Search results for: hidden infestation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 554

Search results for: hidden infestation

524 Nondestructive Evaluation of Hidden Delamination in Glass Fiber Composite Using Terahertz Spectroscopy

Authors: Chung-Hyeon Ryu, Do-Hyoung Kim, Hak-Sung Kim

Abstract:

As the use of the composites was increased, the detecting method of hidden damages which have an effect on performance of the composite was important. Terahertz (THz) spectroscopy was assessed as one of the new powerful nondestructive evaluation (NDE) techniques for fiber reinforced composite structures because it has many advantages which can overcome the limitations of conventional NDE techniques such as x-rays or ultrasound. The THz wave offers noninvasive, noncontact and nonionizing methods evaluating composite damages, also it gives a broad range of information about the material properties. In additions, it enables to detect the multiple-delaminations of various nonmetallic materials. In this study, the pulse type THz spectroscopy imaging system was devised and used for detecting and evaluating the hidden delamination in the glass fiber reinforced plastic (GFRP) composite laminates. The interaction between THz and the GFRP composite was analyzed respect to the type of delamination, including their thickness, size and numbers of overlaps among multiple-delaminations in through-thickness direction. Both of transmission and reflection configurations were used for evaluation of hidden delaminations and THz wave propagations through the delaminations were also discussed. From these results, various hidden delaminations inside of the GFRP composite were successfully detected using time-domain THz spectroscopy imaging system and also compared to the results of C-scan inspection. It is expected that THz NDE technique will be widely used to evaluate the reliability of composite structures.

Keywords: terahertz, delamination, glass fiber reinforced plastic composites, terahertz spectroscopy

Procedia PDF Downloads 580
523 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 304
522 Presence of an Epibiont Epistylis sp. (Protozoa, Ciliophora) on Some Zooplankton

Authors: Hilal Bulut, Serap Saler

Abstract:

Protozoan ciliate epibionts infestation on zooplankton in Cip Dam Lake were studied seasonally, between spring 2014-winter 2015 The ciliates peritrich Epibiont Epistylis sp. (Protozoa, Ciliophora) was found as colony form on some individuals of different zooplanktonic groups, especially rotifers and copepods. Totally 23 zooplankton species (19 species from Rotifera, 3 species from Cladocera and 1 species from Copepoda in Cip Dam Lake were investigated. Rotifers were the most important zooplanktonic group (82.7 % of total) and the taxa observed with epibionts were Keratella, Polyarthra, and Brachionus. The highest densities of infected zooplankton was observed in winter (14265 ind.m-3), the lowest densities of infected zooplankton was found in summer (3056 ind.m-). Rotifers were most infected groups with 75% in this study. Epistylis sp. was found on three species of rotifers and one copepod species. Infestation of Epistylis sp. has been registered for the first time in Cip Dam Lake.

Keywords: copepoda, epibiosis, peritrich, rotifera

Procedia PDF Downloads 242
521 Effect of Tillage Technology on Species Composition of Weeds in Monoculture of Maize

Authors: Svetlana Chovancova, Frantisek Illek, Jan Winkler

Abstract:

The effect of tillage technology of maize on intensity of weed infestation and weed species composition was observed at experimental field. Maize is grown consecutively since 2001. The experimental site is situated at an altitude of 230 m above sea level in the Czech Republic. Variants of tillage technology are CT: plowing – conventional tillage 0.22 m, MT: loosening – disc tillage on the depth of 0.1 – 0.12 m, NT: direct sowing – without tillage. The evaluation of weed infestation was carried out by numerical method in years 2012 and 2013. Within the monitoring were found 20 various species of weeds. Conventional tillage (CT) primarily supports the occurrence of perennial weeds (Cirsium arvense, Convolvulus arvensis). Late spring species (Chenopodium album, Echinochloa crus-galli) were more frequently noticed on variants of loosening (MT) and direct sowing (NT). Different tillage causes a significant change of weed species spectrum in maize.

Keywords: weeds, maize, tillage, loosening, direct sowing

Procedia PDF Downloads 456
520 A Fine String between Weaving the Text and Patching It: Reading beyond the Hidden Symbols and Antithetical Relationships in the Classical and Modern Arabic Poetry

Authors: Rima Abu Jaber-Bransi, Rawya Jarjoura Burbara

Abstract:

This study reveals the extension and continuity between the classical Arabic poetry and modern Arabic poetry through investigation of its ambiguity, symbolism, and antithetical relationships. The significance of this study lies in its exploration and discovering of a new method of reading classical and modern Arabic poetry. The study deals with the Fatimid poetry and discovers a new method to read it. It also deals with the relationship between the apparent and the hidden meanings of words through focusing on how the paradoxical antithetical relationships change the meaning of the whole poem and give it a different dimension through the use of Oxymorons. In our unprecedented research on Oxymoron, we found out that the words in modern Arabic poetry are used in unusual combinations that convey apparent and hidden meanings. In some cases, the poet introduces an image with a symbol of a certain thing, but the reader soon discovers that the symbol includes its opposite, too. The question is: How does the reader find that hidden harmony in that apparent disharmony? The first and most important conclusion of this study is that the Fatimid poetry was written for two types of readers: religious readers who know the religious symbols and the hidden secret meanings behind the words, and ordinary readers who understand the apparent literal meaning of the words. Consequently, the interpretation of the poem is subject to the type of reading. In Fatimid poetry we found out that the hunting-journey is a journey of hidden esoteric knowledge; the Horse is al-Naqib, a religious rank of the investigator and missionary; the Lion is Ali Ibn Abi Talib. The words black and white, day and night, bird, death and murder have different meanings and indications. Our study points out the importance of reading certain poems in certain periods in two different ways: the first depends on a doctrinal interpretation that transforms the external apparent (ẓāher) meanings into internal inner hidden esoteric (bāṭen) ones; the second depends on the interpretation of antithetical relationships between the words in order to reveal meanings that the poet hid for a reader who participates in the processes of creativity. The second conclusion is that the classical poem employed symbols, oxymora and antonymous and antithetical forms to create two poetic texts in one mold and form. We can conclude that this study is pioneering in showing the constant paradoxical relationship between the apparent and the hidden meanings in classical and modern Arabic poetry.

Keywords: apparent, symbol, hidden, antithetical, oxymoron, Sophism, Fatimid poetry

Procedia PDF Downloads 249
519 Coaches Attitudes, Efficacy and Proposed Behaviors towards Athletes with Hidden Disabilities: A Review of Recent Survey Research

Authors: Robbi Beyer, Tiffanye Vargas, Margaret Flores

Abstract:

Within the United States, youths with hidden disabilities (specific learning disabilities, attention deficit hyperactivity disorder, emotional behavioral disorders, mild intellectual disabilities and speech/language disorders) can often be part of the kindergarten through twelfth grade school population. Because individuals with hidden disabilities have no apparent physical disability, learning difficulties may be overlooked and these youths may be mistakenly labeled as unmotivated, or defiant because they don't understand and follow directions, or maintain enough attention to remember and perform. These behaviors are considered especially challenging for youth sport coaches to manage and they often find it difficult to successfully select and deliver effective accommodations for the athletes. These deficits can be remediated and compensated through the use of research-validated strategies and instructional methods. However, while these techniques are commonly included in teacher preparation, they rarely, if ever, are included in coaching preparation. Therefore, the purpose of this presentation is to summarize consecutive research studies that examined coaching education within the United States for youth athletes with hidden disabilities. Each study utilized a questionnaire format to collect data from coaches on attitudes, efficacy and solutions for addressing challenging behaviors. Results indicated that although the majority of coaches’ attitudes were positive and they perceived themselves confident in working with athletes who have hidden disabilities, there were significant differences in the understanding of appropriate teaching strategies and techniques for this population. For example, when asked to describe a videotaped situation of why an athlete is not performing correctly, coaches often found the athlete to be at fault, as opposed to considering the possibility of faulty directions, or the need for accommodations in teaching/coaching style. When considering coaches’ preparation, 83% of participants declared they were inadequately prepared to coach athletes with hidden disabilities and 92% strongly supported improved preparation for coaches. The comprehensive examination of coaches’ perceptions and efficacy in working with youth athletes with hidden disabilities has provided valuable insight and highlights the need for continued research in this area.

Keywords: health, hidden disabilties, physical activity, youth recreational sports

Procedia PDF Downloads 334
518 Hidden Markov Movement Modelling with Irregular Data

Authors: Victoria Goodall, Paul Fatti, Norman Owen-Smith

Abstract:

Hidden Markov Models have become popular for the analysis of animal tracking data. These models are being used to model the movements of a variety of species in many areas around the world. A common assumption of the model is that the observations need to have regular time steps. In many ecological studies, this will not be the case. The objective of the research is to modify the movement model to allow for irregularly spaced locations and investigate the effect on the inferences which can be made about the latent states. A modification of the likelihood function to allow for these irregular spaced locations is investigated, without using interpolation or averaging the movement rate. The suitability of the modification is investigated using GPS tracking data for lion (Panthera leo) in South Africa, with many observations obtained during the night, and few observations during the day. Many nocturnal predator tracking studies are set up in this way, to obtain many locations at night when the animal is most active and is difficult to observe. Few observations are obtained during the day, when the animal is expected to rest and is potentially easier to observe. Modifying the likelihood function allows the popular Hidden Markov Model framework to be used to model these irregular spaced locations, making use of all the observed data.

Keywords: hidden Markov Models, irregular observations, animal movement modelling, nocturnal predator

Procedia PDF Downloads 237
517 Exploring the Activity Fabric of an Intelligent Environment with Hierarchical Hidden Markov Theory

Authors: Chiung-Hui Chen

Abstract:

The Internet of Things (IoT) was designed for widespread convenience. With the smart tag and the sensing network, a large quantity of dynamic information is immediately presented in the IoT. Through the internal communication and interaction, meaningful objects provide real-time services for users. Therefore, the service with appropriate decision-making has become an essential issue. Based on the science of human behavior, this study employed the environment model to record the time sequences and locations of different behaviors and adopted the probability module of the hierarchical Hidden Markov Model for the inference. The statistical analysis was conducted to achieve the following objectives: First, define user behaviors and predict the user behavior routes with the environment model to analyze user purposes. Second, construct the hierarchical Hidden Markov Model according to the logic framework, and establish the sequential intensity among behaviors to get acquainted with the use and activity fabric of the intelligent environment. Third, establish the intensity of the relation between the probability of objects’ being used and the objects. The indicator can describe the possible limitations of the mechanism. As the process is recorded in the information of the system created in this study, these data can be reused to adjust the procedure of intelligent design services.

Keywords: behavior, big data, hierarchical hidden Markov model, intelligent object

Procedia PDF Downloads 222
516 Characterization of New Sources of Maize (Zea mays L.) Resistance to Sitophilus zeamais (Coleoptera: Curculionidae) Infestation in Stored Maize

Authors: L. C. Nwosu, C. O. Adedire, M. O. Ashamo, E. O. Ogunwolu

Abstract:

The maize weevil, Sitophilus zeamais Motschulsky is a notorious pest of stored maize (Zea mays L.). The development of resistant maize varieties to manage weevils is a major breeding objective. The study investigated the parameters and mechanisms that confer resistance on a maize variety to S. zeamais infestation using twenty elite maize varieties. Detailed morphological, physical and chemical studies were conducted on whole-maize grain and the grain pericarp. Resistance was assessed at 33, 56, and 90 days post infestation using weevil mortality rate, weevil survival rate, percent grain damage, percent grain weight loss, weight of grain powder, oviposition rate and index of susceptibility as indices rated on a scale developed by the present study and on Dobie’s modified scale. Linear regression models that can predict maize grain damage in relation to the duration of storage were developed and applied. The resistant varieties identified particularly 2000 SYNEE-WSTR and TZBRELD3C5 with very high degree of resistance should be used singly or best in an integrated pest management system for the control of S. zeamais infestation in stored maize. Though increases in the physical properties of grain hardness, weight, length, and width increased varietal resistance, it was found that the bases of resistance were increased chemical attributes of phenolic acid, trypsin inhibitor and crude fibre while the bases of susceptibility were increased protein, starch, magnesium, calcium, sodium, phosphorus, manganese, iron, cobalt and zinc, the role of potassium requiring further investigation. Characters that conferred resistance on the test varieties were found distributed in the pericarp and the endosperm of the grains. Increases in grain phenolic acid, crude fibre, and trypsin inhibitor adversely and significantly affected the bionomics of the weevil on further assessment. The flat side of a maize grain at the point of penetration was significantly preferred by the weevil. Why the south area of the flattened side of a maize grain was significantly preferred by the weevil is clearly unknown, even though grain-face-type seemed to be a contributor in the study. The preference shown to the south area of the grain flat side has implications for seed viability. The study identified antibiosis, preference, antixenosis, and host evasion as the mechanisms of maize post harvest resistance to Sitophilus zeamais infestation.

Keywords: maize weevil, resistant, parameters, mechanisms, preference

Procedia PDF Downloads 297
515 Susceptibility of Different Clones of Eucalyptus Species against Gall Wasp, Leptocybe invasa Fisher and La Salle in Punjab, India

Authors: Ashwinder K. Dhaliwal, G. P. S. Dhillon

Abstract:

Eucalyptus is one of the most important forest tree species that can tolerate and grow well on degraded and unfertile soils which are not suitable for other tree species. Besides this, these trees have a short rotation and good economic value. However, the gall inducing wasp Leptocybe invasa Fisher and La Salle has been reported from many countries throughout the world. The spread of L. invasa is of huge economic concern as more than 20,000 ha of young Eucalyptus trees have already been affected in southern states of India. The host plant resistance being the first line of defense against insect pests demands the screening of different germplasm source against L. invasa. Keeping this in view, fourteen different clones of Eucalyptus spp. were evaluated for their susceptibility to L. invasa from a replicated clonal trial planted at Punjab Agricultural University, Ludhiana. The degree of gall infestation was recorded from three plants of each clone in each replication. Three branches selected from the lower, middle and upper canopy of the trees were selected for recording the total number of galls induced by L. invasa. The statistical analysis was done as per the procedure laid down for completely randomised block design (CRBD), analysis of variance (ANOVA), critical difference (CD) and variance components using Proc GLM (SAS software 9.3, SAS Institute Ltd. U.S.A). All possible treatment means were compared with Duncan’s multiple range test (DMRT) at 1 % probability level. The results showed that the clones C-9, C-45 and C-42 were completely free from the infestation of L. invasa. However, there was minor infestation of L. invasa on C-2135, C-413, C-407, C-35, C-72 and C-37 clones. The clone C-6 was severely infested by L. invasa followed by C-11, C-12, F-316 and C-25 clones. The information generated by this study will be helpful for future breeding and use in afforestation programmes.

Keywords: eucalyptus clones, gall wasp, Leptocybe invasa, screening, susceptibility

Procedia PDF Downloads 208
514 Speed Breaker/Pothole Detection Using Hidden Markov Models: A Deep Learning Approach

Authors: Surajit Chakrabarty, Piyush Chauhan, Subhasis Panda, Sujoy Bhattacharya

Abstract:

A large proportion of roads in India are not well maintained as per the laid down public safety guidelines leading to loss of direction control and fatal accidents. We propose a technique to detect speed breakers and potholes using mobile sensor data captured from multiple vehicles and provide a profile of the road. This would, in turn, help in monitoring roads and revolutionize digital maps. Incorporating randomness in the model formulation for detection of speed breakers and potholes is crucial due to substantial heterogeneity observed in data obtained using a mobile application from multiple vehicles driven by different drivers. This is accomplished with Hidden Markov Models, whose hidden state sequence is found for each time step given the observables sequence, and are then fed as input to LSTM network with peephole connections. A precision score of 0.96 and 0.63 is obtained for classifying bumps and potholes, respectively, a significant improvement from the machine learning based models. Further visualization of bumps/potholes is done by converting time series to images using Markov Transition Fields where a significant demarcation among bump/potholes is observed.

Keywords: deep learning, hidden Markov model, pothole, speed breaker

Procedia PDF Downloads 131
513 What Lies Beneath: Kanti Shah’s Children of Midnight

Authors: Vibhushan Subba

Abstract:

B-movies are almost always ‘glanced over’, ‘swept beneath’, ‘hidden from’ and ‘locked away’ to live a secret life; a life that exists but enjoys only a mummified existence behind layers of protective covering. They are more often than not discarded as ‘trash’, ‘sleaze’, ‘porn’ and put down for their ‘bad taste’ or at least that has been the case in India. With the art film entering the realm of high art, the popular and the mainstream has been increasingly equated with the A grade Bollywood film. This leaves the B-movie to survive as a degraded cultural artifact on the fringes of the mainstream. Kanti Shah’s films are part of a secret, traversing the libidinal circuits of the B and C grade through history. His films still circulate like a corporeal reminder of the forbidden and that which is taboo, like a hidden fracture that threatens to split open bourgeois respectability. Seeking to find answers to an aesthetic that has been rejected and hidden, this paper looks at three films of Kanti Shah to see how the notion of taboo, censorship and the unseen coincide, how they operate in the domain of his cinema and try and understand a form that draws our attention to the subterranean forces at work.

Keywords: B-movies, trash, taboo, censorship

Procedia PDF Downloads 442
512 The First Language of Humanity is Body Language Neither Mother or Native Language

Authors: Badriah Khaleel

Abstract:

Language acquisition is one of the most striking aspects of human development. It is a startling feat, which has engrossed the attention of linguists for generations. The present study will explore the hidden identities and attributes of nonverbal gestures. The current research will reflect the significant role of body language as not mere body gestures or facial expressions but as the first language of humanity.

Keywords: a startling feat, a new horizon for linguists to rethink, explore the hidden identities and attributes of non-verbal gestures, English as a third language, the first language of humanity

Procedia PDF Downloads 487
511 The Monogeneans of the Genus Lamellodiscus, Parasites of Sparidae Fish of the Genus Dentex on the Coasts of Dakar (Sénégal)

Authors: Sikhou Drame, Arfang Diamanka

Abstract:

This study focuses on an examination of the Monogenea community of the Lamellodiscus genus, parasites of teleost fish of the Dentex genus (Sparidae): Dentex angolensis, Dentex canariensis, Dentex macrophthalmus, and Dentex maroccanus from two landing sites in Dakar: Soumbédioune landing and Hann Bel Air landing. Observing the morpho-anatomical criteria of the monogeneans collected from all host species reveals the presence of 6 species of the Lamellodiscus genus (Monogenea, Diplectanidae): Lamellodiscus euzeti in Dentex canariensis, Lamellodiscus dentexi, Lamellodiscus toguebayei, Lamellodiscus triacies, and Lamellodiscus vicinus in Dentex macrophthalmus; Lamellodiscus crampus in its usual host Dentex marrocanus and we found it in Dentex angolensis. The results of the study on the distribution of parasitic indices in the studied host species show that infestation rates and parasite burdens vary from one host species to another and from one season to another. However, it is during the hot season that the values of infestation intensity and abundance are highest. Additionally, we note that Dentex canariensis records the highest parasite burdens in both locations.

Keywords: lamellodiscus, fish, dentex, Dakar, Monogenea

Procedia PDF Downloads 26
510 Orthogonal Basis Extreme Learning Algorithm and Function Approximation

Authors: Ying Li, Yan Li

Abstract:

A new algorithm for single hidden layer feedforward neural networks (SLFN), Orthogonal Basis Extreme Learning (OBEL) algorithm, is proposed and the algorithm derivation is given in the paper. The algorithm can decide both the NNs parameters and the neuron number of hidden layer(s) during training while providing extreme fast learning speed. It will provide a practical way to develop NNs. The simulation results of function approximation showed that the algorithm is effective and feasible with good accuracy and adaptability.

Keywords: neural network, orthogonal basis extreme learning, function approximation

Procedia PDF Downloads 523
509 Acute and Chronic Effect of Biopesticide on Infestation of Whitefly Bemisia tabaci (Gennadius) on the Culantro Cultivation

Authors: U. Pangnakorn, S. Chuenchooklin

Abstract:

Acute and chronic effects of biopesticide from entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens), wood vinegar and fermented organic substances from plants: (neem Azadirachta indica + citronella grass Cymbopogon nardus Rendle + bitter bush Chromolaena odorata L.) were tested on culantro (Eryngium foetidum L.). The biopesticide was investigated for infestation reduction of the major insect pest whitefly (Bemisia tabaci (Gennadius)). The experimental plots were located at a farm in Nakhon Sawan Province, Thailand. This study was undertaken during the drought season (late November to May). Effectiveness of the treatment was evaluated in terms of acute and chronic effect. The populations of whitefly were observed and recorded every hour up to 3 hours with insect nets and yellow sticky traps after the treatments were applied for the acute effect. The results showed that bacteria ISR had the highest effectiveness for controlling whitefly infestation on culantro; the whitefly numbers on insect nets were 12.5, 10.0 and 7.5 after 1 hr, 2 hr, and 3 hr, respectively while the whitefly on yellow sticky traps showed 15.0, 10.0 and 10.0 after 1 hr, 2 hr, and 3 hr, respectively. For chronic effect, the whitefly was continuously collected and recorded at weekly intervals; the result showed that treatment of bacteria ISR found the average whitefly numbers only 8.06 and 11.0 on insect nets and sticky traps respectively, followed by treatment of nematode where the average whitefly was 9.87 and 11.43 on the insect nets and sticky traps, respectively. In addition, the minor insect pests were also observed and collected. The biopesticide influenced the reduction number of minor insect pests (red spider mites, beet armyworm, short-horned grasshopper, pygmy locusts, etc.) with only a few found on the culantro cultivation.

Keywords: whitefly (Bemisia tabaci Gennadius), culantro (Eryngium foetidum L.), acute and chronic effect, entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens)

Procedia PDF Downloads 274
508 Infestation of Aphid on Wheat Triticum aestivum L. (Poaceae) and Its Possible Management with Naturally Existing Beneficial Fauna

Authors: Ghulam Abbas, Ikramul Haq, Ghulam Ghouse

Abstract:

Bread wheat Triticum aestivum L. (Poaceae) is the major source of the staple food for a number of countries of the world including Pakistan. Since it is the staple food of the country, it has been desired, and efforts have been made, that it does not undergo application of pesticides to ensure the food safety. Luckily, wheat does not face a serious threat of insect pests, in ecological conditions of Pakistan, except aphids and armyworm which infest the wheat prior to maturity. It has been observed that almost 5 species of aphid have been reported to attack wheat ie. Ropalosiphum maidi, R. Padi, Schizaphis graminum, Diuraphis noxia, and Sitibion miscanthi but due to natural rise in temperature in terminal season of wheat, the population of aphid gradually decreases and wheat has a safe escape from its infestation. In case, mild temperatures 15ºC to 30ºC prolong, the infestation of aphids also prolongs and it can severely damage wheat in patches, and it has potential to substantially reduce the yield of wheat in infested patch. In years 2013, 2014, and 2015 the studies were undertaken to determine the potential of damage caused by aphid complex in 10 fields in infested patches. The damage caused by aphid complex was calculated on the basis of 1000 grain weight of wheat grains taken from the infested patch and were compared with 1000 grain weight of the healthy plants of the same fields. It was observed that there was 26 to 42% decrease in the weight of grain in infested patches. This patch also escaped from general harvesting by combine harvester and enhanced the loss 13 to 46%. The quality of the wheat straw was also reduced and its acceptance to the animals was also affected up to 50 to 100%. Moreover, the population of naturally existing beneficial fauna was recorded and factors promoting establishment and manipulation of beneficial fauna were studied and analysed.

Keywords: Triticum aestivum, wheat, Pakistan, beneficial fauna, aphid complex

Procedia PDF Downloads 269
507 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification

Authors: Abdelhadi Lotfi, Abdelkader Benyettou

Abstract:

In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.

Keywords: classification, probabilistic neural networks, network optimization, pattern recognition

Procedia PDF Downloads 248
506 Regional Advantages Analysis: An Interactive Approach of Comparative and Competitive Advantages

Authors: Abdolrasoul Ghasemi, Ali Arabmazar Yazdi, Yasaman Boroumand, Aliasghar Banouei

Abstract:

In regional studies, choosing an appropriate approach to analyze regional success or failure has always been a challenge. Hence, this study introduces an innovative approach to establish a link between regional success and failure in the past as well as the potential success of a region in the future. The former can be sought in the historical evaluation of comparative advantages, while the latter is portrayed as competitive advantage analysis with a forward-looking approach. Based on the interaction of comparative and competitive advantages, activities are classified into four groups, including activities with no advantage, hidden advantage, fragile advantage and synergistic advantage. In analyzing the comparative advantage of activities, the location quotient method is applied, and in analyzing their competitive advantage, Porter`s diamond model using the survey method is applied. According to the results, the share of no advantage, fragile advantage, hidden advantage and synergic advantage activities are respectively 10%, 42%, 16%, and 32%. Also, to achieve economic development in regional activities, our model provides various levels of priority. First, the activities with synergistic advantage should be prioritized, then the ones with hidden advantage, and finally the activities with fragile advantage.

Keywords: regional advantage, comparative advantage, competitive advantage, Porter's diamond model

Procedia PDF Downloads 343
505 Effect of Biostimulants to Control the Phelipanche ramosa L. Pomel in Processing Tomato Crop

Authors: G. Disciglio, G. Gatta, F. Lops, A. Libutti, A. Tarantino, E. Tarantino

Abstract:

The experimental trial was carried out in open field at Foggia district (Apulia Region, Southern Italy), during the spring-summer season 2014, in order to evaluate the effect of four biostimulant products (RadiconÒ, Viormon plusÒ, LysodinÒ and SiaptonÒ 10L), compared with a control (no biostimulant), on the infestation of processing tomato crop (cv Dres) by the chlorophyll-lacking root parasite Phelipanche ramosa. Biostimulants consist in different categories of products (microbial inoculants, humic and fulvic acids, hydrolyzed proteins and aminoacids, seaweed extracts) which play various roles in plant growing, including the improvement of crop resistance and quali-quantitative characteristics of yield. The experimental trial was arranged according to a complete randomized block design with five treatments, each of one replicated three times. The processing tomato seedlings were transplanted on 5 May 2014. Throughout the crop cycle, P. ramosa infestation was assessed according to the number of emerged shoots (branched plants) counted in each plot, at 66, 78 and 92 day after transplanting. The tomato fruits were harvested at full-stage of maturity on 8 August 2014. From each plot, the marketable yield was measured and the quali-quantitative yield parameters (mean weight, dry matter content, colour coordinate, colour index and soluble solids content of the fruits) were determined. The whole dataset was tested according to the basic assumptions for the analysis of variance (ANOVA) and the differences between the means were determined using Tukey’s tests at the 5% probability level. The results of the study showed that none of the applied biostimulants provided a whole control of Phelipanche, although some positive effects were obtained from their application. To this respect, the RadiconÒ appeared to be the most effective in reducing the infestation of this root-parasite in tomato crop. This treatment also gave the higher tomato yield.

Keywords: biostimulant, control methods, Phelipanche ramosa, tomato crop

Procedia PDF Downloads 288
504 Hidden Markov Model for the Simulation Study of Neural States and Intentionality

Authors: R. B. Mishra

Abstract:

Hidden Markov Model (HMM) has been used in prediction and determination of states that generate different neural activations as well as mental working conditions. This paper addresses two applications of HMM; one to determine the optimal sequence of states for two neural states: Active (AC) and Inactive (IA) for the three emission (observations) which are for No Working (NW), Waiting (WT) and Working (W) conditions of human beings. Another is for the determination of optimal sequence of intentionality i.e. Believe (B), Desire (D), and Intention (I) as the states and three observational sequences: NW, WT and W. The computational results are encouraging and useful.

Keywords: hiden markov model, believe desire intention, neural activation, simulation

Procedia PDF Downloads 366
503 Efficacy of Modified Bottom Boards to Control Varroa Mite (Varroa Destructor) in Honeybee Colonies

Authors: Marwan Keshlaf, Hassan Fellah

Abstract:

This study was designed to test whether hive bottom boards modified with polyvinyl chloride pipe or screen-mesh reduces number of Varroa mites in naturally infested honeybee colonies comparing to chemical control. Fifty six colonies distributed equally between two location each received one of four experimental treatment 1) conventional solid board “control”, 2) Apistan in conventional solid board, 3) Mesh bottom board and 4) tube bottom board. Varroa infestation level on both adult bees and on capped brood was estimated. Stored pollen, capped brood area and honey production were also measured. Results of varroa infestation were inconsistent between apiaries. In apiary 1, colonies with Apistan had fewer Varroa destructor than other treatments, but this benefit was not apparent in Apiary 2. There were no effects of modified bottom boards on bee flight activity, brood production, honey yield and stored pollen. We conclude that the efficacy of modified bottom boards in reducing varroa mites population in bee colonies remains uncertain due to observed differences of hygienic behavior.

Keywords: Apis mellifera, modified bottom boards, Varroa destructor, Honeybee colonies

Procedia PDF Downloads 360
502 Identification of Landslide Features Using Back-Propagation Neural Network on LiDAR Digital Elevation Model

Authors: Chia-Hao Chang, Geng-Gui Wang, Jee-Cheng Wu

Abstract:

The prediction of a landslide is a difficult task because it requires a detailed study of past activities using a complete range of investigative methods to determine the changing condition. In this research, first step, LiDAR 1-meter by 1-meter resolution of digital elevation model (DEM) was used to generate six environmental factors of landslide. Then, back-propagation neural networks (BPNN) was adopted to identify scarp, landslide areas and non-landslide areas. The BPNN uses 6 environmental factors in input layer and 1 output layer. Moreover, 6 landslide areas are used as training areas and 4 landslide areas as test areas in the BPNN. The hidden layer is set to be 1 and 2; the hidden layer neurons are set to be 4, 5, 6, 7 and 8; the learning rates are set to be 0.01, 0.1 and 0.5. When using 1 hidden layer with 7 neurons and the learning rate sets to be 0.5, the result of Network training root mean square error is 0.001388. Finally, evaluation of BPNN classification accuracy by the confusion matrix shows that the overall accuracy can reach 94.4%, and the Kappa value is 0.7464.

Keywords: digital elevation model, DEM, environmental factors, back-propagation neural network, BPNN, LiDAR

Procedia PDF Downloads 125
501 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 317
500 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 325
499 Survey for Mango Seed Weevils and Pulp Weevil Sternochetus Species (Coleoptera:Curculionidae) on Mango, Mangifera indica in Shan State-South, Myanmar

Authors: Khin Nyunt Yee, Mu Mu Thein

Abstract:

Detection survey of mango seed and Pulp weevils was undertaken at major mango production areas, Yat Sauk, Taunggyi, Nyaung Shwe and Hopong Townships, in Shan State (South) of Myanmar on two mango cultivars of Sein Ta Lone and Yinkwe from May to August 2016 to coincide with fruiting season to conduct a survey of mango seed and pulp weevils population. The total numbers of 6300 fruits of both mango cultivars were sampled. Among them, 2900 fruits from 5674 fruit bearing plants were collected for Sein Ta Lone cultivar of five well managed, one unmanaged orchards and Urban in Yatsauk Twonship, 400 fruits from only one well managed orchard in Taunggyi Township, 400 fruits from two managed orchards in Nyaung Shwe Township and 400 fruits from one managed orchard in Hopong Township from May to June. 2200 fruits were collected from 4043 fruit bearing plants for Yinkwe Cultivar of four well managed orchards, one unmanaged orchards and one wild tree only in Yat Sauk Township from July to August, 2016. Fruit sample size was 200 fruits /orchard, / wild or /volunteer trees as minimum number. The pulps of all randomly sampling fruits were longitudinal cut open into three slices on each side of fruit and seed were cut longitudinally to inspect the presence of mango weevils. The collected weevils were identified up to species level at Plant Quarantine Laboratory, Plant Protection Division, Department of Agriculture, Ministry of Agriculture, Livestock and Irrigation, Yangon, Myanmar. Mango Pulp and Seed weevils were found on Sein Ta Lone Mango Cultivar in three out of four surveyed Townships except Hopong with the level of infestation ranged from 0.0% to 3.5% of fruits per Township with 0.0% to 39.0% of fruits per orchard. The highest infestation rate per township was 3.5% of fruits (n=400 fruits) in Nyaung Shwe, then, at Yat Suak, the rate was 2.47% (n=2900 fruits). A well-managed orchard at Taung Gyi had 0.75% (n=400 fruits) whereas Hopong was free 0.0% (n=400). The weevils were also recorded on Yinkwe Mango Cultivar in Yatsauk Township where the infestation level was 12.63% of fruits (n=2200) with 0.0% to 67.0% of fruits per orchard. This high level of infestation was obtained by including an absolutely non Integrated Pest Management (non IPM) orchards in both survey with the infestation rates 63.0% of fruits (n=200) and 67.0% of fruits (n=200) respectively on Yinkwe cultivar. Two different species; mango pulp weevil, Sternochetus frigitus, and mango seed weevil Sternochetus olivieri (Faust) of family Curculionidae under the order Coleoptera were recorded. Sternochetus mangiferae was not found during these surveys. Three different developmental stages of mango seed and pulp weevils: larva, pupa and adult were first detected since the first survey in 3rd week of May and mostly were recorded as adult stages in the following surveys in June, July and August The number of Mango pulp weevil was statistically higher than that of mango seed weevils at P < 0.001%. More precise surveys should be carried out national wide to detect the mango weevils.

Keywords: mango pulp weevil, Sternochetus frigitus, mango seed weevil Sternochetus olivieri, faust, Sternochetus mangiferae, fabricius, Sein Ta Lone, Yinkwe mango cultivars, Shan State (South) Myanmar

Procedia PDF Downloads 293
498 Part of Speech Tagging Using Statistical Approach for Nepali Text

Authors: Archit Yajnik

Abstract:

Part of Speech Tagging has always been a challenging task in the era of Natural Language Processing. This article presents POS tagging for Nepali text using Hidden Markov Model and Viterbi algorithm. From the Nepali text, annotated corpus training and testing data set are randomly separated. Both methods are employed on the data sets. Viterbi algorithm is found to be computationally faster and accurate as compared to HMM. The accuracy of 95.43% is achieved using Viterbi algorithm. Error analysis where the mismatches took place is elaborately discussed.

Keywords: hidden markov model, natural language processing, POS tagging, viterbi algorithm

Procedia PDF Downloads 317
497 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 116
496 Analysis of Detection Concealed Objects Based on Multispectral and Hyperspectral Signatures

Authors: M. Kastek, M. Kowalski, M. Szustakowski, H. Polakowski, T. Sosnowski

Abstract:

Development of highly efficient security systems is one of the most urgent topics for science and engineering. There are many kinds of threats and many methods of prevention. It is very important to detect a threat as early as possible in order to neutralize it. One of the very challenging problems is detection of dangerous objects hidden under human’s clothing. This problem is particularly important for safety of airport passengers. In order to develop methods and algorithms to detect hidden objects it is necessary to determine the thermal signatures of such objects of interest. The laboratory measurements were conducted to determine the thermal signatures of dangerous tools hidden under various clothes in different ambient conditions. Cameras used for measurements were working in spectral range 0.6-12.5 μm An infrared imaging Fourier transform spectroradiometer was also used, working in spectral range 7.7-11.7 μm. Analysis of registered thermograms and hyperspectral datacubes has yielded the thermal signatures for two types of guns, two types of knives and home-made explosive bombs. The determined thermal signatures will be used in the development of method and algorithms of image analysis implemented in proposed monitoring systems.

Keywords: hyperspectral detection, nultispectral detection, image processing, monitoring systems

Procedia PDF Downloads 338
495 Artificial Neural Networks and Hidden Markov Model in Landslides Prediction

Authors: C. S. Subhashini, H. L. Premaratne

Abstract:

Landslides are the most recurrent and prominent disaster in Sri Lanka. Sri Lanka has been subjected to a number of extreme landslide disasters that resulted in a significant loss of life, material damage, and distress. It is required to explore a solution towards preparedness and mitigation to reduce recurrent losses associated with landslides. Artificial Neural Networks (ANNs) and Hidden Markov Model (HMMs) are now widely used in many computer applications spanning multiple domains. This research examines the effectiveness of using Artificial Neural Networks and Hidden Markov Model in landslides predictions and the possibility of applying the modern technology to predict landslides in a prominent geographical area in Sri Lanka. A thorough survey was conducted with the participation of resource persons from several national universities in Sri Lanka to identify and rank the influencing factors for landslides. A landslide database was created using existing topographic; soil, drainage, land cover maps and historical data. The landslide related factors which include external factors (Rainfall and Number of Previous Occurrences) and internal factors (Soil Material, Geology, Land Use, Curvature, Soil Texture, Slope, Aspect, Soil Drainage, and Soil Effective Thickness) are extracted from the landslide database. These factors are used to recognize the possibility to occur landslides by using an ANN and HMM. The model acquires the relationship between the factors of landslide and its hazard index during the training session. These models with landslide related factors as the inputs will be trained to predict three classes namely, ‘landslide occurs’, ‘landslide does not occur’ and ‘landslide likely to occur’. Once trained, the models will be able to predict the most likely class for the prevailing data. Finally compared two models with regards to prediction accuracy, False Acceptance Rates and False Rejection rates and This research indicates that the Artificial Neural Network could be used as a strong decision support system to predict landslides efficiently and effectively than Hidden Markov Model.

Keywords: landslides, influencing factors, neural network model, hidden markov model

Procedia PDF Downloads 372