Search results for: detecting unknown viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1799

Search results for: detecting unknown viruses

929 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 267
928 Multi Tier Data Collection and Estimation, Utilizing Queue Model in Wireless Sensor Networks

Authors: Amirhossein Mohajerzadeh, Abolghasem Mohajerzadeh

Abstract:

In this paper, target parameter is estimated with desirable precision in hierarchical wireless sensor networks (WSN) while the proposed algorithm also tries to prolong network lifetime as much as possible, using efficient data collecting algorithm. Target parameter distribution function is considered unknown. Sensor nodes sense the environment and send the data to the base station called fusion center (FC) using hierarchical data collecting algorithm. FC builds underlying phenomena based on collected data. Considering the aggregation level, x, the goal is providing the essential infrastructure to find the best value for aggregation level in order to prolong network lifetime as much as possible, while desirable accuracy is guaranteed (required sample size is fully depended on desirable precision). First, the sample size calculation algorithm is discussed, second, the average queue length based on M/M[x]/1/K queue model is determined and it is used for energy consumption calculation. Nodes can decrease transmission cost by aggregating incoming data. Furthermore, the performance of the new algorithm is evaluated in terms of lifetime and estimation accuracy.

Keywords: aggregation, estimation, queuing, wireless sensor network

Procedia PDF Downloads 170
927 Validating the Arabic Communicative Development Inventory for Assessing the Development of Language in Arabic-Speaking Children

Authors: Alshaimaa Abdelwahab, Allegra Cattani, Caroline Floccia

Abstract:

Assessing children’s language is fundamental for changing their developmental outcome as it gives a chance for a quick and early intervention with the suitable planning and monitoring program. The importance of language assessment lies in helping to find the right test fit for purpose, in addition to achievement and proficiency. This study examines the validity of a new Arabic assessment tool, the Arabic Communicative Development Inventory ‘Arabic CDI’. It assesses the development of language in Arabic children in different Arabic countries, allowing to detect children with language delay. A concurrent validity is set to compare the Arabic CDI to the Arabic Language test. Twenty-three typically developing Egyptian healthy children and their mothers participated in this study. Their age is 24 months (+ or -) two weeks. The sample included 13 males and 10 females. Mothers completed the Arabic CDI either before or after the Arabic Language Test was conducted with the child. The score for comprehension in the Arabic CDI (M= 52.7, SD= 9.7) and words understood in the Arabic Language Test (M= 59.6, SD= 12.5) were strongly and positively correlated (r= .62, p= .002). At the same time, the scores for production in the Arabic CDI (M= 38.4, SD= 14.8) and words expressed in the Arabic Language Test (M= 52.1, SD= 16.3) were also strongly and positively correlated (r= .82, p= .000). The new Arabic CDI is an adequate tool for assessing the development of comprehension and production at Arabic children. In addition, it could be used for detecting children with language impairment. Standardization of the Arabic CDI across 18 different Arabic dialects in children aged 8 to 30 months is underway.

Keywords: Arabic CDI, assessing children, language development, language impairment

Procedia PDF Downloads 438
926 The Influence of Polymorphisms of NER System Genes on the Risk of Colorectal Cancer in the Polish Population

Authors: Ireneusz Majsterek, Karolina Przybylowska, Lukasz Dziki, Adam Dziki, Jacek Kabzinski

Abstract:

Colorectal cancer (CRC) is one of the deadliest cancers. Every year we see an increase in the number of cases, and in spite of intensive research etiology of the disease remains unknown. For many years, researchers are seeking to associate genetic factors with an increased risk of CRC, so far it has proved to be a compelling link between the MMR system of DNA repair and hereditary nonpolyposis colorectal cancers (HNPCC). Currently, research is focused on finding the relationship between the remaining DNA repair systems and an increased risk of developing colorectal cancer. The aim of the study was to determine the relationship between gene polymorphisms Ser835Ser of XPF gene and Gly23Ala of XPA gene–elements of NER DNA repair system, and modulation of the risk of colorectal cancer in the Polish population. Determination of the molecular basis of carcinogenesis process and predicting increased risk will allow qualifying patients to increased risk group and including them in preventive program. We used blood collected from 110 patients diagnosed with colorectal cancer. The control group consisted of equal number of healthy people. Genotyping was performed by TaqMan method. The obtained results indicate that the genotype 23Gly/Ala of XPA gene is associated with an increased risk of colorectal cancer, while 23Ala/Ala as well as TCT allele of Ser835Ser of XPF gene may reduce the risk of CRC.

Keywords: NER, colorectal cancer, XPA, XPF, polymorphisms

Procedia PDF Downloads 549
925 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization

Authors: Hironori Karachi, Haruka Yamashita

Abstract:

Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.

Keywords: data science, non-negative matrix factorization, missing data, quality of services

Procedia PDF Downloads 113
924 Maximum-likelihood Inference of Multi-Finger Movements Using Neural Activities

Authors: Kyung-Jin You, Kiwon Rhee, Marc H. Schieber, Nitish V. Thakor, Hyun-Chool Shin

Abstract:

It remains unknown whether M1 neurons encode multi-finger movements independently or as a certain neural network of single finger movements although multi-finger movements are physically a combination of single finger movements. We present an evidence of correlation between single and multi-finger movements and also attempt a challenging task of semi-blind decoding of neural data with minimum training of the neural decoder. Data were collected from 115 task-related neurons in M1 of a trained rhesus monkey performing flexion and extension of each finger and the wrist (12 single and 6 two-finger-movements). By exploiting correlation of temporal firing pattern between movements, we found that correlation coefficient for physically related movements pairs is greater than others; neurons tuned to single finger movements increased their firing rate when multi-finger commands were instructed. According to this knowledge, neural semi-blind decoding is done by choosing the greatest and the second greatest likelihood for canonical candidates. We achieved a decoding accuracy about 60% for multiple finger movement without corresponding training data set. this results suggest that only with the neural activities on single finger movements can be exploited to control dexterous multi-fingered neuroprosthetics.

Keywords: finger movement, neural activity, blind decoding, M1

Procedia PDF Downloads 295
923 Second Order Analysis of Frames Using Modified Newmark Method

Authors: Seyed Amin Vakili, Sahar Sadat Vakili, Seyed Ehsan Vakili, Nader Abdoli Yazdi

Abstract:

The main purpose of this paper is to present the Modified Newmark Method as a method of non-linear frame analysis by considering the effect of the axial load (second order analysis). The discussion will be restricted to plane frameworks containing a constant cross-section for each element. In addition, it is assumed that the frames are prevented from out-of-plane deflection. This part of the investigation is performed to generalize the established method for the assemblage structures such as frameworks. As explained, the governing differential equations are non-linear and cannot be formulated easily due to unknown axial load of the struts in the frame. By the assumption of constant axial load, the governing equations are changed to linear ones in most methods. Since the modeling and the solutions of the non-linear form of the governing equations are cumbersome, the linear form of the equations would be used in the established method. However, according to the ability of the method to reconsider the minor omitted parameters in modeling during the solution procedure, the axial load in the elements at each stage of the iteration can be computed and applied in the next stage. Therefore, the ability of the method to present an accurate approach to the solutions of non-linear equations will be demonstrated again in this paper.

Keywords: nonlinear, stability, buckling, modified newmark method

Procedia PDF Downloads 401
922 Real-Time Path Planning for Unmanned Air Vehicles Using Improved Rapidly-Exploring Random Tree and Iterative Trajectory Optimization

Authors: A. Ramalho, L. Romeiro, R. Ventura, A. Suleman

Abstract:

A real-time path planning framework for Unmanned Air Vehicles, and in particular multi-rotors is proposed. The framework is designed to provide feasible trajectories from the current UAV position to a goal state, taking into account constraints such as obstacle avoidance, problem kinematics, and vehicle limitations such as maximum speed and maximum acceleration. The framework computes feasible paths online, allowing to avoid new, unknown, dynamic obstacles without fully re-computing the trajectory. These features are achieved using an iterative process in which the robot computes and optimizes the trajectory while performing the mission objectives. A first trajectory is computed using a modified Rapidly-Exploring Random Tree (RRT) algorithm, that provides trajectories that respect a maximum curvature constraint. The trajectory optimization is accomplished using the Interior Point Optimizer (IPOPT) as a solver. The framework has proven to be able to compute a trajectory and optimize to a locally optimal with computational efficiency making it feasible for real-time operations.

Keywords: interior point optimization, multi-rotors, online path planning, rapidly exploring random trees, trajectory optimization

Procedia PDF Downloads 123
921 Case Report: Clinical Improvement of Forbrain Neurologic Signs in 3- Month- Old Persian Mastiff Dog with Calvarial Hyperostosis Syndrome after Corticosteroid, Antiepileptic and Antibiotic Therapy

Authors: Hamidreza Jahani, Zahra Salehzadeh, Ehsan Amini, Mohsen Tohidifar

Abstract:

Calvarial Hyperostosis Syndrome (CHS) is a benign bone disease of the skull. It is a non-neoplastic and proliferative bone disease, and the main feature of the disease is progressive and asymmetrical bone involvement. CHS is mostly reported in young male and female bullmastiff dogs and less frequently in other breeds. The etiology of CHS is unknown. This is the first case report of CHS in Iran. A 3-month-old male Persian Mastiff was presented with chief complaints of multiple episodes of seizure, pacing, bizarre behavior, delayed growth, head pressing, and difficulty in opening the mouth. Central blindness and open fontanelles were observed in clinical examination. No abnormality was found in the complete blood count and routine blood biochemical tests. CT scan findings include cortical thickening of frontal and parietal bones and enlargement of the left retropharyngeal lymph node. For treatment, oral clindamycin for two weeks, prednisolone and phenobarbital for one month, respectively, were administrated, and the case showed improvement after a week and recovered after one month.

Keywords: calvarial hyperostosis, Persian Mastiff, frontal bone, seizure

Procedia PDF Downloads 121
920 Study and Modeling of Flood Watershed in Arid and Semi Arid Regions of Algeria

Authors: Belagoune Fares, Boutoutaou Djamel

Abstract:

The study on floods in Algeria established by the National Agency of Water Resources (ANRH) shows that the country is confronted with the phenomenon of very destructive floods and floods especially in arid and semiarid regions. Flooding of rivers in these areas is less known. They are characterized by their sudden duration (rain showers, thunderstorm).The duration of the flood is of the order of minutes to hours. The human and material damage caused by these floods were still high. The study area encompasses three watersheds in semi-arid and arid south and Algeria. THERE are pools of Chott-Melghir (68,751 km2), highland Constantine-07 (9578 km2) and El Hodna-05 basin (25,843 km2). The total area of this zone is about 104,500km2.Studies of protection against floods and design studies of hydraulic structures (spillway, storm basin, etc.) require the raw data which is often unknown in several places particularly at ungauged wadis of these areas. This makes it very difficult to schedules and managers working in the field of hydraulic studies. The objective of this study and propose a methodology for determining flows in the absence of observations in the semi-arid and arid south eastern Algeria. The objective of the study is to propose a methodology for these areas of flood calculation for ungauged rivers.

Keywords: flood, watershed, specific flow, coefficient of variation, arid

Procedia PDF Downloads 486
919 The Analysis of Indian Culture through the Lexicographical Discourse of Hindi-French Dictionary

Authors: Tanzil Ansari

Abstract:

A dictionary is often considered as a list of words, arranged in alphabetical orders, providing information on a language or languages and it informs us about the spelling, the pronunciation, the origin, the gender and the grammatical functions of new and unknown words. In other words, it is first and foremost a linguistic tool. But, the research across the world in the field of linguistic and lexicography proved that a dictionary is not only a linguistic tool but also a cultural product through which a lexicographer transmits the culture of a country or a linguistic community from his or her ideology. It means, a dictionary does not present only language and its metalinguistic functions but also its culture. Every language consists of some words and expressions which depict the culture of its language. In this way, it is impossible to disassociate language from its culture. There is always an ideology that plays an important role in the depiction of any culture. Using the orientalism theory of Edward Said to represent the east, the objective of the present research is to study the representation of Indian culture through the lexicographical discourse of Hindi-French Dictionary of Federica Boschetti, a French lexicographer. The results show that the Indian culture is stereotypical and monolithic. It also shows India as male oriented country where women are exploited by male-dominated society. The study is focused on Hindi-French dictionary, but its line of argument can be compared to dictionaries produced in other languages.

Keywords: culture, dictionary, lexicographical discourse, stereotype image

Procedia PDF Downloads 282
918 Premalignant and Malignant Lesions of Uterine Polyps: Analysis at a University Hospital

Authors: Manjunath A. P., Al-Ajmi G. M., Al Shukri M., Girija S

Abstract:

Introduction: This study aimed to compare the ability of hysteroscopy and ultrasonography to diagnose uterine polyps. To correlate the ultrasonography and hystroscopic findings with various clinical factors and histopathology of uterine polyps. Methods: This is a retrospective study conducted at the Department of Obstetrics and Gynaecology at Sultan Qaboos University Hospital from 2014 to 2019. All women undergoing hysteroscopy for suspected uterine polyps were included. All relevant data were obtained from the electronic patient record and analysed using SPSS. Results: A total of 77 eligible women were analysed. The mean age of the patients was 40 years. The clinical risk factors; obesity, hypertension, and diabetes mellitus, showed no significant statistical association with the presence of uterine polyps (p-value>0.005). Although 20 women (52.6%) with uterine polyps had thickened endometrium (>11 mm), however, there is no statistical association (p-value>0.005). The sensitivity and specificity of ultrasonography in the detection of uterine polyp were 39% and 65%, respectively. Whereas for hysteroscopy, it was 89% and 20%, respectively. The prevalence of malignant and premalignant lesions were 1.85% and 7.4%, respectively. Conclusion: This study found that obesity, hypertension, and diabetes mellitus were not associated with the presence of uterine polyps. There was no association between thick endometrium and uterine polyps. The sensitivity is higher for hysteroscopy, whereas the specificity is higher for sonography in detecting uterine polyps. The prevalence of malignancy was very low in uterine polyps.

Keywords: endometrial polyps, hysteroscopy, ultrasonography, premalignant, malignant

Procedia PDF Downloads 118
917 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 70
916 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 397
915 Continuous Differential Evolution Based Parameter Estimation Framework for Signal Models

Authors: Ammara Mehmood, Aneela Zameer, Muhammad Asif Zahoor Raja, Muhammad Faisal Fateh

Abstract:

In this work, the strength of bio-inspired computational intelligence based technique is exploited for parameter estimation for the periodic signals using Continuous Differential Evolution (CDE) by defining an error function in the mean square sense. Multidimensional and nonlinear nature of the problem emerging in sinusoidal signal models along with noise makes it a challenging optimization task, which is dealt with robustness and effectiveness of CDE to ensure convergence and avoid trapping in local minima. In the proposed scheme of Continuous Differential Evolution based Signal Parameter Estimation (CDESPE), unknown adjustable weights of the signal system identification model are optimized utilizing CDE algorithm. The performance of CDESPE model is validated through statistics based various performance indices on a sufficiently large number of runs in terms of estimation error, mean squared error and Thiel’s inequality coefficient. Efficacy of CDESPE is examined by comparison with the actual parameters of the system, Genetic Algorithm based outcomes and from various deterministic approaches at different signal-to-noise ratio (SNR) levels.

Keywords: parameter estimation, bio-inspired computing, continuous differential evolution (CDE), periodic signals

Procedia PDF Downloads 285
914 Cellular Energy Metabolism Decreases with Age in the Trophocytes and Oenocytes of Honeybees (Apis Mellifera)

Authors: Chin-Yuan Hsu, Yu-Lung Chuang

Abstract:

The expression, concentration, and activity of mitochondrial energy-utilized molecules and cellular energy-regulated molecules decreased with age in the trophocytes and oenocytes of honeybees (Apis mellifera), but those of cellular energy-metabolized molecules is unknown. In this study, the expression, concentration, and activity of cellular energy-metabolized molecules were assayed in the trophocytes and fat cells of young and old worker bees by using the techniques of cell and biochemistry. The results showed that (i) the •-hydroxylacyl-coenzyme A dehydrogenase (HOAD) activity/citrate synthase (CS) activity ratio, non-esterified fatty acids concentrations, the expression of eukaryotic initiation factor 4E, and the expression of phosphorylated eIF4E binding protein 1 decreased with age; (ii) fat and glycogen accumulation increased with age; and (iii) the pyruvate dehydrogenase (PDH) activity/citrate synthase (CS) activity ratio was not correlated with age. These finding indicated that •-oxidation (HOAD/CS) and protein synthsis decreased with age. Glycolysis (PDH/CS) was unchanged with age. The most likely reason is that sugars are the vital food of worker bees. Taken together these data reveal that young workers have higher cellular energy metabolism than old workers and that aging results in a decline in the cellular energy metabolism in worker honeybees.

Keywords: aging, energy, honeybee, metabolism

Procedia PDF Downloads 454
913 Effects of Fourth Alloying Additive on Microstructure and Mechanical Properties of Sn-Ag-Cu Alloy

Authors: Ugur Buyuk, Sevda Engin

Abstract:

Among the various alloy systems being considered as lead-free solder candidates, Sn-Ag-Cu alloys have been recognized as the most promising because of their excellent reliability and compatibility with current components. Thus, Sn-Ag-Cu alloys have recently attracted considerable attention and have been proposed by the Japanese, the EU and the US consortiums to replace conventional Sn-Pb eutectic solder. However, many problems or unknown characteristics of the Sn-Ag-Cu alloy system such as the best composition, the large undercooling in solidification, and the formation of large intermetallics still exist. It is expected that the addition of some solidification nuclei for Sn-Ag-Cu alloys will refine the solidification microstructure and will suppress undercooling.In the present work, the effects of the fourth elements, i.e., Zn, Ni, Bi, In and Co, on microstructural and mechanical properties of Sn-3.5Ag-0.9Cu lead-free solder were investigated. Sn-3.5Ag-0.9Cu-0.5X (X= Zn, Ni, Bi, In, Co (wt.)) alloys were prepared in a graphite crucible under vacuum atmosphere. The samples were directionally solidified upward at a constant temperature gradient and growth rates by using a Bridgman type directional solidification furnace. The microstructure, microhardness and ultimate tensile strength of alloys were measured. The effects of fourth elements on the microstructure and mechanical properties of Sn–Ag-Cu eutectic alloys were investigated. The results obtained in the present work were compared with the previous experimental results.

Keywords: lead-free solders, microhardness, microstructure, tensile strength

Procedia PDF Downloads 401
912 A Neural Network Classifier for Estimation of the Degree of Infestation by Late Blight on Tomato Leaves

Authors: Gizelle K. Vianna, Gabriel V. Cunha, Gustavo S. Oliveira

Abstract:

Foliage diseases in plants can cause a reduction in both quality and quantity of agricultural production. Intelligent detection of plant diseases is an essential research topic as it may help monitoring large fields of crops by automatically detecting the symptoms of foliage diseases. This work investigates ways to recognize the late blight disease from the analysis of tomato digital images, collected directly from the field. A pair of multilayer perceptron neural network analyzes the digital images, using data from both RGB and HSL color models, and classifies each image pixel. One neural network is responsible for the identification of healthy regions of the tomato leaf, while the other identifies the injured regions. The outputs of both networks are combined to generate the final classification of each pixel from the image and the pixel classes are used to repaint the original tomato images by using a color representation that highlights the injuries on the plant. The new images will have only green, red or black pixels, if they came from healthy or injured portions of the leaf, or from the background of the image, respectively. The system presented an accuracy of 97% in detection and estimation of the level of damage on the tomato leaves caused by late blight.

Keywords: artificial neural networks, digital image processing, pattern recognition, phytosanitary

Procedia PDF Downloads 312
911 Scooping Review Towards Different Use of Monitoring Technology Devices in Caring with Older Adults with Cognitive Impairment: A Model for Nursing Care Management

Authors: Hind Mohammed A. Asiri, Asia Mohammed Asiri, Hana Falah Alruwaili, Joseph Almazan

Abstract:

With the rapid growth of the older adult population, an underlying growth of public health concern is also seen. Various technologies were developed to help mitigate the arising problems of older adults with cognitive impairment and the improvement of their cognitive functions. This scooping review used the Joanna Briggs Institute (JBI) and the PRISMA extension for scoping reviews. The eligibility criteria were defined using the Population, Concept, Context (PCC) framework, as described in the JBI’s Reviewers Manual (Peters et al.,2020). The population of interest for this review is older adults 65 years old or older. Studies involving monitoring technology devices utilized in caring with older adult with cognitive impairment. This scoping review has shown information that researchers are more focused on creating alternative and novel methods or technological devices and use these as a tool for designing interventions depending on the data of the patient. This study has shown the type of technologies that have been explored in terms of assessing, detecting, monitoring, and interventions for cognitive impairment. Thus, there is a need for this technology to be applied in the practical field to further strengthen the evidence that it could enhance the lives of older adults.

Keywords: technology devices, cognitive impairment, older adult, nursing care, caring

Procedia PDF Downloads 102
910 Roasting Degree of Cocoa Beans by Artificial Neural Network (ANN) Based Electronic Nose System and Gas Chromatography (GC)

Authors: Juzhong Tan, William Kerr

Abstract:

Roasting is one critical procedure in chocolate processing, where special favors are developed, moisture content is decreased, and better processing properties are developed. Therefore, determination of roasting degree of cocoa bean is important for chocolate manufacturers to ensure the quality of chocolate products, and it also decides the commercial value of cocoa beans collected from cocoa farmers. The roasting degree of cocoa beans currently relies on human specialists, who sometimes are biased, and chemical analysis, which take long time and are inaccessible to many manufacturers and farmers. In this study, a self-made electronic nose system consists of gas sensors (TGS 800 and 2000 series) was used to detecting the gas generated by cocoa beans with a different roasting degree (0min, 20min, 30min, and 40min) and the signals collected by gas sensors were used to train a three-layers ANN. Chemical analysis of the graded beans was operated by traditional GC-MS system and the contents of volatile chemical compounds were used to train another ANN as a reference to electronic nosed signals trained ANN. Both trained ANN were used to predict cocoa beans with a different roasting degree for validation. The best accuracy of grading achieved by electronic nose signals trained ANN (using signals from TGS 813 826 820 880 830 2620 2602 2610) turned out to be 96.7%, however, the GC trained ANN got the accuracy of 83.8%.

Keywords: artificial neutron network, cocoa bean, electronic nose, roasting

Procedia PDF Downloads 215
909 Using English Discourse Markers by Saudi EFL Learners: A Descriptive Approach

Authors: Sadeq Al Yaari, Fayza Al Hammadi, Nassr Almaflehi, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari

Abstract:

Background: The language of EFL learners is of special interests to linguists. Little research has been tackled on issues concerning English Discourse Markers (EDMs) among Saudi EFL learners. Aims: Employing a corpus-based descriptive analysis, the current study attempts at detecting EDMs in the talk of Saudi EFL learners, their frequency, use, usage, etc., in comparison to other EFL learners as well as native speakers. Methods: Two hundreds Saudi EFL learners were randomly selected from 20 public and private schools (ten students from each school) across the Kingdom of Saudi Arabia (KSA). Subjects were individually recorded while they were studying English in class. Recordings were then linguistically and statistically analyzed by the researchers. Conclusion: Results illustrate that EDMs “and”, “but” and “also” are the most frequent EDMs in the talk of Saudi EFL learners. These devices are randomly used by Saudi EFL learners who mix their use (appropriateness) with usage (correctedness) due to the influence of their L1 (Arabic). In compare to other EFL learners (native and non-native), Saudi EFL learners use less EDMs. These results confirmed the claims that EFL learners use EDMs less than native speakers. This paper, although preliminary in nature, can help arrive a better understanding of using EDMs by Saudi EFL learners. Further, it can also assist in getting appropriate insights into the way how these EDMs are used in Arab Gulf countries. The researchers decided to conduct an in-depth study into the use of EDMs in the oral work of Saudi EFL learners.

Keywords: English discourse markers, Saudi EFL learners, use, usage, frequency, native speakers

Procedia PDF Downloads 16
908 Bridging Urban Planning and Environmental Conservation: A Regional Analysis of Northern and Central Kolkata

Authors: Tanmay Bisen, Aastha Shayla

Abstract:

This study introduces an advanced approach to tree canopy detection in urban environments and a regional analysis of Northern and Central Kolkata that delves into the intricate relationship between urban development and environmental conservation. Leveraging high-resolution drone imagery from diverse urban green spaces in Kolkata, we fine-tuned the deep forest model to enhance its precision and accuracy. Our results, characterized by an impressive Intersection over Union (IoU) score of 0.90 and a mean average precision (mAP) of 0.87, underscore the model's robustness in detecting and classifying tree crowns amidst the complexities of aerial imagery. This research not only emphasizes the importance of model customization for specific datasets but also highlights the potential of drone-based remote sensing in urban forestry studies. The study investigates the spatial distribution, density, and environmental impact of trees in Northern and Central Kolkata. The findings underscore the significance of urban green spaces in met-ropolitan cities, emphasizing the need for sustainable urban planning that integrates green infrastructure for ecological balance and human well-being.

Keywords: urban greenery, advanced spatial distribution analysis, drone imagery, deep learning, tree detection

Procedia PDF Downloads 37
907 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information

Authors: H. Moalla, A. Frikha

Abstract:

Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.

Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method

Procedia PDF Downloads 146
906 Probability-Based Damage Detection of Structures Using Kriging Surrogates and Enhanced Ideal Gas Molecular Movement Algorithm

Authors: M. R. Ghasemi, R. Ghiasi, H. Varaee

Abstract:

Surrogate model has received increasing attention for use in detecting damage of structures based on vibration modal parameters. However, uncertainties existing in the measured vibration data may lead to false or unreliable output result from such model. In this study, an efficient approach based on Monte Carlo simulation is proposed to take into account the effect of uncertainties in developing a surrogate model. The probability of damage existence (PDE) is calculated based on the probability density function of the existence of undamaged and damaged states. The kriging technique allows one to genuinely quantify the surrogate error, therefore it is chosen as metamodeling technique. Enhanced version of ideal gas molecular movement (EIGMM) algorithm is used as main algorithm for model updating. The developed approach is applied to detect simulated damage in numerical models of 72-bar space truss and 120-bar dome truss. The simulation results show the proposed method can perform well in probability-based damage detection of structures with less computational effort compared to direct finite element model.

Keywords: probability-based damage detection (PBDD), Kriging, surrogate modeling, uncertainty quantification, artificial intelligence, enhanced ideal gas molecular movement (EIGMM)

Procedia PDF Downloads 218
905 Error Analysis in Academic Writing of EFL Learners: A Case Study for Undergraduate Students at Pathein University

Authors: Aye Pa Pa Myo

Abstract:

Writing in English is accounted as a complex process for English as a foreign language learners. Besides, committing errors in writing can be found as an inevitable part of language learners’ writing. Generally, academic writing is quite difficult for most of the students to manage for getting better scores. Students can commit common errors in their writings when they try to write academic writing. Error analysis deals with identifying and detecting the errors and also explains the reason for the occurrence of these errors. In this paper, the researcher has an attempt to examine the common errors of undergraduate students in their academic writings at Pathein University. The purpose of doing this research is to investigate the errors which students usually commit in academic writing and to find out the better ways for correcting these errors in EFL classrooms. In this research, fifty-third-year non-English specialization students attending Pathein University were selected as participants. This research took one month. It was conducted with a mixed methodology method. Two mini-tests were used as research tools. Data were collected with a quantitative research method. Findings from this research pointed that most of the students noticed their common errors after getting the necessary input, and they became more decreased committing these errors after taking mini-test; hence, all findings will be supportive for further researches related to error analysis in academic writing.

Keywords: academic writing, error analysis, EFL learners, mini-tests, mixed methodology

Procedia PDF Downloads 120
904 Multi-Criteria Test Case Selection Using Ant Colony Optimization

Authors: Niranjana Devi N.

Abstract:

Test case selection is to select the subset of only the fit test cases and remove the unfit, ambiguous, redundant, unnecessary test cases which in turn improve the quality and reduce the cost of software testing. Test cases optimization is the problem of finding the best subset of test cases from a pool of the test cases to be audited. It will meet all the objectives of testing concurrently. But most of the research have evaluated the fitness of test cases only on single parameter fault detecting capability and optimize the test cases using a single objective. In the proposed approach, nine parameters are considered for test case selection and the best subset of parameters for test case selection is obtained using Interval Type-2 Fuzzy Rough Set. Test case selection is done in two stages. The first stage is the fuzzy entropy-based filtration technique, used for estimating and reducing the ambiguity in test case fitness evaluation and selection. The second stage is the ant colony optimization-based wrapper technique with a forward search strategy, employed to select test cases from the reduced test suite of the first stage. The results are evaluated using the Coverage parameters, Precision, Recall, F-Measure, APSC, APDC, and SSR. The experimental evaluation demonstrates that by this approach considerable computational effort can be avoided.

Keywords: ant colony optimization, fuzzy entropy, interval type-2 fuzzy rough set, test case selection

Procedia PDF Downloads 646
903 Study on the Non-Contact Sheet Resistance Measuring of Silver Nanowire Coated Film Using Terahertz Wave

Authors: Dong-Hyun Kim, Wan-Ho Chung, Hak-Sung Kim

Abstract:

In this work, non-destructive evaluation was conducted to measure the sheet resistance of silver nanowire coated film and find a damage of that film using terahertz (THz) wave. Pulse type THz instrument was used, and the measurement was performed under transmission and pitch-catch reflection modes with 30 degree of incidence angle. In the transmission mode, the intensity of the THz wave was gradually increased as the conductivity decreased. Meanwhile, the intensity of THz wave was decreased as the conductivity decreased in the pitch-catch reflection mode. To confirm the conductivity of the film, sheet resistance was measured by 4-point probe station. Interaction formula was drawn from a relation between the intensity and the sheet resistance. Through substituting sheet resistance to the formula and comparing the resultant value with measured maximum THz wave intensity, measurement of sheet resistance using THz wave was more suitable than that using 4-point probe station. In addition, the damage on the silver nanowire coated film was detected by applying the THz image system. Therefore, the reliability of the entire film can be also be ensured. In conclusion, real-time monitoring using the THz wave can be applied in the transparent electrodes with detecting the damaged area as well as measuring the sheet resistance.

Keywords: terahertz wave, sheet resistance, non-destructive evaluation, silver nanowire

Procedia PDF Downloads 470
902 Cancer of the Cervix Caused by HPV (Human papillomavirus) in Algerian Population

Authors: Sara Mouffouk, Fatma Belaid, Asma Hechani, Chaima Mouffouk

Abstract:

Cancer of the cervix caused by HPV (human papillomavirus ) is for many years a real public health problem, it is ranked 2nd deadly female cancer kills more than 270 000 women each year worldwide. In Algeria, the mortality of cervical cancer decreases with the impact, but the prognosis of these cancers remains bleak: The 5-year relative survival is 60 %. The mode of transmission is usually sexuel. Our study was undertaken to show the link between HPV and cervical cancer and the importance of Pap smear screening in this type of pathology. On the total sample, 76.11 % showed abnormal cervical smears of which 13% have mild cases and hormonal reaction Change, and 44% represent inflammatory smears and normal cases 35%, while long seven years from 2005 to 2012. Thus, 43% of abnormal smear results between ASCUS, AGUS, low and high grade carcinoma and adenocarcinoma and 57 % of other cases of unknown origin. The average age of women at risk of developing adenocarcinoma is 45-50 with a 67% to 33% of the same risk in women of age group 41-45 years although the percentage of cases of HPV infected patients was 2% in the past seven years. We found that with increasing age, the risk is argued. Due to several factors such as multiparty can reduced the resistance of the uterine epithelium and even as the multi that promotes contamination HPV causes repeated infections with HPV.

Keywords: cervical cancer, human papillomavirus (HPV) screening, prevention, vaccines

Procedia PDF Downloads 497
901 Carbon-Nanodots Modified Glassy Carbon Electrode for the Electroanalysis of Selenium in Water

Authors: Azeez O. Idris, Benjamin O. Orimolade, Potlako J. Mafa, Alex T. Kuvarega, Usisipho Feleni, Bhekie B. Mamba

Abstract:

We report a simple and cheaper method for the electrochemical detection of Se(IV) using carbon nanodots (CNDTs) prepared from oat. The carbon nanodots were synthesised by green and facile approach and characterised using scanning electron microscopy, high-resolution transmission electron microscopy, Fourier transform infrared spectroscopy, X-ray diffraction, and Raman spectroscopy. The CNDT was used to fabricate an electrochemical sensor for the quantification of Se(IV) in water. The modification of glassy carbon electrode (GCE) with carbon nanodots led to an increase in the electroactive surface area of the electrode, which enhances the redox current peak of [Fe(CN)₆]₃₋/₄‒ in comparison to the bare GCE. Using the square wave voltammetry, the detection limit and quantification limit of 0.05 and 0.167 ppb were obtained under the optimised parameters using deposition potential of -200 mV, 0.1 M HNO₃ electrolyte, electrodeposition time of 60 s, and pH 1. The results further revealed that the GCE-CNDT was not susceptible to many interfering cations except Cu(II) and Pb(II), and Fe(II). The sensor fabrication involves a one-step electrode modification and was used to detect Se(IV) in a real water sample, and the result obtained is in agreement with the inductively coupled plasma technique. Overall, the electrode offers a cheap, fast, and sensitive way of detecting selenium in environmental matrices.

Keywords: carbon nanodots, square wave voltammetry, nanomaterials, selenium, sensor

Procedia PDF Downloads 76
900 A Decision Support System to Detect the Lumbar Disc Disease on the Basis of Clinical MRI

Authors: Yavuz Unal, Kemal Polat, H. Erdinc Kocer

Abstract:

In this study, a decision support system comprising three stages has been proposed to detect the disc abnormalities of the lumbar region. In the first stage named the feature extraction, T2-weighted sagittal and axial Magnetic Resonance Images (MRI) were taken from 55 people and then 27 appearance and shape features were acquired from both sagittal and transverse images. In the second stage named the feature weighting process, k-means clustering based feature weighting (KMCBFW) proposed by Gunes et al. Finally, in the third stage named the classification process, the classifier algorithms including multi-layer perceptron (MLP- neural network), support vector machine (SVM), Naïve Bayes, and decision tree have been used to classify whether the subject has lumbar disc or not. In order to test the performance of the proposed method, the classification accuracy (%), sensitivity, specificity, precision, recall, f-measure, kappa value, and computation times have been used. The best hybrid model is the combination of k-means clustering based feature weighting and decision tree in the detecting of lumbar disc disease based on both sagittal and axial MR images.

Keywords: lumbar disc abnormality, lumbar MRI, lumbar spine, hybrid models, hybrid features, k-means clustering based feature weighting

Procedia PDF Downloads 501