Search results for: binary classifier
336 Separation of Oryzanol from Rice Bran Oil Using Silica: Equilibrium of Batch Adsorption
Authors: A. D. Susanti, W. B. Sediawan, S. K. Wirawan, Budhijanto, Ritmaleni
Abstract:
Rice bran oil contains significant amounts of oryzanol, a natural antioxidant that considered has higher antioxidant activity than vitamin E (tocopherol). Oryzanol reviewed has several health properties and interested in pharmacy, nutrition, and cosmetics. For practical usage, isolation and purification would be necessary due to the low concentration of oryzanol in crude rice bran oil (0.9-2.9%). Batch chromatography has proved as a promising process for the oryzanol recovery, but productivity was still low and scale-up processes of industrial interest have not yet been described. In order to improve productivity of batch chromatography, a continuous chromatography design namely Simulated Moving Bed (SMB) concept have been proposed. The SMB concept has interested for continuous commercial scale separation of binary system (oryzanol and rice bran oil), and rice bran oil still obtained as side product. Design of SMB chromatography for oryzanol separation requires quantification of its equilibrium. In this study, equilibrium of oryzanol separation conducted in batch adsorption using silica as the adsorbent and n-hexane/acetone (9:1) as the eluent. Three isotherm models, namely the Henry, Langmuir, and Freundlich equations, have been applied and modified for the experimental data to establish appropriate correlation for each sample. It turned out that the model quantitatively describe the equilibrium experimental data and will directed for design of SMB chromatography.Keywords: adsorption, equilibrium, oryzanol, rice bran oil, simulated moving bed
Procedia PDF Downloads 283335 3D Human Reconstruction over Cloud Based Image Data via AI and Machine Learning
Authors: Kaushik Sathupadi, Sandesh Achar
Abstract:
Human action recognition modeling is a critical task in machine learning. These systems require better techniques for recognizing body parts and selecting optimal features based on vision sensors to identify complex action patterns efficiently. Still, there is a considerable gap and challenges between images and videos, such as brightness, motion variation, and random clutters. This paper proposes a robust approach for classifying human actions over cloud-based image data. First, we apply pre-processing and detection, human and outer shape detection techniques. Next, we extract valuable information in terms of cues. We extract two distinct features: fuzzy local binary patterns and sequence representation. Then, we applied a greedy, randomized adaptive search procedure for data optimization and dimension reduction, and for classification, we used a random forest. We tested our model on two benchmark datasets, AAMAZ and the KTH Multi-view football datasets. Our HMR framework significantly outperforms the other state-of-the-art approaches and achieves a better recognition rate of 91% and 89.6% over the AAMAZ and KTH multi-view football datasets, respectively.Keywords: computer vision, human motion analysis, random forest, machine learning
Procedia PDF Downloads 36334 Machine Learning Classification of Fused Sentinel-1 and Sentinel-2 Image Data Towards Mapping Fruit Plantations in Highly Heterogenous Landscapes
Authors: Yingisani Chabalala, Elhadi Adam, Khalid Adem Ali
Abstract:
Mapping smallholder fruit plantations using optical data is challenging due to morphological landscape heterogeneity and crop types having overlapped spectral signatures. Furthermore, cloud covers limit the use of optical sensing, especially in subtropical climates where they are persistent. This research assessed the effectiveness of Sentinel-1 (S1) and Sentinel-2 (S2) data for mapping fruit trees and co-existing land-use types by using support vector machine (SVM) and random forest (RF) classifiers independently. These classifiers were also applied to fused data from the two sensors. Feature ranks were extracted using the RF mean decrease accuracy (MDA) and forward variable selection (FVS) to identify optimal spectral windows to classify fruit trees. Based on RF MDA and FVS, the SVM classifier resulted in relatively high classification accuracy with overall accuracy (OA) = 0.91.6% and kappa coefficient = 0.91% when applied to the fused satellite data. Application of SVM to S1, S2, S2 selected variables and S1S2 fusion independently produced OA = 27.64, Kappa coefficient = 0.13%; OA= 87%, Kappa coefficient = 86.89%; OA = 69.33, Kappa coefficient = 69. %; OA = 87.01%, Kappa coefficient = 87%, respectively. Results also indicated that the optimal spectral bands for fruit tree mapping are green (B3) and SWIR_2 (B10) for S2, whereas for S1, the vertical-horizontal (VH) polarization band. Including the textural metrics from the VV channel improved crop discrimination and co-existing land use cover types. The fusion approach proved robust and well-suited for accurate smallholder fruit plantation mapping.Keywords: smallholder agriculture, fruit trees, data fusion, precision agriculture
Procedia PDF Downloads 54333 Local Interpretable Model-agnostic Explanations (LIME) Approach to Email Spam Detection
Authors: Rohini Hariharan, Yazhini R., Blessy Maria Mathew
Abstract:
The task of detecting email spam is a very important one in the era of digital technology that needs effective ways of curbing unwanted messages. This paper presents an approach aimed at making email spam categorization algorithms transparent, reliable and more trustworthy by incorporating Local Interpretable Model-agnostic Explanations (LIME). Our technique assists in providing interpretable explanations for specific classifications of emails to help users understand the decision-making process by the model. In this study, we developed a complete pipeline that incorporates LIME into the spam classification framework and allows creating simplified, interpretable models tailored to individual emails. LIME identifies influential terms, pointing out key elements that drive classification results, thus reducing opacity inherent in conventional machine learning models. Additionally, we suggest a visualization scheme for displaying keywords that will improve understanding of categorization decisions by users. We test our method on a diverse email dataset and compare its performance with various baseline models, such as Gaussian Naive Bayes, Multinomial Naive Bayes, Bernoulli Naive Bayes, Support Vector Classifier, K-Nearest Neighbors, Decision Tree, and Logistic Regression. Our testing results show that our model surpasses all other models, achieving an accuracy of 96.59% and a precision of 99.12%.Keywords: text classification, LIME (local interpretable model-agnostic explanations), stemming, tokenization, logistic regression.
Procedia PDF Downloads 47332 A Hybrid Expert System for Generating Stock Trading Signals
Authors: Hosein Hamisheh Bahar, Mohammad Hossein Fazel Zarandi, Akbar Esfahanipour
Abstract:
In this paper, a hybrid expert system is developed by using fuzzy genetic network programming with reinforcement learning (GNP-RL). In this system, the frame-based structure of the system uses the trading rules extracted by GNP. These rules are extracted by using technical indices of the stock prices in the training time period. For developing this system, we applied fuzzy node transition and decision making in both processing and judgment nodes of GNP-RL. Consequently, using these method not only did increase the accuracy of node transition and decision making in GNP's nodes, but also extended the GNP's binary signals to ternary trading signals. In the other words, in our proposed Fuzzy GNP-RL model, a No Trade signal is added to conventional Buy or Sell signals. Finally, the obtained rules are used in a frame-based system implemented in Kappa-PC software. This developed trading system has been used to generate trading signals for ten companies listed in Tehran Stock Exchange (TSE). The simulation results in the testing time period shows that the developed system has more favorable performance in comparison with the Buy and Hold strategy.Keywords: fuzzy genetic network programming, hybrid expert system, technical trading signal, Tehran stock exchange
Procedia PDF Downloads 332331 Linguistic Features for Sentence Difficulty Prediction in Aspect-Based Sentiment Analysis
Authors: Adrian-Gabriel Chifu, Sebastien Fournier
Abstract:
One of the challenges of natural language understanding is to deal with the subjectivity of sentences, which may express opinions and emotions that add layers of complexity and nuance. Sentiment analysis is a field that aims to extract and analyze these subjective elements from text, and it can be applied at different levels of granularity, such as document, paragraph, sentence, or aspect. Aspect-based sentiment analysis is a well-studied topic with many available data sets and models. However, there is no clear definition of what makes a sentence difficult for aspect-based sentiment analysis. In this paper, we explore this question by conducting an experiment with three data sets: ”Laptops”, ”Restaurants”, and ”MTSC” (Multi-Target-dependent Sentiment Classification), and a merged version of these three datasets. We study the impact of domain diversity and syntactic diversity on difficulty. We use a combination of classifiers to identify the most difficult sentences and analyze their characteristics. We employ two ways of defining sentence difficulty. The first one is binary and labels a sentence as difficult if the classifiers fail to correctly predict the sentiment polarity. The second one is a six-level scale based on how many of the top five best-performing classifiers can correctly predict the sentiment polarity. We also define 9 linguistic features that, combined, aim at estimating the difficulty at sentence level.Keywords: sentiment analysis, difficulty, classification, machine learning
Procedia PDF Downloads 89330 Automatic Staging and Subtype Determination for Non-Small Cell Lung Carcinoma Using PET Image Texture Analysis
Authors: Seyhan Karaçavuş, Bülent Yılmaz, Ömer Kayaaltı, Semra İçer, Arzu Taşdemir, Oğuzhan Ayyıldız, Kübra Eset, Eser Kaya
Abstract:
In this study, our goal was to perform tumor staging and subtype determination automatically using different texture analysis approaches for a very common cancer type, i.e., non-small cell lung carcinoma (NSCLC). Especially, we introduced a texture analysis approach, called Law’s texture filter, to be used in this context for the first time. The 18F-FDG PET images of 42 patients with NSCLC were evaluated. The number of patients for each tumor stage, i.e., I-II, III or IV, was 14. The patients had ~45% adenocarcinoma (ADC) and ~55% squamous cell carcinoma (SqCCs). MATLAB technical computing language was employed in the extraction of 51 features by using first order statistics (FOS), gray-level co-occurrence matrix (GLCM), gray-level run-length matrix (GLRLM), and Laws’ texture filters. The feature selection method employed was the sequential forward selection (SFS). Selected textural features were used in the automatic classification by k-nearest neighbors (k-NN) and support vector machines (SVM). In the automatic classification of tumor stage, the accuracy was approximately 59.5% with k-NN classifier (k=3) and 69% with SVM (with one versus one paradigm), using 5 features. In the automatic classification of tumor subtype, the accuracy was around 92.7% with SVM one vs. one. Texture analysis of FDG-PET images might be used, in addition to metabolic parameters as an objective tool to assess tumor histopathological characteristics and in automatic classification of tumor stage and subtype.Keywords: cancer stage, cancer cell type, non-small cell lung carcinoma, PET, texture analysis
Procedia PDF Downloads 326329 Evaluation of Machine Learning Algorithms and Ensemble Methods for Prediction of Students’ Graduation
Authors: Soha A. Bahanshal, Vaibhav Verdhan, Bayong Kim
Abstract:
Graduation rates at six-year colleges are becoming a more essential indicator for incoming fresh students and for university rankings. Predicting student graduation is extremely beneficial to schools and has a huge potential for targeted intervention. It is important for educational institutions since it enables the development of strategic plans that will assist or improve students' performance in achieving their degrees on time (GOT). A first step and a helping hand in extracting useful information from these data and gaining insights into the prediction of students' progress and performance is offered by machine learning techniques. Data analysis and visualization techniques are applied to understand and interpret the data. The data used for the analysis contains students who have graduated in 6 years in the academic year 2017-2018 for science majors. This analysis can be used to predict the graduation of students in the next academic year. Different Predictive modelings such as logistic regression, decision trees, support vector machines, Random Forest, Naïve Bayes, and KNeighborsClassifier are applied to predict whether a student will graduate. These classifiers were evaluated with k folds of 5. The performance of these classifiers was compared based on accuracy measurement. The results indicated that Ensemble Classifier achieves better accuracy, about 91.12%. This GOT prediction model would hopefully be useful to university administration and academics in developing measures for assisting and boosting students' academic performance and ensuring they graduate on time.Keywords: prediction, decision trees, machine learning, support vector machine, ensemble model, student graduation, GOT graduate on time
Procedia PDF Downloads 72328 An Adaptive Application of Emotionally Focused Couple Therapy with Trans and Nonbinary Couples
Authors: Reihaneh Mahdavishahri, Dumayi Gutierrez
Abstract:
Emotionally focused couple therapy (EFCT) is one of the most effective and evidence-based approaches to couple therapy. Yet, literature is scarce of its effective application with trans and non-binary couples. It is estimated that 1.4 million trans adults live in the United Stated, with about 40% of these individuals experiencing serious psychological distress within the past month. Trans and nonbinary adults are significantly likely to experience discrimination, harassment, family rejection, and relationship challenges throughout the course of their lives. As systemic therapists, applying an informed lens when working with trans and nonbinary couples can contribute to providing effective mental health care to these individuals. This paper aims to provide a comprehensive, intersectional, and culturally informed application of EFCT with trans and nonbinary couples. We will address the current literature on applications of EFCT with diverse couples, EFCT’s strengths and limitations on cultural humility, and the gaps within current systems of care for trans and nonbinary couples. We will then provide an adaptive application of EFCT to help trans, and nonbinary couples recover from potential attachment injuries in their relationships, intersecting gender minority stressors, and achieve healing and restoration in their interpersonal dynamics.Keywords: attachment, culturally informed care, emotionally focused couple therapy, trans and nonbinary couples
Procedia PDF Downloads 74327 Identification of Spam Keywords Using Hierarchical Category in C2C E-Commerce
Authors: Shao Bo Cheng, Yong-Jin Han, Se Young Park, Seong-Bae Park
Abstract:
Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like e-bay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C e-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C e-commerce.Keywords: spam keyword, e-commerce, keyword features, spam filtering
Procedia PDF Downloads 294326 Analysis of Interpolation Factor in Pulse Shaping Filter on MRC for CDMA 2000 Systems
Authors: Pankaj Verma, Gagandeep Singh Walia, Padma Devi, H. P. Singh
Abstract:
Code Division Multiple Access 2000 operates on various RF channel bandwidths 1.2288 or 3.6864 Mcps. CDMA offers high bandwidth and wireless broadband services but the efficiency gets decreased because of many interfering factors like fading, interference, scattering, diffraction, refraction, reflection etc. To reduce the spectral bandwidth is one of the major concerns in modern day technology and this is achieved by pulse shaping filter. This paper investigates the effect of diversity (MRC), interpolation factor in Root Raised Cosine (RRC) filter for the QPSK and BPSK modulation schemes. It is made possible to send information with minimum inter symbol interference and within limited bandwidth with proper pulse shaping technique. Bit error rate (BER) performance is analyzed by applying diversity technique by varying the interpolation factor for Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK). Interpolation factor increases the original sampling rate of a sequence to a higher rate and reduces the interference and diversity reduces the fading.Keywords: CDMA2000, root raised cosine, roll off factor, ISI, diversity, interference, fading
Procedia PDF Downloads 475325 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks
Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram
Abstract:
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.Keywords: backoff, contention window, CWMIDB, MANET
Procedia PDF Downloads 277324 The Thermal Properties of Nano Magnesium Hydroxide Blended with LDPE/EVA/Irganox1010 for Insulator Application
Authors: Ahmad Aroziki Abdul Aziz, Sakinah Mohd Alauddin, Ruzitah Mohd Salleh, Mohammed Iqbal Shueb
Abstract:
This paper illustrates the effect of nano Magnesium Hydroxide (MH) loading on the thermal properties of Low Density Polyethylene (LDPE)/ Poly (ethylene-co vinyl acetate)(EVA) nano composite. Thermal studies were conducted, as it understanding is vital for preliminary development of new polymeric systems. Thermal analysis of nano composite was conducted using thermo gravimetric analysis (TGA), and differential scanning calorimetry (DSC). Major finding of TGA indicated two main stages of degradation process found at (350 ± 25 oC) and (480 ± 25 oC) respectively. Nano metal filler expressed better fire resistance as it stand over high degree of temperature. Furthermore, DSC analysis provided a stable glass temperature around 51 (±1 oC) and captured double melting point at 84 (±2 oC) and 108 (±2 oC). This binary melting point reflects the modification of nano filler to the polymer matrix forming melting crystals of folded and extended chain. The percent crystallinity of the samples grew vividly with increasing filler content. Overall, increasing the filler loading improved the degradation temperature and weight loss evidently and a better process and phase stability was captured in DSC.Keywords: thermal properties, nano MH, nano particles, cable and wire, LDPE/EVA
Procedia PDF Downloads 451323 Artificial Intelligence-Based Chest X-Ray Test of COVID-19 Patients
Authors: Dhurgham Al-Karawi, Nisreen Polus, Shakir Al-Zaidi, Sabah Jassim
Abstract:
The management of COVID-19 patients based on chest imaging is emerging as an essential tool for evaluating the spread of the pandemic which has gripped the global community. It has already been used to monitor the situation of COVID-19 patients who have issues in respiratory status. There has been increase to use chest imaging for medical triage of patients who are showing moderate-severe clinical COVID-19 features, this is due to the fast dispersal of the pandemic to all continents and communities. This article demonstrates the development of machine learning techniques for the test of COVID-19 patients using Chest X-Ray (CXR) images in nearly real-time, to distinguish the COVID-19 infection with a significantly high level of accuracy. The testing performance has covered a combination of different datasets of CXR images of positive COVID-19 patients, patients with viral and bacterial infections, also, people with a clear chest. The proposed AI scheme successfully distinguishes CXR scans of COVID-19 infected patients from CXR scans of viral and bacterial based pneumonia as well as normal cases with an average accuracy of 94.43%, sensitivity 95%, and specificity 93.86%. Predicted decisions would be supported by visual evidence to help clinicians speed up the initial assessment process of new suspected cases, especially in a resource-constrained environment.Keywords: COVID-19, chest x-ray scan, artificial intelligence, texture analysis, local binary pattern transform, Gabor filter
Procedia PDF Downloads 145322 Models to Calculate Lattice Spacing, Melting Point and Lattice Thermal Expansion of Ga₂Se₃ Nanoparticles
Authors: Mustafa Saeed Omar
Abstract:
The formula which contains the maximum increase of mean bond length, melting entropy and critical particle radius is used to calculate lattice volume in nanoscale size crystals of Ga₂Se₃. This compound belongs to the binary group of III₂VI₃. The critical radius is calculated from the values of the first surface atomic layer height which is equal to 0.336nm. The size-dependent mean bond length is calculated by using an equation-free from fitting parameters. The size-dependent lattice parameter then is accordingly used to calculate the size-dependent lattice volume. The lattice size in the nanoscale region increases to about 77.6 A³, which is up to four times of its bulk state value 19.97 A³. From the values of the nanosize scale dependence of lattice volume, the nanoscale size dependence of melting temperatures is calculated. The melting temperature decreases with the nanoparticles size reduction, it becomes zero when the radius reaches to its critical value. Bulk melting temperature for Ga₂Se₃, for example, has values of 1293 K. From the size-dependent melting temperature and mean bond length, the size-dependent lattice thermal expansion is calculated. Lattice thermal expansion decreases with the decrease of nanoparticles size and reaches to its minimum value as the radius drops down to about 5nm.Keywords: Ga₂Se₃, lattice volume, lattice thermal expansion, melting point, nanoparticles
Procedia PDF Downloads 168321 Comparison between Separable and Irreducible Goppa Code in McEliece Cryptosystem
Authors: Newroz Nooralddin Abdulrazaq, Thuraya Mahmood Qaradaghi
Abstract:
The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this work Irreducible and Separable Goppa codes have been introduced. The Irreducible and Separable Goppa codes used are with flexible parameters and dynamic error vectors. A Comparison between Separable and Irreducible Goppa code in McEliece Cryptosystem has been done. For encryption stage, to get better result for comparison, two types of testing have been chosen; in the first one the random message is constant while the parameters of Goppa code have been changed. But for the second test, the parameters of Goppa code are constant (m=8 and t=10) while the random message have been changed. The results show that the time needed to calculate parity check matrix in separable are higher than the one for irreducible McEliece cryptosystem, which is considered expected results due to calculate extra parity check matrix in decryption process for g2(z) in separable type, and the time needed to execute error locator in decryption stage in separable type is better than the time needed to calculate it in irreducible type. The proposed implementation has been done by Visual studio C#.Keywords: McEliece cryptosystem, Goppa code, separable, irreducible
Procedia PDF Downloads 266320 Vehicle Speed Estimation Using Image Processing
Authors: Prodipta Bhowmik, Poulami Saha, Preety Mehra, Yogesh Soni, Triloki Nath Jha
Abstract:
In India, the smart city concept is growing day by day. So, for smart city development, a better traffic management and monitoring system is a very important requirement. Nowadays, road accidents increase due to more vehicles on the road. Reckless driving is mainly responsible for a huge number of accidents. So, an efficient traffic management system is required for all kinds of roads to control the traffic speed. The speed limit varies from road to road basis. Previously, there was a radar system but due to high cost and less precision, the radar system is unable to become favorable in a traffic management system. Traffic management system faces different types of problems every day and it has become a researchable topic on how to solve this problem. This paper proposed a computer vision and machine learning-based automated system for multiple vehicle detection, tracking, and speed estimation of vehicles using image processing. Detection of vehicles and estimating their speed from a real-time video is tough work to do. The objective of this paper is to detect vehicles and estimate their speed as accurately as possible. So for this, a real-time video is first captured, then the frames are extracted from that video, then from that frames, the vehicles are detected, and thereafter, the tracking of vehicles starts, and finally, the speed of the moving vehicles is estimated. The goal of this method is to develop a cost-friendly system that can able to detect multiple types of vehicles at the same time.Keywords: OpenCV, Haar Cascade classifier, DLIB, YOLOV3, centroid tracker, vehicle detection, vehicle tracking, vehicle speed estimation, computer vision
Procedia PDF Downloads 84319 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 320318 Association Between Hip Internal and External Rotation Range of Motion and Low Back Pain in Table Tennis Players
Authors: Kaili Wang, Botao Zhang, Enming Zhang
Abstract:
Background: Low back pain (LBP) is a common problem affecting athletes' training and competition. Although the association between a limited hip range of motion and prevalence of low back pain has been studied extensively, it has not been studied in table tennis. Aim: The main purposes of this study in table tennis players were (1) to investigate if there is a difference in hip internal rotation (HIR) and external rotation (HER) range of motion (ROM) between players with LBP and players without LBP and (2) to analyze the association between HIR and HER ROM and LBP. Methods: Forty-six table tennis players from the Chinese table tennis team were evaluated for passive maximum HIR and HER ROM. LBP was retrospectively recorded for the last 12 months before the date of ROM assessment by a physical therapist. The data were analyzed the difference in HIR and HER ROM between players with LBP and players without LBP by Mann-Whitney U test, and the association between the difference in HIR and HER ROM and LBP was analyzed via a binary logistic regression. Results: The 54% of players had developed LBP during the retrospective study period. Significant difference between LBP group and the asymptomatic group for HIR ROM (z=4.007, p<0.001) was observed. Difference between LBP group and asymptomatic group for HER ROM (z=1.117, p=0.264) was not significant. Players who had HIR ROM deficit had an increased risk of LBP compared with players without HIR ROM deficit (OR=5.344, 95%CI: 1.006-28.395, P=0.049). Conclusion: HIR ROM of a table tennis player with LBP was less than a table tennis player without LBP. Compared with player whose HIR ROM was normal, player who had HIR ROM deficit appeared to have a higher risk for LBP.Keywords: assessment, injury prevention, low back pain, table tennis players
Procedia PDF Downloads 111317 Examining Motivational Strategies of Foreign Manufacturing Firms in Ghana
Authors: Samuel Ato Dadzie
Abstract:
The objective of this study is to examine the influence of eclectic paradigm on motivational strategy of foreign subsidiaries in Ghana. This study uses binary regression model, and the analysis was based on 75 manufacturing investments made by MNEs from different countries in 1994–2008. The results indicated that perceived market size increases the probability of foreign firms undertaking a market seeking (MS) in Ghana, while perceived cultural distance between Ghana and foreign firm’s home countries decreased the probability of foreign firms undertaking an market seeking (MS) foreign direct investment (FDI) in Ghana. Furthermore, extensive international experience decreases the probability of foreign firms undertaking a market seeking (MS) foreign direct investment (FDI) in Ghana. Most of the studies done by earlier researchers were based on the advanced and emerging countries and offered support for the theory, which was used in generalizing the result that multinational corporations (MNCs) normally used the theory regarding investment strategy outside their home country. In using the same theory in the context of Ghana, the result does not offer strong support for the theory. This means that MNCs that come to Sub-Sahara Africa cannot rely much on eclectic paradigm for their motivational strategies because prevailing economic conditions in Ghana are different from that of the advanced and emerging economies where the institutional structures work.Keywords: foreign subsidiary, motives, Ghana, foreign direct investment
Procedia PDF Downloads 433316 Simultaneous Targeting of MYD88 and Nur77 as an Effective Approach for the Treatment of Inflammatory Diseases
Authors: Uzma Saqib, Mirza S. Baig
Abstract:
Myeloid differentiation primary response protein 88 (MYD88) has long been considered a central player in the inflammatory pathway. Recent studies clearly suggest that it is an important therapeutic target in inflammation. On the other hand, a recent study on the interaction between the orphan nuclear receptor (Nur77) and p38α, leading to increased lipopolysaccharide-induced hyperinflammatory response, suggests this binary complex as a therapeutic target. In this study, we have designed inhibitors that can inhibit both MYD88 and Nur77 at the same time. Since both MYD88 and Nur77 are an integral part of the pathways involving lipopolysaccharide-induced activation of NF-κB-mediated inflammation, we tried to target both proteins with the same library in order to retrieve compounds having dual inhibitory properties. To perform this, we developed a homodimeric model of MYD88 and, along with the crystal structure of Nur77, screened a virtual library of compounds from the traditional Chinese medicine database containing ~61,000 compounds. We analyzed the resulting hits for their efficacy for dual binding and probed them for developing a common pharmacophore model that could be used as a prototype to screen compound libraries as well as to guide combinatorial library design to search for ideal dual-target inhibitors. Thus, our study explores the identification of novel leads having dual inhibiting effects due to binding to both MYD88 and Nur77 targets.Keywords: drug design, Nur77, MYD88, inflammation
Procedia PDF Downloads 305315 Studies on Interaction between Anionic Polymer Sodium Carboxymethylcellulose with Cationic Gemini Surfactants
Authors: M. Kamil, Rahber Husain Khan
Abstract:
In the present study, the Interaction of anionic polymer, sodium carboxymethylcellulose (NaCMC), with cationic gemini surfactants 2,2[(oxybis(ethane-1,2-diyl))bis(oxy)]bis(N-hexadecyl1-N,N-[di(E2)/tri(E3)]methyl1-2-oxoethanaminium)chloride (16-E2-16 and 16-E3-16) and conventional surfactant (CTAC) in aqueous solutions have been studied by surface tension measurement of binary mixtures (0.0- 0.5 wt% NaCMC and 1 mM gemini surfactant/10 mM CTAC solution). Surface tension measurements were used to determine critical aggregation concentration (CAC) and critical micelle concentration (CMC). The maximum surface excess concentration (Ґmax) at the air-water interface was evaluated by the Gibbs adsorption equation. The minimum area per surfactant molecule was evaluated, which indicates the surfactant-polymer Interaction in a mixed system. The effect of changing surfactant chain length on CAC and CMC values of mixed polymer-surfactant systems was examined. From the results, it was found that the gemini surfactant interacts strongly with NaCMC as compared to its corresponding monomeric counterpart CTAC. In these systems, electrostatic interactions predominate. The lowering of surface tension with an increase in the concentration of surfactants is higher in the case of gemini surfactants almost 10-15 times. The measurements indicated that the Interaction between NaCMC-CTAC resulted in complex formation. The volume of coacervate increases with an increase in CTAC concentration; however, above 0.1 wt. % concentration coacervate vanishes.Keywords: anionic polymer, gemni surfactants, tensiometer, CMC, interaction
Procedia PDF Downloads 89314 Continuum of Maternal Care in Non Empowered Action Group States of India: Evidence from District Level Household Survey-IV
Authors: Rasikha Ramanand, Priyanka Dixit
Abstract:
Background: Continuum of maternal care which includes antenatal care, delivery care and postnatal care aids in averting maternal deaths. The objective of this paper is to identify the association between previous experiences of child death on Continuum of Care (CoC) of recent child. Further, the study aimed at understanding where the drop-out rate was high in the continuum. Methods: The study was based on the Nation-wide District Level Household and Facility Survey (DLHS-4) conducted during 2012-13, which provides information on antenatal care, delivery care, percentage of women who received JSY benefits, percentage of women who had any pregnancy, delivery, the place of delivery etc. The sample included women who were selected from the non-EAG states who delivered at least two children. The data were analyzed using SPSS 20.Binary Logistic regression was applied to the data in which the Continuum of Care (CoC) was the dependent variable while the independent variables were entered as the covariates. Results: A major finding of the study was the antenatal to delivery care period where the drop-out rates were high. Also, it was found that a large proportion of women did not receive any of the services along the continuum. Conclusions: This study has clearly established the relationship between previous history of child loss and continuum of maternal care.Keywords: antenatal care, continuum of care, child loss, delivery care, India, maternal health care, postnatal care
Procedia PDF Downloads 403313 City-Wide Simulation on the Effects of Optimal Appliance Scheduling in a Time-of-Use Residential Environment
Authors: Rudolph Carl Barrientos, Juwaln Diego Descallar, Rainer James Palmiano
Abstract:
Household Appliance Scheduling Systems (HASS) coupled with a Time-of-Use (TOU) pricing scheme, a form of Demand Side Management (DSM), is not widely utilized in the Philippines’ residential electricity sector. This paper’s goal is to encourage distribution utilities (DUs) to adopt HASS and TOU by analyzing the effect of household schedulers on the electricity price and load profile in a residential environment. To establish this, a city based on an implemented survey is generated using Monte Carlo Analysis (MCA). Then, a Binary Particle Swarm Optimization (BPSO) algorithm-based HASS is developed considering user satisfaction, electricity budget, appliance prioritization, energy storage systems, solar power, and electric vehicles. The simulations were assessed under varying levels of user compliance. Results showed that the average electricity cost, peak demand, and peak-to-average ratio (PAR) of the city load profile were all reduced. Therefore, the deployment of the HASS and TOU pricing scheme is beneficial for both stakeholders.Keywords: appliance scheduling, DSM, TOU, BPSO, city-wide simulation, electric vehicle, appliance prioritization, energy storage system, solar power
Procedia PDF Downloads 98312 The Effect of Internal Electrical Ion Mobility on Molten Salts through Atomistic Simulations
Authors: Carlos F. Sanz-Navarro, Sonia Fereres
Abstract:
Binary and ternary mixtures of molten salts are excellent thermal energy storage systems and have been widely used in commercial tanks both in nuclear and solar thermal applications. However, the energy density of the commercially used mixtures is still insufficient, and therefore, new systems based on latent heat storage (or phase change materials, PCM) are currently being investigated. In order to shed some light on the macroscopic physical properties of the molten salt phases, knowledge of the microscopic structure and dynamics is required. Several molecular dynamics (MD) simulations have been performed to model the thermal behavior of (Li,K)2CO3 mixtures. Up to this date, this particular molten salt mixture has not been extensively studied but it is of fundamental interest for understanding the behavior of other commercial salts. Molten salt diffusivities, the internal electrical ion mobility, and the physical properties of the solid-liquid phase transition have been calculated and compared to available data from literature. The effect of anion polarization and the application of a strong external electric field have also been investigated. The influence of electrical ion mobility on local composition is explained through the Chemla effect, well known in electrochemistry. These results open a new way to design optimal high temperature energy storage materials.Keywords: atomistic simulations, thermal storage, latent heat, molten salt, ion mobility
Procedia PDF Downloads 326311 The Relation between the Organizational Trust Level and Organizational Justice Perceptions of Staff in Konya Municipality: A Theoretical and Empirical Study
Authors: Handan Ertaş
Abstract:
The aim of the study is to determine the relationship between organizational trust level and organizational justice of Municipality officials. Correlational method has been used via descriptive survey model and Organizational Justice Perception Scale, Organizational Trust Inventory and Interpersonal Trust Scale have been applied to 353 participants who work in Konya Metropolitan Municipality and central district municipalities in the study. Frequency as statistical method, Independent Samples t test for binary groups, One Way-ANOVA analyses for multi-groups and Pearson Correlation analysis have been used to determine the relation in the data analysis process. It has been determined in the outcomes of the study that participants have high level of organizational trust, “Interpersonal Trust” is in the first place and there is a significant difference in the favor of male officials in terms of Trust on the Organization Itself and Interpersonal Trust. It has also been understood that officials in district municipalities have higher perception level in all dimensions, there is a significant difference in Trust on the Organization sub-dimension and work status is an important factor on organizational trust perception. Moreover, the study has shown that organizational justice implementations are important in raising trust of official on the organization, administrator and colleagues, and there is a parallel relation between Organizational Trust components and Organizational Trust dimensions.Keywords: organizational trust level, organizational justice perceptions, staff, Konya
Procedia PDF Downloads 347310 Iris Recognition Based on the Low Order Norms of Gradient Components
Authors: Iman A. Saad, Loay E. George
Abstract:
Iris pattern is an important biological feature of human body; it becomes very hot topic in both research and practical applications. In this paper, an algorithm is proposed for iris recognition and a simple, efficient and fast method is introduced to extract a set of discriminatory features using first order gradient operator applied on grayscale images. The gradient based features are robust, up to certain extents, against the variations may occur in contrast or brightness of iris image samples; the variations are mostly occur due lightening differences and camera changes. At first, the iris region is located, after that it is remapped to a rectangular area of size 360x60 pixels. Also, a new method is proposed for detecting eyelash and eyelid points; it depends on making image statistical analysis, to mark the eyelash and eyelid as a noise points. In order to cover the features localization (variation), the rectangular iris image is partitioned into N overlapped sub-images (blocks); then from each block a set of different average directional gradient densities values is calculated to be used as texture features vector. The applied gradient operators are taken along the horizontal, vertical and diagonal directions. The low order norms of gradient components were used to establish the feature vector. Euclidean distance based classifier was used as a matching metric for determining the degree of similarity between the features vector extracted from the tested iris image and template features vectors stored in the database. Experimental tests were performed using 2639 iris images from CASIA V4-Interival database, the attained recognition accuracy has reached up to 99.92%.Keywords: iris recognition, contrast stretching, gradient features, texture features, Euclidean metric
Procedia PDF Downloads 335309 Fake News Detection Based on Fusion of Domain Knowledge and Expert Knowledge
Authors: Yulan Wu
Abstract:
The spread of fake news on social media has posed significant societal harm to the public and the nation, with its threats spanning various domains, including politics, economics, health, and more. News on social media often covers multiple domains, and existing models studied by researchers and relevant organizations often perform well on datasets from a single domain. However, when these methods are applied to social platforms with news spanning multiple domains, their performance significantly deteriorates. Existing research has attempted to enhance the detection performance of multi-domain datasets by adding single-domain labels to the data. However, these methods overlook the fact that a news article typically belongs to multiple domains, leading to the loss of domain knowledge information contained within the news text. To address this issue, research has found that news records in different domains often use different vocabularies to describe their content. In this paper, we propose a fake news detection framework that combines domain knowledge and expert knowledge. Firstly, it utilizes an unsupervised domain discovery module to generate a low-dimensional vector for each news article, representing domain embeddings, which can retain multi-domain knowledge of the news content. Then, a feature extraction module uses the domain embeddings discovered through unsupervised domain knowledge to guide multiple experts in extracting news knowledge for the total feature representation. Finally, a classifier is used to determine whether the news is fake or not. Experiments show that this approach can improve multi-domain fake news detection performance while reducing the cost of manually labeling domain labels.Keywords: fake news, deep learning, natural language processing, multiple domains
Procedia PDF Downloads 73308 The Effect of Probiotic Bacteria on Aflatoxin M1 Detoxification in Phosphate Buffer Saline
Authors: Sumeyra Sevim, Gulsum Gizem Topal, Mercan Merve Tengilimoglu-Metin, Mevlude Kizil
Abstract:
Aflatoxin M1 (AFM1) is a major toxic and carcinogenic molecule in milk and milk products. Therefore, it poses a risk for public health. Probiotics can be biological agent to remove AFM1. The aim of this study is to evaluate the effect of probiotic bacteria on AFM1 detoxification in phosphate buffer saline. The PBS samples artificially contaminated with AFM1 at concentration 100 pg/ml were prepared with probiotics bacteria that including monoculture (L. plantarum, B. bifidum ATCC, B. animalis ATCC 27672) and binary culture (L. bulgaricus + S. thermophiles, B. bifidum ATCC + B. animalis ATCC 27672, L. plantarum+B. bifidum ATCC, L. plantarum+ B. animalis ATCC 27672). The samples were incubated at 37°C for 4 hours and stored for 1, 5 and 10 days. The toxin was measured by the ELISA. The highest levels of AFM1 binding ability (63.6%) in PBS were detected yoghurt starter bacteria, while L. plantarum had the lowest levels of AFM1 binding ability (35.5%) in PBS. In addition, it was found that there was significant effect of storage on AFM1 binding ability in all groups except the one including B. animalis (p < 0.05). Consequently, results demonstrate that AFM1 detoxification by probiotic bacteria has a potential application to reduce toxin concentrations in yoghurt. Moreover, probiotic strains can react with itself as synergic or antagonist.Keywords: aflatoxin M1, ELISA, probiotics, storage
Procedia PDF Downloads 330307 Roof and Road Network Detection through Object Oriented SVM Approach Using Low Density LiDAR and Optical Imagery in Misamis Oriental, Philippines
Authors: Jigg L. Pelayo, Ricardo G. Villar, Einstine M. Opiso
Abstract:
The advances of aerial laser scanning in the Philippines has open-up entire fields of research in remote sensing and machine vision aspire to provide accurate timely information for the government and the public. Rapid mapping of polygonal roads and roof boundaries is one of its utilization offering application to disaster risk reduction, mitigation and development. The study uses low density LiDAR data and high resolution aerial imagery through object-oriented approach considering the theoretical concept of data analysis subjected to machine learning algorithm in minimizing the constraints of feature extraction. Since separating one class from another in distinct regions of a multi-dimensional feature-space, non-trivial computing for fitting distribution were implemented to formulate the learned ideal hyperplane. Generating customized hybrid feature which were then used in improving the classifier findings. Supplemental algorithms for filtering and reshaping object features are develop in the rule set for enhancing the final product. Several advantages in terms of simplicity, applicability, and process transferability is noticeable in the methodology. The algorithm was tested in the different random locations of Misamis Oriental province in the Philippines demonstrating robust performance in the overall accuracy with greater than 89% and potential to semi-automation. The extracted results will become a vital requirement for decision makers, urban planners and even the commercial sector in various assessment processes.Keywords: feature extraction, machine learning, OBIA, remote sensing
Procedia PDF Downloads 362