Search results for: recurrent errors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1271

Search results for: recurrent errors

731 Caring for a Spinal Cord Injury Patient with Diabetic Nephropathy Receiving Hospice Palliative Care

Authors: Li-Ting Kung, Hui-Zhu Chen, Hsin-Tzu Lee, Wan-Yin Hsu

Abstract:

Patients with spinal cord injury combined with diabetic nephropathy may under a lot of painful conditions due to complications related to the illness itself or treatments, such as recurrent pressure ulcers, autonomic and peripheral neuropathy, as well as dialysis, for long term. This case report illustrated the nursing experience of transferring a spine cord injure patient who received hemodialysis due to adverse lifestyle-induced diabetic nephropathy to the hospice ward. Nursing care was provided in this patient from July 25th to August 30th, 2015. The tool of 'Gordon’s 11-item functional health assessment' and clinical observation, interviews as well as physical examination were used as data collections. Based on results of health assessment as above, the patient’s health problems were identified as the following: impaired skin integrity, chronic pain, and hopeless. Besides to relieve the symptom of pain due to disease or the treatment of hemodialysis and provide wound care, the first author also played a role to assist the patient to achieve his goal of receiving the hospice palliative care. Finally, with much effort of nurses to communicate with medical teams between the surgical and hospice wards, the patient was transferred to the hospice ward to have fulfilled his last wish of having a good death. We hope this nursing experience can be applied to other similar cases in the future.

Keywords: diabetic nephropathy, hospice care, palliative care, spinal cord injury

Procedia PDF Downloads 137
730 Towards a Balancing Medical Database by Using the Least Mean Square Algorithm

Authors: Kamel Belammi, Houria Fatrim

Abstract:

imbalanced data set, a problem often found in real world application, can cause seriously negative effect on classification performance of machine learning algorithms. There have been many attempts at dealing with classification of imbalanced data sets. In medical diagnosis classification, we often face the imbalanced number of data samples between the classes in which there are not enough samples in rare classes. In this paper, we proposed a learning method based on a cost sensitive extension of Least Mean Square (LMS) algorithm that penalizes errors of different samples with different weight and some rules of thumb to determine those weights. After the balancing phase, we applythe different classifiers (support vector machine (SVM), k- nearest neighbor (KNN) and multilayer neuronal networks (MNN)) for balanced data set. We have also compared the obtained results before and after balancing method.

Keywords: multilayer neural networks, k- nearest neighbor, support vector machine, imbalanced medical data, least mean square algorithm, diabetes

Procedia PDF Downloads 517
729 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 191
728 The Effects of Goal Setting and Feedback on Inhibitory Performance

Authors: Mami Miyasaka, Kaichi Yanaoka

Abstract:

Attention Deficit/Hyperactivity Disorder (ADHD) is a neurodevelopmental disorder characterized by inattention, hyperactivity, and impulsivity; symptoms often manifest during childhood. In children with ADHD, the development of inhibitory processes is impaired. Inhibitory control allows people to avoid processing unnecessary stimuli and to behave appropriately in various situations; thus, people with ADHD require interventions to improve inhibitory control. Positive or negative reinforcements (i.e., reward or punishment) help improve the performance of children with such difficulties. However, in order to optimize impact, reward and punishment must be presented immediately following the relevant behavior. In regular elementary school classrooms, such supports are uncommon; hence, an alternative practical intervention method is required. One potential intervention involves setting goals to keep children motivated to perform tasks. This study examined whether goal setting improved inhibitory performances, especially for children with severe ADHD-related symptoms. We also focused on giving feedback on children's task performances. We expected that giving children feedback would help them set reasonable goals and monitor their performance. Feedback can be especially effective for children with severe ADHD-related symptoms because they have difficulty monitoring their own performance, perceiving their errors, and correcting their behavior. Our prediction was that goal setting by itself would be effective for children with mild ADHD-related symptoms, and goal setting based on feedback would be effective for children with severe ADHD-related symptoms. Japanese elementary school children and their parents were the sample for this study. Children performed two kinds of go/no-go tasks, and parents completed a checklist about their children's ADHD symptoms, the ADHD Rating Scale-IV, and the Conners 3rd edition. The go/no-go task is a cognitive task to measure inhibitory performance. Children were asked to press a key on the keyboard when a particular symbol appeared on the screen (go stimulus) and to refrain from doing so when another symbol was displayed (no-go stimulus). Errors obtained in response to a no-go stimulus indicated inhibitory impairment. To examine the effect of goal-setting on inhibitory control, 37 children (Mage = 9.49 ± 0.51) were required to set a performance goal, and 34 children (Mage = 9.44 ± 0.50) were not. Further, to manipulate the presence of feedback, in one go/no-go task, no information about children’s scores was provided; however, scores were revealed for the other type of go/no-go tasks. The results revealed a significant interaction between goal setting and feedback. However, three-way interaction between ADHD-related inattention, feedback, and goal setting was not significant. These results indicated that goal setting was effective for improving the performance of the go/no-go task only with feedback, regardless of ADHD severity. Furthermore, we found an interaction between ADHD-related inattention and feedback, indicating that informing inattentive children of their scores made them unexpectedly more impulsive. Taken together, giving feedback was, unexpectedly, too demanding for children with severe ADHD-related symptoms, but the combination of goal setting with feedback was effective for improving their inhibitory control. We discuss effective interventions for children with ADHD from the perspective of goal setting and feedback. This work was supported by the 14th Hakuho Research Grant for Child Education of the Hakuho Foundation.

Keywords: attention deficit disorder with hyperactivity, feedback, goal-setting, go/no-go task, inhibitory control

Procedia PDF Downloads 89
727 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

Authors: M. F. Haroun, T. A. Gulliver

Abstract:

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA

Procedia PDF Downloads 494
726 The Roles of Mandarin and Local Dialect in the Acquisition of L2 English Consonants Among Chinese Learners of English: Evidence From Suzhou Dialect Areas

Authors: Weijing Zhou, Yuting Lei, Francis Nolan

Abstract:

In the domain of second language acquisition, whenever pronunciation errors or acquisition difficulties are found, researchers habitually attribute them to the negative transfer of the native language or local dialect. To what extent do Mandarin and local dialects affect English phonological acquisition for Chinese learners of English as a foreign language (EFL)? Little evidence, however, has been found via empirical research in China. To address this core issue, the present study conducted phonetic experiments to explore the roles of local dialects and Mandarin in Chinese EFL learners’ acquisition of L2 English consonants. Besides Mandarin, the sole national language in China, Suzhou dialect was selected as the target local dialect because of its distinct phonology from Mandarin. The experimental group consisted of 30 junior English majors at Yangzhou University, who were born and lived in Suzhou, acquired Suzhou Dialect since their early childhood, and were able to communicate freely and fluently with each other in Suzhou Dialect, Mandarin as well as English. The consonantal target segments were all the consonants of English, Mandarin and Suzhou Dialect in typical carrier words embedded in the carrier sentence Say again. The control group consisted of two Suzhou Dialect experts, two Mandarin radio broadcasters, and two British RP phoneticians, who served as the standard speakers of the three languages. The reading corpus was recorded and sampled in the phonetic laboratories at Yangzhou University, Soochow University and Cambridge University, respectively, then transcribed, segmented and analyzed acoustically via Praat software, and finally analyzed statistically via EXCEL and SPSS software. The main findings are as follows: First, in terms of correct acquisition rates (CARs) of all the consonants, Mandarin ranked top (92.83%), English second (74.81%) and Suzhou Dialect last (70.35%), and significant differences were found only between the CARs of Mandarin and English and between the CARs of Mandarin and Suzhou Dialect, demonstrating Mandarin was overwhelmingly more robust than English or Suzhou Dialect in subjects’ multilingual phonological ecology. Second, in terms of typical acoustic features, the average duration of all the consonants plus the voice onset time (VOT) of plosives, fricatives, and affricatives in 3 languages were much longer than those of standard speakers; the intensities of English fricatives and affricatives were higher than RP speakers but lower than Mandarin and Suzhou Dialect standard speakers; the formants of English nasals and approximants were significantly different from those of Mandarin and Suzhou Dialects, illustrating the inconsistent acoustic variations between the 3 languages. Thirdly, in terms of typical pronunciation variations or errors, there were significant interlingual interactions between the 3 consonant systems, in which Mandarin consonants were absolutely dominant, accounting for the strong transfer from L1 Mandarin to L2 English instead of from earlier-acquired L1 local dialect to L2 English. This is largely because the subjects were knowingly exposed to Mandarin since their nursery and were strictly required to speak in Mandarin through all the formal education periods from primary school to university.

Keywords: acquisition of L2 English consonants, role of Mandarin, role of local dialect, Chinese EFL learners from Suzhou Dialect areas

Procedia PDF Downloads 77
725 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 286
724 Inflation and Deflation of Aircraft's Tire with Intelligent Tire Pressure Regulation System

Authors: Masoud Mirzaee, Ghobad Behzadi Pour

Abstract:

An aircraft tire is designed to tolerate extremely heavy loads for a short duration. The number of tires increases with the weight of the aircraft, as it is needed to be distributed more evenly. Generally, aircraft tires work at high pressure, up to 200 psi (14 bar; 1,400 kPa) for airliners and higher for business jets. Tire assemblies for most aircraft categories provide a recommendation of compressed nitrogen that supports the aircraft’s weight on the ground, including a mechanism for controlling the aircraft during taxi, takeoff; landing; and traction for braking. Accurate tire pressure is a key factor that enables tire assemblies to perform reliably under high static and dynamic loads. Concerning ambient temperature change, considering the condition in which the temperature between the origin and destination airport was different, tire pressure should be adjusted and inflated to the specified operating pressure at the colder airport. This adjustment superseding the normal tire over an inflation limit of 5 percent at constant ambient temperature is required because the inflation pressure remains constant to support the load of a specified aircraft configuration. On the other hand, without this adjustment, a tire assembly would be significantly under/over-inflated at the destination. Due to an increase of human errors in the aviation industry, exorbitant costs are imposed on the airlines for providing consumable parts such as aircraft tires. The existence of an intelligent system to adjust the aircraft tire pressure based on weight, load, temperature, and weather conditions of origin and destination airports, could have a significant effect on reducing the aircraft maintenance costs, aircraft fuel and further improving the environmental issues related to the air pollution. An intelligent tire pressure regulation system (ITPRS) contains a processing computer, a nitrogen bottle with 1800 psi, and distribution lines. Nitrogen bottle’s inlet and outlet valves are installed in the main wheel landing gear’s area and are connected through nitrogen lines to main wheels and nose wheels assy. Controlling and monitoring of nitrogen will be performed by a computer, which is adjusted according to the calculations of received parameters, including the temperature of origin and destination airport, the weight of cargo loads and passengers, fuel quantity, and wind direction. Correct tire inflation and deflation are essential in assuring that tires can withstand the centrifugal forces and heat of normal operations, with an adequate margin of safety for unusual operating conditions such as rejected takeoff and hard landings. ITPRS will increase the performance of the aircraft in all phases of takeoff, landing, and taxi. Moreover, this system will reduce human errors, consumption materials, and stresses imposed on the aircraft body.

Keywords: avionic system, improve efficiency, ITPRS, human error, reduced cost, tire pressure

Procedia PDF Downloads 225
723 Application All Digits Number Benford Law in Financial Statement

Authors: Teguh Sugiarto

Abstract:

Background: The research aims to explore if there is fraud in a financial statement, use the Act stated that Benford's distribution all digits must compare the number will follow the trend of lower number. Research methods: This research uses all the analysis number being in Benford's law. After receiving the results of the analysis of all the digits, the author makes a distinction between implementation using the scale above and below 5%, the rate of occurrence of difference. With the number which have differences in the range of 5%, then can do the follow-up and the detection of the onset of fraud against the financial statements. The findings: From the research that has been done can be drawn the conclusion that the average of all numbers appear in the financial statements, and compare the rates of occurrence of numbers according to the characteristics of Benford's law. About the existence of errors and fraud in the financial statements of PT medco Energy Tbk did not occur. Conclusions: The study concludes that Benford's law can serve as indicator tool in detecting the possibility of in financial statements to case studies of PT Medco Energy Tbk for the fiscal year 2000-2010.

Keywords: Benford law, first digits, all digits number Benford law, financial statement

Procedia PDF Downloads 229
722 E-Government Websites Accessibility for People with Disabilities (PWD): In Depth Evaluation of Kingdom of Bahrain

Authors: Reem AlKabbi, Hayat Ali, Mariam Yasser

Abstract:

Nowadays, eGovernment websites are becoming indispensable for public, business, personal efficiency or even improvement of livelihoods. Using these websites, citizens undertake number of tasks that would otherwise be difficult or impossible. However, many of these websites are not accessible to all people' types including People with Disabilities (PWDs). Through Web Accessibility Guidelines, Web developers can develop Web applications that are accessible to PWDs. This research is to investigate the Accessibility of eGovernment websites in Kingdom of Bahrain. The accessibility was measured using Web Content Accessibility Guidelines (WCAG) and section 508. For the evaluation purpose, some automatic tools were used. Samples of 43 eGovernment websites were selected. The accessibility of the websites was analyzed by using several automatic evaluation tools such as Total Validator and Functional Accessibility Evaluator (FAE). The evaluation process revealed several errors according to the accessibility guidelines. This research provides few recommendations for further improvement of accessibility features of eGovernment websites based on the highlighted issues and key findings reported in this research.

Keywords: website accessibility, W3C, PWD, e-government

Procedia PDF Downloads 429
721 Exploring Causes of Homelessness and Shelter Entry: A Case Study Analysis of Shelter Data in New York

Authors: Lindsay Fink, Sarha Smith-Moyo, Leanne W. Charlesworth

Abstract:

In recent years, the number of individuals experiencing homelessness has increased in the United States. This paper analyzes 2019 data from 16 different emergency shelters in Monroe County, located in Upstate New York. The data were collected through the County’s Homeless Management Information System (HMIS), and individuals were de-identified and de-duplicated for analysis. The purpose of this study is to explore the basic characteristics of the homeless population in Monroe County, and the dynamics of shelter use. The results of this study showed gender as a significant factor when analyzing the relationship between demographic variables and recorded reasons for shelter entry. Results also indicated that age and ethnicity did not significantly influence odds of re-entering a shelter, but did significantly influence reasons for shelter entry. Overall, the most common recorded cause of shelter entry in 2019 in the examined county was eviction by primary tenant. Recommendations to better address recurrent shelter entry and potential chronic homelessness include more consideration for the diversity existing within the homeless population, and the dynamics leading to shelter stays, including enhanced funding and training for shelter staff, as well as expanded access to permanent supportive housing programs.

Keywords: chronic homelessness, homeless shelter stays, permanent supportive housing, shelter population dynamics

Procedia PDF Downloads 140
720 Efficient Subsurface Mapping: Automatic Integration of Ground Penetrating Radar with Geographic Information Systems

Authors: Rauf R. Hussein, Devon M. Ramey

Abstract:

Integrating Ground Penetrating Radar (GPR) with Geographic Information Systems (GIS) can provide valuable insights for various applications, such as archaeology, transportation, and utility locating. Although there has been progress toward automating the integration of GPR data with GIS, fully automatic integration has not been achieved yet. Additionally, manually integrating GPR data with GIS can be a time-consuming and error-prone process. In this study, actual, real-world GPR applications are presented, and a software named GPR-GIS 10 is created to interactively extract subsurface targets from GPR radargrams and automatically integrate them into GIS. With this software, it is possible to quickly and reliably integrate the two techniques to create informative subsurface maps. The results indicated that automatic integration of GPR with GIS can be an efficient tool to map and view any subsurface targets in their appropriate location in a 3D space with the needed precision. The findings of this study could help GPR-GIS integrators save time and reduce errors in many GPR-GIS applications.

Keywords: GPR, GIS, GPR-GIS 10, drone technology, automation

Procedia PDF Downloads 77
719 Grammatical Interference in Russian-Spanish Bilingualism

Authors: Olga A. Gnatyuk

Abstract:

The article is devoted to the phenomenon of interference that occurs in the case of the Russian-Spanish language contact. The questions of the definition of the term and levels, as well as prerequisites of interference occurrence, are considered. Interference, which is an essential part of bilingualism, may become apparent at different linguistic levels. Interference is especially evident in oral speech. The article reviews some examples of grammatical interference in Russian-Spanish bilingualism of Russian immigrants living in Spain. According to the results of the research, some cases of mother-tongue interference in Russian-Speaking Spanish language learners’ speech were revealed. Special attention is paid to such key spheres of grammatical interference as articles, personal pronouns, gender, and number of nouns. In the research, the drop of a link-verb, as well as its usage in some incorrect form, are observed in Russian immigrants’ speech. Conclusions are drawn that in the Spanish language, interference errors appear because of a consequence of both the absence in the Russian language of certain phenomena and categories of the Spanish language and the discrepancy of the linguistic systems of the two languages.

Keywords: bilingualism, interference, grammatical interference, Russian language, Spanish language

Procedia PDF Downloads 147
718 The Contribution of Edgeworth, Bootstrap and Monte Carlo Methods in Financial Data

Authors: Edlira Donefski, Tina Donefski, Lorenc Ekonomi

Abstract:

Edgeworth Approximation, Bootstrap, and Monte Carlo Simulations have considerable impacts on achieving certain results related to different problems taken into study. In our paper, we have treated a financial case related to the effect that has the components of a cash-flow of one of the most successful businesses in the world, as the financial activity, operational activity, and investment activity to the cash and cash equivalents at the end of the three-months period. To have a better view of this case, we have created a vector autoregression model, and after that, we have generated the impulse responses in the terms of asymptotic analysis (Edgeworth Approximation), Monte Carlo Simulations, and residual bootstrap based on the standard errors of every series created. The generated results consisted of the common tendencies for the three methods applied that consequently verified the advantage of the three methods in the optimization of the model that contains many variants.

Keywords: autoregression, bootstrap, edgeworth expansion, Monte Carlo method

Procedia PDF Downloads 136
717 Impact of Integrated Signals for Doing Human Activity Recognition Using Deep Learning Models

Authors: Milagros Jaén-Vargas, Javier García Martínez, Karla Miriam Reyes Leiva, María Fernanda Trujillo-Guerrero, Francisco Fernandes, Sérgio Barroso Gonçalves, Miguel Tavares Silva, Daniel Simões Lopes, José Javier Serrano Olmedo

Abstract:

Human Activity Recognition (HAR) is having a growing impact in creating new applications and is responsible for emerging new technologies. Also, the use of wearable sensors is an important key to exploring the human body's behavior when performing activities. Hence, the use of these dispositive is less invasive and the person is more comfortable. In this study, a database that includes three activities is used. The activities were acquired from inertial measurement unit sensors (IMU) and motion capture systems (MOCAP). The main objective is differentiating the performance from four Deep Learning (DL) models: Deep Neural Network (DNN), Convolutional Neural Network (CNN), Recurrent Neural Network (RNN) and hybrid model Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM), when considering acceleration, velocity and position and evaluate if integrating the IMU acceleration to obtain velocity and position represent an increment in performance when it works as input to the DL models. Moreover, compared with the same type of data provided by the MOCAP system. Despite the acceleration data is cleaned when integrating, results show a minimal increase in accuracy for the integrated signals.

Keywords: HAR, IMU, MOCAP, acceleration, velocity, position, feature maps

Procedia PDF Downloads 83
716 Modelling of Rate-Dependent Hysteresis of Polypyrrole Dual Sensing-Actuators for Precise Position Control

Authors: Johanna Schumacher, Toribio F. Otero, Victor H. Pascual

Abstract:

Bending dual sensing-actuators based on electroactive polymers are faradaic motors meaning the consumed charge determines the actuator’s tip position. During actuation, consumed charges during oxidation and reduction result in different tip positions showing dynamic hysteresis effects with errors up to 25%. For a precise position control of these actuators, the characterization of the hysteresis effect due to irreversible reactions is crucial. Here, the investigation and modelling of dynamic hysteresis effects of polypyrrole-dodezylbenzenesulfonate (PPyDBS) actuators under ambient working conditions are presented. The hysteresis effect is studied for charge consumption at different frequencies and a rate-dependent hysteresis model is derived. The hysteresis model is implemented as closed loop system and is verified experimentally.

Keywords: dual sensing-actuator, electroactive polymers, hysteresis, position control

Procedia PDF Downloads 373
715 Technology Impact in Learning and Teaching English Language Writing

Authors: Laura Naka

Abstract:

The invention of computer writing programs has changed the way of teaching second language writing. This artificial intelligence engine can provide students with feedback on their essays, on their grammatical and spelling errors, convenient writing and editing tools to facilitate student’s writing process. However, it is not yet proved if this technology is helping students to improve their writing skills. There are several programs that are of great assistance for students concerning their writing skills. New technology provides students with different software programs which enable them to be more creative, to express their opinions and ideas in words, pictures and sounds, but at the end main and most correct feedback should be given by their teachers. No matter how new technology affects in writing skills, always comes from their teachers. This research will try to present some of the advantages and disadvantages that new technology has in writing process for students. The research takes place in the University of Gjakova ‘’Fehmi Agani’’ Faculty of Education-Preschool Program. The research aims to provide random sample response by using questionnaires and observation.

Keywords: English language learning, technology, academic writing, teaching L2.

Procedia PDF Downloads 555
714 Characteristic Sentence Stems in Academic English Texts: Definition, Identification, and Extraction

Authors: Jingjie Li, Wenjie Hu

Abstract:

Phraseological units in academic English texts have been a central focus in recent corpus linguistic research. A wide variety of phraseological units have been explored, including collocations, chunks, lexical bundles, patterns, semantic sequences, etc. This paper describes a special category of clause-level phraseological units, namely, Characteristic Sentence Stems (CSSs), with a view to describing their defining criteria and extraction method. CSSs are contiguous lexico-grammatical sequences which contain a subject-predicate structure and which are frame expressions characteristic of academic writing. The extraction of CSSs consists of six steps: Part-of-speech tagging, n-gram segmentation, structure identification, significance of occurrence calculation, text range calculation, and overlapping sequence reduction. Significance of occurrence calculation is the crux of this study. It includes the computing of both the internal association and the boundary independence of a CSS and tests the occurring significance of the CSS from both inside and outside perspectives. A new normalization algorithm is also introduced into the calculation of LocalMaxs for reducing overlapping sequences. It is argued that many sentence stems are so recurrent in academic texts that the most typical of them have become the habitual ways of making meaning in academic writing. Therefore, studies of CSSs could have potential implications and reference value for academic discourse analysis, English for Academic Purposes (EAP) teaching and writing.

Keywords: characteristic sentence stem, extraction method, phraseological unit, the statistical measure

Procedia PDF Downloads 150
713 Hardware Implementation for the Contact Force Reconstruction in Tactile Sensor Arrays

Authors: María-Luisa Pinto-Salamanca, Wilson-Javier Pérez-Holguín

Abstract:

Reconstruction of contact forces is a fundamental technique for analyzing the properties of a touched object and is essential for regulating the grip force in slip control loops. This is based on the processing of the distribution, intensity, and direction of the forces during the capture of the sensors. Currently, efficient hardware alternatives have been used more frequently in different fields of application, allowing the implementation of computationally complex algorithms, as is the case with tactile signal processing. The use of hardware for smart tactile sensing systems is a research area that promises to improve the processing time and portability requirements of applications such as artificial skin and robotics, among others. The literature review shows that hardware implementations are present today in almost all stages of smart tactile detection systems except in the force reconstruction process, a stage in which they have been less applied. This work presents a hardware implementation of a model-driven reported in the literature for the contact force reconstruction of flat and rigid tactile sensor arrays from normal stress data. From the analysis of a software implementation of such a model, this implementation proposes the parallelization of tasks that facilitate the execution of matrix operations and a two-dimensional optimization function to obtain a vector force by each taxel in the array. This work seeks to take advantage of the parallel hardware characteristics of Field Programmable Gate Arrays, FPGAs, and the possibility of applying appropriate techniques for algorithms parallelization using as a guide the rules of generalization, efficiency, and scalability in the tactile decoding process and considering the low latency, low power consumption, and real-time execution as the main parameters of design. The results show a maximum estimation error of 32% in the tangential forces and 22% in the normal forces with respect to the simulation by the Finite Element Modeling (FEM) technique of Hertzian and non-Hertzian contact events, over sensor arrays of 10×10 taxels of different sizes. The hardware implementation was carried out on an MPSoC XCZU9EG-2FFVB1156 platform of Xilinx® that allows the reconstruction of force vectors following a scalable approach, from the information captured by means of tactile sensor arrays composed of up to 48 × 48 taxels that use various transduction technologies. The proposed implementation demonstrates a reduction in estimation time of x / 180 compared to software implementations. Despite the relatively high values of the estimation errors, the information provided by this implementation on the tangential and normal tractions and the triaxial reconstruction of forces allows to adequately reconstruct the tactile properties of the touched object, which are similar to those obtained in the software implementation and in the two FEM simulations taken as reference. Although errors could be reduced, the proposed implementation is useful for decoding contact forces for portable tactile sensing systems, thus helping to expand electronic skin applications in robotic and biomedical contexts.

Keywords: contact forces reconstruction, forces estimation, tactile sensor array, hardware implementation

Procedia PDF Downloads 181
712 A Method to Determine Cutting Force Coefficients in Turning Using Mechanistic Approach

Authors: T. C. Bera, A. Bansal, D. Nema

Abstract:

During performing turning operation, cutting force plays a significant role in metal cutting process affecting tool-work piece deflection, vibration and eventually part quality. The present research work aims to develop a mechanistic cutting force model and to study the mechanistic constants used in the force model in case of turning operation. The proposed model can be used for the reliable and accurate estimation of the cutting forces establishing relationship of various force components (cutting force and feed force) with uncut chip thickness. The accurate estimation of cutting force is required to improve thin-walled part accuracy by controlling the tool-work piece deflection induced surface errors and tool-work piece vibration.

Keywords: turning, cutting forces, cutting constants, uncut chip thickness

Procedia PDF Downloads 507
711 Dopamine and Female Sexual Function: A Clinical and Biochemical Study

Authors: Azza Gaber Antar Farag, Eman Abd El Fatah Badr, Wesam Ahmed Tawfik Hasssan Abdel Aal, Mustafa Elsayed Elshaib

Abstract:

Background: Female Sexual Dysfunction (FSD) represents recurrent and persistent problems that distress women and/or strain their relationships with their partners. Dopamine can affect sexual function and interacts with ovarian hormones in the ventromedial area in the hypothalamus. Objective: To investigate the possible role of dopamine in FSD. Method: This prospective case-control study was carried on 100 women having FSD and 100 healthy volunteer females. They were recruited from the Al-Menoufia governorate. All included women were subjected to the questionnaire to assess their demographic and gynecological data as well as sexual function. They were investigated for serum levels of dopamine, estradiol, progesterone and DHEA hormones. Results: Dopamine serum levels were significantly lower in females having sexual dysfunction (6.68±4.14) than controls (57.97±26.26) (P>0.001). This decreased dopamine level was of a significant positive correlation with the arousal domain and significant negative correlation regarding the pain domain (r=-0.19, p=0.01). Also, estradiol serum levels were significantly lower (P>0.001), but progesterone and DHEA serum levels were significantly higher in the FSD group than controls (P>0.001). There was a significant negative correlation between dopamine and DHEA serum levels (r= -0.45, p <0.001). Conclusions: Decreased dopamine serum levels may have an active role in the pathophysiology of FSD, impacting mainly arousal and pain domains, and its targeting should be considered during FSD management.

Keywords: dopamine, estradiol, progesterone, DHEA, females sexual dysfunction

Procedia PDF Downloads 153
710 Evaluation of Patients’ Quality of Life After Lumbar Disc Surgery and Movement Limitations

Authors: Shirin Jalili, Ramin Ghasemi

Abstract:

Lumbar microdiscectomy is the most commonly performed spinal surgery strategy; it is regularly performed to lighten the indications and signs of sciatica within the lower back and leg caused by a lumbar disc herniation. This surgery aims to progress leg pain, reestablish function, and enable a return to ordinary day-by-day exercises. Rates of lumbar disc surgery show critical geographic varieties recommending changing treatment criteria among working specialists. Few population-based considers have investigated the hazard of reoperation after disc surgery, and regional or inter specialty varieties within the reoperations are obscure. The conventional approach to recouping from lumbar microdiscectomy has been to restrain bending, lifting, or turning for a least 6 weeks in arrange to anticipate the disc from herniating once more. Traditionally, patients were exhorted to limit post-operative action, which was accepted to decrease the hazard of disc herniation and progressive insecurity. In modern hone, numerous specialists don't limit understanding of postoperative action due to the discernment this practice is pointless. There's a need of thinks about highlighting the result by distinctive scores or parameters after surgery for repetitive circle herniations of the lumbar spine at the starting herniation location. This study will evaluate the quality of life after surgical treatment of recurrent herniations with distinctive standardized approved result instruments.

Keywords: post-operative activity, disc, quality of life, treatment, movements

Procedia PDF Downloads 67
709 Investigating 'Criticality' in Written Assignments of Postgraduate Students in TESOL and Applied Linguistics

Authors: Josephine Mirador

Abstract:

Too often, one hears teachers complaining about how uncritical students can be, yet the notion of ‘criticality’ may be subject to variable understandings or interpretations. One challenge facing postgraduate students is the writing of essays responding to a specific reading assignment. Such an essay requires students not only to summarise, but to engage in a discussion of the significant points of the article, pointing out its strengths as well as its weaknesses. This paper presents the results of an investigation on criticality in written assignments of postgraduate students in applied linguistics and TESOL. The guiding questions for this investigation were: -How ‘critical’ are postgraduate students when writing their assignments? -What kind of ‘critical’ comments are they able to offer? A total of 70 essays were analysed, using two sets of corpora in the initial and follow-through phases of the research from three different universities in Asia. The essays were written by MA applied linguistics and TESOL students. Students were told that the response essay should definitely not just summarise, but should offer a reflection or critique on the ideas presented in the subject article. The initial findings from the investigation include: the identification of at least 10 general ‘moves’ each of which has a number of possible specific categories; presence of critique ‘nodes’ as distinguished from ‘support’ comments; and the identification of at least 4 moves as the most recurrent and possibly obligatory categories. This investigation has unearthed a few more questions or issues that are definitely worth investigating as extensions of this research, and will be of interest (most especially) to genre analysts and teachers of writing.

Keywords: criticality, discourse and genre analysis, postgraduate students, applied linguistics

Procedia PDF Downloads 379
708 Integrating Eye-Tracking Analysis to Enhance Web Usability Evaluation

Authors: Johanna Renny Octavia, Meliana Nurdin, Ignatius Kevin Kurniawan, Ricca Aksara

Abstract:

It is widely believed that usability evaluation is necessary to evaluate a website design for further improvement. Traditional methods of usability evaluation have given sufficient insights to reveal usability problems of websites. Eye-tracking analysis has been considered as a useful method that adds a powerful dimension to web usability evaluation. It allows web designers and usability researchers to understand exactly what users do and do not see on a web page, thus disclose more information on web usability and provide a more complete insights on a website design. This paper elaborates on moving beyond traditional methods of web usability evaluation by integrating eye-tracking analysis to enhance the evaluation of website design, and presents three case studies to support this approach. In these case studies, eye movement metrics such as gaze plots and fixation-derived metrics, and user performance data such as task completion times and number of errors were recorded as objective measurements that can inform the necessity for website design improvements.

Keywords: design, eye-tracking, usability evaluation, website

Procedia PDF Downloads 287
707 Dissolved Oxygen Prediction Using Support Vector Machine

Authors: Sorayya Malek, Mogeeb Mosleh, Sharifah M. Syed

Abstract:

In this study, Support Vector Machine (SVM) technique was applied to predict the dichotomized value of Dissolved oxygen (DO) from two freshwater lakes namely Chini and Bera Lake (Malaysia). Data sample contained 11 parameters for water quality features from year 2005 until 2009. All data parameters were used to predicate the dissolved oxygen concentration which was dichotomized into 3 different levels (High, Medium, and Low). The input parameters were ranked, and forward selection method was applied to determine the optimum parameters that yield the lowest errors, and highest accuracy. Initial results showed that pH, water temperature, and conductivity are the most important parameters that significantly affect the predication of DO. Then, SVM model was applied using the Anova kernel with those parameters yielded 74% accuracy rate. We concluded that using SVM models to predicate the DO is feasible, and using dichotomized value of DO yields higher prediction accuracy than using precise DO value.

Keywords: dissolved oxygen, water quality, predication DO, support vector machine

Procedia PDF Downloads 273
706 Prognostic and Predictive Value of Tumor: Infiltrating Lymphocytes in Triple Negative Breast Cancer

Authors: Wooseok Byon, Eunyoung Kim, Junseong Kwon, Byung Joo Song, Chan Heun Park

Abstract:

Background/Purpose: Previous preclinical and clinical data suggest that increased lymphocytic infiltration would be associated with good prognosis and benefit from immunogenic chemotherapy especially in triple-negative breast cancer (TNBC). We investigated a single-center experience of TNBC and relationship with lymphocytic infiltration. Methods: From January 2004 to December 2012, at the Department of Surgery, Kangbuk Samsung Hospital, Sungkyunkwan University, School of Medicine, we retrospectively reviewed 897 breast cancer patients-clinical outcomes, clinicopathological characteristics, breast cancer subtypes. And we reviewed lymphocytic infiltration of TNBC specimens by two pathologists. Statistical analysis of risk factors associated with recurrence was performed. Results: A total of 897 patients, 76 were TNBC (8.47%). Mean age of TNBC patients were 50.95 (SD10.42) years, mean follow-up periods was 40.06 months. We reviewed 49 slides, and there were 8 recurrent breast cancer patients (16.32%), and 4 patients were expired (8.16%). There were 9 lymphocytic predominant breast cancers (LPBC)-carcinomas with either intratumoral lymphocytes in >60% of tumor cell nests. 1 patient of LPBC was recurred and 8 were not. In multivariate logistic regression, the odds ratio of lymphocytic infiltration was 0.59 (p=0.643). Conclusion: In a single-center experience of TNBC, the lymphocytic infiltration in tumor cell nest might be a good trend on the prognosis but there was not statistically significant.

Keywords: tumor-infiltrating lymphocytes, triple negative breast cancer, medical and health sciences

Procedia PDF Downloads 393
705 Linear Quadratic Gaussian/Loop Transfer Recover Control Flight Control on a Nonlinear Model

Authors: T. Sanches, K. Bousson

Abstract:

As part of the development of a 4D autopilot system for unmanned aerial vehicles (UAVs), i.e. a time-dependent robust trajectory generation and control algorithm, this work addresses the problem of optimal path control based on the flight sensors data output that may be unreliable due to noise on data acquisition and/or transmission under certain circumstances. Although several filtering methods, such as the Kalman-Bucy filter or the Linear Quadratic Gaussian/Loop Transfer Recover Control (LQG/LTR), are available, the utter complexity of the control system, together with the robustness and reliability required of such a system on a UAV for airworthiness certifiable autonomous flight, required the development of a proper robust filter for a nonlinear system, as a way of further mitigate errors propagation to the control system and improve its ,performance. As such, a nonlinear algorithm based upon the LQG/LTR, is validated through computational simulation testing, is proposed on this paper.

Keywords: autonomous flight, LQG/LTR, nonlinear state estimator, robust flight control

Procedia PDF Downloads 124
704 Optimization and Design of Current-Mode Multiplier Circuits with Applications in Analog Signal Processing for Gas Industrial Package Systems

Authors: Mohamad Baqer Heidari, Hefzollah.Mohammadian

Abstract:

This brief presents two original implementations of improved accuracy current-mode multiplier/divider circuits. Besides the advantage of their simplicity, these original multiplier/divider structures present the advantage of very small linearity errors that can be obtained as a result of the proposed design techniques (0.75% and 0.9%, respectively, for an extended range of the input currents). The original multiplier/divider circuits permit a facile reconfiguration, the presented structures representing the functional basis for implementing complex function synthesizer circuits. The proposed computational structures are designed for implementing in 0.18-µm CMOS technology, with a low-voltage operation (a supply voltage of 1.2 V). The circuits’ power consumptions are 60 and 75 µW, respectively, while their frequency bandwidths are 79.6 and 59.7 MHz, respectively.

Keywords: analog signal processing, current-mode operation, functional core, multiplier, reconfigurable circuits, industrial package systems

Procedia PDF Downloads 361
703 Multimodal Sentiment Analysis With Web Based Application

Authors: Shreyansh Singh, Afroz Ahmed

Abstract:

Sentiment Analysis intends to naturally reveal the hidden mentality that we hold towards an entity. The total of this assumption over a populace addresses sentiment surveying and has various applications. Current text-based sentiment analysis depends on the development of word embeddings and Machine Learning models that take in conclusion from enormous text corpora. Sentiment Analysis from text is presently generally utilized for consumer loyalty appraisal and brand insight investigation. With the expansion of online media, multimodal assessment investigation is set to carry new freedoms with the appearance of integral information streams for improving and going past text-based feeling examination using the new transforms methods. Since supposition can be distinguished through compelling follows it leaves, like facial and vocal presentations, multimodal opinion investigation offers good roads for examining facial and vocal articulations notwithstanding the record or printed content. These methodologies use the Recurrent Neural Networks (RNNs) with the LSTM modes to increase their performance. In this study, we characterize feeling and the issue of multimodal assessment investigation and audit ongoing advancements in multimodal notion examination in various spaces, including spoken surveys, pictures, video websites, human-machine, and human-human connections. Difficulties and chances of this arising field are additionally examined, promoting our theory that multimodal feeling investigation holds critical undiscovered potential.

Keywords: sentiment analysis, RNN, LSTM, word embeddings

Procedia PDF Downloads 103
702 The Impact of the Cross Race Effect on Eyewitness Identification

Authors: Leah Wilck

Abstract:

Eyewitness identification is arguably one of the most utilized practices within our legal system; however, exoneration cases indicate that this practice may lead to accuracy and conviction errors. The purpose of this study was to examine the effects of the cross-race effect, the phenomena in which people are able to more easily and accurately identify faces from within their racial category, on the accuracy of eyewitness identification. Participants watched three separate videos of a perpetrator trying to steal a bicycle. In each video, the perpetrator was of a different race and gender. Participants watched a video where the perpetrator was a Black male, a White male, and a White female. Following the completion of watching each video, participants were asked to recall everything they could about the perpetrator they witnessed. The initial results of the study did not find the expected cross-race effect impacted the eyewitness identification accuracy. These surprising results are discussed in terms of cross-race bias and recognition theory as well as applied implications.

Keywords: cross race effect, eyewitness identification, own-race bias, racial profiling

Procedia PDF Downloads 147