Search results for: low-temperature district heating network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7118

Search results for: low-temperature district heating network

1448 Predicting the Diagnosis of Alzheimer’s Disease: Development and Validation of Machine Learning Models

Authors: Jay L. Fu

Abstract:

Patients with Alzheimer's disease progressively lose their memory and thinking skills and, eventually, the ability to carry out simple daily tasks. The disease is irreversible, but early detection and treatment can slow down the disease progression. In this research, publicly available MRI data and demographic data from 373 MRI imaging sessions were utilized to build models to predict dementia. Various machine learning models, including logistic regression, k-nearest neighbor, support vector machine, random forest, and neural network, were developed. Data were divided into training and testing sets, where training sets were used to build the predictive model, and testing sets were used to assess the accuracy of prediction. Key risk factors were identified, and various models were compared to come forward with the best prediction model. Among these models, the random forest model appeared to be the best model with an accuracy of 90.34%. MMSE, nWBV, and gender were the three most important contributing factors to the detection of Alzheimer’s. Among all the models used, the percent in which at least 4 of the 5 models shared the same diagnosis for a testing input was 90.42%. These machine learning models allow early detection of Alzheimer’s with good accuracy, which ultimately leads to early treatment of these patients.

Keywords: Alzheimer's disease, clinical diagnosis, magnetic resonance imaging, machine learning prediction

Procedia PDF Downloads 143
1447 Prospects of Agroforestry Products in the Emergency Situation: A Case Study of Earthquake of 2015 in Central Nepal

Authors: Raju Chhetri

Abstract:

Agroforestry is one of the main sources of livelihood among the people of Nepal. In particular, this is the only one mode of livelihood among the Chepangs. The monster earthquake (7.3 MW) that hit the country on the 25th of April in 2015 and many of its aftershocks had devastating effects. As a result, not only the big structures collapsed, it incurred great losses on fabrication, collection centers, schools, markets and other necessary service centers. Although there were a large number of aftershocks after the monster earthquake, the most devastating aftershock took place on 12th May, 2015, which measured 6.3 richter scale. Consequently, it caused more destruction of houses, further calamity to the lives of people, and public life got further perdition. This study was mainly carried out to find out the food security and market situation of Agroforestry product of the Chepang community in Raksirang VDC (one of the severely affected VDCs of Makwanpur district) due to the earthquake. A total of 40 households (12 percent) were randomly selected as a sample in ward number 7 only. Questionnaires and focus groups were used to gather primary data. Additional, two Focus Group Discussions (FGD) were convened in the study area to get some descriptive information on this study. Estimated 370 hectares of land, which was full of Agroforestry plantation, ruptured by the earthquake. It caused severe damages to the households, and a serious loss of food-stock, up to 60-80 percent (maize, millet, and rice). Instead of regular cereal intake, banana (Muas Paradisca) consumption was found ‘high scale’ in the emergency period. The market price of rice (37-44 NRS/Kg) increased by 18.9 percent. Some difference in the income range before and after the earthquake was observed. Before earthquake, sale of Agroforestry, and livestock products were continuing, but after the earthquake, Agroforestry product sale is the only one means of livelihood among Chepangs. Nearly 50-60 percent Agroforestry production of banana (Mass Paradisca), citrus (Citrus Lemon), pineapple (Ananus comosus) and broom grass (Thysanolaena maxima) declined, excepting for cash income from the residual. Heavy demands of Agroforestry product mentioned above lay high farm gate prices (50-100 percent) helps surveyed the community to continue livelihood from its sale. Out of the survey samples, 30 households (75 percent) respondents migrated to safe location due to land rupture, ongoing aftershocks, and landslides. Overall food security situation in this community is acute and challenging for the days to come. Immediate and long term both response from a relief agency concerning food, shelter and safe stocking of Agroforestry product is required to keep secured livelihood in Chepang community.

Keywords: earthquake, rupture, agroforestry, livelihood, indigenous, food security

Procedia PDF Downloads 322
1446 The Potential of Sentiment Analysis to Categorize Social Media Comments Using German Libraries

Authors: Felix Boehnisch, Alexander Lutz

Abstract:

Based on the number of users and the amount of content posted daily, Facebook is considered the largest social network in the world. This content includes images or text posts from companies but also private persons, which are also commented on by other users. However, it can sometimes be difficult for companies to keep track of all the posts and the reactions to them, especially when there are several posts a day that contain hundreds to thousands of comments. To facilitate this, the following paper deals with the possible applications of sentiment analysis to social media comments in order to be able to support the work in social media marketing. In a first step, post comments were divided into positive and negative by a subjective rating, then the same comments were checked for their polarity value by the two german python libraries TextBlobDE and SentiWS and also grouped into positive, negative, or even neutral. As a control, the subjective classifications were compared with the machine-generated ones by a confusion matrix, and relevant quality criteria were determined. The accuracy of both libraries was not really meaningful, with 60% to 66%. However, many words or sentences were not evaluated at all, so there seems to be room for optimization to possibly get more accurate results. In future studies, the use of these specific German libraries can be optimized to gain better insights by either applying them to stricter cleaned data or by adding a sentiment value to emojis, which have been removed from the comments in advance, as they are not contained in the libraries.

Keywords: Facebook, German libraries, polarity, sentiment analysis, social media comments

Procedia PDF Downloads 182
1445 Gaits Stability Analysis for a Pneumatic Quadruped Robot Using Reinforcement Learning

Authors: Soofiyan Atar, Adil Shaikh, Sahil Rajpurkar, Pragnesh Bhalala, Aniket Desai, Irfan Siddavatam

Abstract:

Deep reinforcement learning (deep RL) algorithms leverage the symbolic power of complex controllers by automating it by mapping sensory inputs to low-level actions. Deep RL eliminates the complex robot dynamics with minimal engineering. Deep RL provides high-risk involvement by directly implementing it in real-world scenarios and also high sensitivity towards hyperparameters. Tuning of hyperparameters on a pneumatic quadruped robot becomes very expensive through trial-and-error learning. This paper presents an automated learning control for a pneumatic quadruped robot using sample efficient deep Q learning, enabling minimal tuning and very few trials to learn the neural network. Long training hours may degrade the pneumatic cylinder due to jerk actions originated through stochastic weights. We applied this method to the pneumatic quadruped robot, which resulted in a hopping gait. In our process, we eliminated the use of a simulator and acquired a stable gait. This approach evolves so that the resultant gait matures more sturdy towards any stochastic changes in the environment. We further show that our algorithm performed very well as compared to programmed gait using robot dynamics.

Keywords: model-based reinforcement learning, gait stability, supervised learning, pneumatic quadruped

Procedia PDF Downloads 316
1444 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 339
1443 Modeling Pan Evaporation Using Intelligent Methods of ANN, LSSVM and Tree Model M5 (Case Study: Shahroud and Mayamey Stations)

Authors: Hamidreza Ghazvinian, Khosro Ghazvinian, Touba Khodaiean

Abstract:

The importance of evaporation estimation in water resources and agricultural studies is undeniable. Pan evaporation are used as an indicator to determine the evaporation of lakes and reservoirs around the world due to the ease of interpreting its data. In this research, intelligent models were investigated in estimating pan evaporation on a daily basis. Shahroud and Mayamey were considered as the studied cities. These two cities are located in Semnan province in Iran. The mentioned cities have dry weather conditions that are susceptible to high evaporation potential. Meteorological data of 11 years of synoptic stations of Shahrood and Mayamey cities were used. The intelligent models used in this study are Artificial Neural Network (ANN), Least Squares Support Vector Machine (LSSVM), and M5 tree models. Meteorological parameters of minimum and maximum air temperature (Tmax, Tmin), wind speed (WS), sunshine hours (SH), air pressure (PA), relative humidity (RH) as selected input data and evaporation data from pan (EP) to The output data was considered. 70% of data is used at the education level, and 30 % of the data is used at the test level. Models used with explanation coefficient evaluation (R2) Root of Mean Squares Error (RMSE) and Mean Absolute Error (MAE). The results for the two Shahroud and Mayamey stations showed that the above three models' operations are rather appropriate.

Keywords: pan evaporation, intelligent methods, shahroud, mayamey

Procedia PDF Downloads 74
1442 The Phatic Function and the Socializing Element of Personal Blogs

Authors: Emelia Noronha, Milind Malshe

Abstract:

The phatic function of communication is a vital element of any conversation. This research paper looks into this function with respect to personal blogs maintained by Indian bloggers. This paper is a study into the phenomenon of phatic communication maintained by bloggers through their blogs. Based on a linguistic analysis of the posts of twenty eight Indian bloggers, writing in English, studied over a period of three years, the study indicates that though the blogging phenomenon is not conversational in the same manner as face-to-face communication, it does make ample provision for feedback that is conversational in nature. Ordinary day to day offline conversations use conventionalized phatic utterances; those on the social media are in a perpetual mode of innovation and experimentation in order to sustain contact with its readers. These innovative methods and means are the focus of this study. Though the personal blogger aims to chronicle his/her personal life through the blog, the socializing function is crucial to these bloggers. In comparison to the western personal blogs which focus on the presentation of the ‘bounded individual self’, we find Indian personal bloggers engage in the presentation of their ‘social selves’. These bloggers yearn to reach out to the readers on the internet and the phatic function serves to initiate, sustain and renew social ties on the blogosphere thereby consolidating the social network of readers and bloggers.

Keywords: personal blogs, phatic, social-selves, blog readers

Procedia PDF Downloads 362
1441 Stochastic Nuisance Flood Risk for Coastal Areas

Authors: Eva L. Suarez, Daniel E. Meeroff, Yan Yong

Abstract:

The U.S. Federal Emergency Management Agency (FEMA) developed flood maps based on experts’ experience and estimates of the probability of flooding. Current flood-risk models evaluate flood risk with regional and subjective measures without impact from torrential rain and nuisance flooding at the neighborhood level. Nuisance flooding occurs in small areas in the community, where a few streets or blocks are routinely impacted. This type of flooding event occurs when torrential rainstorm combined with high tide and sea level rise temporarily exceeds a given threshold. In South Florida, this threshold is 1.7 ft above Mean Higher High Water (MHHW). The National Weather Service defines torrential rain as rain deposition at a rate greater than 0.3-inches per hour or three inches in a single day. Data from the Florida Climate Center, 1970 to 2020, shows 371 events with more than 3-inches of rain in a day in 612 months. The purpose of this research is to develop a data-driven method to determine comprehensive analytical damage-avoidance criteria that account for nuisance flood events at the single-family home level. The method developed uses the Failure Mode and Effect Analysis (FMEA) method from the American Society of Quality (ASQ) to estimate the Damage Avoidance (DA) preparation for a 1-day 100-year storm. The Consequence of Nuisance Flooding (CoNF) is estimated from community mitigation efforts to prevent nuisance flooding damage. The Probability of Nuisance Flooding (PoNF) is derived from the frequency and duration of torrential rainfall causing delays and community disruptions to daily transportation, human illnesses, and property damage. Urbanization and population changes are related to the U.S. Census Bureau's annual population estimates. Data collected by the United States Department of Agriculture (USDA) Natural Resources Conservation Service’s National Resources Inventory (NRI) and locally by the South Florida Water Management District (SFWMD) track the development and land use/land cover changes with time. The intent is to include temporal trends in population density growth and the impact on land development. Results from this investigation provide the risk of nuisance flooding as a function of CoNF and PoNF for coastal areas of South Florida. The data-based criterion provides awareness to local municipalities on their flood-risk assessment and gives insight into flood management actions and watershed development.

Keywords: flood risk, nuisance flooding, urban flooding, FMEA

Procedia PDF Downloads 99
1440 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 259
1439 Reducing Support Structures in Design for Additive Manufacturing: A Neural Networks Approach

Authors: Olivia Borgue, Massimo Panarotto, Ola Isaksson

Abstract:

This article presents a neural networks-based strategy for reducing the need for support structures when designing for additive manufacturing (AM). Additive manufacturing is a relatively new and immature industrial technology, and the information to make confident decisions when designing for AM is limited. This lack of information impacts especially the early stages of engineering design, for instance, it is difficult to actively consider the support structures needed for manufacturing a part. This difficulty is related to the challenge of designing a product geometry accounting for customer requirements, manufacturing constraints and minimization of support structure. The approach presented in this article proposes an automatized geometry modification technique for reducing the use of the support structures while designing for AM. This strategy starts with a neural network-based strategy for shape recognition to achieve product classification, using an STL file of the product as input. Based on the classification, an automatic part geometry modification based on MATLAB© is implemented. At the end of the process, the strategy presents different geometry modification alternatives depending on the type of product to be designed. The geometry alternatives are then evaluated adopting a QFD-like decision support tool.

Keywords: additive manufacturing, engineering design, geometry modification optimization, neural networks

Procedia PDF Downloads 253
1438 Profitability Assessment of Granite Aggregate Production and the Development of a Profit Assessment Model

Authors: Melodi Mbuyi Mata, Blessing Olamide Taiwo, Afolabi Ayodele David

Abstract:

The purpose of this research is to create empirical models for assessing the profitability of granite aggregate production in Akure, Ondo state aggregate quarries. In addition, an artificial neural network (ANN) model and multivariate predicting models for granite profitability were developed in the study. A formal survey questionnaire was used to collect data for the study. The data extracted from the case study mine for this study includes granite marketing operations, royalty, production costs, and mine production information. The following methods were used to achieve the goal of this study: descriptive statistics, MATLAB 2017, and SPSS16.0 software in analyzing and modeling the data collected from granite traders in the study areas. The ANN and Multi Variant Regression models' prediction accuracy was compared using a coefficient of determination (R²), Root mean square error (RMSE), and mean square error (MSE). Due to the high prediction error, the model evaluation indices revealed that the ANN model was suitable for predicting generated profit in a typical quarry. More quarries in Nigeria's southwest region and other geopolitical zones should be considered to improve ANN prediction accuracy.

Keywords: national development, granite, profitability assessment, ANN models

Procedia PDF Downloads 101
1437 Physico-Mechanical Behavior of Indian Oil Shales

Authors: K. S. Rao, Ankesh Kumar

Abstract:

The search for alternative energy sources to petroleum has increased these days because of increase in need and depletion of petroleum reserves. Therefore the importance of oil shales as an economically viable substitute has increased many folds in last 20 years. The technologies like hydro-fracturing have opened the field of oil extraction from these unconventional rocks. Oil shale is a compact laminated rock of sedimentary origin containing organic matter known as kerogen which yields oil when distilled. Oil shales are formed from the contemporaneous deposition of fine grained mineral debris and organic degradation products derived from the breakdown of biota. Conditions required for the formation of oil shales include abundant organic productivity, early development of anaerobic conditions, and a lack of destructive organisms. These rocks are not gown through the high temperature and high pressure conditions in Mother Nature. The most common approach for oil extraction is drastically breaking the bond of the organics which involves retorting process. The two approaches for retorting are surface retorting and in-situ processing. The most environmental friendly approach for extraction is In-situ processing. The three steps involved in this process are fracturing, injection to achieve communication, and fluid migration at the underground location. Upon heating (retorting) oil shale at temperatures in the range of 300 to 400°C, the kerogen decomposes into oil, gas and residual carbon in a process referred to as pyrolysis. Therefore it is very important to understand the physico-mechenical behavior of such rocks, to improve the technology for in-situ extraction. It is clear from the past research and the physical observations that these rocks will behave as an anisotropic rock so it is very important to understand the mechanical behavior under high pressure at different orientation angles for the economical use of these resources. By knowing the engineering behavior under above conditions will allow us to simulate the deep ground retorting conditions numerically and experimentally. Many researchers have investigate the effect of organic content on the engineering behavior of oil shale but the coupled effect of organic and inorganic matrix is yet to be analyzed. The favourable characteristics of Assam coal for conversion to liquid fuels have been known for a long time. Studies have indicated that these coals and carbonaceous shale constitute the principal source rocks that have generated the hydrocarbons produced from the region. Rock cores of the representative samples are collected by performing on site drilling, as coring in laboratory is very difficult due to its highly anisotropic nature. Different tests are performed to understand the petrology of these samples, further the chemical analyses are also done to exactly quantify the organic content in these rocks. The mechanical properties of these rocks are investigated by considering different anisotropic angles. Now the results obtained from petrology and chemical analysis are correlated with the mechanical properties. These properties and correlations will further help in increasing the producibility of these rocks. It is well established that the organic content is negatively correlated to tensile strength, compressive strength and modulus of elasticity.

Keywords: oil shale, producibility, hydro-fracturing, kerogen, petrology, mechanical behavior

Procedia PDF Downloads 347
1436 Virtual Container Yard: Assessing the Perceived Impact of Legal Implications to Container Carriers

Authors: L. Edirisinghe, P. Mukherjee, H. Edirisinghe

Abstract:

Virtual Container Yard (VCY) is a modern concept that helps to reduce the empty container repositioning cost of carriers. The concept of VCY is based on container interchange between shipping lines. Although this mechanism has been theoretically accepted by the shipping community as a feasible solution, it has not yet achieved the necessary momentum among container shipping lines (CSL). This paper investigates whether there is any legal influence on this industry myopia about the VCY. It is believed that this is the first publication that focuses on the legal aspects of container exchange between carriers. Not much literature on this subject is available. This study establishes with statistical evidence that there is a phobia prevailing in the shipping industry that exchanging containers with other carriers may lead to various legal implications. The complexity of exchange is two faceted. CSLs assume that offering a container to another carrier (obviously, a competitor in terms of commercial context) or using a container offered by another carrier may lead to undue legal implications. This research reveals that this fear is reflected through four types of perceived components, namely: shipping associate; warehouse associate; network associate; and trading associate. These components carry eighteen subcomponents that comprehensively cover the entire process of a container shipment. The statistical explanation has been supported through regression analysis; INCO terms were used to illustrate the shipping process.

Keywords: virtual container yard, legal, maritime law, inventory

Procedia PDF Downloads 165
1435 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 82
1434 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 176
1433 Developing Artificial Neural Networks (ANN) for Falls Detection

Authors: Nantakrit Yodpijit, Teppakorn Sittiwanchai

Abstract:

The number of older adults is rising rapidly. The world’s population becomes aging. Falls is one of common and major health problems in the elderly. Falls may lead to acute and chronic injuries and deaths. The fall-prone individuals are at greater risk for decreased quality of life, lowered productivity and poverty, social problems, and additional health problems. A number of studies on falls prevention using fall detection system have been conducted. Many available technologies for fall detection system are laboratory-based and can incur substantial costs for falls prevention. The utilization of alternative technologies can potentially reduce costs. This paper presents the new design and development of a wearable-based fall detection system using an Accelerometer and Gyroscope as motion sensors for the detection of body orientation and movement. Algorithms are developed to differentiate between Activities of Daily Living (ADL) and falls by comparing Threshold-based values with Artificial Neural Networks (ANN). Results indicate the possibility of using the new threshold-based method with neural network algorithm to reduce the number of false positive (false alarm) and improve the accuracy of fall detection system.

Keywords: aging, algorithm, artificial neural networks (ANN), fall detection system, motion sensorsthreshold

Procedia PDF Downloads 496
1432 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 437
1431 Matching Law in Autoshaped Choice in Neural Networks

Authors: Giselle Maggie Fer Castañeda, Diego Iván González

Abstract:

The objective of this work was to study the autoshaped choice behavior in the Donahoe, Burgos and Palmer (DBP) neural network model and analyze it under the matching law. Autoshaped choice can be viewed as a form of economic behavior defined as the preference between alternatives according to their relative outcomes. The Donahoe, Burgos and Palmer (DBP) model is a connectionist proposal that unifies operant and Pavlovian conditioning. This model has been used for more than three decades as a neurobehavioral explanation of conditioning phenomena, as well as a generator of predictions suitable for experimental testing with non-human animals and humans. The study consisted of different simulations in which, in each one, a ratio of reinforcement was established for two alternatives, and the responses (i.e., activations) in each of them were measured. Choice studies with animals have demonstrated that the data generally conform closely to the generalized matching law equation, which states that the response ratio equals proportionally to the reinforcement ratio; therefore, it was expected to find similar results with the neural networks of the Donahoe, Burgos and Palmer (DBP) model since these networks have simulated and predicted various conditioning phenomena. The results were analyzed by the generalized matching law equation, and it was observed that under some contingencies, the data from the networks adjusted approximately to what was established by the equation. Implications and limitations are discussed.

Keywords: matching law, neural networks, computational models, behavioral sciences

Procedia PDF Downloads 74
1430 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 191
1429 Deep Learning to Improve the 5G NR Uplink Control Channel

Authors: Ahmed Krobba, Meriem Touzene, Mohamed Debeyche

Abstract:

The wireless communications system (5G) will provide more diverse applications and higher quality services for users compared to the long-term evolution 4G (LTE). 5G uses a higher carrier frequency, which suffers from information loss in 5G coverage. Most 5G users often cannot obtain high-quality communications due to transmission channel noise and channel complexity. Physical Uplink Control Channel (PUCCH-NR: Physical Uplink Control Channel New Radio) plays a crucial role in 5G NR telecommunication technology, which is mainly used to transmit link control information uplink (UCI: Uplink Control Information. This study based of evaluating the performance of channel physical uplink control PUCCH-NR under low Signal-to-Noise Ratios with various antenna numbers reception. We propose the artificial intelligence approach based on deep neural networks (Deep Learning) to estimate the PUCCH-NR channel in comparison with this approach with different conventional methods such as least-square (LS) and minimum-mean-square-error (MMSE). To evaluate the channel performance we use the block error rate (BLER) as an evaluation criterion of the communication system. The results show that the deep neural networks method gives best performance compared with MMSE and LS

Keywords: 5G network, uplink (Uplink), PUCCH channel, NR-PUCCH channel, deep learning

Procedia PDF Downloads 82
1428 Geodynamics Behaviour of Greater Cairo as Deduced from 4D Gravity and Seismic Activities

Authors: Elsayed A. Issawy, Anwar H. Radwan

Abstract:

Recent crustal deformations studies in Egypt are applied on the most active areas with relation to seismic activity. Temporal gravity variations in parallel with the geodetic technique (GPS) were used to monitor recent crustal movements in Egypt since 1997. The non-tidal gravity changes were constrained by the vertical component of surface movements derived from the GPS observations. The gravity changes were used to understand the surface tectonics and geodynamic modelling of the Greater Cairo region after the occurrence of an earthquake of 1992. It was found that there is a certain relation showed by increasing of gravity values before the main seismic activity. As example, relative considerable increase of gravity values was noticed for the network between the epochs of 2000 and 2004. Otherwise, the temporal gravity variations were reported a considerable decrease in gravity values between the two campaigns of 2004 and 2007 for the same stations. This behaviour could explain by compressive deformation and strain build-up stage before the South western Cairo earthquake (July 31, 2005 with magnitude of 4.3) and the stress release stage occurred after the main event. The geodetic measurements showed that, the estimated horizontal velocities for almost of points are 5.5 mm/year in approximately NW direction.

Keywords: temporal gravity variations, geodynamics, greater Cairo, recent crustal movements, earthquakes

Procedia PDF Downloads 368
1427 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing

Authors: Thomas Yeboah

Abstract:

Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.

Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing

Procedia PDF Downloads 628
1426 Behaviour of Polypropylene Fiber Reinforced Concrete under Dynamic Impact Loads

Authors: Masoud Abedini, Azrul A. Mutalib

Abstract:

A study of the used of additives which mixed with concrete in order to increase the strength and durability of concrete was examined to improve the quality of many aspects in the concrete. This paper presents a polypropylene (PP) fibre was added into concrete to study the dynamic response under impact load. References related to dynamic impact test for sample polypropylene fibre reinforced concrete (PPFRC) is very limited and there is no specific research and information related to this research. Therefore, the study on the dynamic impact of PPFRC using a Split Hopkinson Pressure Bar (SHPB) was done in this study. Provided samples for this study was composed of 1.0 kg/m³ PP fibres, 2.0 kg/m³ PP fibres and plain concrete as a control samples. This PP fibre contains twisted bundle non-fibrillating monofilament and fibrillating network fibres. Samples were prepared by cylindrical mould with three samples of each mix proportion, 28 days curing period and concrete grade 35 Mpa. These samples are then tested for dynamic impact by SHPB at 2 Mpa pressure under the strain rate of 10 s-1. Dynamic compressive strength results showed an increase of SC1 and SC2 samples than the control sample which is 13.22 % and 76.9 % respectively with the dynamic compressive strength of 74.5 MPa and 116.4 MPa compared to 65.8 MPa. Dynamic increased factor (DIF) shows that, sample SC2 gives higher value with 4.15 than others samples SC1 and SC3 that gives the value of 2.14 and 1.97 respectively.

Keywords: polypropylene fiber, Split Hopkinson Pressure Bar, impact load, dynamic compressive strength

Procedia PDF Downloads 550
1425 Social Interaction of Gifted Students in a Heterogeneous Educational Environment

Authors: Ekaterina Donii

Abstract:

Understanding interpersonal competence, social interaction and peer relationships of gifted children is a concern for specialists in the field of gifted education. To gain more in-depth knowledge concerning the social functioning of gifted children among peers, we decided to study the social abilities of gifted children in a heterogeneous academic environment. Eight gifted children (5 of age 7, 1 of age 8.5, 1 of age 9.5 and 1 of age 10), their classmates (10 of age 7-8, 12 of age 8.5-9, 16 of age 9.5-10) and teachers participated in the study. The sociometric questionnaire analysis was based on the method of Rodríguez and Morera to check the social status of the gifted children among classmates. The Instrument Observational Protocol for Interactions within the Classroom (OPINTEC-v.5) was used to assess the social interactions between the gifted students, their classmates, and the teacher within the educational context. While doing a task together, the gifted children interacted more with popular and neither popular nor gifted classmates than with rejected classmates. While spending time together, the gifted children interacted more with neither popular nor rejected classmates than with popular or rejected classmates. All gifted children chose other gifted and non-gifted classmates for interaction, established close relations and demonstrated good social abilities interacting with their classmates. The aim of this study was to examine the social interactions, social status, and social network of the gifted students in a regular classroom. The majority of the gifted children were popular among their classmates and had good social skills. We should be alert, though, for those gifted children who do have social problems, in order to help them functioning in a regular classroom.

Keywords: gifted, heterogeneous environment, sociometric status, social interactions

Procedia PDF Downloads 356
1424 An MrPPG Method for Face Anti-Spoofing

Authors: Lan Zhang, Cailing Zhang

Abstract:

In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.

Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG

Procedia PDF Downloads 178
1423 LncRNA NEAT1 Promotes NSCLC Progression through Acting as a ceRNA of miR-377-3p

Authors: Chengcao Sun, Shujun Li, Cuili Yang, Yongyong Xi, Liang Wang, Feng Zhang, Dejia Li

Abstract:

Recently, the long non-coding RNA (lncRNA) NEAT1 has been identified as an oncogenic gene in multiple cancer types and elevated expression of NEAT1 was tightly linked to tumorigenesis and cancer progression. However, the molecular basis for this observation has not been characterized in progression of non-small cell lung cancer (NSCLC). In our studies, we identified NEAT1 was highly expressed in NSCLC patients and was a novel regulator of NSCLC progression. Patients whose tumors had high NEAT1 expression had a shorter overall survival than patients whose tumors had low NEAT1 expression. Further, NEAT1 significantly accelerates NSCLC cell growth and metastasis in vitro and tumor growth in vivo. Additionally, by using bioinformatics study and RNA pull down combined with luciferase reporter assays, we demonstrated that NEAT1 functioned as a competing endogenous RNA (ceRNA) for has-miR-377-3p, antagonized its functions and led to the de-repression of its endogenous targets E2F3, which was a core oncogene in promoting NSCLC progression. Taken together, these observations imply that the NEAT1 modulated the expression of E2F3 gene by acting as a competing endogenous RNA, which may build up the missing link between the regulatory miRNA network and NSCLC progression.

Keywords: long non-coding RNA NEAT1, hsa-miRNA-377-3p, E2F3, non-small cell lung cancer, tumorigenesis

Procedia PDF Downloads 369
1422 Multi Agent Based Pre-Hospital Emergency Management Architecture

Authors: Jaleh Shoshtarian Malak, Niloofar Mohamadzadeh

Abstract:

Managing pre-hospital emergency patients requires real-time practices and efficient resource utilization. Since we are facing a distributed Network of healthcare providers, services and applications choosing the right resources and treatment protocol considering patient situation is a critical task. Delivering care to emergency patients at right time and with the suitable treatment settings can save ones live and prevent further complication. In recent years Multi Agent Systems (MAS) introduced great solutions to deal with real-time, distributed and complicated problems. In this paper we propose a multi agent based pre-hospital emergency management architecture in order to manage coordination, collaboration, treatment protocol and healthcare provider selection between different parties in pre-hospital emergency in a self-organizing manner. We used AnyLogic Agent Based Modeling (ABM) tool in order to simulate our proposed architecture. We have analyzed and described the functionality of EMS center, Ambulance, Consultation Center, EHR Repository and Quality of Care Monitoring as main collaborating agents. Future work includes implementation of the proposed architecture and evaluation of its impact on patient quality of care improvement.

Keywords: multi agent systems, pre-hospital emergency, simulation, software architecture

Procedia PDF Downloads 426
1421 Analysis of Linguistic Disfluencies in Bilingual Children’s Discourse

Authors: Sheena Christabel Pravin, M. Palanivelan

Abstract:

Speech disfluencies are common in spontaneous speech. The primary purpose of this study was to distinguish linguistic disfluencies from stuttering disfluencies in bilingual Tamil–English (TE) speaking children. The secondary purpose was to determine whether their disfluencies are mediated by native language dominance and/or on an early onset of developmental stuttering at childhood. A detailed study was carried out to identify the prosodic and acoustic features that uniquely represent the disfluent regions of speech. This paper focuses on statistical modeling of repetitions, prolongations, pauses and interjections in the speech corpus encompassing bilingual spontaneous utterances from school going children – English and Tamil. Two classifiers including Hidden Markov Models (HMM) and the Multilayer Perceptron (MLP), which is a class of feed-forward artificial neural network, were compared in the classification of disfluencies. The results of the classifiers document the patterns of disfluency in spontaneous speech samples of school-aged children to distinguish between Children Who Stutter (CWS) and Children with Language Impairment CLI). The ability of the models in classifying the disfluencies was measured in terms of F-measure, Recall, and Precision.

Keywords: bi-lingual, children who stutter, children with language impairment, hidden markov models, multi-layer perceptron, linguistic disfluencies, stuttering disfluencies

Procedia PDF Downloads 217
1420 Wave Agitated Signatures in the Oolitic Limestones of Kunihar Formation, Proterozoic Simla Group, Lesser Himalaya, India

Authors: Alono Thorie, Ananya Mukhopadhyay

Abstract:

Ooid bearing horizons of the Proterozoic Kunihar Formation, Simla Group, Lesser Himalaya have been addressed in the present work. The study is concentrated around the outskirts of Arki town, Solan district, Himachal Pradesh, India. Based on the sedimentary facies associations, the processes that promote the formation of ooids have been documented. The facies associations that have been recorded are: (i) Oolitic-Intraclastic grainstone (FA1), (ii) Oolitic grainstone (FA2), (iii) Boundstone (FA3), (iv) Dolomudstone (FA4) and (v) Rudstone (FA5). Oolitic-Intraclastic grainstone (FA1) mainly consists of well sorted ooids with concentric laminae and intraclasts. Large ooids with grain sizes more than 4 mm are characteristic of oolites throughout the area. Normally graded beds consisting of ooids and intraclasts are frequently documented in storm sediments in shelf environments and carbonate platforms. The well-sorted grainstone fabric indicates deposition in a high-energy shoal with tidal currents and storm reworking. FA2 comprises spherical to elliptical grains up to 8.5cm in size with concentric cortex and micritic nuclei. Peloids in FA2 are elliptical, rounded objects <0.3 mm in size. FA1 and FA2 have been recorded alongside boundstones (FA3) comprising stromatolites having columnar, wavy and domal morphology. Boundstones (FA3) reflect microbial growth in carbonate platforms and reefs. Dolomudstones (FA4) interbedded with cross laminated sandstones and erosional surfaces reflect sedimentation in storm dominated zones below fair-weather wave base. Rudstone (FA5) is composed of oolitic grainstone (FA2), boundstone (FA3) and dolomudstone (FA4). These clasts are few mm to more than 10 cm in length. Rudstones indicate deposition along a slope with intermittent influence of wave currents and storm activities. Most ooids from the Kunihar Formation are regular ooids with abundance of broken ooids. Compound and concentric ooids indicating medium to low energy environments are present but scarce. Ooids from high energy domains are more dominant than ooids developed from low energy environments. The unusually large size of the Kunihar ooids (more than 8.5 cm) is rare in the geological record. Development of carbonate deposits such as oolitic- intraclastic Grainstones (FA1), oolitic grainstones (FA2) and rudstones (FA5), and reflect deposition in an agitated beach environment with abundant microbial activity and high energy shallow marine waters influenced by tide, wave and storm currents. Occurrences of boundstone (FA4) or stromatolitic carbonate amongst oolitic facies (FA1 and FA2) and appearance of compound and concentric ooids indicate intervals of calm in between agitated phases of storm, wave and tidal activities.

Keywords: proterozoic, Simla Group, ooids, stromatolites

Procedia PDF Downloads 188
1419 Nutritional Status of Children in a Rural Food Environment, Haryana: A Paradox for the Policy Action

Authors: Neha Gupta, Sonika Verma, Seema Puri, Nikhil Tandon, Narendra K. Arora

Abstract:

The concurrent increasing prevalence of underweight and overweight/obesity among children with changing lifestyle and the rapid transitioning society has necessitated the need for a unifying/multi-level approach to understand the determinants of the problem. The present community-based cross-sectional research study was conducted to assess the associations between lifestyle behavior and food environment of the child at household, neighborhood, and school with the BMI of children (6-12 year old) (n=612) residing in three rural clusters of Palwal district, Haryana. The study used innovative and robust methods for assessing the lifestyle and various components of food environment in the study. The three rural clusters selected for the study were located at three different locations according to their access to highways in the SOMAARTH surveillance site. These clusters were significantly different from each other in terms of their socio-demographic and socio-economic profile, living conditions, environmental hygiene, health seeking behavior and retail density. Despite of being different, the quality of living conditions and environmental hygiene was poor across three clusters. The children had higher intakes of dietary energy and sugars; one-fifth share of the energy being derived from unhealthy foods, engagement in high levels of physical activity and significantly different food environment at home, neighborhood and school level. However, despite having a high energy intake, 22.5% of the recruited children were thin/severe thin, and 3% were overweight/obese as per their BMI-for-age categories. The analysis was done using multi-variate logistic regression at three-tier hierarchy including individual, household and community level. The factors significantly explained the variability in governing the risk of getting thin/severe thin among children in rural area (p-value: 0.0001; Adjusted R2: 0.156) included age (>10years) (OR: 2.1; 95% CI: 1.0-4.4), the interaction between minority category and poor SES of the household (OR: 4.4; 95% CI: 1.6-12.1), availability of sweets (OR: 0.9; 95% CI: 0.8-0.99) and cereals (OR: 0.9; 95% CI: 0.8-1.0) in the household and poor street condition (proxy indicator of the hygiene and cleanliness in the neighborhood) (OR: 0.3; 95% CI: 0.1-1.1). The homogeneity of other factors at neighborhood and school level food environment diluted the heterogeneity in the lifestyles and home environment of the recruited children and their households. However, it is evident that when various individual factors interplay at multiple levels amplifies the risk of undernutrition in a rural community. Conclusion: These rural areas in Haryana are undergoing developmental, economic and societal transition. In correspondence, no improvements in the nutritional status of children have happened. Easy access to the unhealthy foods has become a paradox.

Keywords: transition, food environment, lifestyle, undernutrition, overnutrition

Procedia PDF Downloads 180