Search results for: generate
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1931

Search results for: generate

1871 Image Recognition and Anomaly Detection Powered by GANs: A Systematic Review

Authors: Agastya Pratap Singh

Abstract:

Generative Adversarial Networks (GANs) have emerged as powerful tools in the fields of image recognition and anomaly detection due to their ability to model complex data distributions and generate realistic images. This systematic review explores recent advancements and applications of GANs in both image recognition and anomaly detection tasks. We discuss various GAN architectures, such as DCGAN, CycleGAN, and StyleGAN, which have been tailored to improve accuracy, robustness, and efficiency in visual data analysis. In image recognition, GANs have been used to enhance data augmentation, improve classification models, and generate high-quality synthetic images. In anomaly detection, GANs have proven effective in identifying rare and subtle abnormalities across various domains, including medical imaging, cybersecurity, and industrial inspection. The review also highlights the challenges and limitations associated with GAN-based methods, such as instability during training and mode collapse, and suggests future research directions to overcome these issues. Through this review, we aim to provide researchers with a comprehensive understanding of the capabilities and potential of GANs in transforming image recognition and anomaly detection practices.

Keywords: generative adversarial networks, image recognition, anomaly detection, DCGAN, CycleGAN, StyleGAN, data augmentation

Procedia PDF Downloads 18
1870 A New 3D Shape Descriptor Based on Multi-Resolution and Multi-Block CS-LBP

Authors: Nihad Karim Chowdhury, Mohammad Sanaullah Chowdhury, Muhammed Jamshed Alam Patwary, Rubel Biswas

Abstract:

In content-based 3D shape retrieval system, achieving high search performance has become an important research problem. A challenging aspect of this problem is to find an effective shape descriptor which can discriminate similar shapes adequately. To address this problem, we propose a new shape descriptor for 3D shape models by combining multi-resolution with multi-block center-symmetric local binary pattern operator. Given an arbitrary 3D shape, we first apply pose normalization, and generate a set of multi-viewed 2D rendered images. Second, we apply Gaussian multi-resolution filter to generate several levels of images from each of 2D rendered image. Then, overlapped sub-images are computed for each image level of a multi-resolution image. Our unique multi-block CS-LBP comes next. It allows the center to be composed of m-by-n rectangular pixels, instead of a single pixel. This process is repeated for all the 2D rendered images, derived from both ‘depth-buffer’ and ‘silhouette’ rendering. Finally, we concatenate all the features vectors into one dimensional histogram as our proposed 3D shape descriptor. Through several experiments, we demonstrate that our proposed 3D shape descriptor outperform the previous methods by using a benchmark dataset.

Keywords: 3D shape retrieval, 3D shape descriptor, CS-LBP, overlapped sub-images

Procedia PDF Downloads 441
1869 A Business Model Design Process for Social Enterprises: The Critical Role of the Environment

Authors: Hadia Abdel Aziz, Raghda El Ebrashi

Abstract:

Business models are shaped by their design space or the environment they are designed to be implemented in. The rapidly changing economic, technological, political, regulatory and market external environment severely affects business logic. This is particularly true for social enterprises whose core mission is to transform their environments, and thus, their whole business logic revolves around the interchange between the enterprise and the environment. The context in which social business operates imposes different business design constraints while at the same time, open up new design opportunities. It is also affected to a great extent by the impact that successful enterprises generate; a continuous loop of interaction that needs to be managed through a dynamic capability in order to generate a lasting powerful impact. This conceptual research synthesizes and analyzes literature on social enterprise, social enterprise business models, business model innovation, business model design, and the open system view theory to propose a new business model design process for social enterprises that takes into account the critical role of environmental factors. This process would help the social enterprise develop a dynamic capability that ensures the alignment of its business model to its environmental context, thus, maximizing its probability of success.

Keywords: social enterprise, business model, business model design, business model environment

Procedia PDF Downloads 370
1868 Droplet Impact on a High Frequency Vibrating Surface

Authors: Maryam Ebrahimiazar, Parsia Mohammadshahi, Amirreza Amighi, Nasser Ashgriz

Abstract:

Ultrasonic atomization is used to generate micron size aerosols. In this work, the aerosol formation by the atomization of a parent droplet dripping from a capillary needle onto the surface of a Teflon coated piezoelectric vibrating at 2.5 MHz is studied, and different steps of atomization are categorized. After the droplet impacts on the piezoelectric, surface acoustic streaming deforms the droplet into a fountain shape. This fountain soon collapses and forms a liquid layer. The breakup of the liquid layer results in the generation of both large ( 100 microns) and small drops (few microns). Next, the residual drops from the liquid layer start to be atomized to generate few micron size droplets. The high velocity and explosive aerosol formation in this step are better explained in terms of cavitation theory. However, the combination of both capillary waves and cavitation theory seem to be responsible for few-micron droplet generation. The current study focuses on both qualitative and quantitative aspects of fountain formation for both ethyl-alcohol and water. Even though the general steps of atomization are the same for both liquids, the quantitative results indicate that some noticeable differences lie between them.

Keywords: droplet breakup, ultrasonic atomization, acoustic streaming, droplet oscillation

Procedia PDF Downloads 178
1867 Forecasting Optimal Production Program Using Profitability Optimization by Genetic Algorithm and Neural Network

Authors: Galal H. Senussi, Muamar Benisa, Sanja Vasin

Abstract:

In our business field today, one of the most important issues for any enterprises is cost minimization and profit maximization. Second issue is how to develop a strong and capable model that is able to give us desired forecasting of these two issues. Many researches deal with these issues using different methods. In this study, we developed a model for multi-criteria production program optimization, integrated with Artificial Neural Network. The prediction of the production cost and profit per unit of a product, dealing with two obverse functions at same time can be extremely difficult, especially if there is a great amount of conflict information about production parameters. Feed-Forward Neural Networks are suitable for generalization, which means that the network will generate a proper output as a result to input it has never seen. Therefore, with small set of examples the network will adjust its weight coefficients so the input will generate a proper output. This essential characteristic is of the most important abilities enabling this network to be used in variety of problems spreading from engineering to finance etc. From our results as we will see later, Feed-Forward Neural Networks has a strong ability and capability to map inputs into desired outputs.

Keywords: project profitability, multi-objective optimization, genetic algorithm, Pareto set, neural networks

Procedia PDF Downloads 445
1866 Exploring Students' Understanding about Bullying in Private Colleges in Rawalpindi, Pakistan

Authors: Alveena Khan

Abstract:

The objective of this research is to explore students’ understanding about bullying and different bullying types. Nowadays bullying is considered as an important social issue around the world because it has long lasting effects on students’ lives. Sometimes due to bullying students commit suicide, they lose confidence and become isolated. This research used qualitative research approach. In order to generate data, triangulation was considered for the verification and reliability of the generated data. Semi-structured interview, non-participant observation, and case studies were conducted. This research focused on five major private colleges and 20 students (both female and male) participated in Rawalpindi, Pakistan. The data generated included approximately 45 hours of total interviews. Thematic analysis was used for data analysis and followed grounded theory to generate themes. The findings of the research highlights that bullying does prevail in studied private colleges, mostly in the form of verbal and physical bullying. No specific gender difference was found in experiencing verbal and physical bullying. Furthermore, from students’ point of view, college administrators are responsible to deal with bullying. The researcher suggests that there must be a proper check and balance system and anti-bullying programs should be held in colleges to create a protective and healthy environment in which students do not face bullying.

Keywords: bullying, college student, physical and verbal bullying, qualitative research

Procedia PDF Downloads 157
1865 Spatial Practice Towards Urban Identity: The Shift, Limitation and Contemporary Value of Christopher

Authors: Botao Zhao, Hong Jiang

Abstract:

Christopher Alexander's urban design theory challenges the technical rationality of the empiricism that prevailsin the first half of the 20th century. Alexander emphasizes the wholeness of the city through progressive design, conceptual-based participation, shaping of centrality, and other principles. Based on Christopher Alexander’s comprehensive book “a new theory of urban design” and by combining with other major works, this paper puts Alexander into the history of the post-modern shift of architecture and urban planning in the middle and late 20th century and analyzes the uniqueness of Alexander’s systematization of spatial context. Despite the overemphasis on the initiative of design, Alexander's attempt to discover the “objectivity” of good space -the ability to generate people's urban identity-through an expanded concept of space, and a systematic approach to design restructures the visceral connection between urban space and human. The concept of urban identity is then decomposed into the identity of the physical setting, identity of process, and identity of meaning. Professionals need to learn from the reality and history of urban space to construct spatial“vocabulary libraries” and create the wholeness of the city, and in which process strengthen the subjectivity of the discipline simultaneously, to generate living structures in which urban identity could be ultimately cultivated.

Keywords: christopher alexander, a new theory of urban design, Urban identity, pattern language, urban design

Procedia PDF Downloads 150
1864 Innovative Ideas through Collaboration with Potential Users

Authors: Martin Hewing, Katharina Hölzle

Abstract:

Organizations increasingly use environmental stimuli and ideas from users within participatory innovation processes in order to tap new sources of knowledge. The research presented in this article focuses on users who shape the distant edges of markets and currently are not using products and services from a domain– so called potential users. Those users at the peripheries are perceived to contribute more novel information, by which they better reflect shifts in needs and behavior than current users in the core market. Their contributions in collaborative and creative problem-solving processes and how they generate ideas for discontinuous innovations are of particular interest. With an experimental design, we compare ideas from potential and current users and analyze the effects of cognitive distance in collaboration and the utilization of explicit and tacit knowledge. We find potential users to generate more original ideas, particularly when they collaborate with someone experienced within the domain. Their ideas are most obviously characterized by an increased level of surprise and unusualness compared to dominant designs, which is rooted in contexts and does not require technological leaps. Collaboration with potential users can therefore result in new ways to leverage technological competences. Furthermore, the cross-fertilization arising from cognitive distance between a potential and a current user is asymmetric due to differences in the nature of their utilized knowledge and personal objectives. This paper discusses implications for innovation research and the management of early innovation processes.

Keywords: user collaboration, co-creation, discontinuous innovation, innovation research

Procedia PDF Downloads 505
1863 An Enhanced MEIT Approach for Itemset Mining Using Levelwise Pruning

Authors: Tanvi P. Patel, Warish D. Patel

Abstract:

Association rule mining forms the core of data mining and it is termed as one of the well-known methodologies of data mining. Objectives of mining is to find interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. For efficient targeted query processing, finding frequent patterns and itemset mining, there is an efficient way to generate an itemset tree structure named Memory Efficient Itemset Tree. Memory efficient IT is efficient for storing itemsets, but takes more time as compare to traditional IT. The proposed strategy generates maximal frequent itemsets from memory efficient itemset tree by using levelwise pruning. For that firstly pre-pruning of items based on minimum support count is carried out followed by itemset tree reconstruction. By having maximal frequent itemsets, less number of patterns are generated as well as tree size is also reduced as compared to MEIT. Therefore, an enhanced approach of memory efficient IT proposed here, helps to optimize main memory overhead as well as reduce processing time.

Keywords: association rule mining, itemset mining, itemset tree, meit, maximal frequent pattern

Procedia PDF Downloads 368
1862 Science Process Skill and Interest Preschooler in Learning Early Science through Mobile Application

Authors: Seah Siok Peh, Hashimah Mohd Yunus, Nor Hashimah Hashim, Mariam Mohamad

Abstract:

A country needs a workforce that encompasses knowledge, skilled labourers to generate innovation, productivity and being able to solve problems creatively via technology. Science education experts believe that the mastery of science skills help preschoolers to generate such knowledge on scientific concepts by providing constructive experiences. Science process skills are skills used by scientists to study or investigate a problem, issue, problem or phenomenon of science. In line with the skills used by scientists. The purpose of this study is to investigate the basic science process skill and interest in learning early science through mobile application. This study aimed to explore six spesific basic science process skills by the use of a mobile application as a learning support tool. The descriptive design also discusses on the extent of the use of mobile application in improving basic science process skill in young children. This study consists of six preschoolers and two preschool teachers from two different classes located in Perak, Malaysia. Techniques of data collection are inclusive of observations, interviews and document analysis. This study will be useful to provide information and give real phenomena to policy makers especially Ministry of education in Malaysia.

Keywords: science education, basic science process skill, interest, early science, mobile application

Procedia PDF Downloads 244
1861 Is there Anything Useful in That? High Value Product Extraction from Artemisia annua L. in the Spent Leaf and Waste Streams

Authors: Anike Akinrinlade

Abstract:

The world population is estimated to grow from 7.1 billion to 9.22 billion by 2075, increasing therefore by 23% from the current global population. Much of the demographic changes up to 2075 will take place in the less developed regions. There are currently 54 countries which fall under the bracket of being defined as having ‘low-middle income’ economies and need new ways to generate valuable products from current resources that is available. Artemisia annua L is well used for the extraction of the phytochemical artemisinin, which accounts for around 0.01 to 1.4 % dry weight of the plant. Artemisinin is used in the treatment of malaria, a disease rampart in sub-Saharan Africa and in many other countries. Once artemisinin has been extracted the spent leaf and waste streams are disposed of as waste. A feasibility study was carried out looking at increasing the biomass value of A. annua, by designing a biorefinery where spent leaf and waste streams are utilized for high product generation. Quercetin, ferulic acid, dihydroartemisinic acid, artemisinic acid and artemsinin were screened for in the waste stream samples and the spent leaf. The analytical results showed that artemisinin, artemisinic acid and dihydroartemisinic acid were present in the waste extracts as well as camphor and arteannuin b. Ongoing effects are looking at using more industrially relevant solvents to extract the phytochemicals from the waste fractions and investigate how microwave pyrolysis of spent leaf can be utilized to generate bio-products.

Keywords: high value product generation, bioinformatics, biomedicine, waste streams, spent leaf

Procedia PDF Downloads 347
1860 A Comparative Study of Primary Revenue Sources in the U.S. Professional Sports, Intercollegiate Sports, and Sporting Goods Industry

Authors: Chenghao Ma

Abstract:

This paper mainly examines and compares the primary revenue sources in the professional sports, intercollegiate sports, and sporting goods industries in the U.S. In the professional team sport, revenues may come from different resources, including broadcasting rights, ticket sales, corporate partnerships, naming rights, licensed merchandise, luxury suites, club seating, ancillary activities, and transfer fees. Many universities use university budgets and student fees to cover the cost of collegiate athletics. Other sources of revenue include ticket sales, broadcast rights, concessions, corporate partnerships, cash contributions from alumni, and others. Revenues in the sporting goods industry are very different compared with professional sports teams and collegiate athletics. Sporting goods companies mainly sell a line of products and equipment to generate revenue. Revenues are critical for sports organizations, including professional sports teams, intercollegiate athletics, and sporting goods companies. There are similarities and differences among these areas. Sports managers are looking for new ways to generate revenues, and there are many changes of sources because of the development of the internet and technology. Compared with intercollegiate athletics, professional sport and sporting goods companies will create more revenue opportunities globally.

Keywords: revenue sources, professional sports, intercollegiate athletics, sporting goods industry

Procedia PDF Downloads 219
1859 Enhancing Aerodynamic Performance of Savonius Vertical Axis Turbine Used with Triboelectric Generator

Authors: Bhavesh Dadhich, Fenil Bamnoliya, Akshita Swaminathan

Abstract:

This project aims to design a system to generate energy from flowing wind due to the motion of a vehicle on the road or from the flow of wind in compact areas to utilize the wasteful energy into a useful one. It is envisaged through a design and aerodynamic performance improvement of a Savonius vertical axis wind turbine rotor and used in an integrated system with a Triboelectric Nanogenerator (TENG) that can generate a good amount of electrical energy. Aerodynamic calculations are performed numerically using Computational Fluid Dynamics software, and TENG's performance is evaluated analytically. The Turbine's coefficient of power is validated with published results for an inlet velocity of 7 m/s with a Tip Speed Ratio of 0.75 and found to reasonably agree with that of experiment results. The baseline design is modified with a new blade arc angle and rotor position angle based on the recommended parameter ranges suggested by previous researchers. Simulations have been performed for different T.S.R. values ranging from 0.25 to 1.5 with an interval of 0.25 with two applicable free stream velocities of 5 m/s and 7m/s. Finally, the newly designed VAWT CFD performance results are used as input for the analytical performance prediction of the triboelectric nanogenerator. The results show that this approach could be feasible and useful for small power source applications.

Keywords: savonius turbine, power, overlap ratio, tip speed ratio, TENG

Procedia PDF Downloads 119
1858 Optimization of Spatial Light Modulator to Generate Aberration Free Optical Traps

Authors: Deepak K. Gupta, T. R. Ravindran

Abstract:

Holographic Optical Tweezers (HOTs) in general use iterative algorithms such as weighted Gerchberg-Saxton (WGS) to generate multiple traps, which produce traps with 99% uniformity theoretically. But in experiments, it is the phase response of the spatial light modulator (SLM) which ultimately determines the efficiency, uniformity, and quality of the trap spots. In general, SLMs show a nonlinear phase response behavior, and they may even have asymmetric phase modulation depth before and after π. This affects the resolution with which the gray levels are addressed before and after π, leading to a degraded trap performance. We present a method to optimize the SLM for a linear phase response behavior along with a symmetric phase modulation depth around π. Further, we optimize the SLM for its varying phase response over different spatial regions by optimizing the brightness/contrast and gamma of the hologram in different subsections. We show the effect of the optimization on an array of trap spots resulting in improved efficiency and uniformity. We also calculate the spot sharpness metric and trap performance metric and show a tightly focused spot with reduced aberration. The trap performance is compared by calculating the trap stiffness of a trapped particle in a given trap spot before and after aberration correction. The trap stiffness is found to improve by 200% after the optimization.

Keywords: spatial light modulator, optical trapping, aberration, phase modulation

Procedia PDF Downloads 184
1857 Mobile Application to Generate Automate Plan for Tourist in The South and West of Saudi Arabia, Saferk

Authors: Hanan M. Alghamdi, Kholud E. Alsalami, Manal I. Alshaikhi, Nouf M. Alsalami, Sara A. Awad, Ruqaya A. Alrabei

Abstract:

Tourism in Saudi Arabia is one of the emerging sectors with rapid growth. The Kingdom of Saudi Arabia is characterized by its wonderful and historical areas, which constitute important cultural and tourist landmarks. These landmarks attract the attention of the government of Saudi Arabia; hence the improvement of the tourism sector becomes one of the important axes of Saudi Arabia's vision 2030. There is a need to enhance the tourist experience by facilitating the tourism process for visitors to the Kingdom of Saudi Arabia. This project aims to design an application to serve domestic tourists and visitors from outside the Kingdom of Saudi Arabia. This application will contain an automated tourist generate plan service by sentiment analysis of comments in Google Map using Lexicon for method Rule-based approach. There are thirteen regions in the kingdom of Saudi Arabia. The regions supported in this application will be Makkah and Asir regions. According to the output of the sentiment analysis, the application will recommend restaurants and cafes, activities (parks, museums) and shopping (shopping centers) in the generated plan. After that, the system will show the user a drop-down list of “Mega-events in Saudi Arabia” containing a link to the site of events in the Kingdom of Saudi Arabia. and “important information for you” public decency regulations.

Keywords: tourist automated plan, sentiment analysis, comments in google map, tourism in Saudi Arabia

Procedia PDF Downloads 141
1856 Physical and Chemical Properties during Home Composting of Municipal Organic Solid Waste in Jordan and Production of Organic Fertilizer

Authors: Munir Rusan

Abstract:

Municipal waste management (MWM) represents a cornerstone in the effort to preserve the environment, which guarantees a healthy living environment for communities. MWM is directly affected by population growth and population density, urbanization, and tourism. In Jordan, MWM is currently managed by transferring and dumping waste into landfills. Landfills are mostly saturated and cannot receive any more waste. Besides, the organic waste, which accounts for 50% of municipal waste, will be naturally fermented in the landfills creating an unpleasant odor and emits greenhouse gases as well as generate organic leachates that are harmful to the environment. Organic waste can be aerobically composted and generate organic fertilizer called compost. Compost is very beneficial to soil and plant growth and, in general, to the ecosystem. Home composting is very common in most developed countries, but unfortunately, in developing countries such as Jordan, such an approach is not practiced and is not even socially well acceptable. The objective of this study was to evaluate the physical and chemical properties of home composting materials and to produce compost for further use as a soil amendment. The effect of compost soil application on the soil-plant system was evaluated. The soil application of the compost resulted in enhancing soil organic matter and soil N, P, and K content. The plant growth was also improved quantitatively and qualitatively. It was concluded that composting of municipal organic solid waste and soil application of the compost has a significant positive impact on the environment and soil-plant productivity.

Keywords: composting, organic solid waste, soil, plant

Procedia PDF Downloads 80
1855 Flame Spray Pyrolysis as a High-Throughput Method to Generate Gadolinium Doped Titania Nanoparticles for Augmented Radiotherapy

Authors: Malgorzata J. Rybak-Smith, Benedicte Thiebaut, Simon Johnson, Peter Bishop, Helen E. Townley

Abstract:

Gadolinium doped titania (TiO2:Gd) nanoparticles (NPs) can be activated by X-ray radiation to generate Reactive Oxygen Species (ROS), which can be effective in killing cancer cells. As such, treatment with these NPs can be used to enhance the efficacy of conventional radiotherapy. Incorporation of the NPs in to tumour tissue will permit the extension of radiotherapy to currently untreatable tumours deep within the body, and also reduce damage to neighbouring healthy cells. In an attempt to find a fast and scalable method for the synthesis of the TiO2:Gd NPs, the use of Flame Spray Pyrolysis (FSP) was investigated. A series of TiO2 NPs were generated with 1, 2, 5 and 7 mol% gadolinium dopant. Post-synthesis, the TiO2:Gd NPs were silica-coated to improve their biocompatibility. Physico-chemical characterisation was used to determine the size and stability in aqueous suspensions of the NPs. All analysed TiO2:Gd NPs were shown to have relatively high photocatalytic activity. Furthermore, the FSP synthesized silica-coated TiO2:Gd NPs generated enhanced ROS in chemico. Studies on rhabdomyosarcoma (RMS) cell lines (RD & RH30) demonstrated that in the absence of irradiation all TiO2:Gd NPs were inert. However, application of TiO2:Gd NPs to RMS cells, followed by irradiation, showed a significant decrease in cell proliferation. Consequently, our studies showed that the X-ray-activatable TiO2:Gd NPs can be prepared by a high-throughput scalable technique to provide a novel and affordable anticancer therapy.

Keywords: cancer, gadolinium, ROS, titania nanoparticles, X-ray

Procedia PDF Downloads 429
1854 Ab Initio Approach to Generate a Binary Bulk Metallic Glass Foam

Authors: Jonathan Galvan-Colin, Ariel Valladares, Renela Valladares, Alexander Valladares

Abstract:

Both porous materials and bulk metallic glasses have been studied due to their potential applications and their exceptional physical and chemical properties. However, each material presents certain drawbacks which have been thought to be overcome by generating bulk metallic glass foams (BMGF). Although some experimental reports have been performed on multicomponent BMGF, still no ab initio works have been published, as far as we know. We present an approach based on the expanding lattice (EL) method to generate binary amorphous nanoporous Cu64Zr36. Starting from two different configurations: a 108-atom crystalline cubic supercell (cCu64Zr36) and a 108-atom amorphous supercell (aCu64Zr36), both with an initial density of 8.06 g/cm3, we applied EL method to halve the density and to get 50% of porosity. After the lattice expansion the supercells were subject to ab initio molecular dynamics for 500 steps at constant room temperature. Then, the samples were geometry-optimized and characterized with the pair and radial distribution functions, bond-angle distributions and a coordination number analysis. We found that pores appeared along specific spatial directions different from one to another and that they differed in size and form as well, which we think is related to the initial structure. Due to the lack of experimental counterparts our results should be considered predictive and further studies are needed in order to handle a larger number of atoms and its implication on pore topology.

Keywords: ab initio molecular dynamics, bulk mettalic glass, porous alloy

Procedia PDF Downloads 260
1853 Test Suite Optimization Using an Effective Meta-Heuristic BAT Algorithm

Authors: Anuradha Chug, Sunali Gandhi

Abstract:

Regression Testing is a very expensive and time-consuming process carried out to ensure the validity of modified software. Due to the availability of insufficient resources to re-execute all the test cases in time constrained environment, efforts are going on to generate test data automatically without human efforts. Many search based techniques have been proposed to generate efficient, effective as well as optimized test data, so that the overall cost of the software testing can be minimized. The generated test data should be able to uncover all potential lapses that exist in the software or product. Inspired from the natural behavior of bat for searching her food sources, current study employed a meta-heuristic, search-based bat algorithm for optimizing the test data on the basis certain parameters without compromising their effectiveness. Mathematical functions are also applied that can effectively filter out the redundant test data. As many as 50 Java programs are used to check the effectiveness of proposed test data generation and it has been found that 86% saving in testing efforts can be achieved using bat algorithm while covering 100% of the software code for testing. Bat algorithm was found to be more efficient in terms of simplicity and flexibility when the results were compared with another nature inspired algorithms such as Firefly Algorithm (FA), Hill Climbing Algorithm (HC) and Ant Colony Optimization (ACO). The output of this study would be useful to testers as they can achieve 100% path coverage for testing with minimum number of test cases.

Keywords: regression testing, test case selection, test case prioritization, genetic algorithm, bat algorithm

Procedia PDF Downloads 379
1852 Fracture Control of the Soda-Lime Glass in Laser Thermal Cleavage

Authors: Jehnming Lin

Abstract:

The effects of the contact ball-lens on the soda lime glass in laser thermal cleavage with a cw Nd-YAG laser were investigated in this study. A contact ball-lens was adopted to generate a bending force on the crack formation of the soda-lime glass in the laser cutting process. The Nd-YAG laser beam (wavelength of 1064 nm) was focused through the ball-lens and transmitted to the soda-lime glass, which was coated with a carbon film on the surface with a bending force from a ball-lens to generate a tensile stress state on the surface cracking. The fracture was controlled by the contact ball-lens and a straight cutting was tested to demonstrate the feasibility. Experimental observations on the crack propagation from the leading edge, main section and trailing edge of the glass sheet were compared with various mechanical and thermal loadings. Further analyses on the stress under various laser powers and contact ball loadings were made to characterize the innovative technology. The results show that the distributions of the side crack at the leading and trailing edges are mainly dependent on the boundary condition, contact force, cutting speed and laser power. With the increase of the mechanical and thermal loadings, the region of the side cracks might be dramatically reduced with proper selection of the geometrical constraints. Therefore, the application of the contact ball-lens is a possible way to control the fracture in laser cleavage with improved cutting qualities.

Keywords: laser cleavage, stress analysis, crack visualization, laser

Procedia PDF Downloads 433
1851 A Prediction Model Using the Price Cyclicality Function Optimized for Algorithmic Trading in Financial Market

Authors: Cristian Păuna

Abstract:

After the widespread release of electronic trading, automated trading systems have become a significant part of the business intelligence system of any modern financial investment company. An important part of the trades is made completely automatically today by computers using mathematical algorithms. The trading decisions are taken almost instantly by logical models and the orders are sent by low-latency automatic systems. This paper will present a real-time price prediction methodology designed especially for algorithmic trading. Based on the price cyclicality function, the methodology revealed will generate price cyclicality bands to predict the optimal levels for the entries and exits. In order to automate the trading decisions, the cyclicality bands will generate automated trading signals. We have found that the model can be used with good results to predict the changes in market behavior. Using these predictions, the model can automatically adapt the trading signals in real-time to maximize the trading results. The paper will reveal the methodology to optimize and implement this model in automated trading systems. After tests, it is proved that this methodology can be applied with good efficiency in different timeframes. Real trading results will be also displayed and analyzed in order to qualify the methodology and to compare it with other models. As a conclusion, it was found that the price prediction model using the price cyclicality function is a reliable trading methodology for algorithmic trading in the financial market.

Keywords: algorithmic trading, automated trading systems, financial markets, high-frequency trading, price prediction

Procedia PDF Downloads 182
1850 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 134
1849 Hindi Speech Synthesis by Concatenation of Recognized Hand Written Devnagri Script Using Support Vector Machines Classifier

Authors: Saurabh Farkya, Govinda Surampudi

Abstract:

Optical Character Recognition is one of the current major research areas. This paper is focussed on recognition of Devanagari script and its sound generation. This Paper consists of two parts. First, Optical Character Recognition of Devnagari handwritten Script. Second, speech synthesis of the recognized text. This paper shows an implementation of support vector machines for the purpose of Devnagari Script recognition. The Support Vector Machines was trained with Multi Domain features; Transform Domain and Spatial Domain or Structural Domain feature. Transform Domain includes the wavelet feature of the character. Structural Domain consists of Distance Profile feature and Gradient feature. The Segmentation of the text document has been done in 3 levels-Line Segmentation, Word Segmentation, and Character Segmentation. The pre-processing of the characters has been done with the help of various Morphological operations-Otsu's Algorithm, Erosion, Dilation, Filtration and Thinning techniques. The Algorithm was tested on the self-prepared database, a collection of various handwriting. Further, Unicode was used to convert recognized Devnagari text into understandable computer document. The document so obtained is an array of codes which was used to generate digitized text and to synthesize Hindi speech. Phonemes from the self-prepared database were used to generate the speech of the scanned document using concatenation technique.

Keywords: Character Recognition (OCR), Text to Speech (TTS), Support Vector Machines (SVM), Library of Support Vector Machines (LIBSVM)

Procedia PDF Downloads 496
1848 A Novel Machining Method and Tool-Path Generation for Bent Mandrel

Authors: Hong Lu, Yongquan Zhang, Wei Fan, Xiangang Su

Abstract:

Bent mandrel has been widely used as precise mould in automobile industry, shipping industry and aviation industry. To improve the versatility and efficiency of turning method of bent mandrel with fixed rotational center, an instantaneous machining model based on cutting parameters and machine dimension is prospered in this paper. The spiral-like tool path generation approach in non-axisymmetric turning process of bent mandrel is developed as well to deal with the error of part-to-part repeatability in existed turning model. The actual cutter-location points are calculated by cutter-contact points, which are obtained from the approach of spiral sweep process using equal-arc-length segment principle in polar coordinate system. The tool offset is set to avoid the interference between tool and work piece is also considered in the machining model. Depend on the spindle rotational angle, synchronization control of X-axis, Z-axis and C-axis is adopted to generate the tool-path of the turning process. The simulation method is developed to generate NC program according to the presented model, which includes calculation of cutter-location points and generation of tool-path of cutting process. With the approach of a bent mandrel taken as an example, the maximum offset of center axis is 4mm in the 3D space. Experiment results verify that the machining model and turning method are appropriate for the characteristics of bent mandrel.

Keywords: bent mandrel, instantaneous machining model, simulation method, tool-path generation

Procedia PDF Downloads 334
1847 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 107
1846 Convolutional Neural Networks-Optimized Text Recognition with Binary Embeddings for Arabic Expiry Date Recognition

Authors: Mohamed Lotfy, Ghada Soliman

Abstract:

Recognizing Arabic dot-matrix digits is a challenging problem due to the unique characteristics of dot-matrix fonts, such as irregular dot spacing and varying dot sizes. This paper presents an approach for recognizing Arabic digits printed in dot matrix format. The proposed model is based on Convolutional Neural Networks (CNN) that take the dot matrix as input and generate embeddings that are rounded to generate binary representations of the digits. The binary embeddings are then used to perform Optical Character Recognition (OCR) on the digit images. To overcome the challenge of the limited availability of dotted Arabic expiration date images, we developed a True Type Font (TTF) for generating synthetic images of Arabic dot-matrix characters. The model was trained on a synthetic dataset of 3287 images and 658 synthetic images for testing, representing realistic expiration dates from 2019 to 2027 in the format of yyyy/mm/dd. Our model achieved an accuracy of 98.94% on the expiry date recognition with Arabic dot matrix format using fewer parameters and less computational resources than traditional CNN-based models. By investigating and presenting our findings comprehensively, we aim to contribute substantially to the field of OCR and pave the way for advancements in Arabic dot-matrix character recognition. Our proposed approach is not limited to Arabic dot matrix digit recognition but can also be extended to text recognition tasks, such as text classification and sentiment analysis.

Keywords: computer vision, pattern recognition, optical character recognition, deep learning

Procedia PDF Downloads 91
1845 An Assessment of Different Blade Tip Timing (BTT) Algorithms Using an Experimentally Validated Finite Element Model Simulator

Authors: Mohamed Mohamed, Philip Bonello, Peter Russhard

Abstract:

Blade Tip Timing (BTT) is a technology concerned with the estimation of both frequency and amplitude of rotating blades. A BTT system comprises two main parts: (a) the arrival time measurement system, and (b) the analysis algorithms. Simulators play an important role in the development of the analysis algorithms since they generate blade tip displacement data from the simulated blade vibration under controlled conditions. This enables an assessment of the performance of the different algorithms with respect to their ability to accurately reproduce the original simulated vibration. Such an assessment is usually not possible with real engine data since there is no practical alternative to BTT for blade vibration measurement. Most simulators used in the literature are based on a simple spring-mass-damper model to determine the vibration. In this work, a more realistic experimentally validated simulator based on the Finite Element (FE) model of a bladed disc (blisk) is first presented. It is then used to generate the necessary data for the assessment of different BTT algorithms. The FE modelling is validated using both a hammer test and two firewire cameras for the mode shapes. A number of autoregressive methods, fitting methods and state-of-the-art inverse methods (i.e. Russhard) are compared. All methods are compared with respect to both synchronous and asynchronous excitations with both single and simultaneous frequencies. The study assesses the applicability of each method for different conditions of vibration, amount of sampling data, and testing facilities, according to its performance and efficiency under these conditions.

Keywords: blade tip timing, blisk, finite element, vibration measurement

Procedia PDF Downloads 305
1844 Multi-Stream Graph Attention Network for Recommendation with Knowledge Graph

Authors: Zhifei Hu, Feng Xia

Abstract:

In recent years, Graph neural network has been widely used in knowledge graph recommendation. The existing recommendation methods based on graph neural network extract information from knowledge graph through entity and relation, which may not be efficient in the way of information extraction. In order to better propose useful entity information for the current recommendation task in the knowledge graph, we propose an end-to-end Neural network Model based on multi-stream graph attentional Mechanism (MSGAT), which can effectively integrate the knowledge graph into the recommendation system by evaluating the importance of entities from both users and items. Specifically, we use the attention mechanism from the user's perspective to distil the domain nodes information of the predicted item in the knowledge graph, to enhance the user's information on items, and generate the feature representation of the predicted item. Due to user history, click items can reflect the user's interest distribution, we propose a multi-stream attention mechanism, based on the user's preference for entities and relationships, and the similarity between items to be predicted and entities, aggregate user history click item's neighborhood entity information in the knowledge graph and generate the user's feature representation. We evaluate our model on three real recommendation datasets: Movielens-1M (ML-1M), LFM-1B 2015 (LFM-1B), and Amazon-Book (AZ-book). Experimental results show that compared with the most advanced models, our proposed model can better capture the entity information in the knowledge graph, which proves the validity and accuracy of the model.

Keywords: graph attention network, knowledge graph, recommendation, information propagation

Procedia PDF Downloads 115
1843 Synthetic Classicism: A Machine Learning Approach to the Recognition and Design of Circular Pavilions

Authors: Federico Garrido, Mostafa El Hayani, Ahmed Shams

Abstract:

The exploration of the potential of artificial intelligence (AI) in architecture is still embryonic, however, its latent capacity to change design disciplines is significant. 'Synthetic Classism' is a research project that questions the underlying aspects of classically organized architecture not just in aesthetic terms but also from a geometrical and morphological point of view, intending to generate new architectural information using historical examples as source material. The main aim of this paper is to explore the uses of artificial intelligence and machine learning algorithms in architectural design while creating a coherent narrative to be contained within a design process. The purpose is twofold: on one hand, to develop and train machine learning algorithms to produce architectural information of small pavilions and on the other, to synthesize new information from previous architectural drawings. These algorithms intend to 'interpret' graphical information from each pavilion and then generate new information from it. The procedure, once these algorithms are trained, is the following: parting from a line profile, a synthetic 'front view' of a pavilion is generated, then using it as a source material, an isometric view is created from it, and finally, a top view is produced. Thanks to GAN algorithms, it is also possible to generate Front and Isometric views without any graphical input as well. The final intention of the research is to produce isometric views out of historical information, such as the pavilions from Sebastiano Serlio, James Gibbs, or John Soane. The idea is to create and interpret new information not just in terms of historical reconstruction but also to explore AI as a novel tool in the narrative of a creative design process. This research also challenges the idea of the role of algorithmic design associated with efficiency or fitness while embracing the possibility of a creative collaboration between artificial intelligence and a human designer. Hence the double feature of this research, both analytical and creative, first by synthesizing images based on a given dataset and then by generating new architectural information from historical references. We find that the possibility of creatively understand and manipulate historic (and synthetic) information will be a key feature in future innovative design processes. Finally, the main question that we propose is whether an AI could be used not just to create an original and innovative group of simple buildings but also to explore the possibility of fostering a novel architectural sensibility grounded on the specificities on the architectural dataset, either historic, human-made or synthetic.

Keywords: architecture, central pavilions, classicism, machine learning

Procedia PDF Downloads 138
1842 Assessing Performance of Data Augmentation Techniques for a Convolutional Network Trained for Recognizing Humans in Drone Images

Authors: Masood Varshosaz, Kamyar Hasanpour

Abstract:

In recent years, we have seen growing interest in recognizing humans in drone images for post-disaster search and rescue operations. Deep learning algorithms have shown great promise in this area, but they often require large amounts of labeled data to train the models. To keep the data acquisition cost low, augmentation techniques can be used to create additional data from existing images. There are many techniques of such that can help generate variations of an original image to improve the performance of deep learning algorithms. While data augmentation is potentially assumed to improve the accuracy and robustness of the models, it is important to ensure that the performance gains are not outweighed by the additional computational cost or complexity of implementing the techniques. To this end, it is important to evaluate the impact of data augmentation on the performance of the deep learning models. In this paper, we evaluated the most currently available 2D data augmentation techniques on a standard convolutional network which was trained for recognizing humans in drone images. The techniques include rotation, scaling, random cropping, flipping, shifting, and their combination. The results showed that the augmented models perform 1-3% better compared to a base network. However, as the augmented images only contain the human parts already visible in the original images, a new data augmentation approach is needed to include the invisible parts of the human body. Thus, we suggest a new method that employs simulated 3D human models to generate new data for training the network.

Keywords: human recognition, deep learning, drones, disaster mitigation

Procedia PDF Downloads 91