Search results for: computer processing of large databases
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12483

Search results for: computer processing of large databases

5883 Characterization of Caneberry Juices Enriched by Natural Antioxidants

Authors: Jelena Vulić, Jasna Čanadanović-Brunet, Gordana Ćetković, Sonja Djilas, Vesna Tumbas Šaponjac

Abstract:

Caneberries (raspberries and blackberries) are among the most popular berries in the world, which are consumed as fresh and processed to juice, jams, confitures and other products or as ingredients for different foods. These fruits are known as a rich source of phenolic compounds such as phenolic acids and anthocyanins. Antioxidant activity (AA) of caneberry juices was improved by addition of phenolic compounds which were extracted from two raspberry cultivars (Rubus idaeus, cv. 'Willamette' (RW) and 'Meeker' (RM)) and two blackberry cultivars (Rubus fruticosus, cv. 'Čačanka' (BC) and 'Thornfree' (BT)) pomace, a by-product in juice processing. The total phenolic contents in raspberry and blackberry pomace extracts were determined spectrophotometrically using the Folin-Ciocalteu reagens. The phenolic concentrations in caneberries (RW, RM, BC and BT) pomace extracts were 43.67 ± 2.13 mg GAE/g, 26.25 ± 1.18 mg GAE/g, 46.01 ± 3.26 mg GAE/g and 61.59 ± 1.14 mg GAE/g, respectively. In order to obtain enriched juices, phenolic compounds were applied at concentration of 0.05 mg GAE/ 100 ml. Antioxidant activities of caneberry juices and caneberry enriched juices were measured using stable 1.1-diphenyl-2-picrylhydrazyl (DPPH) radicals. AADPPH of RW, RM, BC and BT juices and enriched juices with addition of 0.01 µg GAE/ml, changed from 37.12% to 93.01%, 23.26% to 91.57%, 53.61% to 95.65% and 52.06% to 93.13%, respectively, while IC50 values of RW, RM, BC and BT juices and enriched juices were diminished 6.33, 19.00, 6.33 and 4.75 times, respectively. Based on the obtained results it can be concluded that phenolic enriched juices were significantly more effective on DPPH radicals. Caneberry juices enriched with waste material are a good source of natural pigments and antioxidants and could be used as functional foods.

Keywords: caneberry, enriched juice, phenolic antioxidant, DPPH radical

Procedia PDF Downloads 330
5882 Evaluation of Environmental Impact Assessment of Dam Using GIS/Remote Sensing-Review

Authors: Ntungamili Kenosi, Moatlhodi W. Letshwenyo

Abstract:

Negative environmental impacts due to construction of large projects such as dams have become an important aspect of land degradation. This paper will review the previous literature on the previous researches or study in the same area of study in the other parts of the world. After dam has been constructed, the actual environmental impacts are investigated and compared to the predicted results of the carried out Environmental Impact Assessment. GIS and Remote Sensing, play an important role in generating automated spatial data sets and in establishing spatial relationships. Results from other sources shows that the normalized vegetation index (NDVI) analysis was used to detect the spatial and temporal change of vegetation biomass in the study area. The result indicated that the natural vegetation biomass is declining. This is mainly due to the expansion of agricultural land and escalating human made structures in the area. Urgent environmental conservation is necessary when adjoining projects site. Less study on the evaluation of EIA on dam has been conducted in Botswana hence there is a need for the same study to be conducted and then it will be easy to be compared to other studies around the world.

Keywords: Botswana, dam, environmental impact assessment, GIS, normalized vegetation index (NDVI), remote sensing

Procedia PDF Downloads 392
5881 Characterization on Molecular Weight of Polyamic Acids Using GPC Coupled with Multiple Detectors

Authors: Mei Hong, Wei Liu, Xuemin Dai, Yanxiong Pan, Xiangling Ji

Abstract:

Polyamic acid (PAA) is the precursor of polyimide (PI) prepared by a two-step method, its molecular weight and molecular weight distribution not only play an important role during the preparation and processing, but also influence the final performance of PI. However, precise characterization on molecular weight of PAA is still a challenge because of the existence of very complicated interactions in the solution system, including the electrostatic interaction, hydrogen bond interaction, dipole-dipole interaction, etc. Thus, it is necessary to establisha suitable strategy which can completely suppress these complex effects and get reasonable data on molecular weight. Herein, the gel permeation chromatography (GPC) coupled with differential refractive index (RI) and multi-angle laser light scattering (MALLS) detectors were applied to measure the molecular weight of (6FDA-DMB) PAA using different mobile phases, LiBr/DMF, LiBr/H3PO4/THF/DMF, LiBr/HAc/THF/DMF, and LiBr/HAc/DMF, respectively. It was found that combination of LiBr with HAc can shield the above-mentioned complex interactions and is more conducive to the separation of PAA than only addition of LiBr in DMF. LiBr/HAc/DMF was employed for the first time as a mild mobile phase to effectively separate PAA and determine its molecular weight. After a series of conditional experiments, 0.02M LiBr/0.2M HAc/DMF was fixed as an optimized mobile phase to measure the relative and absolute molecular weights of (6FDA-DMB) PAA prepared, and the obtained Mw from GPC-MALLS and GPC-RI were 35,300 g/mol and 125,000 g/mol, respectively. Particularly, such a mobile phase is also applicable to other PAA samples with different structures, and the final results on molecular weight are also reproducible.

Keywords: Polyamic acids, Polyelectrolyte effects, Gel permeation chromatography, Mobile phase, Molecular weight

Procedia PDF Downloads 37
5880 Modern Nahwu's View about the Theory of Amil

Authors: Kisno Umbar

Abstract:

Arabic grammar (nahwu) is one of the most important disciplines to learn about the Islamic literature (kitab al-turats). In the last century, learning Arabic grammar was difficult for both the Arabian or non-Arabian native. Most of the traditional nahwu scholars viewed that the theory of amil is a major problem. The views had influenced large number of modern nahwu scholars, and some of them refuse the theory of amil to simplify Arabic grammar to make it easier. The aim of the study is to compare many views of the modern nahwu scholars about the theory of amil including their reasons. In addition, the study is to reveal whether they follow classic scholars or give a view. The author uses literature study approach to get data of modern nahwu scholars from their books as a primary resource. As a secondary resource, the author uses the updated relevant researches from journals about the theory of amil. Besides, the author put on several resources from the traditional nahwu scholars to compare the views. The analysis showed the contrasting views about the theory of amil. Most of the scholars refuse the amil because it isn’t originally derived from Arabic tradition, but it is influenced by Aristotelian philosophy. The others persistently use the amil inasmuch as it is one of the characteristics that differ Arabic language and other languages.

Keywords: Arabic grammar, Amil, Arabic tradition, Aristotelian philosophy

Procedia PDF Downloads 137
5879 Accuracy Improvement of Traffic Participant Classification Using Millimeter-Wave Radar by Leveraging Simulator Based on Domain Adaptation

Authors: Tokihiko Akita, Seiichi Mita

Abstract:

A millimeter-wave radar is the most robust against adverse environments, making it an essential environment recognition sensor for automated driving. However, the reflection signal is sparse and unstable, so it is difficult to obtain the high recognition accuracy. Deep learning provides high accuracy even for them in recognition, but requires large scale datasets with ground truth. Specially, it takes a lot of cost to annotate for a millimeter-wave radar. For the solution, utilizing a simulator that can generate an annotated huge dataset is effective. Simulation of the radar is more difficult to match with real world data than camera image, and recognition by deep learning with higher-order features using the simulator causes further deviation. We have challenged to improve the accuracy of traffic participant classification by fusing simulator and real-world data with domain adaptation technique. Experimental results with the domain adaptation network created by us show that classification accuracy can be improved even with a few real-world data.

Keywords: millimeter-wave radar, object classification, deep learning, simulation, domain adaptation

Procedia PDF Downloads 77
5878 Assertion-Driven Test Repair Based on Priority Criteria

Authors: Ruilian Zhao, Shukai Zhang, Yan Wang, Weiwei Wang

Abstract:

Repairing broken test cases is an expensive and challenging task in evolving software systems. Although an automated repair technique with intent preservation has been proposed, but it does not take into account the association between test repairs and assertions, leading to a large number of irrelevant candidates and decreasing the repair capability. This paper proposes an assertion-driven test repair approach. Furthermore, an intent-oriented priority criterion is raised to guide the repair candidate generation, making the repairs closer to the intent of the test. In more detail, repair targets are determined through post-dominance relations between assertions and the methods that directly cause compilation errors. Then, test repairs are generated from the target in a bottom-up way, guided by the intent-oriented priority criteria. Finally, the generated repair candidates are prioritized to match the original test intent. The approach is implemented and evaluated on the benchmark of 4 open-source programs and 91 broken test cases. The result shows that the approach can fix 89% (81/91) of broken test cases, which is more effective than the existing intentpreserved test repair approach, and our intent-oriented priority criteria work well.

Keywords: test repair, test intent, software test, test case evolution

Procedia PDF Downloads 111
5877 Effect of Physicochemical Treatments on the Characteristics of Activated Sludge

Authors: Hammadi Larbi

Abstract:

The treatment of wastewater in sewage plants usually results in the formation of a large amount of sludge. These appear at the outlet of the treatment plant as a viscous fluid loaded with a high concentration of dry matter. This sludge production presents environmental, ecological, and economic risks. That is why it is necessary to find many solutions for minimizing these risks. In the present article, the effect of hydrogen peroxide, thermal treatment, and quicklime on the characteristics of the activated sludge produced in urban wastewater plant were evaluated in order to avoid any risk in the plants. The study shows increasing of the dose of H2O2 from 0 to 0.4 g causes an increase in the solubilization rate of COD from 12% to 45% and a reduction in the organic matter content of sludge (VM/SM) from 74% to 36% . The results also show that the optimum efficiency of the heat treatment corresponds to a temperature of 80 ° C for a treatment time of 40 min is 47% and 51.82% for a temperature equal to 100 ° C and 76.30 % for a temperature of 120 ° C, and 79.38% for a temperature of 140 ° C. The treatment of sludge by quicklime gives the optimum efficiency of 70.62 %. It was shown the increasing of the temperature from 80°C to 140°C, the pH of sludge was increased from 7.12 to 9.59. The obtained results showed that with increasing the dose of quicklime from 0 g/l to 1g/l in activated sludge led to an increase of their pH from 7.12 to 12.06. The study shows the increasing the dose of quicklime from 0 g/l to 1g/l causes also an increase in the solubilization of COD from 0% to 70.62 %

Keywords: activated sludge, hydrogen peroxide, thermal treatment, quicklime

Procedia PDF Downloads 87
5876 Unmanned Systems in Urban Areas

Authors: Abdullah Beyazkurk, Onur Ozdemir

Abstract:

The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations.

Keywords: technology, warfare, urban warfare, unmanned systems, unmanned ground vehicles, unmanned aerial vehicles

Procedia PDF Downloads 338
5875 Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: Anan Alssbaiheen, Steve Love

Abstract:

Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services.

Keywords: challenges, e-government, mobile government, opportunities

Procedia PDF Downloads 401
5874 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 417
5873 Global Navigation Satellite System and Precise Point Positioning as Remote Sensing Tools for Monitoring Tropospheric Water Vapor

Authors: Panupong Makvichian

Abstract:

Global Navigation Satellite System (GNSS) is nowadays a common technology that improves navigation functions in our life. Additionally, GNSS is also being employed on behalf of an accurate atmospheric sensor these times. Meteorology is a practical application of GNSS, which is unnoticeable in the background of people’s life. GNSS Precise Point Positioning (PPP) is a positioning method that requires data from a single dual-frequency receiver and precise information about satellite positions and satellite clocks. In addition, careful attention to mitigate various error sources is required. All the above data are combined in a sophisticated mathematical algorithm. At this point, the research is going to demonstrate how GNSS and PPP method is capable to provide high-precision estimates, such as 3D positions or Zenith tropospheric delays (ZTDs). ZTDs combined with pressure and temperature information allows us to estimate the water vapor in the atmosphere as precipitable water vapor (PWV). If the process is replicated for a network of GNSS sensors, we can create thematic maps that allow extract water content information in any location within the network area. All of the above are possible thanks to the advances in GNSS data processing. Therefore, we are able to use GNSS data for climatic trend analysis and acquisition of the further knowledge about the atmospheric water content.

Keywords: GNSS, precise point positioning, Zenith tropospheric delays, precipitable water vapor

Procedia PDF Downloads 184
5872 Facilitating Primary Care Practitioners to Improve Outcomes for People With Oropharyngeal Dysphagia Living in the Community: An Ongoing Realist Review

Authors: Caroline Smith, Professor Debi Bhattacharya, Sion Scott

Abstract:

Introduction: Oropharyngeal Dysphagia (OD) effects around 15% of older people, however it is often unrecognised and under diagnosed until they are hospitalised. There is a need for primary care healthcare practitioners (HCPs) to assume a proactive role in identifying and managing OD to prevent adverse outcomes such as aspiration pneumonia. Understanding the determinants of primary care HCPs undertaking this new behaviour provides the intervention targets for addressing. This realist review, underpinned by the Theoretical Domains Framework (TDF), aims to synthesise relevant literature and develop programme theories to understand what interventions work, how they work and under what circumstances to facilitate HCPs to prevent harm from OD. Combining realist methodology with behavioural science will permit conceptualisation of intervention components as theoretical behavioural constructs, thus informing the design of a future behaviour change intervention. Furthermore, through the TDF’s linkage to a taxonomy of behaviour change techniques, we will identify corresponding behaviour change techniques to include in this intervention. Methods & analysis: We are following the five steps for undertaking a realist review: 1) clarify the scope 2) Literature search 3) appraise and extract data 4) evidence synthesis 5) evaluation. We have searched Medline, Google scholar, PubMed, EMBASE, CINAHL, AMED, Scopus and PsycINFO databases. We are obtaining additional evidence through grey literature, snowball sampling, lateral searching and consulting the stakeholder group. Literature is being screened, evaluated and synthesised in Excel and Nvivo. We will appraise evidence in relation to its relevance and rigour. Data will be extracted and synthesised according to its relation to Initial programme theories (IPTs). IPTs were constructed after the preliminary literature search, informed by the TDF and with input from a stakeholder group of patient and public involvement advisors, general practitioners, speech and language therapists, geriatricians and pharmacists. We will follow the Realist and Meta-narrative Evidence Syntheses: Evolving Standards (RAMESES) quality and publication standards to report study results. Results: In this ongoing review our search has identified 1417 manuscripts with approximately 20% progressing to full text screening. We inductively generated 10 IPTs that hypothesise practitioners require: the knowledge to spot the signs and symptoms of OD; the skills to provide initial advice and support; and access to resources in their working environment to support them conducting these new behaviours. We mapped the 10 IPTs to 8 TDF domains and then generated a further 12 IPTs deductively using domain definitions to fulfil the remaining 6 TDF domains. Deductively generated IPTs broadened our thinking to consider domains such as ‘Emotion,’ ‘Optimism’ and ‘Social Influence’, e.g. If practitioners perceive that patients, carers and relatives expect initial advice and support, then they will be more likely to provide this, because they will feel obligated to do so. After prioritisation with stakeholders using a modified nominal group technique approach, a maximum of 10 IPTs will progress to test against the literature.

Keywords: behaviour change, deglutition disorders, primary healthcare, realist review

Procedia PDF Downloads 75
5871 Content of Trace Elements in Agricultural Soils from Central and Eastern Europe

Authors: S. Krustev, V. Angelova, K. Ivanov, P. Zaprjanova

Abstract:

Approximately a dozen trace elements are vital for the development of all plants and some other elements are significant for some species. Heavy metals do not belong to this group of elements that are essential to plants, but some of them such as copper and zinc, have a dual effect on their growth. Concentration levels of these elements in the different regions of the world vary considerably. Their high concentrations in some parts of Central and Eastern Europe cause concern for human health and degrade the quality of agricultural produce from these areas. This study aims to compare the prevalence and levels of the major trace elements in some rural areas of Central and Eastern Europe. Soil samples from different regions of the Czech Republic, Slovakia, Austria, Hungary, Serbia, Romania, Bulgaria and Greece far from large industrial centers have been studied. The main methods for their determination are the atomic spectral techniques – atomic absorption and plasma atomic emission. As a result of this study, data on microelements levels in soils of 17 points from the main grain-producing regions of Central and Eastern Europe are presented and systematized. The content of trace elements was in the range of 5.0-84.1 mg.kg⁻¹ for Cu, 0.3-1.4 mg.kg⁻¹ for Cd, 26.1-225.5 mg.kg⁻¹ for Zn, 235.5-788.6 mg.kg⁻¹ for Mn and 4.1-25.8 mg.kg⁻¹ for Pb.

Keywords: trace elements, heavy metals, agricultural soils, Central and Eastern Europe

Procedia PDF Downloads 153
5870 Modelling and Simulation of a Commercial Thermophilic Biogas Plant

Authors: Jeremiah L. Chukwuneke, Obiora E. Anisiji, Chinonso H. Achebe, Paul C. Okolie

Abstract:

This paper developed a mathematical model of a commercial biogas plant for urban area clean energy requirement. It identified biodegradable waste materials like domestic/city refuse as economically viable alternative source of energy. The mathematical formulation of the proposed gas plant follows the fundamental principles of thermodynamics, and further analyses were accomplished to develop an algorithm for evaluating the plant performance preferably in terms of daily production capacity. In addition, the capacity of the plant is equally estimated for a given cycle of operation and presented in time histories. A nominal 1500 m3 power gas plant was studied characteristically and its performance efficiency evaluated. It was observed that the rate of bio gas production is essentially a function of the reactor temperature, pH, substrate concentration, rate of degradation of the biomass, and the accumulation of matter in the system due to bacteria growth. The results of this study conform to a very large extent with reported empirical data of some existing plant and further model validations were conducted in line with classical records found in literature.

Keywords: energy and mass conservation, specific growth rate, thermophilic bacteria, temperature, rate of bio gas production

Procedia PDF Downloads 424
5869 Using Eye-Tracking to Investigate TEM Validity and Design

Authors: Cao Xi

Abstract:

This paper reports a study which used eye-tracking to examine the cognitive validity of TEM 8(Test for English Majors, Band 8). The study investigated test takers' reading patterns on four -item types using eye-tracking, and interviews. Thirty participants completed 22 items on a computer, with the Tobii X2 Eye Tracker recording their eye movements on screen. Eleven students further participated in a recall interview while viewing video footage of their gaze patterns on the test. The findings will indicate that first, different reading item types will employ different cognitive processes; then different reading patterns for stronger and weaker test takers’on each item types. The implication of this study is to provide recommendations for the use of eye tracking technology in language research.

Keywords: eye tracking, reading patterns, test for english majors, cognitive validity

Procedia PDF Downloads 136
5868 Standard Model-Like Higgs Decay into Displaced Heavy Neutrino Pairs in U(1)' Models

Authors: E. Accomando, L. Delle Rose, S. Moretti, E. Olaiya, C. Shepherd-Themistocleous

Abstract:

Heavy sterile neutrinos are almost ubiquitous in the class of Beyond Standard Model scenarios aimed at addressing the puzzle that emerged from the discovery of neutrino flavour oscillations, hence the need to explain their masses. In particular, they are necessary in a U(1)’ enlarged Standard Model (SM). We show that these heavy neutrinos can be rather long-lived producing distinctive displaced vertices and tracks. Indeed, depending on the actual decay length, they can decay inside a Large Hadron Collider (LHC) detector far from the main interaction point and can be identified in the inner tracking system or the muon chambers, emulated here through the Compact Muon Solenoid (CMS) detector parameters. Among the possible production modes of such heavy neutrino, we focus on their pair production mechanism in the SM Higgs decay, eventually yielding displaced lepton signatures following the heavy neutrino decays into weak gauge bosons. By employing well-established triggers available for the CMS detector and using the data collected by the end of the LHC Run 2, these signatures would prove to be accessible with negligibly small background. Finally, we highlight the importance that the exploitation of new triggers, specifically, displaced tri-lepton ones, could have for this displaced vertex search.

Keywords: beyond the standard model, displaced vertex, Higgs physics, neutrino physics

Procedia PDF Downloads 129
5867 Gas Lift Optimization to Improve Well Performance

Authors: Mohamed A. G. H. Abdalsadig, Amir Nourian, G. G. Nasr, Meisam Babaie

Abstract:

Gas lift optimization is becoming more important now a day in petroleum industry. A proper lift optimization can reduce the operating cost, increase the net present value (NPV) and maximize the recovery from the asset. A widely accepted definition of gas lift optimization is to obtain the maximum output under specified operating conditions. In addition, gas lift, a costly and indispensable means to recover oil from high depth reservoir entails solving the gas lift optimization problems. Gas lift optimization is a continuous process; there are two levels of production optimization. The total field optimization involves optimizing the surface facilities and the injection rate that can be achieved by standard tools softwares. Well level optimization can be achieved by optimizing the well parameters such as point of injection, injection rate, and injection pressure. All these aspects have been investigated and presented in this study by using experimental data and PROSPER simulation program. The results show that the well head pressure has a large influence on the gas lift performance and also proved that smart gas lift valve can be used to improve gas lift performance by controlling gas injection from down hole. Obtaining the optimum gas injection rate is important because excessive gas injection reduces production rate and consequently increases the operation cost.

Keywords: optimization, production rate, reservoir pressure effect, gas injection rate effect, gas injection pressure

Procedia PDF Downloads 397
5866 Executive Function in Youth With ADHD and ASD: A Systematic Review and Meta-analysis

Authors: Parker Townes, Prabdeep Panesar, Chunlin Liu, Soo Youn Lee, Dan Devoe, Paul D. Arnold, Jennifer Crosbie, Russell Schachar

Abstract:

Attention-deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are impairing childhood neurodevelopmental disorders with problems in executive functions. Executive functions are higher-level mental processes essential for daily functioning and goal attainment. There is genetic and neural overlap between ADHD and ASD. The aim of this meta-analysis was to evaluate if pediatric ASD and ADHD have distinct executive function profiles. This review was completed following Cochrane guidelines. Fifty-eight articles were identified through database searching, followed by a blinded screening in duplicate. A meta-analysis was performed for all task performance metrics evaluated by at least two articles. Forty-five metrics from 24 individual tasks underwent analysis. No differences were found between youth with ASD and ADHD in any domain under direct comparison. However, individuals with ASD and ADHD exhibited deficient attention, flexibility, visuospatial abilities, working memory, processing speed, and response inhibition compared to controls. No deficits in planning were noted in either disorder. Only 11 studies included a group with comorbid ASD+ADHD, making it difficult to determine whether common executive function deficits are a function of comorbidity. Further research is needed to determine if comorbidity accounts for the apparent commonality in executive function between ASD and ADHD.

Keywords: autism spectrum disorder, ADHD, neurocognition, executive function, youth

Procedia PDF Downloads 66
5865 Multi-Objective Electric Vehicle Charge Coordination for Economic Network Management under Uncertainty

Authors: Ridoy Das, Myriam Neaimeh, Yue Wang, Ghanim Putrus

Abstract:

Electric vehicles are a popular transportation medium renowned for potential environmental benefits. However, large and uncontrolled charging volumes can impact distribution networks negatively. Smart charging is widely recognized as an efficient solution to achieve both improved renewable energy integration and grid relief. Nevertheless, different decision-makers may pursue diverse and conflicting objectives. In this context, this paper proposes a multi-objective optimization framework to control electric vehicle charging to achieve both energy cost reduction and peak shaving. A weighted-sum method is developed due to its intuitiveness and efficiency. Monte Carlo simulations are implemented to investigate the impact of uncertain electric vehicle driving patterns and provide decision-makers with a robust outcome in terms of prospective cost and network loading. The results demonstrate that there is a conflict between energy cost efficiency and peak shaving, with the decision-makers needing to make a collaborative decision.

Keywords: electric vehicles, multi-objective optimization, uncertainty, mixed integer linear programming

Procedia PDF Downloads 168
5864 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 313
5863 Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era

Authors: Yi Yang

Abstract:

In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice.

Keywords: 'Internet Plus' era, webcast, copyright, protection dilemma

Procedia PDF Downloads 99
5862 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 102
5861 Numerical Analysis of the Effect of Height and Rate of Fluid Flow on a Stepped Spillway

Authors: Amir Abbas Kamanbedast, Abbas Saki

Abstract:

Stepped spillways are composed of several steps, which start from around the spillway crest and continue to the downstream heel. Recently, such spillways have been receiving increasing attention due to the significant effect of the associated stairs on the flow’s rate of energy dissipation. Energy dissipation in the stepped spillways across the overflow can be explained by the watercourse contact with the stairs (i.e., large, harsh surfaces). In this context, less energy must be dissipated at the end of the spillway, and, hence, a smaller (less expensive) energy-dissipating structure is required. In this study, a stepped spillway was simulated using the model Fluent 3, and a standard model was used to model the flow disturbance. For this purpose, the energy dissipation from the stepped spillway was investigated in terms of the different numbers of stairs involved. Using k-ε, the disturbances of the numerical method for velocity and of flow depth at the downstream overflow were obtained, and, then, the energy that was dissipated throughout the spillway was calculated. Our results showed that an increase in the number of stairs can considerably increase the amount of energy dissipation for the fixed, upstream energy. In addition, the results of the numerical analyses were provided as isobar and velocity curves so points that were sensitive to cavitation could be determined.

Keywords: stepped spillway, fluent software, turbulence model of k-ε, VOF model

Procedia PDF Downloads 282
5860 Weighted-Distance Sliding Windows and Cooccurrence Graphs for Supporting Entity-Relationship Discovery in Unstructured Text

Authors: Paolo Fantozzi, Luigi Laura, Umberto Nanni

Abstract:

The problem of Entity relation discovery in structured data, a well covered topic in literature, consists in searching within unstructured sources (typically, text) in order to find connections among entities. These can be a whole dictionary, or a specific collection of named items. In many cases machine learning and/or text mining techniques are used for this goal. These approaches might be unfeasible in computationally challenging problems, such as processing massive data streams. A faster approach consists in collecting the cooccurrences of any two words (entities) in order to create a graph of relations - a cooccurrence graph. Indeed each cooccurrence highlights some grade of semantic correlation between the words because it is more common to have related words close each other than having them in the opposite sides of the text. Some authors have used sliding windows for such problem: they count all the occurrences within a sliding windows running over the whole text. In this paper we generalise such technique, coming up to a Weighted-Distance Sliding Window, where each occurrence of two named items within the window is accounted with a weight depending on the distance between items: a closer distance implies a stronger evidence of a relationship. We develop an experiment in order to support this intuition, by applying this technique to a data set consisting in the text of the Bible, split into verses.

Keywords: cooccurrence graph, entity relation graph, unstructured text, weighted distance

Procedia PDF Downloads 134
5859 Health Expenditure and Household Age Composition in India: Consequences for Health System Development

Authors: Milind Bharambe, Chander Shekhar

Abstract:

India is a vast country with its 1.21 billion population at the dawn of new decade, which accounts for one sixth of the global human capital in the world today. It is well known that health expenditure in India is dominated by private spending. This is an unfortunate consequence of India’s development because of large positive externality associated with health spending, which make health a merit good. This paper has used data from NSSO and Indian Government’s spending on health as reported by Ministry of Health and Family Welfare. Understanding of the dynamism of age-structure of the population would greatly optimize the expenditure on health care services. A country with good public health indicators is bound to possess good human capital which is an asset to the economic growth and indicator of development status of country. The paper tries to present the linkages between the health expenditure incurred by different states at various levels of demographic transition levels and the efficiency in utilization of health expenditure. It also looks into the way in which allocative efficiency health services can be improved. Paper tries to explore the per capita spending on health and how the demographic transition taking place in different states of India affect the required quantity and quality of health services.

Keywords: age structure, demographic transition, health expenditure, morbidity

Procedia PDF Downloads 388
5858 From Sound to Music: The Trajectory of Musical Semiotics in a Selected Soundscape Environment in South-Western Nigeria

Authors: Olatunbosun Samuel Adekogbe

Abstract:

This paper addresses the question of musical signification, revolving around nature and its natural divides; the paper tends to examine the roles of the dispositional apparatus of listeners to react to sounding environments through music as coordinated sound that focuses on the powerful strain between vibrational occurrences of sound and potentials of being structured. This paper sets out to examine music as a simple conventional design that does not allude to something beyond music and sound as a vehicle to communicate through production, perception, translation, and reaction with regard to melodic and semiotic functions of sounds. This paper adopts the application of questionnaire and evolutionary approach methods to probe musical adaptation, reproduction, and natural selection as the basis for explaining specific human behavioural responses to musical sense-making beyond the above-sketched dichotomies, with a major focus on the transition from acoustic-emotional sensibilities to musical meaning in the selected soundscapes. It was observed that music has emancipated itself from the level of mere acoustic processing of sounds to a functional description in terms of allowing music users to share experiences and interact with the soundscaping environment. The paper, therefore, concludes that the audience as music participants and listeners in the selected soundscapes have been conceived as adaptive devices in the paradigm shift, which can build up new semiotic linkages with the sounding environments in southwestern Nigeria.

Keywords: semiotics, sound, music, soundscape, environment

Procedia PDF Downloads 49
5857 Machine Learning Assisted Performance Optimization in Memory Tiering

Authors: Derssie Mebratu

Abstract:

As a large variety of micro services, web services, social graphic applications, and media applications are continuously developed, it is substantially vital to design and build a reliable, efficient, and faster memory tiering system. Despite limited design, implementation, and deployment in the last few years, several techniques are currently developed to improve a memory tiering system in a cloud. Some of these techniques are to develop an optimal scanning frequency; improve and track pages movement; identify pages that recently accessed; store pages across each tiering, and then identify pages as a hot, warm, and cold so that hot pages can store in the first tiering Dynamic Random Access Memory (DRAM) and warm pages store in the second tiering Compute Express Link(CXL) and cold pages store in the third tiering Non-Volatile Memory (NVM). Apart from the current proposal and implementation, we also develop a new technique based on a machine learning algorithm in that the throughput produced 25% improved performance compared to the performance produced by the baseline as well as the latency produced 95% improved performance compared to the performance produced by the baseline.

Keywords: machine learning, bayesian optimization, memory tiering, CXL, DRAM

Procedia PDF Downloads 82
5856 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs

Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk

Abstract:

It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.

Keywords: cross ABC method, customs supply chain, risk, risk management

Procedia PDF Downloads 360
5855 The Impact of Training Method on Programming Learning Performance

Authors: Chechen Liao, Chin Yi Yang

Abstract:

Although several factors that affect learning to program have been identified over the years, there continues to be no indication of any consensus in understanding why some students learn to program easily and quickly while others have difficulty. Seldom have researchers considered the problem of how to help the students enhance the programming learning outcome. The research had been conducted at a high school in Taiwan. Students participating in the study consist of 330 tenth grade students enrolled in the Basic Computer Concepts course with the same instructor. Two types of training methods-instruction-oriented and exploration-oriented were conducted. The result of this research shows that the instruction-oriented training method has better learning performance than exploration-oriented training method.

Keywords: learning performance, programming learning, TDD, training method

Procedia PDF Downloads 413
5854 Application of Pattern Recognition Technique to the Quality Characterization of Superficial Microstructures in Steel Coatings

Authors: H. Gonzalez-Rivera, J. L. Palmeros-Torres

Abstract:

This paper describes the application of traditional computer vision techniques as a procedure for automatic measurement of the secondary dendrite arm spacing (SDAS) from microscopic images. The algorithm is capable of finding the lineal or curve-shaped secondary column of the main microstructure, measuring its length size in a micro-meter and counting the number of spaces between dendrites. The automatic characterization was compared with a set of 1728 manually characterized images, leading to an accuracy of −0.27 µm for the length size determination and a precision of ± 2.78 counts for dendrite spacing counting, also reducing the characterization time from 7 hours to 2 minutes.

Keywords: dendrite arm spacing, microstructure inspection, pattern recognition, polynomial regression

Procedia PDF Downloads 33