detection and Recognition

Authors: Ilia Zharikov, Philipp Nikitin, Ilia Vasiliev, Vladimir Dokholyan

Abstract:

With the increasing popularity of document analysis and recognition systems, text detection (TD) and optical character recognition (OCR) in document images become challenging tasks. However, according to our best knowledge, no publicly available datasets for these particular problems exist. In this paper, we introduce a Distorted Document Images dataset (DDI-100) and provide a detailed analysis of the DDI-100 in its current state. To create the dataset we collected 7000 unique document pages, and extend it by applying different types of distortions and geometric transformations. In total, DDI-100 contains more than 100,000 document images together with binary text masks, text and character locations in terms of bounding boxes. We also present an analysis of several state-of-the-art TD and OCR approaches on the presented dataset. Lastly, we demonstrate the usefulness of DDI-100 to improve accuracy and stability of the considered TD and OCR models.

Keywords: document analysis, open dataset, optical character recognition, text detection

Procedia PDF Downloads 172
9145 A Diagnostic Accuracy Study: Comparison of Two Different Molecular-Based Tests (Genotype HelicoDR and Seeplex Clar-H. pylori ACE Detection), in the Diagnosis of Helicobacter pylori Infections

Authors: Recep Kesli, Huseyin Bilgin, Yasar Unlu, Gokhan Gungor

Abstract:

Aim: The aim of this study was to compare diagnostic values of two different molecular-based tests (GenoType® HelicoDR ve Seeplex® H. pylori-ClaR- ACE Detection) in detection presence of the H. pylori from gastric biopsy specimens. In addition to this also was aimed to determine resistance ratios of H. pylori strains against to clarytromycine and quinolone isolated from gastric biopsy material cultures by using both the genotypic (GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection) and phenotypic (gradient strip, E-test) methods. Material and methods: A total of 266 patients who admitted to Konya Education and Research Hospital Department of Gastroenterology with dyspeptic complaints, between January 2011-June 2013, were included in the study. Microbiological and histopathological examinations of biopsy specimens taken from antrum and corpus regions were performed. The presence of H. pylori in all the biopsy samples was investigated by five differnt dignostic methods together: culture (C) (Portagerm pylori-PORT PYL, Pylori agar-PYL, GENbox microaer, bioMerieux, France), histology (H) (Giemsa, Hematoxylin and Eosin staining), rapid urease test (RUT) (CLOtest, Cimberly-Clark, USA), and two different molecular tests; GenoType® HelicoDR, Hain, Germany, based on DNA strip assay, and Seeplex ® H. pylori -ClaR- ACE Detection, Seegene, South Korea, based on multiplex PCR. Antimicrobial resistance of H. pylori isolates against clarithromycin and levofloxacin was determined by GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection, and gradient strip (E-test, bioMerieux, France) methods. Culture positivity alone or positivities of both histology and RUT together was accepted as the gold standard for H. pylori positivity. Sensitivity and specificity rates of two molecular methods used in the study were calculated by taking the two gold standards previously mentioned. Results: A total of 266 patients between 16-83 years old who 144 (54.1 %) were female, 122 (45.9 %) were male were included in the study. 144 patients were found as culture positive, and 157 were H and RUT were positive together. 179 patients were found as positive with GenoType® HelicoDR and Seeplex ® H. pylori -ClaR- ACE Detection together. Sensitivity and specificity rates of studied five different methods were found as follows: C were 80.9 % and 84.4 %, H + RUT were 88.2 % and 75.4 %, GenoType® HelicoDR were 100 % and 71.3 %, and Seeplex ® H. pylori -ClaR- ACE Detection were, 100 % and 71.3 %. A strong correlation was found between C and H+RUT, C and GenoType® HelicoDR, and C and Seeplex ® H. pylori -ClaR- ACE Detection (r:0.644 and p:0.000, r:0.757 and p:0.000, r:0.757 and p:0.000, respectively). Of all the isolated 144 H. pylori strains 24 (16.6 %) were detected as resistant to claritromycine, and 18 (12.5 %) were levofloxacin. Genotypic claritromycine resistance was detected only in 15 cases with GenoType® HelicoDR, and 6 cases with Seeplex ® H. pylori -ClaR- ACE Detection. Conclusion: In our study, it was concluded that; GenoType® HelicoDR and Seeplex ® H. pylori -ClaR- ACE Detection was found as the most sensitive diagnostic methods when comparing all the investigated other ones (C, H, and RUT).

Keywords: Helicobacter pylori, GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection, antimicrobial resistance

Procedia PDF Downloads 168
9144 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 432
9143 Green-synthesized of Selenium Nanoparticles Using Garlic Extract and Their Application for Rapid Detection of Salicylic Acid in Milk

Authors: Kashif Jabbar

Abstract:

Milk adulteration is a global concern, and the current study was plan to synthesize Selenium nanoparticles by green method using plant extract of garlic, Allium Sativum, and to characterize Selenium nanoparticles through different analytical techniques and to apply Selenium nanoparticles as fast and easy technique for the detection of salicylic acid in milk. The highly selective, sensitive, and quick interference green synthesis-based sensing of possible milk adulterants i.e., salicylic acid, has been reported here. Salicylic acid interacts with nanoparticles through strong bonding interactions, hence resulting in an interruption within the formation of selenium nanoparticles which is confirmed by UV-VIS spectroscopy, scanning electron microscopy, and x-ray diffraction. This interaction in the synthesis of nanoparticles resulted in transmittance wavelength that decrease with the increasing amount of salicylic acid, showing strong binding of selenium nanoparticles with adulterant, thereby permitting in-situ fast detection of salicylic acid from milk having a limit of detection at 10-3 mol and linear coefficient correlation of 0.9907. Conclusively, it can be draw that colloidal selenium could be synthesize successfully by garlic extract in order to serve as a probe for fast and cheap testing of milk adulteration.

Keywords: adulteration, green synthesis, selenium nanoparticles, salicylic acid, aggregation

Procedia PDF Downloads 82
9142 Surface-Enhanced Raman Spectroscopy-Based Detection of SARS-CoV-2 Through In Situ One-pot Electrochemical Synthesis of 3D Au-Lysate Nanocomposite Structures on Plasmonic Au Electrodes

Authors: Ansah Iris Baffour, Dong-Ho Kim, Sung-Gyu Park

Abstract:

The ongoing COVID-19 pandemic, caused by the SARS-CoV-2 virus and is gradually shifting to an endemic phase which implies the outbreak is far from over and will be difficult to eradicate. Global cooperation has led to unified precautions that aim to suppress epidemiological spread (e.g., through travel restrictions) and reach herd immunity (through vaccinations); however, the primary strategy to restrain the spread of the virus in mass populations relies on screening protocols that enable rapid on-site diagnosis of infections. Herein, we employed surface enhanced Raman spectroscopy (SERS) for the rapid detection of SARS-CoV-2 lysate on an Au-modified Au nanodimple(AuND)electrode. Through in situone-pot Au electrodeposition on the AuND electrode, Au-lysate nanocomposites were synthesized, generating3D internal hotspots for large SERS signal enhancements within 30 s of the deposition. The capture of lysate into newly generated plasmonic nanogaps within the nanocomposite structures enhanced metal-spike protein contact in 3D spaces and served as hotspots for sensitive detection. The limit of detection of SARS-CoV-2 lysate was 5 x 10-2 PFU/mL. Interestingly, ultrasensitive detection of the lysates of influenza A/H1N1 and respiratory syncytial virus (RSV) was possible, but the method showed ultimate selectivity for SARS-CoV-2 in lysate solution mixtures. We investigated the practical application of the approach for rapid on-site diagnosis by detecting SARS-CoV-2 lysate spiked in normal human saliva at ultralow concentrations. The results presented demonstrate the reliability and sensitivity of the assay for rapid diagnosis of COVID-19.

Keywords: label-free detection, nanocomposites, SARS-CoV-2, surface-enhanced raman spectroscopy

Procedia PDF Downloads 123
9141 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: android, information security, intrusion detection systems, malware, mobile devices

Procedia PDF Downloads 301
9140 Breeding for Hygienic Behavior in Honey Bees

Authors: Michael Eickermann, Juergen Junk

Abstract:

The Western honey (Apis mellifera) is threatened by a number of parasites, especially the devastating Varroa mite (Varroa destructor) is responsible for a high level of mortality over winter, e.g., in Europe and USA. While the use of synthetic pesticides or organic acids has been preferred so far to control this parasite, breeding strategies for less susceptible honey bees are in early stages. Hygienic behavior can be an important tool for controlling Varroa destructor. Worker bees with a high level of this behavior are able to detect infested brood in the cells under the wax lid during pupation and remove them out of the hive. The underlying processes of this behavior are only partly investigated, but it is for sure that hygienic behavior is heritable and therefore, can be integrated into commercial breeding lines. In a first step, breeding lines with a high level of phenotypic hygienic behavior have been identified by using a bioassay for accurate assessment of this trait in a long-term national breeding program in Luxembourg since 2015. Based on the artificial infestation of nucleus colonies with 150 phoretic Varroa destructor mites, the level of phenotypic hygienic behavior was detected by counting the number of mites in all stages, twelve days after infestation. A nucleus with a high level of hygienic behavior was overwintered and used for breeding activities in the following years. Artificial insemination was used to combine different breeding lines. Buckfast lines, as well as Carnica lines, were used. While Carnica lines offered only a low increase of hygienic behavior up to maximum 62.5%, Buckfast lines performed much better with mean levels of more than 87.5%. Some mating ends up with a level of 100%. But even with a level of 82.5% Varroa mites are not able to reproduce in the colony anymore. In a final step, a nucleus with a high level of hygienic behavior were build up to full colonies and located at two places in Luxembourg to build up a drone congregation area. Local beekeepers can bring their nucleus to this location for mating the queens with drones offering a high level of hygienic behavior.

Keywords: agiculture, artificial insemination, honey bee, varroa destructor

Procedia PDF Downloads 136
9139 Moving Object Detection Using Histogram of Uniformly Oriented Gradient

Authors: Wei-Jong Yang, Yu-Siang Su, Pau-Choo Chung, Jar-Ferr Yang

Abstract:

Moving object detection (MOD) is an important issue in advanced driver assistance systems (ADAS). There are two important moving objects, pedestrians and scooters in ADAS. In real-world systems, there exist two important challenges for MOD, including the computational complexity and the detection accuracy. The histogram of oriented gradient (HOG) features can easily detect the edge of object without invariance to changes in illumination and shadowing. However, to reduce the execution time for real-time systems, the image size should be down sampled which would lead the outlier influence to increase. For this reason, we propose the histogram of uniformly-oriented gradient (HUG) features to get better accurate description of the contour of human body. In the testing phase, the support vector machine (SVM) with linear kernel function is involved. Experimental results show the correctness and effectiveness of the proposed method. With SVM classifiers, the real testing results show the proposed HUG features achieve better than classification performance than the HOG ones.

Keywords: moving object detection, histogram of oriented gradient, histogram of uniformly-oriented gradient, linear support vector machine

Procedia PDF Downloads 594
9138 Basic Study of Mammographic Image Magnification System with Eye-Detector and Simple EEG Scanner

Authors: Aika Umemuro, Mitsuru Sato, Mizuki Narita, Saya Hori, Saya Sakurai, Tomomi Nakayama, Ayano Nakazawa, Toshihiro Ogura

Abstract:

Mammography requires the detection of very small calcifications, and physicians search for microcalcifications by magnifying the images as they read them. The mouse is necessary to zoom in on the images, but this can be tiring and distracting when many images are read in a single day. Therefore, an image magnification system combining an eye-detector and a simple electroencephalograph (EEG) scanner was devised, and its operability was evaluated. Two experiments were conducted in this study: the measurement of eye-detection error using an eye-detector and the measurement of the time required for image magnification using a simple EEG scanner. Eye-detector validation showed that the mean distance of eye-detection error ranged from 0.64 cm to 2.17 cm, with an overall mean of 1.24 ± 0.81 cm for the observers. The results showed that the eye detection error was small enough for the magnified area of the mammographic image. The average time required for point magnification in the verification of the simple EEG scanner ranged from 5.85 to 16.73 seconds, and individual differences were observed. The reason for this may be that the size of the simple EEG scanner used was not adjustable, so it did not fit well for some subjects. The use of a simple EEG scanner with size adjustment would solve this problem. Therefore, the image magnification system using the eye-detector and the simple EEG scanner is useful.

Keywords: EEG scanner, eye-detector, mammography, observers

Procedia PDF Downloads 215
9137 An Intelligent Nondestructive Testing System of Ultrasonic Infrared Thermal Imaging Based on Embedded Linux

Authors: Hao Mi, Ming Yang, Tian-yue Yang

Abstract:

Ultrasonic infrared nondestructive testing is a kind of testing method with high speed, accuracy and localization. However, there are still some problems, such as the detection requires manual real-time field judgment, the methods of result storage and viewing are still primitive. An intelligent non-destructive detection system based on embedded linux is put forward in this paper. The hardware part of the detection system is based on the ARM (Advanced Reduced Instruction Set Computer Machine) core and an embedded linux system is built to realize image processing and defect detection of thermal images. The CLAHE algorithm and the Butterworth filter are used to process the thermal image, and then the boa server and CGI (Common Gateway Interface) technology are used to transmit the test results to the display terminal through the network for real-time monitoring and remote monitoring. The system also liberates labor and eliminates the obstacle of manual judgment. According to the experiment result, the system provides a convenient and quick solution for industrial non-destructive testing.

Keywords: remote monitoring, non-destructive testing, embedded Linux system, image processing

Procedia PDF Downloads 223
9136 A Global Organizational Theory for the 21st Century

Authors: Troy A. Tyre

Abstract:

Organizational behavior and organizational change are elements of the ever-changing global business environment. Leadership and organizational behavior are 21st century disciplines. Network marketing organizations need to understand the ever-changing nature of global business and be ready and willing to adapt to the environment. Network marketing organizations have a challenge keeping up with a rapid escalation in global growth. Network marketing growth has been steady and global. Network marketing organizations have been slow to develop a 21st century global strategy to manage the rapid escalation of growth degrading organizational behavior, job satisfaction, increasing attrition, and degrading customer service. Development of an organizational behavior and leadership theory for the 21st century to help network marketing develops a global business strategy to manage the rapid escalation in growth that affects organizational behavior. Managing growth means organizational leadership must develop and adapt to the organizational environment. Growth comes with an open mind and one’s departure from the comfort zone. Leadership growth operates in the tacit dimension. Systems thinking and adaptation of mental models can help shift organizational behavior. Shifting the organizational behavior requires organizational learning. Organizational learning occurs through single-loop, double-loop, and triple-loop learning. Triple-loop learning is the most difficult, but the most rewarding. Tools such as theory U can aid in developing a landscape for organizational behavioral development. Additionally, awareness to espoused and portrayed actions is imperatives. Theories of motivation, cross-cultural diversity, and communications are instrumental in founding an organizational behavior suited for the 21st century.

Keywords: global, leadership, network marketing, organizational behavior

Procedia PDF Downloads 553
9135 Probabilistic Simulation of Triaxial Undrained Cyclic Behavior of Soils

Authors: Arezoo Sadrinezhad, Kallol Sett, S. I. Hariharan

Abstract:

In this paper, a probabilistic framework based on Fokker-Planck-Kolmogorov (FPK) approach has been applied to simulate triaxial cyclic constitutive behavior of uncertain soils. The framework builds upon previous work of the writers, and it has been extended for cyclic probabilistic simulation of triaxial undrained behavior of soils. von Mises elastic-perfectly plastic material model is considered. It is shown that by using probabilistic framework, some of the most important aspects of soil behavior under cyclic loading can be captured even with a simple elastic-perfectly plastic constitutive model.

Keywords: elasto-plasticity, uncertainty, soils, fokker-planck equation, fourier spectral method, finite difference method

Procedia PDF Downloads 379