Search results for: feature analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28631

Search results for: feature analysis

27881 A Cross-Dialect Statistical Analysis of Final Declarative Intonation in Tuvinian

Authors: D. Beziakina, E. Bulgakova

Abstract:

This study continues the research on Tuvinian intonation and presents a general cross-dialect analysis of intonation of Tuvinian declarative utterances, specifically the character of the tone movement in order to test the hypothesis about the prevalence of level tone in some Tuvinian dialects. The results of the analysis of basic pitch characteristics of Tuvinian speech (in general and in comparison with two other Turkic languages - Uzbek and Azerbaijani) are also given in this paper. The goal of our work was to obtain the ranges of pitch parameter values typical for Tuvinian speech. Such language-specific values can be used in speaker identification systems in order to get more accurate results of ethnic speech analysis. We also present the results of a cross-dialect analysis of declarative intonation in the poorly studied Tuvinian language.

Keywords: speech analysis, statistical analysis, speaker recognition, identification of person

Procedia PDF Downloads 466
27880 A ZVT-ZCT-PWM DC-DC Boost Converter with Direct Power Transfer

Authors: Naim Suleyman Ting, Yakup Sahin, Ismail Aksoy

Abstract:

This paper presents a zero voltage transition-zero current transition (ZVT-ZCT)-PWM DC-DC boost converter with direct power transfer. In this converter, the main switch turns on with ZVT and turns off with ZCT. The auxiliary switch turns on and off with zero current switching (ZCS). The main diode turns on with ZVS and turns off with ZCS. Besides, the additional current or voltage stress does not occur on the main device. The converter has features as simple structure, fast dynamic response and easy control. Also, the proposed converter has direct power transfer feature as well as excellent soft switching techniques. In this study, the operating principle of the converter is presented and its operation is verified for 1 kW and 100 kHz model.

Keywords: direct power transfer, boost converter, zero-voltage transition, zero-current transition

Procedia PDF Downloads 815
27879 A Survey of Sentiment Analysis Based on Deep Learning

Authors: Pingping Lin, Xudong Luo, Yifan Fan

Abstract:

Sentiment analysis is a very active research topic. Every day, Facebook, Twitter, Weibo, and other social media, as well as significant e-commerce websites, generate a massive amount of comments, which can be used to analyse peoples opinions or emotions. The existing methods for sentiment analysis are based mainly on sentiment dictionaries, machine learning, and deep learning. The first two kinds of methods rely on heavily sentiment dictionaries or large amounts of labelled data. The third one overcomes these two problems. So, in this paper, we focus on the third one. Specifically, we survey various sentiment analysis methods based on convolutional neural network, recurrent neural network, long short-term memory, deep neural network, deep belief network, and memory network. We compare their futures, advantages, and disadvantages. Also, we point out the main problems of these methods, which may be worthy of careful studies in the future. Finally, we also examine the application of deep learning in multimodal sentiment analysis and aspect-level sentiment analysis.

Keywords: document analysis, deep learning, multimodal sentiment analysis, natural language processing

Procedia PDF Downloads 160
27878 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 325
27877 Containment/Penetration Analysis for the Protection of Aircraft Engine External Configuration and Nuclear Power Plant Structures

Authors: Dong Wook Lee, Adrian Mistreanu

Abstract:

The authors have studied a method for analyzing containment and penetration using an explicit nonlinear Finite Element Analysis. This method may be used in the stage of concept design for the protection of external configurations or components of aircraft engines and nuclear power plant structures. This paper consists of the modeling method, the results obtained from the method and the comparison of the results with those calculated from simple analytical method. It shows that the containment capability obtained by proposed method matches well with analytically calculated containment capability.

Keywords: computer aided engineering, containment analysis, finite element analysis, impact analysis, penetration analysis

Procedia PDF Downloads 135
27876 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 480
27875 On Copular Constructions in Yemeni Arabic and the Cartography of Subjects

Authors: Ameen Alahdal

Abstract:

This paper investigates copular constructions in Raimi Yemeni Arabic (RYA). The aim of the paper is actually twofold. First it explores the types of copular constructions in Raimi Yemeni Arabic, a variety of Arabic that has not attracted a lot of attention. In this connection, the paper shows that RYA manifests ‘bare’, verbal and pronominal/PRON copular constructions, just like other varieties of Arabic and indeed other Semitic languages like Hebrew. The sentences below from RYA represent the three constructions, respectively. (1) a. nada Hilwah Nada pretty.3sf ‘Nada is pretty’ b. kan al-banat hina was the-girls here ‘The girls were here c. ali hu-l mudiir Ali he-the manager ‘Ali is the manager’ Interestingly, in addition to these common types of copular constructions, RYA seems to exhibit dual copula sentences, a construction that features both a pronominal copula and a verbal copula. Such a construction is attested neither in Standard Arabic nor in other modern varieties of Arabic such as Lebanese, Moroccan, Egyptian, Jordanian. Remarkably, dual copular sentences do not appear even in other dialects of Yemeni Arabic such as Sanaani, Adeni and Tehami. (2) is an example. (2) maha kan-ih mudarrisah maha was-she teacher.3sf ‘Maha was a teacehr’ Second, the paper considers the cartography of subject positions in copular constructions proposed by Shlonsky and Rizzi (2018). Different copular constructions seem to involve different subject positions (which might eventually correlate with different interpretations – not our concern in this paper). Here, it is argued that in a bare copular sentence, as in (1a), RYA might exploit two criterial subject positions (in Rizzi’s sense), in addition to the canonical Spec,TP position. Under mainstream minimalist assumption, a copular sentence is analyzed as a PredP. Thus, in addition to the PredP-related thematic subject position, a criterial subject position is posited outside of PredP. (3) below represents the cartography of subject positions in a bare copular construction. (3) [……..DP subj PredP DP Pred DP/AP/PP ] In PRON sentences, as exemplified in (1c), another two subject positions are postulated high in the clause, particularly above PolP. (4) illustrates the hierarchy of the subject positions in a PRON copular construction. The subject resides in Spec,SUBJ2P. (4) …DP SUBJ2 …DP SUBJ1 … Pol … DP subj PredP Another related phenomenon in RYA which sets it apart from other languages like Hebrew is that of negative bare copular construction. This construction involves a PRON, which is not found in its affirmative counterpart. PRON, however, is hosted neither by SUBJ20 nor by SUBJ10. Rather, PRON occurs below Neg0 (Pol0 in the hierarchy). This situation raises interesting issues for the hierarchy of subjects in copular constructions as well as to the syntax of the left periphery in general. With regard to what causes the subject to move, there are different potential triggers. For instance, movement of the subject at the base, i.e., out of PredP is triggered by a labeling failure. Other movements of the subject can be driven by a formal feature like EPP, or a criterial feature like [subj].

Keywords: Yemeni Arabic, copular constructions, cartography of subjects, labeling, criterial positions

Procedia PDF Downloads 103
27874 Computer-Aided Diagnosis System Based on Multiple Quantitative Magnetic Resonance Imaging Features in the Classification of Brain Tumor

Authors: Chih Jou Hsiao, Chung Ming Lo, Li Chun Hsieh

Abstract:

Brain tumor is not the cancer having high incidence rate, but its high mortality rate and poor prognosis still make it as a big concern. On clinical examination, the grading of brain tumors depends on pathological features. However, there are some weak points of histopathological analysis which can cause misgrading. For example, the interpretations can be various without a well-known definition. Furthermore, the heterogeneity of malignant tumors is a challenge to extract meaningful tissues under surgical biopsy. With the development of magnetic resonance imaging (MRI), tumor grading can be accomplished by a noninvasive procedure. To improve the diagnostic accuracy further, this study proposed a computer-aided diagnosis (CAD) system based on MRI features to provide suggestions of tumor grading. Gliomas are the most common type of malignant brain tumors (about 70%). This study collected 34 glioblastomas (GBMs) and 73 lower-grade gliomas (LGGs) from The Cancer Imaging Archive. After defining the region-of-interests in MRI images, multiple quantitative morphological features such as region perimeter, region area, compactness, the mean and standard deviation of the normalized radial length, and moment features were extracted from the tumors for classification. As results, two of five morphological features and three of four image moment features achieved p values of <0.001, and the remaining moment feature had p value <0.05. Performance of the CAD system using the combination of all features achieved the accuracy of 83.18% in classifying the gliomas into LGG and GBM. The sensitivity is 70.59% and the specificity is 89.04%. The proposed system can become a second viewer on clinical examinations for radiologists.

Keywords: brain tumor, computer-aided diagnosis, gliomas, magnetic resonance imaging

Procedia PDF Downloads 255
27873 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop

Authors: Anuta Mukherjee, Saswati Mukherjee

Abstract:

Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.

Keywords: sentiment analysis, twitter, collision theory, discourse analysis

Procedia PDF Downloads 528
27872 Using SNAP and RADTRAD to Establish the Analysis Model for Maanshan PWR Plant

Authors: J. R. Wang, H. C. Chen, C. Shih, S. W. Chen, J. H. Yang, Y. Chiang

Abstract:

In this study, we focus on the establishment of the analysis model for Maanshan PWR nuclear power plant (NPP) by using RADTRAD and SNAP codes with the FSAR, manuals, and other data. In order to evaluate the cumulative dose at the Exclusion Area Boundary (EAB) and Low Population Zone (LPZ) outer boundary, Maanshan NPP RADTRAD/SNAP model was used to perform the analysis of the DBA LOCA case. The analysis results of RADTRAD were similar to FSAR data. These analysis results were lower than the failure criteria of 10 CFR 100.11 (a total radiation dose to the whole body, 250 mSv; a total radiation dose to the thyroid from iodine exposure, 3000 mSv).

Keywords: RADionuclide, transport, removal, and dose estimation (RADTRAD), symbolic nuclear analysis package (SNAP), dose, PWR

Procedia PDF Downloads 455
27871 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment

Authors: Michael Gidey Gebru

Abstract:

Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.

Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output

Procedia PDF Downloads 54
27870 A Critical Discourse Analysis of ‘Youth Radicalisation’: A Case of the Daily Nation Kenya Online Newspaper

Authors: Miraji H. Mohamed

Abstract:

The purpose of this study is to critique ‘radicalisation’ and more particularly ‘youth radicalisation’ by exploring its usage in online newspapers. ‘Radicalisation’ and ‘extremism’ have become the most common terms in terrorism studies since the 9/11 attacks. Regardless of the geographic location, when the word terrorism is used the terms ‘radicalisation’ and ‘extremism’ always follow to attempt to explore the journey of the perpetrators towards violence. These terms have come to represent a discourse of dominantly pejorative traits often used to describe spaces, groups, and processes identified as problematic. Even though ambiguously defined they feature widely in government documents, political statements, news articles, academic research, social media platforms, religious gatherings, and public discussions. Notably, ‘radicalisation’ and ‘extremism’ have been closely conflated with the term youth to form ‘youth radicalisation’ to refer to a discourse of ‘youth at risk’. The three terms largely continue to be used unquestioningly and interchangeably hence the reason why they are placed in single quotation marks to deliberately question their conventional usage. Albeit this comes timely in the Kenyan context where there has been a proliferation of academic and expert research on ‘youth radicalisation’ (used as a neutral label) without considering the political, cultural and socio-historical contexts that inform this label. This study seeks to draw these nuances by employing a genealogical approach that historicises and deconstructs ‘youth radicalisation’; and by applying a Discourse-Historical Approach (DHA) of Critical Discourse Analysis to analyse Kenyan online newspaper - The Daily Nation between 2015 and 2018. By applying the concept of representation to analyse written texts, the study reveals that the use of ‘youth radicalisation’ as a discursive strategy disproportionately affects young people especially those from cultural/ethnic/religious minority groups. Also, the ambiguous use of ‘radicalisation’ and ‘youth radicalisation’ by the media reinforces the discourse of ‘youth at risk’ which has become the major framework underpinning Countering Violent Extremism (CVE) interventions. Similarly, the findings indicate that the uncritical use of ‘youth radicalisation’ has been used to serve political interests; and has become an instrument of policing young people, thus contributing to their cultural shaping. From this, it is evident that the media could thwart rather than assist CVE efforts. By exposing the political nature of the three terms through evidence-based research, this study offers recommendations on how critical reflective reporting by the media could help to make CVE more nuanced.

Keywords: discourse, extremism, radicalisation, terrorism, youth

Procedia PDF Downloads 124
27869 Implementation and Validation of Therapeutic Tourism Products for Families With Children With Autism Spectrum Disorder in Azores Islands: “Azores All in Blue” Project

Authors: Ana Rita Conde, Pilar Mota, Tânia Botelho, Suzana Caldeira, Isabel Rego, Jessica Pacheco, Osvaldo Silva, Áurea Sousa

Abstract:

Tourism promotes well-being and health to children with ASD and their families. Literature indicates the need to provide tourist activities that integrate the therapeutic component, to promote the development and well-being of children with ASD. The study aims to implement tourist offers in Azores that integrate the therapeutic feature, assess their suitability and impact on the well-being and health of the child and caregivers. Using a mixed methodology, the study integrates families that experience and evaluate the impact of tourism products developed specifically for them.

Keywords: austism spectrum disorder, children, therapeutic tourism activities, well-being, health, inclusive tourism

Procedia PDF Downloads 141
27868 A Multilayer Perceptron Neural Network Model Optimized by Genetic Algorithm for Significant Wave Height Prediction

Authors: Luis C. Parra

Abstract:

The significant wave height prediction is an issue of great interest in the field of coastal activities because of the non-linear behavior of the wave height and its complexity of prediction. This study aims to present a machine learning model to forecast the significant wave height of the oceanographic wave measuring buoys anchored at Mooloolaba of the Queensland Government Data. Modeling was performed by a multilayer perceptron neural network-genetic algorithm (GA-MLP), considering Relu(x) as the activation function of the MLPNN. The GA is in charge of optimized the MLPNN hyperparameters (learning rate, hidden layers, neurons, and activation functions) and wrapper feature selection for the window width size. Results are assessed using Mean Square Error (MSE), Root Mean Square Error (RMSE), and Mean Absolute Error (MAE). The GAMLPNN algorithm was performed with a population size of thirty individuals for eight generations for the prediction optimization of 5 steps forward, obtaining a performance evaluation of 0.00104 MSE, 0.03222 RMSE, 0.02338 MAE, and 0.71163% of MAPE. The results of the analysis suggest that the MLPNNGA model is effective in predicting significant wave height in a one-step forecast with distant time windows, presenting 0.00014 MSE, 0.01180 RMSE, 0.00912 MAE, and 0.52500% of MAPE with 0.99940 of correlation factor. The GA-MLP algorithm was compared with the ARIMA forecasting model, presenting better performance criteria in all performance criteria, validating the potential of this algorithm.

Keywords: significant wave height, machine learning optimization, multilayer perceptron neural networks, evolutionary algorithms

Procedia PDF Downloads 104
27867 Constructivism Learning Management in Mathematics Analysis Courses

Authors: Komon Paisal

Abstract:

The purposes of this research were (1) to create a learning activity for constructivism, (2) study the Mathematical Analysis courses learning achievement, and (3) study students’ attitude toward the learning activity for constructivism. The samples in this study were divided into 2 parts including 3 Mathematical Analysis courses instructors of Suan Sunandha Rajabhat University who provided basic information and attended the seminar and 17 Mathematical Analysis courses students who were studying in the academic and engaging in the learning activity for constructivism. The research instruments were lesson plans constructivism, subjective Mathematical Analysis courses achievement test with reliability index of 0.8119, and an attitude test concerning the students’ attitude toward the Mathematical Analysis courses learning activity for constructivism. The result of the research show that the efficiency of the Mathematical Analysis courses learning activity for constructivism is 73.05/72.16, which is more than expected criteria of 70/70. The research additionally find that the average score of learning achievement of students who engaged in the learning activities for constructivism are equal to 70% and the students’ attitude toward the learning activity for constructivism are at the medium level.

Keywords: constructivism, learning management, mathematics analysis courses, learning activity

Procedia PDF Downloads 529
27866 Prediction of MicroRNA-Target Gene by Machine Learning Algorithms in Lung Cancer Study

Authors: Nilubon Kurubanjerdjit, Nattakarn Iam-On, Ka-Lok Ng

Abstract:

MicroRNAs are small non-coding RNA found in many different species. They play crucial roles in cancer such as biological processes of apoptosis and proliferation. The identification of microRNA-target genes can be an essential first step towards to reveal the role of microRNA in various cancer types. In this paper, we predict miRNA-target genes for lung cancer by integrating prediction scores from miRanda and PITA algorithms used as a feature vector of miRNA-target interaction. Then, machine-learning algorithms were implemented for making a final prediction. The approach developed in this study should be of value for future studies into understanding the role of miRNAs in molecular mechanisms enabling lung cancer formation.

Keywords: microRNA, miRNAs, lung cancer, machine learning, Naïve Bayes, SVM

Procedia PDF Downloads 397
27865 Systematic Review of Functional Analysis in Brazil

Authors: Felipe Magalhaes Lemos

Abstract:

Functional behavior analysis is a procedure that has been studied for several decades by behavior analysts. In Brazil, we still have few studies in the area, so it was decided to carry out a systematic review of the articles published in the area by Brazilians. A search was done on the following scientific article registration sites: PsycINFO, ERIC, ISI Web of Science, Virtual Health Library. The research includes (a) peer-reviewed studies that (b) have been carried out in Brazil containing (c) functional assessment as a pre-treatment through (d) experimental procedures, direct or indirect observation and measurement of behavior problems (e) demonstrating a relationship between environmental events and behavior. During the review, 234 papers were found; however, only 9 were included in the final analysis. Of the 9 articles extracted, only 2 presented functional analysis procedures with manipulation of environmental variables, while the other 7 presented different procedures for a descriptive behavior assessment. Only the two studies using "functional analysis" used graphs to demonstrate the prevalent function of the behavior. Other studies described procedures and did not make clear the causal relationship between environment and behavior. There is still confusion in Brazil regarding the terms "functional analysis", "descriptive assessment" and "contingency analysis," which are generally treated in the same way. This study shows that few articles are published with a focus on functional analysis in Brazil.

Keywords: behavior, contingency, descriptive assessment, functional analysis

Procedia PDF Downloads 141
27864 Manufacturing Process and Cost Estimation through Process Detection by Applying Image Processing Technique

Authors: Chalakorn Chitsaart, Suchada Rianmora, Noppawat Vongpiyasatit

Abstract:

In order to reduce the transportation time and cost for direct interface between customer and manufacturer, the image processing technique has been introduced in this research where designing part and defining manufacturing process can be performed quickly. A3D virtual model is directly generated from a series of multi-view images of an object, and it can be modified, analyzed, and improved the structure, or function for the further implementations, such as computer-aided manufacturing (CAM). To estimate and quote the production cost, the user-friendly platform has been developed in this research where the appropriate manufacturing parameters and process detections have been identified and planned by CAM simulation.

Keywords: image processing technique, feature detections, surface registrations, capturing multi-view images, Production costs and Manufacturing processes

Procedia PDF Downloads 245
27863 An Adaptive Oversampling Technique for Imbalanced Datasets

Authors: Shaukat Ali Shahee, Usha Ananthakumar

Abstract:

A data set exhibits class imbalance problem when one class has very few examples compared to the other class, and this is also referred to as between class imbalance. The traditional classifiers fail to classify the minority class examples correctly due to its bias towards the majority class. Apart from between-class imbalance, imbalance within classes where classes are composed of a different number of sub-clusters with these sub-clusters containing different number of examples also deteriorates the performance of the classifier. Previously, many methods have been proposed for handling imbalanced dataset problem. These methods can be classified into four categories: data preprocessing, algorithmic based, cost-based methods and ensemble of classifier. Data preprocessing techniques have shown great potential as they attempt to improve data distribution rather than the classifier. Data preprocessing technique handles class imbalance either by increasing the minority class examples or by decreasing the majority class examples. Decreasing the majority class examples lead to loss of information and also when minority class has an absolute rarity, removing the majority class examples is generally not recommended. Existing methods available for handling class imbalance do not address both between-class imbalance and within-class imbalance simultaneously. In this paper, we propose a method that handles between class imbalance and within class imbalance simultaneously for binary classification problem. Removing between class imbalance and within class imbalance simultaneously eliminates the biases of the classifier towards bigger sub-clusters by minimizing the error domination of bigger sub-clusters in total error. The proposed method uses model-based clustering to find the presence of sub-clusters or sub-concepts in the dataset. The number of examples oversampled among the sub-clusters is determined based on the complexity of sub-clusters. The method also takes into consideration the scatter of the data in the feature space and also adaptively copes up with unseen test data using Lowner-John ellipsoid for increasing the accuracy of the classifier. In this study, neural network is being used as this is one such classifier where the total error is minimized and removing the between-class imbalance and within class imbalance simultaneously help the classifier in giving equal weight to all the sub-clusters irrespective of the classes. The proposed method is validated on 9 publicly available data sets and compared with three existing oversampling techniques that rely on the spatial location of minority class examples in the euclidean feature space. The experimental results show the proposed method to be statistically significantly superior to other methods in terms of various accuracy measures. Thus the proposed method can serve as a good alternative to handle various problem domains like credit scoring, customer churn prediction, financial distress, etc., that typically involve imbalanced data sets.

Keywords: classification, imbalanced dataset, Lowner-John ellipsoid, model based clustering, oversampling

Procedia PDF Downloads 412
27862 Experiences of Timing Analysis of Parallel Embedded Software

Authors: Muhammad Waqar Aziz, Syed Abdul Baqi Shah

Abstract:

The execution time analysis is fundamental to the successful design and execution of real-time embedded software. In such analysis, the Worst-Case Execution Time (WCET) of a program is a key measure, on the basis of which system tasks are scheduled. The WCET analysis of embedded software is also needed for system understanding and to guarantee its behavior. WCET analysis can be performed statically (without executing the program) or dynamically (through measurement). Traditionally, research on the WCET analysis assumes sequential code running on single-core platforms. However, as computation is steadily moving towards using a combination of parallel programs and multi-core hardware, new challenges in WCET analysis need to be addressed. In this article, we report our experiences of performing the WCET analysis of Parallel Embedded Software (PES) running on multi-core platform. The primary purpose was to investigate how WCET estimates of PES can be computed statically, and how they can be derived dynamically. Our experiences, as reported in this article, include the challenges we faced, possible suggestions to these challenges and the workarounds that were developed. This article also provides observations on the benefits and drawbacks of deriving the WCET estimates using the said methods and provides useful recommendations for further research in this area.

Keywords: embedded software, worst-case execution-time analysis, static flow analysis, measurement-based analysis, parallel computing

Procedia PDF Downloads 320
27861 A Geographical Information System Supported Method for Determining Urban Transformation Areas in the Scope of Disaster Risks in Kocaeli

Authors: Tayfun Salihoğlu

Abstract:

Following the Law No: 6306 on Transformation of Disaster Risk Areas, urban transformation in Turkey found its legal basis. In the best practices all over the World, the urban transformation was shaped as part of comprehensive social programs through the discourses of renewing the economic, social and physical degraded parts of the city, producing spaces resistant to earthquakes and other possible disasters and creating a livable environment. In Turkish practice, a contradictory process is observed. In this study, it is aimed to develop a method for better understanding of the urban space in terms of disaster risks in order to constitute a basis for decisions in Kocaeli Urban Transformation Master Plan, which is being prepared by Kocaeli Metropolitan Municipality. The spatial unit used in the study is the 50x50 meter grids. In order to reflect the multidimensionality of urban transformation, three basic components that have spatial data in Kocaeli were identified. These components were named as 'Problems in Built-up Areas', 'Disaster Risks arising from Geological Conditions of the Ground and Problems of Buildings', and 'Inadequacy of Urban Services'. Each component was weighted and scored for each grid. In order to delimitate urban transformation zones Optimized Outlier Analysis (Local Moran I) in the ArcGIS 10.6.1 was conducted to test the type of distribution (clustered or scattered) and its significance on the grids by assuming the weighted total score of the grid as Input Features. As a result of this analysis, it was found that the weighted total scores were not significantly clustering at all grids in urban space. The grids which the input feature is clustered significantly were exported as the new database to use in further mappings. Total Score Map reflects the significant clusters in terms of weighted total scores of 'Problems in Built-up Areas', 'Disaster Risks arising from Geological Conditions of the Ground and Problems of Buildings' and 'Inadequacy of Urban Services'. Resulting grids with the highest scores are the most likely candidates for urban transformation in this citywide study. To categorize urban space in terms of urban transformation, Grouping Analysis in ArcGIS 10.6.1 was conducted to data that includes each component scores in significantly clustered grids. Due to Pseudo Statistics and Box Plots, 6 groups with the highest F stats were extracted. As a result of the mapping of the groups, it can be said that 6 groups can be interpreted in a more meaningful manner in relation to the urban space. The method presented in this study can be magnified due to the availability of more spatial data. By integrating with other data to be obtained during the planning process, this method can contribute to the continuation of research and decision-making processes of urban transformation master plans on a more consistent basis.

Keywords: urban transformation, GIS, disaster risk assessment, Kocaeli

Procedia PDF Downloads 117
27860 Predictive Analysis for Big Data: Extension of Classification and Regression Trees Algorithm

Authors: Ameur Abdelkader, Abed Bouarfa Hafida

Abstract:

Since its inception, predictive analysis has revolutionized the IT industry through its robustness and decision-making facilities. It involves the application of a set of data processing techniques and algorithms in order to create predictive models. Its principle is based on finding relationships between explanatory variables and the predicted variables. Past occurrences are exploited to predict and to derive the unknown outcome. With the advent of big data, many studies have suggested the use of predictive analytics in order to process and analyze big data. Nevertheless, they have been curbed by the limits of classical methods of predictive analysis in case of a large amount of data. In fact, because of their volumes, their nature (semi or unstructured) and their variety, it is impossible to analyze efficiently big data via classical methods of predictive analysis. The authors attribute this weakness to the fact that predictive analysis algorithms do not allow the parallelization and distribution of calculation. In this paper, we propose to extend the predictive analysis algorithm, Classification And Regression Trees (CART), in order to adapt it for big data analysis. The major changes of this algorithm are presented and then a version of the extended algorithm is defined in order to make it applicable for a huge quantity of data.

Keywords: predictive analysis, big data, predictive analysis algorithms, CART algorithm

Procedia PDF Downloads 137
27859 Stress Perception, Social Supports and Family Function among Military Inpatients with Adjustment Disorders in Taiwan

Authors: Huey-Fang Sun, Wei-Kai Weng, Mei-Kuang Chao, Hui-Shan Hsu, Tsai-Yin Shih

Abstract:

Psycho-social stress is important for mental illness and the presence of emotional and behavioral symptoms to an identifiable event is the central feature of adjustment disorders. However, whether patients with adjustment disorders have been raised in family with poor family functions and social supports and have higher stress perception than their peer group when they both experienced a similar stressful environment remains unknown. The specific aims of the study are to investigate the correlation among the family function, social supports and the level of stress perception and to test the hypothesis that military patients with adjustment disorders would have lower family function, lower social supports and higher stress perception than their healthy colleagues recruited in the same cohort for military services given their common exposure to similar stressful environments. Methods: The study was conducted in four hospitals of northern part of Taiwan from July 1, 2015 to June 30, 2017 and a matched case-control study design was used. The inclusion criteria for potential patient participants were psychiatric inpatients that serviced in military during the study period and met the diagnosis of adjustment disorders. Patients who had been admitted to psychiatric ward before or had illiteracy problem were excluded. A healthy military control sample matched by the same military service unit, gender, and recruited cohort was invited to participate the study as well. Totally 74 participants (37 patients and 37 controls) completed the consent forms and filled out the research questionnaires. Questionnaires used in the study included Perceived Stress Scale (PSS) as a measure of stress perception; Family APGAR as a measure of family function, and Multidimensional Scale of Perceived Social Support (MSPSS) as a measure of social supports. Pearson correlation analysis and t-test were applied for statistical analysis. Results: The analysis results showed that PSS level significantly negatively correlated with three social support subscales (family subscale, r= -.37, P < .05; friend subscale, r= -.38, P < .05; significant other subscale, r= -.39, P < .05). A negative correlation between PSS level and Family APGAR only reached a borderline significant level (P= .06). The t-test results for PSS scores, Family APGAR levels, and three subscale scores of MSPSS between patient and control participants were all significantly different (P < .001, P < .05, P < .05, P < .05, P < .05, respectively) and the patient participants had higher stress perception scores, lower social supports and lower family function scores than the healthy control participants. Conclusions: Our study suggested that family function and social supports were negatively correlated with patients’ subjective stress perception. Military patients with adjustment disorders tended to have higher stress perception and lower family function and social supports than those military peers who remained healthy and still provided services in their military units.

Keywords: adjustment disorders, family function, social support, stress perception

Procedia PDF Downloads 190
27858 Measuring e-Business Activities of SMEs in Yemen

Authors: Ahmed Abdullah, Lyndon Murphy, Brychan Thomas

Abstract:

Increasingly, in developed and developing countries, small and medium-sized enterprises (SMEs) are becoming more important to national economies due to their strategic significance in developing different industrial sectors Worldwide. SMEs play a major role in an economy by significantly contributing to the enhancement of the countries’ gross domestic product and its labor force by creating more job opportunities and developing skilled labor. Rapid development has been witnessed in the World within different aspects of life, especially the technological revolution such as e-business. This has become a feature of this era requiring us to ‘keep-up’ in our daily society, losing the traditional pattern of our daily lives and combining scientific methodology of an analytical and experimental nature. In the past few years the emergence of e-business and e-commerce in the world has been carefully surveyed. There is widespread use of the internet in every aspect and phase of business.

Keywords: e-business, e-business activities, SMEs, e-adoption ladder

Procedia PDF Downloads 528
27857 Study of Temperature Difference and Current Distribution in Parallel-Connected Cells at Low Temperature

Authors: Sara Kamalisiahroudi, Jun Huang, Zhe Li, Jianbo Zhang

Abstract:

Two types of commercial cylindrical lithium ion batteries (Panasonic 3.4 Ah NCR-18650B and Samsung 2.9 Ah INR-18650), were investigated experimentally. The capacities of these samples were individually measured using constant current-constant voltage (CC-CV) method at different ambient temperatures (-10 ℃, 0 ℃, 25 ℃). Their internal resistance was determined by electrochemical impedance spectroscopy (EIS) and pulse discharge methods. The cells with different configurations of parallel connection NCR-NCR, INR-INR and NCR-INR were charged/discharged at the aforementioned ambient temperatures. The results showed that the difference of internal resistance between cells much more evident at low temperatures. Furthermore, the parallel connection of NCR-NCR exhibits the most uniform temperature distribution in cells at -10 ℃, this feature is quite favorable for the safety of the battery pack.

Keywords: batteries in parallel connection, internal resistance, low temperature, temperature difference, current distribution

Procedia PDF Downloads 476
27856 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications

Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi

Abstract:

China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.

Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron

Procedia PDF Downloads 387
27855 DeClEx-Processing Pipeline for Tumor Classification

Authors: Gaurav Shinde, Sai Charan Gongiguntla, Prajwal Shirur, Ahmed Hambaba

Abstract:

Health issues are significantly increasing, putting a substantial strain on healthcare services. This has accelerated the integration of machine learning in healthcare, particularly following the COVID-19 pandemic. The utilization of machine learning in healthcare has grown significantly. We introduce DeClEx, a pipeline that ensures that data mirrors real-world settings by incorporating Gaussian noise and blur and employing autoencoders to learn intermediate feature representations. Subsequently, our convolutional neural network, paired with spatial attention, provides comparable accuracy to state-of-the-art pre-trained models while achieving a threefold improvement in training speed. Furthermore, we provide interpretable results using explainable AI techniques. We integrate denoising and deblurring, classification, and explainability in a single pipeline called DeClEx.

Keywords: machine learning, healthcare, classification, explainability

Procedia PDF Downloads 51
27854 Critical Activity Effect on Project Duration in Precedence Diagram Method

Authors: Salman Ali Nisar, Koshi Suzuki

Abstract:

Precedence Diagram Method (PDM) with its additional relationships i.e., start-to-start, finish-to-finish, and start-to-finish, between activities provides more flexible schedule than traditional Critical Path Method (CPM). But, changing the duration of critical activities in PDM network will have anomalous effect on critical path. Researchers have proposed some classification of critical activity effects. In this paper, we do further study on classifications of critical activity effect and provide more information in detailed. Furthermore, we determine the maximum amount of time for each class of critical activity effect by which the project managers can control the dynamic feature (shortening/lengthening) of critical activities and project duration more efficiently.

Keywords: construction project management, critical path method, project scheduling, precedence diagram method

Procedia PDF Downloads 509
27853 Random Subspace Ensemble of CMAC Classifiers

Authors: Somaiyeh Dehghan, Mohammad Reza Kheirkhahan Haghighi

Abstract:

The rapid growth of domains that have data with a large number of features, while the number of samples is limited has caused difficulty in constructing strong classifiers. To reduce the dimensionality of the feature space becomes an essential step in classification task. Random subspace method (or attribute bagging) is an ensemble classifier that consists of several classifiers that each base learner in ensemble has subset of features. In the present paper, we introduce Random Subspace Ensemble of CMAC neural network (RSE-CMAC), each of which has training with subset of features. Then we use this model for classification task. For evaluation performance of our model, we compare it with bagging algorithm on 36 UCI datasets. The results reveal that the new model has better performance.

Keywords: classification, random subspace, ensemble, CMAC neural network

Procedia PDF Downloads 327
27852 Predictive Modeling of Bridge Conditions Using Random Forest

Authors: Miral Selim, May Haggag, Ibrahim Abotaleb

Abstract:

The aging of transportation infrastructure presents significant challenges, particularly concerning the monitoring and maintenance of bridges. This study investigates the application of Random Forest algorithms for predictive modeling of bridge conditions, utilizing data from the US National Bridge Inventory (NBI). The research is significant as it aims to improve bridge management through data-driven insights that can enhance maintenance strategies and contribute to overall safety. Random Forest is chosen for its robustness, ability to handle complex, non-linear relationships among variables, and its effectiveness in feature importance evaluation. The study begins with comprehensive data collection and cleaning, followed by the identification of key variables influencing bridge condition ratings, including age, construction materials, environmental factors, and maintenance history. Random Forest is utilized to examine the relationships between these variables and the predicted bridge conditions. The dataset is divided into training and testing subsets to evaluate the model's performance. The findings demonstrate that the Random Forest model effectively enhances the understanding of factors affecting bridge conditions. By identifying bridges at greater risk of deterioration, the model facilitates proactive maintenance strategies, which can help avoid costly repairs and minimize service disruptions. Additionally, this research underscores the value of data-driven decision-making, enabling better resource allocation to prioritize maintenance efforts where they are most necessary. In summary, this study highlights the efficiency and applicability of Random Forest in predictive modeling for bridge management. Ultimately, these findings pave the way for more resilient and proactive management of bridge systems, ensuring their longevity and reliability for future use.

Keywords: data analysis, random forest, predictive modeling, bridge management

Procedia PDF Downloads 13