Search results for: state machine
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9914

Search results for: state machine

9254 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 195
9253 Guidance and Counseling Programmes among Tertiary Institutions in Lagos State, Nigeria

Authors: Olubusayo Asikhia

Abstract:

The purpose of the study was to compare the incidence of indiscipline and guidance and counseling programmes among federal and state-owned tertiary institutions in Lagos State, Southwest, Nigeria. This study was borne out of persistent students’ revolt and unrest in Nigerian tertiary institutions with its concomitant breakdown of law and order, disruption of academic activities, closure of institutions and the disruption of lives and property among others. A sample of 300 students, 270 staff (including academic and non-academic, heads of disciplinary committees, deans of student affairs and counselors) from 6 federal and state-owned tertiary institutions were selected through stratified random sampling. Three structured questionnaires with reliability coefficients that range from 0.78 to 0.91 were used to collect data for the study. The data were tested at 0.05 level of significance and analyzed using descriptive, paired samples statistics and regression analysis. Findings from the four hypotheses generated for the study revealed that student indiscipline occurs more in state colleges of education and polytechnics than in their federal counterparts. It was also higher in federal universities than the state. The study also revealed a significant difference in the causes of indiscipline and assessment of guidance and counseling programmes in state and federal universities and no significant difference in state and federal colleges and polytechnics. It was recommended that the guidance and counseling department in tertiary institutions should create a well-structured program that will enable it to address issues of indiscipline among students and that counselors should use small-group counseling approach and student-focused interventions.

Keywords: colleges of education, guidance and counseling, indiscipline, polytechnics, students and universities

Procedia PDF Downloads 250
9252 Longevity of Soybean Seeds Submitted to Different Mechanized Harvesting Conditions

Authors: Rute Faria, Digo Moraes, Amanda Santos, Dione Morais, Maria Sartori

Abstract:

Seed vigor is a fundamental component for the good performance of the entire soybean production process. Seeds with mechanical damage at harvest time will be more susceptible to fungal and insect attack during storage, which will invariably reduce their vigor to the field, compromising uniformity and final stand performance. Harvesters, even the most modern ones, when not properly regulated or operated, can cause irreversible damages to the seeds, compromising even their commercialization. Therefore, the control of an efficient harvest is necessary in order to guarantee a good quality final product. In this work, the damage caused by two different harvesters (one rented, and another one) was evaluated, traveling in two speeds (4 and 8 km / h). The design was completely randomized in 2 x 2 factorial, with four replications. To evaluate the physiological quality seed germination and vigor tests were carried out over a period of six months. A multivariate analysis of Principal Components (PCA) and clustering allowed us to verify that the leased machine had better performance in the incidence of immediate damages in the seeds, but after a storage period of 6 months the vigor of these seeds reduced more than own machine evidencing that such a machine would bring more damages to the seeds.

Keywords: Glycine max (L.), cluster analysis, PCA, vigor

Procedia PDF Downloads 256
9251 A Hybrid Model of Goal, Integer and Constraint Programming for Single Machine Scheduling Problem with Sequence Dependent Setup Times: A Case Study in Aerospace Industry

Authors: Didem Can

Abstract:

Scheduling problems are one of the most fundamental issues of production systems. Many different approaches and models have been developed according to the production processes of the parts and the main purpose of the problem. In this study, one of the bottleneck stations of a company serving in the aerospace industry is analyzed and considered as a single machine scheduling problem with sequence-dependent setup times. The objective of the problem is assigning a large number of similar parts to the same shift -to reduce chemical waste- while minimizing the number of tardy jobs. The goal programming method will be used to achieve two different objectives simultaneously. The assignment of parts to the shift will be expressed using the integer programming method. Finally, the constraint programming method will be used as it provides a way to find a result in a short time by avoiding worse resulting feasible solutions with the defined variables set. The model to be established will be tested and evaluated with real data in the application part.

Keywords: constraint programming, goal programming, integer programming, sequence-dependent setup, single machine scheduling

Procedia PDF Downloads 237
9250 Vibration-Based Data-Driven Model for Road Health Monitoring

Authors: Guru Prakash, Revanth Dugalam

Abstract:

A road’s condition often deteriorates due to harsh loading such as overload due to trucks, and severe environmental conditions such as heavy rain, snow load, and cyclic loading. In absence of proper maintenance planning, this results in potholes, wide cracks, bumps, and increased roughness of roads. In this paper, a data-driven model will be developed to detect these damages using vibration and image signals. The key idea of the proposed methodology is that the road anomaly manifests in these signals, which can be detected by training a machine learning algorithm. The use of various machine learning techniques such as the support vector machine and Radom Forest method will be investigated. The proposed model will first be trained and tested with artificially simulated data, and the model architecture will be finalized by comparing the accuracies of various models. Once a model is fixed, the field study will be performed, and data will be collected. The field data will be used to validate the proposed model and to predict the future road’s health condition. The proposed will help to automate the road condition monitoring process, repair cost estimation, and maintenance planning process.

Keywords: SVM, data-driven, road health monitoring, pot-hole

Procedia PDF Downloads 86
9249 Social Reforms and the Welfare State in America after the New Deal (1945-1969)

Authors: Aziza Tahar Djebbar

Abstract:

Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.

Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms

Procedia PDF Downloads 458
9248 Constitution and Self-Consciousness in Hegel's Philosophy

Authors: Akbar Jamali

Abstract:

According to Hegel’s philosophy, constitution of any given nation is the best expression of its national Self-Consciousness. Since constitution is the place in which freedom and Universal Rights is expressed, and since the essence of Self-consciousness is freedom, the development of self-consciousness and consequently freedom, is the direct cause of the development of constitution. Self-consciousness develops in the human history according to its own internal and external dialectic; therefore, it is essentially a dynamic phenomenon. However, constitution is supposed to be a stable foundation for the legal system of state and society. Therefore, the dilemma is: how the dynamic and contradictory nature of Self-Consciousness is the foundation of constitution that supposed to be the stable base of legal system of state and society. According to Hegel’s philosophy, the contradiction between the dynamic self- consciousness and the static constitution and state has an essential role in the formation of social movements within any given state. Self-consciousness is the phenomenology of Spirit in the human history. Subjective Spirit expresses itself in the different shapes of Self-consciousness in human spirit. These different shapes of self-consciousness must be identical with its contradiction; Objective Spirit. State is the highest form of the objective Spirit. Therefore, state and its foundation namely ‘constitution’ must be identical with Self-consciousness. "Spirit cannot remain forever alienated from its expression." Hegel states. Self-consciousness is the Subjective Spirit, it freely develops according to its internal and external contradictions, but since it must be always identical with its expression namely constitution, its development results to alienation. They way by which self-consciousness became again identical with the constitution determines the nature of legal and political development of any given society and state. In the democratic states, self-consciousness shows itself partially in the public opinion. In the process of election, this public opinion changes the ruling parties that construct the government. In democracies, self-consciousness or subjective spirit is in a dialectical relationship with state or the Objective Spirit. Therefore, it cannot remain alienated with its expression that is political system and its constitution. But, in the autocracies Self-consciousness cannot easily express itself in the government and its constitution. More Self-consciousness develops more it becomes alienated with its expression that is the state and its constitution. Rebel and revolution are the symptom of alienation of Spirit (self-consciousness) with its expression (state and its constitution).

Keywords: alienation, constitution, self-consciousness, spirit

Procedia PDF Downloads 362
9247 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 137
9246 Tolerating Input Faults in Asynchronous Sequential Machines

Authors: Jung-Min Yang

Abstract:

A method of tolerating input faults for input/state asynchronous sequential machines is proposed. A corrective controller is placed in front of the considered asynchronous machine to realize model matching with a reference model. The value of the external input transmitted to the closed-loop system may change by fault. We address the existence condition for the controller that can counteract adverse effects of any input fault while maintaining the objective of model matching. A design procedure for constructing the controller is outlined. The proposed reachability condition for the controller design is validated in an illustrative example.

Keywords: asynchronous sequential machines, corrective control, fault tolerance, input faults, model matching

Procedia PDF Downloads 423
9245 Grassroots Feminist Organizing in the Shadow of State Feminism in Ethiopia

Authors: Tina Beyene

Abstract:

In this paper examines the state of grassroots feminist activism in the backdrop of state feminism in Ethiopia. Specifically, I examine the impact of the Charities and Societies Proclamation (aka CSO law), a 2009 law that banned so-called foreign NGOs—i.e., those receiving more than 10% of its operating budget from non-local sources— from working in the areas of human rights, democracy, governance, and gender equality. Viewed as government retribution for the NGO opposition to the government in the 2005 elections, the law aimed to halt the work groups such as the Ethiopian Women Lawyers Association (EWLA), who were defined as a “foreign” NGO. Based on interviews with prominent Ethiopian women’s rights leaders in Addis Ababa, Ethiopia, I assess how grassroots feminist organizing adapts to state suppression on the one hand, and the aggressive entry of the state into women’s rights work on the other hand. While the 2009 law has slowed down the work of women’s rights activism, displaced feminists view feminist advocacy as cyclical and the state as neither fully adversarial nor an ally but rather as an instable entity that at times provides political openings to push ambitious feminist agendas. Grassroots activists are regrouping and developing new political responses strategies such as coding rights issues to fit state mandate; dissembling rights work in permissible social provision language; rechanneling political work into informal spaces and unregistered social clubs; innovating new funding partnerships, and reassembling as privately held research and advocacy companies. my study reveals how grassroots feminist politics operates in the shadow of a hostile state and within the confines of local politics.

Keywords: grassroots feminism, ethiopian feminism, civil society and gender, state feminism

Procedia PDF Downloads 171
9244 An Enhanced Support Vector Machine Based Approach for Sentiment Classification of Arabic Tweets of Different Dialects

Authors: Gehad S. Kaseb, Mona F. Ahmed

Abstract:

Arabic Sentiment Analysis (SA) is one of the most common research fields with many open areas. Few studies apply SA to Arabic dialects. This paper proposes different pre-processing steps and a modified methodology to improve the accuracy using normal Support Vector Machine (SVM) classification. The paper works on two datasets, Arabic Sentiment Tweets Dataset (ASTD) and Extended Arabic Tweets Sentiment Dataset (Extended-AATSD), which are publicly available for academic use. The results show that the classification accuracy approaches 86%.

Keywords: Arabic, classification, sentiment analysis, tweets

Procedia PDF Downloads 148
9243 Evaluation of Machine Learning Algorithms and Ensemble Methods for Prediction of Students’ Graduation

Authors: Soha A. Bahanshal, Vaibhav Verdhan, Bayong Kim

Abstract:

Graduation rates at six-year colleges are becoming a more essential indicator for incoming fresh students and for university rankings. Predicting student graduation is extremely beneficial to schools and has a huge potential for targeted intervention. It is important for educational institutions since it enables the development of strategic plans that will assist or improve students' performance in achieving their degrees on time (GOT). A first step and a helping hand in extracting useful information from these data and gaining insights into the prediction of students' progress and performance is offered by machine learning techniques. Data analysis and visualization techniques are applied to understand and interpret the data. The data used for the analysis contains students who have graduated in 6 years in the academic year 2017-2018 for science majors. This analysis can be used to predict the graduation of students in the next academic year. Different Predictive modelings such as logistic regression, decision trees, support vector machines, Random Forest, Naïve Bayes, and KNeighborsClassifier are applied to predict whether a student will graduate. These classifiers were evaluated with k folds of 5. The performance of these classifiers was compared based on accuracy measurement. The results indicated that Ensemble Classifier achieves better accuracy, about 91.12%. This GOT prediction model would hopefully be useful to university administration and academics in developing measures for assisting and boosting students' academic performance and ensuring they graduate on time.

Keywords: prediction, decision trees, machine learning, support vector machine, ensemble model, student graduation, GOT graduate on time

Procedia PDF Downloads 72
9242 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 364
9241 Optimizing the Scanning Time with Radiation Prediction Using a Machine Learning Technique

Authors: Saeed Eskandari, Seyed Rasoul Mehdikhani

Abstract:

Radiation sources have been used in many industries, such as gamma sources in medical imaging. These waves have destructive effects on humans and the environment. It is very important to detect and find the source of these waves because these sources cannot be seen by the eye. A portable robot has been designed and built with the purpose of revealing radiation sources that are able to scan the place from 5 to 20 meters away and shows the location of the sources according to the intensity of the waves on a two-dimensional digital image. The operation of the robot is done by measuring the pixels separately. By increasing the image measurement resolution, we will have a more accurate scan of the environment, and more points will be detected. But this causes a lot of time to be spent on scanning. In this paper, to overcome this challenge, we designed a method that can optimize this time. In this method, a small number of important points of the environment are measured. Hence the remaining pixels are predicted and estimated by regression algorithms in machine learning. The research method is based on comparing the actual values of all pixels. These steps have been repeated with several other radiation sources. The obtained results of the study show that the values estimated by the regression method are very close to the real values.

Keywords: regression, machine learning, scan radiation, robot

Procedia PDF Downloads 79
9240 Early Prediction of Disposable Addresses in Ethereum Blockchain

Authors: Ahmad Saleem

Abstract:

Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results.

Keywords: blockchain, Ethereum, cryptocurrency, prediction

Procedia PDF Downloads 97
9239 State Estimation of a Biotechnological Process Using Extended Kalman Filter and Particle Filter

Authors: R. Simutis, V. Galvanauskas, D. Levisauskas, J. Repsyte, V. Grincas

Abstract:

This paper deals with advanced state estimation algorithms for estimation of biomass concentration and specific growth rate in a typical fed-batch biotechnological process. This biotechnological process was represented by a nonlinear mass-balance based process model. Extended Kalman Filter (EKF) and Particle Filter (PF) was used to estimate the unmeasured state variables from oxygen uptake rate (OUR) and base consumption (BC) measurements. To obtain more general results, a simplified process model was involved in EKF and PF estimation algorithms. This model doesn’t require any special growth kinetic equations and could be applied for state estimation in various bioprocesses. The focus of this investigation was concentrated on the comparison of the estimation quality of the EKF and PF estimators by applying different measurement noises. The simulation results show that Particle Filter algorithm requires significantly more computation time for state estimation but gives lower estimation errors both for biomass concentration and specific growth rate. Also the tuning procedure for Particle Filter is simpler than for EKF. Consequently, Particle Filter should be preferred in real applications, especially for monitoring of industrial bioprocesses where the simplified implementation procedures are always desirable.

Keywords: biomass concentration, extended Kalman filter, particle filter, state estimation, specific growth rate

Procedia PDF Downloads 428
9238 Estimation of the State of Charge of the Battery Using EFK and Sliding Mode Observer in MATLAB-Arduino/Labview

Authors: Mouna Abarkan, Abdelillah Byou, Nacer M'Sirdi, El Hossain Abarkan

Abstract:

This paper presents the estimation of the state of charge of the battery using two types of observers. The battery model used is the combination of a voltage source, which is the open circuit battery voltage of a strength corresponding to the connection of resistors and electrolyte and a series of parallel RC circuits representing charge transfer phenomena and diffusion. An adaptive observer applied to this model is proposed, this observer to estimate the battery state of charge of the battery is based on EFK and sliding mode that is known for their robustness and simplicity implementation. The results are validated by simulation under MATLAB/Simulink and implemented in Arduino-LabView.

Keywords: model of the battery, adaptive sliding mode observer, the EFK observer, estimation of state of charge, SOC, implementation in Arduino/LabView

Procedia PDF Downloads 304
9237 The Role of Synthetic Data in Aerial Object Detection

Authors: Ava Dodd, Jonathan Adams

Abstract:

The purpose of this study is to explore the characteristics of developing a machine learning application using synthetic data. The study is structured to develop the application for the purpose of deploying the computer vision model. The findings discuss the realities of attempting to develop a computer vision model for practical purpose, and detail the processes, tools, and techniques that were used to meet accuracy requirements. The research reveals that synthetic data represents another variable that can be adjusted to improve the performance of a computer vision model. Further, a suite of tools and tuning recommendations are provided.

Keywords: computer vision, machine learning, synthetic data, YOLOv4

Procedia PDF Downloads 225
9236 Talent-to-Vec: Using Network Graphs to Validate Models with Data Sparsity

Authors: Shaan Khosla, Jon Krohn

Abstract:

In a recruiting context, machine learning models are valuable for recommendations: to predict the best candidates for a vacancy, to match the best vacancies for a candidate, and compile a set of similar candidates for any given candidate. While useful to create these models, validating their accuracy in a recommendation context is difficult due to a sparsity of data. In this report, we use network graph data to generate useful representations for candidates and vacancies. We use candidates and vacancies as network nodes and designate a bi-directional link between them based on the candidate interviewing for the vacancy. After using node2vec, the embeddings are used to construct a validation dataset with a ranked order, which will help validate new recommender systems.

Keywords: AI, machine learning, NLP, recruiting

Procedia PDF Downloads 84
9235 The Convergence of IoT and Machine Learning: A Survey of Real-time Stress Detection System

Authors: Shreyas Gambhirrao, Aditya Vichare, Aniket Tembhurne, Shahuraj Bhosale

Abstract:

In today's rapidly evolving environment, stress has emerged as a significant health concern across different age groups. Stress that isn't controlled, whether it comes from job responsibilities, health issues, or the never-ending news cycle, can have a negative effect on our well-being. The problem is further aggravated by the ongoing connection to technology. In this high-tech age, identifying and controlling stress is vital. In order to solve this health issue, the study focuses on three key metrics for stress detection: body temperature, heart rate, and galvanic skin response (GSR). These parameters along with the Support Vector Machine classifier assist the system to categorize stress into three groups: 1) Stressed, 2) Not stressed, and 3) Moderate stress. Proposed training model, a NodeMCU combined with particular sensors collects data in real-time and rapidly categorizes individuals based on their stress levels. Real-time stress detection is made possible by this creative combination of hardware and software.

Keywords: real time stress detection, NodeMCU, sensors, heart-rate, body temperature, galvanic skin response (GSR), support vector machine

Procedia PDF Downloads 72
9234 Bridging the Gap: Living Machine in Educational Nature Preserve Center

Authors: Zakeia Benmoussa

Abstract:

Pressure on freshwater systems comes from removing too much water to grow crops; contamination from economic activities, land use practices, and human waste. The paper will be focusing on how water management can influence the design, implementation, and impacts of the ecological principles of biomimicry as sustainable methods in recycling wastewater. At Texas State, United States of America, in particular the lower area of the Trinity River refuge, there is a true example of the diversity to be found in that area, whether when exploring the lands or the waterways. However, as the Trinity River supplies water to the state’s residents, the lower part of the river at Liberty County presents several problem of wastewater discharge in the river. Therefore, conservation efforts are particularly important in the Trinity River basin. Clearly, alternative ways must be considered in order to conserve water to meet future demands. As a result, there should be another system provided rather than the conventional water treatment. Mimicking ecosystem's technologies out of context is not enough, but if we incorporate plants into building architecture, in addition to their beauty, they can filter waste, absorb excess water, and purify air. By providing an architectural proposal center, a living system can be explored through several methods that influence natural resources on the micro-scale in order to impact sustainability on the macro-scale. The center consists of an ecological program of Plant and Water Biomimicry study which becomes a living organism that purifies the river water in a natural way through architecture. Consequently, a rich beautiful nature could be used as an educational destination, observation and adventure, as well as providing unpolluted fresh water to the major cities of Texas. As a result, these facts raise a couple of questions: Why is conservation so rarely practiced by those who must extract a living from the land? Are we sufficiently enlightened to realize that we must now challenge that dogma? Do architects respond to the environment and reflect on it in the correct way through their public projects? The method adopted in this paper consists of general research into careful study of the system of the living machine, in how to integrate it at architectural level, and finally, the consolidation of the all the conclusions formed into design proposal. To summarise, this paper attempts to provide a sustainable alternative perspective in bridging physical and mental interaction with biodiversity to enhance nature by using architecture.

Keywords: Biodiversity, Design with Nature, Sustainable architecture, Waste water treatment.

Procedia PDF Downloads 297
9233 MSIpred: A Python 2 Package for the Classification of Tumor Microsatellite Instability from Tumor Mutation Annotation Data Using a Support Vector Machine

Authors: Chen Wang, Chun Liang

Abstract:

Microsatellite instability (MSI) is characterized by high degree of polymorphism in microsatellite (MS) length due to a deficiency in mismatch repair (MMR) system. MSI is associated with several tumor types and its status can be considered as an important indicator for tumor prognostic. Conventional clinical diagnosis of MSI examines PCR products of a panel of MS markers using electrophoresis (MSI-PCR) which is laborious, time consuming, and less reliable. MSIpred, a python 2 package for automatic classification of MSI was released by this study. It computes important somatic mutation features from files in mutation annotation format (MAF) generated from paired tumor-normal exome sequencing data, subsequently using these to predict tumor MSI status with a support vector machine (SVM) classifier trained by MAF files of 1074 tumors belonging to four types. Evaluation of MSIpred on an independent 358-tumor test set achieved overall accuracy of over 98% and area under receiver operating characteristic (ROC) curve of 0.967. These results indicated that MSIpred is a robust pan-cancer MSI classification tool and can serve as a complementary diagnostic to MSI-PCR in MSI diagnosis.

Keywords: microsatellite instability, pan-cancer classification, somatic mutation, support vector machine

Procedia PDF Downloads 173
9232 The Effectiveness of Teaching Games for Understanding in Improving the Hockey Tactical Skills and State Self-Confidence among 16 Years Old Students

Authors: Wee Akina Sia Seng Lee, Shabeshan Rengasamy, Lim Boon Hooi, Chandrakalavaratharajoo, Mohd Ibrahim K. Azeez

Abstract:

This study was conducted to examine the effectiveness of Teaching Games For Understanding (TGFU) in improving the hockey tactical skills and state self-confidence among 16-year-old students. Two hundred fifty nine (259) school students were selected for the study based on the intact sampling method. One class was used as the control group (Boys=60, Girls=70), while another as the treatment group (Boys=60, Girls=69) underwent intervention with TGFU in physical education class conducted twice a week for four weeks. The Games Performance Assessment Instrument was used to observe the hockey tactical skills and The State Self-Confidence Inventory was used to determine the state of self-confidence among the students. After four weeks, ANCOVA analysis indicated the treatment groups had significant improvement in hockey tactical skills with F (1, 118) =313.37, p < .05 for school boys, and F (1, 136) =92.62, p < .05 for school girls. The Mann Whitney U test also showed the treatment groups had significant improvement in state self-confidence with U=428.50, z= -7.22, p < .05, r=.06 for school boys. ANCOVA analysis also showed the treatment group had significant improvement in state self-confidence with F (1, 136) =74.40, p < .05 for school girls. This indicates that TGFU in a 40 minute physical education class conducted twice a week for four weeks can significantly improve the hockey tactical skills and state self-confidence among 16-year-old students. The findings give new knowledge to PE teachers to implement the TGFU method as it enhances the hockey tactical skills and state self-confidence among 16-year-old students. Some recommendation was suggested for future research.

Keywords: Teaching Games For Understanding (TGFU), traditional teaching, hockey tactical skills, state self-confidence

Procedia PDF Downloads 354
9231 The Effect on Rolling Mill of Waviness in Hot Rolled Steel

Authors: Sunthorn Sittisakuljaroen

Abstract:

The edge waviness in hot rolled steel is a common defect. Variables that effect for such defect include as raw material and machine. These variables are necessary to consider. This research studied the defect of edge waviness for SS 400 of metal sheet manufacture. Defect of metal sheets divided into two groups. The specimens were investigated on chemical composition and mechanical properties to find the difference. The results of investigate showed that not different to a standard significantly. Therefore the roll milled machine for sample need to adjustable rollers for press on metal sheet which was more appropriate to adjustable at both ends.

Keywords: edge waviness, hot rolling steel, metal sheet defect, SS 400, roll leveller

Procedia PDF Downloads 420
9230 A Comprehensive Study and Evaluation on Image Fashion Features Extraction

Authors: Yuanchao Sang, Zhihao Gong, Longsheng Chen, Long Chen

Abstract:

Clothing fashion represents a human’s aesthetic appreciation towards everyday outfits and appetite for fashion, and it reflects the development of status in society, humanity, and economics. However, modelling fashion by machine is extremely challenging because fashion is too abstract to be efficiently described by machines. Even human beings can hardly reach a consensus about fashion. In this paper, we are dedicated to answering a fundamental fashion-related problem: what image feature best describes clothing fashion? To address this issue, we have designed and evaluated various image features, ranging from traditional low-level hand-crafted features to mid-level style awareness features to various current popular deep neural network-based features, which have shown state-of-the-art performance in various vision tasks. In summary, we tested the following 9 feature representations: color, texture, shape, style, convolutional neural networks (CNNs), CNNs with distance metric learning (CNNs&DML), AutoEncoder, CNNs with multiple layer combination (CNNs&MLC) and CNNs with dynamic feature clustering (CNNs&DFC). Finally, we validated the performance of these features on two publicly available datasets. Quantitative and qualitative experimental results on both intra-domain and inter-domain fashion clothing image retrieval showed that deep learning based feature representations far outweigh traditional hand-crafted feature representation. Additionally, among all deep learning based methods, CNNs with explicit feature clustering performs best, which shows feature clustering is essential for discriminative fashion feature representation.

Keywords: convolutional neural network, feature representation, image processing, machine modelling

Procedia PDF Downloads 139
9229 An Analysis of Present Supplier Selection Criteria of State Pharmaceutical Corporation (SPC) Sri Lanka: A Case Study

Authors: Gamalath M. B. P. Abeysekara

Abstract:

Primary objective of any organization is to enhance the bottom line profit. Strategic procurement is one of the prominent aspects in view of receiving this ultimate objective. Strategic procurement is an activity used in each and every organization in their operations. Pharmaceutical procurement is an especially significant task for any organizations, particularly state sector concerned. The whole pharmaceutical procurement requirement of the country is procured through the State Pharmaceutical Corporation (SPC) of Sri Lanka. They follow Pharmaceutical Procurement Guideline of 2006 as the procurement principle. The main objective of this project is to identify the importance of State Pharmaceutical Corporation supplier selection criteria and critical analysis of pharmaceutical procurement procedure. State Pharmaceutical Corporations applied net price, product quality, past performance, and delivery of suppliers’ as main criteria for the selection suppliers. Data collection for this study was taken place through a questionnaire, given to fifty doctors within the Colombo district attached to five main state hospitals. Data analysis is carried out with mean and standard deviation functions. The ultimate outcomes indicated product quality, net price, and delivery of suppliers’ are the most important criteria behind the selection of suppliers. Critical analysis proved State Pharmaceutical Corporation should focus on net price reduction, improving laboratory testing facilities and effective communication between up and down stream of supply chain.

Keywords: government procurement procedure, pharmaceutical procurement supplier selection criteria, importance of SPC supplier selection criteria

Procedia PDF Downloads 451
9228 Using Machine-Learning Methods for Allergen Amino Acid Sequence's Permutations

Authors: Kuei-Ling Sun, Emily Chia-Yu Su

Abstract:

Allergy is a hypersensitive overreaction of the immune system to environmental stimuli, and a major health problem. These overreactions include rashes, sneezing, fever, food allergies, anaphylaxis, asthmatic, shock, or other abnormal conditions. Allergies can be caused by food, insect stings, pollen, animal wool, and other allergens. Their development of allergies is due to both genetic and environmental factors. Allergies involve immunoglobulin E antibodies, a part of the body’s immune system. Immunoglobulin E antibodies will bind to an allergen and then transfer to a receptor on mast cells or basophils triggering the release of inflammatory chemicals such as histamine. Based on the increasingly serious problem of environmental change, changes in lifestyle, air pollution problem, and other factors, in this study, we both collect allergens and non-allergens from several databases and use several machine learning methods for classification, including logistic regression (LR), stepwise regression, decision tree (DT) and neural networks (NN) to do the model comparison and determine the permutations of allergen amino acid’s sequence.

Keywords: allergy, classification, decision tree, logistic regression, machine learning

Procedia PDF Downloads 303
9227 Recognition and Protection of Indigenous Society in Indonesia

Authors: Triyanto, Rima Vien Permata Hartanto

Abstract:

Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened.

Keywords: indigenous peoples, customary law, state law, state of law

Procedia PDF Downloads 330
9226 Hybrid SVM/DBN Model for Arabic Isolated Words Recognition

Authors: Elyes Zarrouk, Yassine Benayed, Faiez Gargouri

Abstract:

This paper presents a new hybrid model for isolated Arabic words recognition. To do this, we apply Support Vectors Machine (SVM) as an estimator of posterior probabilities within the Dynamic Bayesian networks (DBN). This paper deals a comparative study between DBN and SVM/DBN systems for multi-dialect isolated Arabic words. Performance using SVM/DBN is found to exceed that of DBNs trained on an identical task, giving higher recognition accuracy for four different Arabic dialects. In fact, the average of recognition rates for the four dialects with SVM/DBN was 87.67% while 83.01% with DBN.

Keywords: dynamic Bayesian networks, hybrid models, supports vectors machine, Arabic isolated words

Procedia PDF Downloads 560
9225 The Precarious Chinese Ecology of Financial Expertise: Discontent in the Mix

Authors: Giulia Dal Maso

Abstract:

Within the contemporary financial capitalist configuration, the interplay of Chinese statecraft and financialization has shaped a new ‘ecology of financial expertise.’ This indicates the emergence of a new financial technocratic governance; that is increasingly changing the Chinese economy, reducing the state’s administrative and fiscal functions and increasing state assets in accordance with a new shareholder logic. In this shift, the creation of the stock market by the state was conceived not only as a new redistributor of wealth but as a ‘clearing house’ for social discontent resulting from work casualization, wage repression and a lack of social welfare. Since its inception in the wake of Deng Xiaoping’s reforms, the Chinese state has used the stock market as a means of securing social legitimation by providing a prearranged space where the disaggregated and vulnerable subjects left behind by the dismantlement of the collective work units of the Maoist period (danwei) can congregate. However, fieldwork which included both participant observation as well as interviews with investors in brokerage rooms in Shanghai (where one of only two mainland Chinese stock exchanges is situated) reveals that both new formal and informal financial experts—namely the haigui (Chinese returnees with a financial degree abroad) and sanhu (individual Chinese scattered players), are equally dissatisfied with their investing activities. They express discontent with the state, which they hold responsible for the summer 2015 financial crisis and for the financial turmoil that jeopardizes China’s financial and political project. What the investors want is a state that will guarantee the continuation of the current gupiaore ‘stock fever’. This paper holds that, by embracing financialization, the state is undermining the contract at the base of its legitimacy.

Keywords: Chinese state, Deng Xiaoping, financial capitalism, individual investors

Procedia PDF Downloads 456