Search results for: extra tree classifier
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1755

Search results for: extra tree classifier

855 A Kernel-Based Method for MicroRNA Precursor Identification

Authors: Bin Liu

Abstract:

MicroRNAs (miRNAs) are small non-coding RNA molecules, functioning in transcriptional and post-transcriptional regulation of gene expression. The discrimination of the real pre-miRNAs from the false ones (such as hairpin sequences with similar stem-loops) is necessary for the understanding of miRNAs’ role in the control of cell life and death. Since both their small size and sequence specificity, it cannot be based on sequence information alone but requires structure information about the miRNA precursor to get satisfactory performance. Kmers are convenient and widely used features for modeling the properties of miRNAs and other biological sequences. However, Kmers suffer from the inherent limitation that if the parameter K is increased to incorporate long range effects, some certain Kmer will appear rarely or even not appear, as a consequence, most Kmers absent and a few present once. Thus, the statistical learning approaches using Kmers as features become susceptible to noisy data once K becomes large. In this study, we proposed a Gapped k-mer approach to overcome the disadvantages of Kmers, and applied this method to the field of miRNA prediction. Combined with the structure status composition, a classifier called imiRNA-GSSC was proposed. We show that compared to the original imiRNA-kmer and alternative approaches. Trained on human miRNA precursors, this predictor can achieve an accuracy of 82.34 for predicting 4022 pre-miRNA precursors from eleven species.

Keywords: gapped k-mer, imiRNA-GSSC, microRNA precursor, support vector machine

Procedia PDF Downloads 144
854 Comparing Repaired and Undamaged Specimens Test Results of Post-Tensioned Beam to Column Connections

Authors: Mustafa Kaya

Abstract:

After the 1999 Marmara earthquake in Turkey research by the Turkish Precast Union stated that 24.50% of the precast structures were damaged with some of this damage being observed in the beam to column connections of the structures. Since it is essential to provide those rendered homeless by the earthquake with safe, habitable accommodation repairing medium and slight levels of damage at the connection parts should be undertaken. In order to prove that a repaired connection was sufficiently strong, a precast beam to column post tensioned connection was tested in three phases. In phase one, the middle level damage was observed at 6% drift at these connections. As a result of the extra loads applied, little damage was observed. In the last phase, the four connections tested in the first phase were repaired using epoxy resin and then retested. The results from the tests on the repaired precast and the undamaged specimens showed that the repaired specimens were sufficiently strong, thus proving that repair to damaged precast beam to column post tensioned connections can be undertaken.

Keywords: precast beam to column connection, moment-resisting connection, post-tensioned connections, repair of precast connections

Procedia PDF Downloads 430
853 The Hitchhiker’s Guide to the Galaxy: The Challenges of Translating Science Fiction

Authors: Esteban Tremoco

Abstract:

This article aims to highlight some specificities of translating Science Fiction (SF literature) and, more particularly, its comic subgenre. Translating SF presupposes the translation of neologisms and gadget names of all kinds, while the translation of humor sometimes implies a need for the translator to slightly modify certain scenes or situations. In the French translation of Douglas Adams' Hitchhiker's Guide to the Galaxy by Jean Bonnefoy (Guide du routard galactique, 1982), the humorous dimension of the book is enhanced through certain choices made by the translator. One of the striking aspects of this translation is that almost all of the characters’ names have been translated, which is not the case in the German, Italian, Spanish and Portuguese translations. While there may be translations of characters’ names outside of the SF literature, there is no denying that by translating them, Jean Bonnefoy added a humorous layer to Adams' work. This work belongs to science fiction literature thanks to gadgets resulting from futuristic technological innovations, but also the presence of space travel, extra-terrestrials and mysterious worlds, which are central elements in SF. These names of planets, aliens, and other gadgets have also been translated, adapted, or at least reinvented, by Jean Bonnefoy in order to amuse the French-speaking readership.

Keywords: translation, translation studies, humour, science fiction

Procedia PDF Downloads 65
852 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags

Authors: Zhang Shuqi, Liu Dan

Abstract:

For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.

Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation

Procedia PDF Downloads 86
851 The Internal View of the Mu'min: Natural Law Theories in Islam

Authors: Gianni Izzo

Abstract:

The relation of Islam to its legal precepts, reflected in the various jurisprudential 'schools of thought' (madhahib), is one expressed in a version of 'positivism' (fiqh) providing the primary theory for deducing Qurʾan rulings and those from the narrations (hadith) of the Prophet Muhammad. Scholars of Islam, including Patricia Crone (2004) and others chronicled by Anver Emon (2005), deny the influence of natural law theories as extra-scriptural indices of revelation’s content. This paper seeks to dispute these claims by reference to historical and canonical examples within Shiʿa legal thought that emphasize the salient roles of ‘aql (reason), fitrah (primordial human nature), and lutf (divine grace). These three holistic features, congenital to every human, and theophanically reflected in nature make up a mode of moral intelligibility antecedent to prophetic revelation. The debate between the 'traditionalist' Akhbaris and 'rationalist' Usulis over the nature of deriving legal edicts in Islam is well-covered academic ground. Instead, an attempt is made to define and detail the built-in assumptions of natural law revealed in the jurisprudential summa of Imami Shiʿism, whether of either dominant school, that undergird its legal prescriptions and methods of deduction.

Keywords: Islam, fiqh, natural law, legal positivism, aql

Procedia PDF Downloads 124
850 A Possible Determinant of Musical Preference in Big Five Personality Traits

Authors: Peter S. Kim

Abstract:

The increasing availability of music facilitated by new technology and open sourcing has eliminated many traditional limiting factors in musical taste, creating a culture of choice. This study tested 191 international subjects, mostly young adults more decisively shaped by emerging technologies like Facebook, the platform for the study. Using an aggregated Big Five personality test, subjects were asked to self-report on questions related to extraversion, agreeableness, conscientiousness, neuroticism, and openness. Subsequently, subjects listened to five pairs of musical works reflecting opposite extremes of one of five musical qualities: tempo (fast/slow), complexity (simple/complex), degree of dissonance (tonal/atonal), familiarity (familiar/unfamiliar), and extra-musical significance (significant/not significant). Subjects were then asked to record listening times and preferences among the selections. Strikingly, this study shows a relatively high positive correlation between agreeableness and musical preferences (predicting preferences for simple, familiar, and fast music), as compared to extraversion, openness, conscientiousness, and neuroticism. Thus, this research suggests that the not yet well-understood relationship between personality traits and musical qualities merits further study.

Keywords: music perception, psychology, cognition, musical preference

Procedia PDF Downloads 297
849 High Performance Field Programmable Gate Array-Based Stochastic Low-Density Parity-Check Decoder Design for IEEE 802.3an Standard

Authors: Ghania Zerari, Abderrezak Guessoum, Rachid Beguenane

Abstract:

This paper introduces high-performance architecture for fully parallel stochastic Low-Density Parity-Check (LDPC) field programmable gate array (FPGA) based LDPC decoder. The new approach is designed to decrease the decoding latency and to reduce the FPGA logic utilisation. To accomplish the target logic utilisation reduction, the routing of the proposed sub-variable node (VN) internal memory is designed to utilize one slice distributed RAM. Furthermore, a VN initialization, using the channel input probability, is achieved to enhance the decoder convergence, without extra resources and without integrating the output saturated-counters. The Xilinx FPGA implementation, of IEEE 802.3an standard LDPC code, shows that the proposed decoding approach attain high performance along with reduction of FPGA logic utilisation.

Keywords: low-density parity-check (LDPC) decoder, stochastic decoding, field programmable gate array (FPGA), IEEE 802.3an standard

Procedia PDF Downloads 284
848 Tensor Deep Stacking Neural Networks and Bilinear Mapping Based Speech Emotion Classification Using Facial Electromyography

Authors: P. S. Jagadeesh Kumar, Yang Yung, Wenli Hu

Abstract:

Speech emotion classification is a dominant research field in finding a sturdy and profligate classifier appropriate for different real-life applications. This effort accentuates on classifying different emotions from speech signal quarried from the features related to pitch, formants, energy contours, jitter, shimmer, spectral, perceptual and temporal features. Tensor deep stacking neural networks were supported to examine the factors that influence the classification success rate. Facial electromyography signals were composed of several forms of focuses in a controlled atmosphere by means of audio-visual stimuli. Proficient facial electromyography signals were pre-processed using moving average filter, and a set of arithmetical features were excavated. Extracted features were mapped into consistent emotions using bilinear mapping. With facial electromyography signals, a database comprising diverse emotions will be exposed with a suitable fine-tuning of features and training data. A success rate of 92% can be attained deprived of increasing the system connivance and the computation time for sorting diverse emotional states.

Keywords: speech emotion classification, tensor deep stacking neural networks, facial electromyography, bilinear mapping, audio-visual stimuli

Procedia PDF Downloads 232
847 Surgical Site Infections Post Ventriculoperitoneal (VP) Shunting: A Matched Healthcare Cost and Length of Stay Study

Authors: Issa M. Hweidi, Saba W. Al-Ibraheem

Abstract:

This study aimed to assess the increased hospital length of stay and healthcare costs associated with SSIs among ventriculoperitoneal shunting surgery patients in Jordan. This study adopted a retrospective and nested 1:1 matched case-control design. A non-probability convenient sample of 48 VP shunt patients was recruited for the purpose of the study. The targeted groups of the study basically used to cross-match the variables investigated to minimize the risk of confounding. Information was extracted from the text of patients' electronic health records. As compared to the non-SSI group, the SSI group had an extra mean healthcare cost of $13,696.53 (p=0.001) and longer hospital length of stay (22.64 mean additional days). Furthermore, Acinetobacter baumannii and Klebsiella pneumonia were identified as being the most predominant causative agents of SSIs. The results of this study may provide baseline data for national and regional benchmarking to evaluate the quality of care provided to likewise patients. Adherence to infection control strategies and protocols considering new surveillance methods of SSIs is encouraged.

Keywords: ventriculoperitoneal shunt, health care cost, length of stay, neurosurgery, surgical site infections

Procedia PDF Downloads 58
846 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 375
845 Sociolinguistic Analysis of Campus Slang: The Case of Akwa Ibom State College of Education, Afaha Nsit, Nigeria

Authors: Charles Okon Effiong

Abstract:

This paper is a sociolinguistic analysis of the semantics of students’ slang in Akwa Ibom State College of Education, Afaha Nsit, Nigeria. The descriptive survey design was deployed for the study and data were collected from one hundred and fifty (150) students through a series of instruments such as questionnaire, interviews and observations. The questionnaire was administered randomly to levels 200, 300 and Extra Time students only. Interviews and observations were also conducted on the students. These categories of students were selected because they had spent a longer time in the college and were thought to be familiar with campus slang. A total of ninety two (92) slang expressions were taken from the questionnaire and out of this number, twenty six (26) slang expressions were peculiar to the college while sixty six (66) were those slang terms also used in the society. The study proves the notion that every speaker handles a variety of registers and tends to choose among them in accordance with the social situation in which he finds himself. The study shows campus slang as a sociolect which facilitates communication among the students in a different sense. The slang expressions are fully intelligible to the students and this unique and elaborate lexicon serves to achieve group identity among other social implications.

Keywords: communication, slang, social relationship, sociolinguistics

Procedia PDF Downloads 437
844 Design and Implementation of an Effective Machine Learning Approach to Crime Prediction and Prevention

Authors: Ashish Kumar, Kaptan Singh, Amit Saxena

Abstract:

Today, it is believed that crimes have the greatest impact on a person's ability to progress financially and personally. Identifying places where individuals shouldn't go is crucial for preventing crimes and is one of the key considerations. As society and technologies have advanced significantly, so have crimes and the harm they wreak. When there is a concentration of people in one place and changes happen quickly, it is even harder to prevent. Because of this, many crime prevention strategies have been embraced as a component of the development of smart cities in numerous cities. However, crimes can occur anywhere; all that is required is to identify the pattern of their occurrences, which will help to lower the crime rate. In this paper, an analysis related to crime has been done; information related to crimes is collected from all over India that can be accessed from anywhere. The purpose of this paper is to investigate the relationship between several factors and India's crime rate. The review has covered information related to every state of India and their associated regions of the period going in between 2001- 2014. However various classes of violations have a marginally unique scope over the years.

Keywords: K-nearest neighbor, random forest, decision tree, pre-processing

Procedia PDF Downloads 72
843 Experimental and Numerical Analysis of Built-In Thermoelectric Generator Modules with Elliptical Pin-Fin Heat Sink

Authors: J. Y Jang, C. Y. Tseng

Abstract:

A three-dimensional numerical model of thermoelectric generator (TEG) modules attached to a large chimney plate is proposed and solved numerically using a control volume based finite difference formulation. The TEG module consists of a thermoelectric generator, an elliptical pin-fin heat sink, and a cold plate for water cooling. In the chimney, the temperature of flue gases is 450-650K. Therefore, the effects of convection and radiation heat transfer are considered. Although the TEG hot-side temperature and thus the electric power output can be increased by inserting an elliptical pin-fin heat sink into the chimney tunnel to increase the heat transfer area, the pin fin heat sink would cause extra pumping power at the same time. The main purpose of this study is to analyze the effects of geometrical parameters on the electric power output and chimney pressure drop characteristics. In addition, the effects of different operating conditions, including various inlet velocities (Vin = 1, 3, 5 m/s) and inlet temperatures (Tgas = 450, 550, 650K) are discussed in detail. The predicted numerical data for the power vs. current (P-I) curve are in good agreement (within 11%) with the experimental data.

Keywords: thermoelectric generator, waste heat recovery, pin-fin heat sink, experimental and numerical analysis

Procedia PDF Downloads 367
842 High-Frequency Full-Bridge Isolated DC-DC Converter for Fuel Cell Power Generation Systems

Authors: Nabil A. Ahmed

Abstract:

DC-DC converters are necessary to interface low-voltage fuel cell power generation systems to a higher voltage DC bus system. A system and method for generating a regulated output power from fuel cell power generation systems is proposed in this paper, this includes a soft-switching isolated DC-DC converter to reduce the idling and circulating currents. The system incorporates a high-frequency center tap transformer link DC-DC converter using secondary-side soft switching control. Snubber capacitors including the parasitic capacitance of the switching devices and the transformer leakage inductance are utilized to achieve zero-voltage switching (ZVS) in the primary side of the high-frequency transformer. Therefore, no extra resonant components are required for ZVS. The inherent soft-switching capability allows high power density, efficient power conversion, and compact packaging. A prototype rated at 6.5 kW is proposed and simulated. Simulation results confirmed a wide range of soft-switching operation and consequently high conversion efficiency will be achieved.

Keywords: secondary-side, phase-shift, high-frequency transformer, zero voltage, zero current, soft switching operation, switching losses

Procedia PDF Downloads 292
841 Crisis of Sinti (Gypsy) Ethnicity and Identity

Authors: Rinaldo Diricchardi

Abstract:

In this paper, author theoretically and empirically explores the ethnic identity of the descendants of the Indian travelers in Slovenia Sinti, who are in modern time, for the researchers, still a "tabula rasa". He investigates the extent to which Sinti ethnic particular identities (e.g. Sinti chiefs, Sinti’s individual political structure…), the Sinti language (dialect, which is topic and it is not allowed to be spoken in public), culture and habits still in the impact of anachronism, moreover, to what extent the community is still “tabula rasa” (to non–Sinti population). The relationships within the Sinti entity: "in se–intra se" is a mirror of duality of the relation of "extra se". Is it possible that the concepts of social/economical relationships are reflecting the Sinti community, moreover, the possible influence of minority from outside to inside? Is the stratification of their ethnicity and their language ethnicism? In addition, is the result of stratification of discourse still inherited and discounted the Indian caste system? In present article, author uses the word Gypsy with high respect and with a large measure of prudentiality, without negative connotations. At the first Gypsy World Congress in 1971 in London the Sinti did not accept unification with Romani, but Sinti and others Gypsies still keep the name Gypsy/Romanichals, Gypsy/Kale, Gypsy/Manouches, Gypsy/Manoesje, Gypsy/Xoraxano, Gypsy/Machaways and Gypsy/Kalderashe. In addition, all of the European documents taken into account respect and use the name Gypsy.

Keywords: Sinti, Gypsy, identity, stratification, inclusion, exclusion

Procedia PDF Downloads 360
840 The Employment of Unmanned Aircraft Systems for Identification and Classification of Helicopter Landing Zones and Airdrop Zones in Calamity Situations

Authors: Marielcio Lacerda, Angelo Paulino, Elcio Shiguemori, Alvaro Damiao, Lamartine Guimaraes, Camila Anjos

Abstract:

Accurate information about the terrain is extremely important in disaster management activities or conflict. This paper proposes the use of the Unmanned Aircraft Systems (UAS) at the identification of Airdrop Zones (AZs) and Helicopter Landing Zones (HLZs). In this paper we consider the AZs the zones where troops or supplies are dropped by parachute, and HLZs areas where victims can be rescued. The use of digital image processing enables the automatic generation of an orthorectified mosaic and an actual Digital Surface Model (DSM). This methodology allows obtaining this fundamental information to the terrain’s comprehension post-disaster in a short amount of time and with good accuracy. In order to get the identification and classification of AZs and HLZs images from DJI drone, model Phantom 4 have been used. The images were obtained with the knowledge and authorization of the responsible sectors and were duly registered in the control agencies. The flight was performed on May 24, 2017, and approximately 1,300 images were obtained during approximately 1 hour of flight. Afterward, new attributes were generated by Feature Extraction (FE) from the original images. The use of multispectral images and complementary attributes generated independently from them increases the accuracy of classification. The attributes of this work include the Declivity Map and Principal Component Analysis (PCA). For the classification four distinct classes were considered: HLZ 1 – small size (18m x 18m); HLZ 2 – medium size (23m x 23m); HLZ 3 – large size (28m x 28m); AZ (100m x 100m). The Decision Tree method Random Forest (RF) was used in this work. RF is a classification method that uses a large collection of de-correlated decision trees. Different random sets of samples are used as sampled objects. The results of classification from each tree and for each object is called a class vote. The resulting classification is decided by a majority of class votes. In this case, we used 200 trees for the execution of RF in the software WEKA 3.8. The classification result was visualized on QGIS Desktop 2.12.3. Through the methodology used, it was possible to classify in the study area: 6 areas as HLZ 1, 6 areas as HLZ 2, 4 areas as HLZ 3; and 2 areas as AZ. It should be noted that an area classified as AZ covers the classifications of the other classes, and may be used as AZ, HLZ of large size (HLZ3), medium size (HLZ2) and small size helicopters (HLZ1). Likewise, an area classified as HLZ for large rotary wing aircraft (HLZ3) covers the smaller area classifications, and so on. It was concluded that images obtained through small UAV are of great use in calamity situations since they can provide data with high accuracy, with low cost, low risk and ease and agility in obtaining aerial photographs. This allows the generation, in a short time, of information about the features of the terrain in order to serve as an important decision support tool.

Keywords: disaster management, unmanned aircraft systems, helicopter landing zones, airdrop zones, random forest

Procedia PDF Downloads 161
839 Mondoc: Informal Lightweight Ontology for Faceted Semantic Classification of Hypernymy

Authors: M. Regina Carreira-Lopez

Abstract:

Lightweight ontologies seek to concrete union relationships between a parent node, and a secondary node, also called "child node". This logic relation (L) can be formally defined as a triple ontological relation (LO) equivalent to LO in ⟨LN, LE, LC⟩, and where LN represents a finite set of nodes (N); LE is a set of entities (E), each of which represents a relationship between nodes to form a rooted tree of ⟨LN, LE⟩; and LC is a finite set of concepts (C), encoded in a formal language (FL). Mondoc enables more refined searches on semantic and classified facets for retrieving specialized knowledge about Atlantic migrations, from the Declaration of Independence of the United States of America (1776) and to the end of the Spanish Civil War (1939). The model looks forward to increasing documentary relevance by applying an inverse frequency of co-ocurrent hypernymy phenomena for a concrete dataset of textual corpora, with RMySQL package. Mondoc profiles archival utilities implementing SQL programming code, and allows data export to XML schemas, for achieving semantic and faceted analysis of speech by analyzing keywords in context (KWIC). The methodology applies random and unrestricted sampling techniques with RMySQL to verify the resonance phenomena of inverse documentary relevance between the number of co-occurrences of the same term (t) in more than two documents of a set of texts (D). Secondly, the research also evidences co-associations between (t) and their corresponding synonyms and antonyms (synsets) are also inverse. The results from grouping facets or polysemic words with synsets in more than two textual corpora within their syntagmatic context (nouns, verbs, adjectives, etc.) state how to proceed with semantic indexing of hypernymy phenomena for subject-heading lists and for authority lists for documentary and archival purposes. Mondoc contributes to the development of web directories and seems to achieve a proper and more selective search of e-documents (classification ontology). It can also foster on-line catalogs production for semantic authorities, or concepts, through XML schemas, because its applications could be used for implementing data models, by a prior adaptation of the based-ontology to structured meta-languages, such as OWL, RDF (descriptive ontology). Mondoc serves to the classification of concepts and applies a semantic indexing approach of facets. It enables information retrieval, as well as quantitative and qualitative data interpretation. The model reproduces a triple tuple ⟨LN, LE, LT, LCF L, BKF⟩ where LN is a set of entities that connect with other nodes to concrete a rooted tree in ⟨LN, LE⟩. LT specifies a set of terms, and LCF acts as a finite set of concepts, encoded in a formal language, L. Mondoc only resolves partial problems of linguistic ambiguity (in case of synonymy and antonymy), but neither the pragmatic dimension of natural language nor the cognitive perspective is addressed. To achieve this goal, forthcoming programming developments should target at oriented meta-languages with structured documents in XML.

Keywords: hypernymy, information retrieval, lightweight ontology, resonance

Procedia PDF Downloads 111
838 Evaluation of Robust Feature Descriptors for Texture Classification

Authors: Jia-Hong Lee, Mei-Yi Wu, Hsien-Tsung Kuo

Abstract:

Texture is an important characteristic in real and synthetic scenes. Texture analysis plays a critical role in inspecting surfaces and provides important techniques in a variety of applications. Although several descriptors have been presented to extract texture features, the development of object recognition is still a difficult task due to the complex aspects of texture. Recently, many robust and scaling-invariant image features such as SIFT, SURF and ORB have been successfully used in image retrieval and object recognition. In this paper, we have tried to compare the performance for texture classification using these feature descriptors with k-means clustering. Different classifiers including K-NN, Naive Bayes, Back Propagation Neural Network , Decision Tree and Kstar were applied in three texture image sets - UIUCTex, KTH-TIPS and Brodatz, respectively. Experimental results reveal SIFTS as the best average accuracy rate holder in UIUCTex, KTH-TIPS and SURF is advantaged in Brodatz texture set. BP neuro network works best in the test set classification among all used classifiers.

Keywords: texture classification, texture descriptor, SIFT, SURF, ORB

Procedia PDF Downloads 349
837 Management and Evaluating Technologies of Tissue Engineering Various Fields of Bone

Authors: Arash Sepehri Bonab

Abstract:

Techniques to switch cells between development and differentiation, which tend to be commonly exclusive, are utilized in arrange to supply an expansive cell mass that can perform particular separated capacities required for the tissue to develop. Approaches to tissue engineering center on the have to give signals to cell populaces to advance cell multiplication and separation. Current tissue regenerative procedures depend primarily on tissue repair by transplantation of synthetic/natural inserts. In any case, restrictions on the existing procedures have expanded the request for tissue designing approaches. Tissue engineering innovation and stem cell investigation based on tissue building have made awesome advances in overcoming the issues of tissue and organ damage, useful loss, and surgical complications. Bone tissue has the capability to recover itself; in any case, surrenders of a basic estimate anticipate the bone from recovering and require extra support. The advancement of bone tissue building has been utilized to form useful options to recover the bone. This paper primarily portrays current advances in tissue engineering in different fields of bone and talks about the long-term trend of tissue designing innovation in the treatment of complex diseases.

Keywords: tissue engineering, bone, technologies, treatment

Procedia PDF Downloads 84
836 Diversity Indices as a Tool for Evaluating Quality of Water Ways

Authors: Khadra Ahmed, Khaled Kheireldin

Abstract:

In this paper, we present a pedestrian detection descriptor called Fused Structure and Texture (FST) features based on the combination of the local phase information with the texture features. Since the phase of the signal conveys more structural information than the magnitude, the phase congruency concept is used to capture the structural features. On the other hand, the Center-Symmetric Local Binary Pattern (CSLBP) approach is used to capture the texture information of the image. The dimension less quantity of the phase congruency and the robustness of the CSLBP operator on the flat images, as well as the blur and illumination changes, lead the proposed descriptor to be more robust and less sensitive to the light variations. The proposed descriptor can be formed by extracting the phase congruency and the CSLBP values of each pixel of the image with respect to its neighborhood. The histogram of the oriented phase and the histogram of the CSLBP values for the local regions in the image are computed and concatenated to construct the FST descriptor. Several experiments were conducted on INRIA and the low resolution DaimlerChrysler datasets to evaluate the detection performance of the pedestrian detection system that is based on the FST descriptor. A linear Support Vector Machine (SVM) is used to train the pedestrian classifier. These experiments showed that the proposed FST descriptor has better detection performance over a set of state of the art feature extraction methodologies.

Keywords: planktons, diversity indices, water quality index, water ways

Procedia PDF Downloads 500
835 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 141
834 Regression Model Evaluation on Depth Camera Data for Gaze Estimation

Authors: James Purnama, Riri Fitri Sari

Abstract:

We investigate the machine learning algorithm selection problem in the term of a depth image based eye gaze estimation, with respect to its essential difficulty in reducing the number of required training samples and duration time of training. Statistics based prediction accuracy are increasingly used to assess and evaluate prediction or estimation in gaze estimation. This article evaluates Root Mean Squared Error (RMSE) and R-Squared statistical analysis to assess machine learning methods on depth camera data for gaze estimation. There are 4 machines learning methods have been evaluated: Random Forest Regression, Regression Tree, Support Vector Machine (SVM), and Linear Regression. The experiment results show that the Random Forest Regression has the lowest RMSE and the highest R-Squared, which means that it is the best among other methods.

Keywords: gaze estimation, gaze tracking, eye tracking, kinect, regression model, orange python

Procedia PDF Downloads 524
833 Major Depressive Disorder: Diagnosis based on Electroencephalogram Analysis

Authors: Wajid Mumtaz, Aamir Saeed Malik, Syed Saad Azhar Ali, Mohd Azhar Mohd Yasin

Abstract:

In this paper, a technique based on electroencephalogram (EEG) analysis is presented, aiming for diagnosing major depressive disorder (MDD) among a potential population of MDD patients and healthy controls. EEG is recognized as a clinical modality during applications such as seizure diagnosis, index for anesthesia, detection of brain death or stroke. However, its usability for psychiatric illnesses such as MDD is less studied. Therefore, in this study, for the sake of diagnosis, 2 groups of study participants were recruited, 1) MDD patients, 2) healthy people as controls. EEG data acquired from both groups were analyzed involving inter-hemispheric asymmetry and composite permutation entropy index (CPEI). To automate the process, derived quantities from EEG were utilized as inputs to classifier such as logistic regression (LR) and support vector machine (SVM). The learning of these classification models was tested with a test dataset. Their learning efficiency is provided as accuracy of classifying MDD patients from controls, their sensitivities and specificities were reported, accordingly (LR =81.7 % and SVM =81.5 %). Based on the results, it is concluded that the derived measures are indicators for diagnosing MDD from a potential population of normal controls. In addition, the results motivate further exploring other measures for the same purpose.

Keywords: major depressive disorder, diagnosis based on EEG, EEG derived features, CPEI, inter-hemispheric asymmetry

Procedia PDF Downloads 532
832 Iris Feature Extraction and Recognition Based on Two-Dimensional Gabor Wavelength Transform

Authors: Bamidele Samson Alobalorun, Ifedotun Roseline Idowu

Abstract:

Biometrics technologies apply the human body parts for their unique and reliable identification based on physiological traits. The iris recognition system is a biometric–based method for identification. The human iris has some discriminating characteristics which provide efficiency to the method. In order to achieve this efficiency, there is a need for feature extraction of the distinct features from the human iris in order to generate accurate authentication of persons. In this study, an approach for an iris recognition system using 2D Gabor for feature extraction is applied to iris templates. The 2D Gabor filter formulated the patterns that were used for training and equally sent to the hamming distance matching technique for recognition. A comparison of results is presented using two iris image subjects of different matching indices of 1,2,3,4,5 filter based on the CASIA iris image database. By comparing the two subject results, the actual computational time of the developed models, which is measured in terms of training and average testing time in processing the hamming distance classifier, is found with best recognition accuracy of 96.11% after capturing the iris localization or segmentation using the Daughman’s Integro-differential, the normalization is confined to the Daugman’s rubber sheet model.

Keywords: Daugman rubber sheet, feature extraction, Hamming distance, iris recognition system, 2D Gabor wavelet transform

Procedia PDF Downloads 49
831 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 449
830 Theoretical Approach to Kinetic of Heat Transfer under Irradiation

Authors: Pavlo Selyshchev

Abstract:

A theoretical approach to describe kinetic of heat transfer between an irradiated sample and environment is developed via formalism of the Complex systems and kinetic equations. The irradiated material is a metastable system with non-linear feedbacks, which can give rise to different regimes of buildup and annealing of radiation-induced defects, heating and heat transfer with environment. Irradiation with energetic particles heats the sample and produces defects of the crystal lattice of the sample. The crystal with defects accumulates extra (non-thermal) energy, which is transformed into heat during the defect annealing. Any increase of temperature leads to acceleration of defect annealing, to additional transformation of non-thermal energy into heat and to further growth of the temperature. Thus a non-linear feedback is formed. It is shown that at certain conditions of irradiation this non-linear feedback leads to self-oscillations of the defect density, the temperature of the irradiated sample and the heat transfer between the sample and environment. Simulation and analysis of these phenomena is performed. The frequency of the self-oscillations is obtained. It is determined that the period of the self-oscillations is varied from minutes to several hours depending on conditions of irradiation and properties of the sample. Obtaining results are compared with experimental ones.

Keywords: irradiation, heat transfer, non-linear feed-back, self-oscillations

Procedia PDF Downloads 215
829 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 486
828 One-Way Electric Vehicle Carsharing in an Urban Area with Vehicle-To-Grid Option

Authors: Cem Isik Dogru, Salih Tekin, Kursad Derinkuyu

Abstract:

Electric vehicle (EV) carsharing is an alternative method to tackle urban transportation problems. This method can be applied by several options. One of the options is the one-way carsharing, which allow an EV to be taken at a designated location and leaving it on another specified location customer desires. Although it may increase users’ satisfaction, the issues, namely, demand dissatisfaction, relocation of EVs and charging schedules, must be dealt with. Also, excessive electricity has to be stored in batteries of EVs. To cope with aforementioned issues, two-step mixed integer programming (MIP) model is proposed. In first step, the integer programming model is used to determine amount of electricity to be sold to the grid in terms of time periods for extra profit. Determined amounts are provided from the batteries of EVs. Also, this step works in day-ahead electricity markets with forecast of periodical electricity prices. In second step, other MIP model optimizes daily operations of one-way carsharing: charging-discharging schedules, relocation of EVs to serve more demand and renting to maximize the profit of EV fleet owner. Due to complexity of the models, heuristic methods are introduced to attain a feasible solution and different price information scenarios are compared.

Keywords: electric vehicles, forecasting, mixed integer programming, one-way carsharing

Procedia PDF Downloads 118
827 The Sociocultural Adaptation, Openness, and Success of Sojourn of Foreign Students in Tarlac City, Philippines

Authors: Maria Sheila S. Garcia

Abstract:

A good number of researches indicate that living in another country may create different and unexpected adjustment problems, and foreign students are not exempted from this. To provide an understanding of this process, 30 foreign college students studying English in Tarlac City were asked to answer questionnaires. This is to determine their sociocultural adaptation, openness to the host culture and success of sojourn. Through statistical analysis, it was found that the students experience greater difficulty in the academic area. Moderate difficulty was attributed to everyday life and social interactions. Albeit difficult, what they like best is the school’s methods of teaching English while the areas that need improvement are the libraries and internet connection. The only significant relationship was found between sociocultural adaptation and success of sojourn. Negatively correlated, if students experience greater difficulties in their host country, they are likely to regret their stay and will not recommend it to anyone. Openness to the host culture did not have an effect on the adaptation and success of sojourn. The short period of time that the students have are spent in studying rather than making friends. Nonetheless, this indicates the need to look deeper into the academic, extra-curricular activities and facilities provided by learning institutions.

Keywords: foreign students, sociocultural adaptation, success of sojourn, Tarlac Philippines

Procedia PDF Downloads 576
826 Identifying Missing Component in the Bechdel Test Using Principal Component Analysis Method

Authors: Raghav Lakhotia, Chandra Kanth Nagesh, Krishna Madgula

Abstract:

A lot has been said and discussed regarding the rationale and significance of the Bechdel Score. It became a digital sensation in 2013, when Swedish cinemas began to showcase the Bechdel test score of a film alongside its rating. The test has drawn criticism from experts and the film fraternity regarding its use to rate the female presence in a movie. The pundits believe that the score is too simplified and the underlying criteria of a film to pass the test must include 1) at least two women, 2) who have at least one dialogue, 3) about something other than a man, is egregious. In this research, we have considered a few more parameters which highlight how we represent females in film, like the number of female dialogues in a movie, dialogue genre, and part of speech tags in the dialogue. The parameters were missing in the existing criteria to calculate the Bechdel score. The research aims to analyze 342 movies scripts to test a hypothesis if these extra parameters, above with the current Bechdel criteria, are significant in calculating the female representation score. The result of the Principal Component Analysis method concludes that the female dialogue content is a key component and should be considered while measuring the representation of women in a work of fiction.

Keywords: Bechdel test, dialogue genre, parts of speech tags, principal component analysis

Procedia PDF Downloads 122