Search results for: consensus algorithms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2476

Search results for: consensus algorithms

1546 Female Athlete Triad: How Much Is Known

Authors: Nadine Abuqtaish

Abstract:

Females’ participation in athletic sports events has increased in the last decades, and the discovery of eating disorders and menstrual dysfunction has been evident since the early 1980s. The term “Female athlete triad” was initially defined by the Task Force on Women’s Issues of the American College of Sports Medicine (ACSM) in 1992. Menstrual irregularities have been prevalent in competitive female athletes, especially in their adolescence and early adulthood age. Nutritional restrictions to maintain a certain physique and lean look are sought to be advantageous in female athletes such as gymnastics, cheerleading, or weight-sensitive sports such as endurance sports (cycling and marathoners). This stress places the female at risk of irregularities in their menstrual cycle which can lead them to lose their circadian estrogen levels. Estrogen is an important female reproductive hormone that plays a role in maintaining bone mass. Bone mineral density peaks by the age 25. Inadequate estrogen due to missed menstrual cycle or amenorrhea has been estimated to cause a yearly loss of 2% of bone mass, increasing the risk of osteoporosis in the postmenopausal phase. This paper is intended to have a better depth understanding of whether female athletes are being monitored by their official entities or coaches. A qualitative research method through online search engines and keywords “females, athletes, triad, amenorrhea, anorexia, osteoporosis” were used to collect the available primary sources from official public library databases. The latest consensus was published in 2014 by the Female Athlete Triad Coalition and the need for further research and emphasis on this issue is still lacking.

Keywords: female, athlete, triad, amenorrhea, anorexia, bone loss

Procedia PDF Downloads 62
1545 Efficient Field-Oriented Motor Control on Resource-Constrained Microcontrollers for Optimal Performance without Specialized Hardware

Authors: Nishita Jaiswal, Apoorv Mohan Satpute

Abstract:

The increasing demand for efficient, cost-effective motor control systems in the automotive industry has driven the need for advanced, highly optimized control algorithms. Field-Oriented Control (FOC) has established itself as the leading approach for motor control, offering precise and dynamic regulation of torque, speed, and position. However, as energy efficiency becomes more critical in modern applications, implementing FOC on low-power, cost-sensitive microcontrollers pose significant challenges due to the limited availability of computational and hardware resources. Currently, most solutions rely on high-performance 32-bit microcontrollers or Application-Specific Integrated Circuits (ASICs) equipped with Floating Point Units (FPUs) and Hardware Accelerated Units (HAUs). These advanced platforms enable rapid computation and simplify the execution of complex control algorithms like FOC. However, these benefits come at the expense of higher costs, increased power consumption, and added system complexity. These drawbacks limit their suitability for embedded systems with strict power and budget constraints, where achieving energy and execution efficiency without compromising performance is essential. In this paper, we present an alternative approach that utilizes optimized data representation and computation techniques on a 16-bit microcontroller without FPUs or HAUs. By carefully optimizing data point formats and employing fixed-point arithmetic, we demonstrate how the precision and computational efficiency required for FOC can be maintained in resource-constrained environments. This approach eliminates the overhead performance associated with floating-point operations and hardware acceleration, providing a more practical solution in terms of cost, scalability and improved execution time efficiency, allowing faster response in motor control applications. Furthermore, it enhances system design flexibility, making it particularly well-suited for applications that demand stringent control over power consumption and costs.

Keywords: field-oriented control, fixed-point arithmetic, floating point unit, hardware accelerator unit, motor control systems

Procedia PDF Downloads 13
1544 A Mean–Variance–Skewness Portfolio Optimization Model

Authors: Kostas Metaxiotis

Abstract:

Portfolio optimization is one of the most important topics in finance. This paper proposes a mean–variance–skewness (MVS) portfolio optimization model. Traditionally, the portfolio optimization problem is solved by using the mean–variance (MV) framework. In this study, we formulate the proposed model as a three-objective optimization problem, where the portfolio's expected return and skewness are maximized whereas the portfolio risk is minimized. For solving the proposed three-objective portfolio optimization model we apply an adapted version of the non-dominated sorting genetic algorithm (NSGAII). Finally, we use a real dataset from FTSE-100 for validating the proposed model.

Keywords: evolutionary algorithms, portfolio optimization, skewness, stock selection

Procedia PDF Downloads 196
1543 Developing an Instrument to Measure Teachers’ Self-Efficacy of Teaching Innovation Skills

Authors: Huda S. Al-Azmi

Abstract:

There is a growing consensus that adoption of teachers’ self-efficacy measurement tools help to assess teachers’ abilities in specific areas in order to improve their skills. As a result, different instruments to assess teachers’ ability were developed by academics and practitioners. However, many of these instruments focused either on general teaching skills, or on the other hand, were very specific to one subject. As such, these instruments do not offer a tool to measure the ability of teachers in teaching 21st century skills such as innovation skills. Teaching innovation skills helps to prepare students for lives and careers in the 21st century. The purpose of this study is to develop an instrument measuring teachers’ self-efficacy of teaching innovation skills related to the classroom context and evaluating the teachers’ beliefs regarding their ability in teaching innovation skills. To reach this goal, the 16-item instrument measures four dimensions of innovation skills: creativity, critical thinking, communication, and collaboration. 211 secondary-school teachers filled out the survey to quantitatively analyze the quality of the instrument. The instrument’s reliability and item analysis were measured by using jMetrik. The results concluded that the mean of self-efficacy ranged from 3 to 3.6 without extreme high or low self-efficacy scores. The discrimination analysis revealed that one item recorded a negative correlation with the total, and three items recorded low correlation with the total. The reliabilities of items ranged from 0.64 to 0.69 and the instrument needed a couple of revisions before practical use. The study concluded the need to discard one item and revise five items to increase the quality of the instrument for future work.

Keywords: critical thinking, collaboration, innovation skills, self-efficacy

Procedia PDF Downloads 213
1542 The Intersection of Artificial Intelligence and Mathematics

Authors: Mitat Uysal, Aynur Uysal

Abstract:

Artificial Intelligence (AI) is fundamentally driven by mathematics, with many of its core algorithms rooted in mathematical principles such as linear algebra, probability theory, calculus, and optimization techniques. This paper explores the deep connection between AI and mathematics, highlighting the role of mathematical concepts in key AI techniques like machine learning, neural networks, and optimization. To demonstrate this connection, a case study involving the implementation of a neural network using Python is presented. This practical example illustrates the essential role that mathematics plays in training a model and solving real-world problems.

Keywords: AI, mathematics, machine learning, optimization techniques, image processing

Procedia PDF Downloads 13
1541 Ensemble Methods in Machine Learning: An Algorithmic Approach to Derive Distinctive Behaviors of Criminal Activity Applied to the Poaching Domain

Authors: Zachary Blanks, Solomon Sonya

Abstract:

Poaching presents a serious threat to endangered animal species, environment conservations, and human life. Additionally, some poaching activity has even been linked to supplying funds to support terrorist networks elsewhere around the world. Consequently, agencies dedicated to protecting wildlife habitats have a near intractable task of adequately patrolling an entire area (spanning several thousand kilometers) given limited resources, funds, and personnel at their disposal. Thus, agencies need predictive tools that are both high-performing and easily implementable by the user to help in learning how the significant features (e.g. animal population densities, topography, behavior patterns of the criminals within the area, etc) interact with each other in hopes of abating poaching. This research develops a classification model using machine learning algorithms to aid in forecasting future attacks that is both easy to train and performs well when compared to other models. In this research, we demonstrate how data imputation methods (specifically predictive mean matching, gradient boosting, and random forest multiple imputation) can be applied to analyze data and create significant predictions across a varied data set. Specifically, we apply these methods to improve the accuracy of adopted prediction models (Logistic Regression, Support Vector Machine, etc). Finally, we assess the performance of the model and the accuracy of our data imputation methods by learning on a real-world data set constituting four years of imputed data and testing on one year of non-imputed data. This paper provides three main contributions. First, we extend work done by the Teamcore and CREATE (Center for Risk and Economic Analysis of Terrorism Events) research group at the University of Southern California (USC) working in conjunction with the Department of Homeland Security to apply game theory and machine learning algorithms to develop more efficient ways of reducing poaching. This research introduces ensemble methods (Random Forests and Stochastic Gradient Boosting) and applies it to real-world poaching data gathered from the Ugandan rain forest park rangers. Next, we consider the effect of data imputation on both the performance of various algorithms and the general accuracy of the method itself when applied to a dependent variable where a large number of observations are missing. Third, we provide an alternate approach to predict the probability of observing poaching both by season and by month. The results from this research are very promising. We conclude that by using Stochastic Gradient Boosting to predict observations for non-commercial poaching by season, we are able to produce statistically equivalent results while being orders of magnitude faster in computation time and complexity. Additionally, when predicting potential poaching incidents by individual month vice entire seasons, boosting techniques produce a mean area under the curve increase of approximately 3% relative to previous prediction schedules by entire seasons.

Keywords: ensemble methods, imputation, machine learning, random forests, statistical analysis, stochastic gradient boosting, wildlife protection

Procedia PDF Downloads 290
1540 An Efficient Strategy for Relay Selection in Multi-Hop Communication

Authors: Jung-In Baik, Seung-Jun Yu, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes an efficient relaying algorithm to obtain diversity for improving the reliability of a signal. The algorithm achieves time or space diversity gain by multiple versions of the same signal through two routes. Relays are separated between a source and destination. The routes between the source and destination are set adaptive in order to deal with different channels and noises. The routes consist of one or more relays and the source transmits its signal to the destination through the routes. The signals from the relays are combined and detected at the destination. The proposed algorithm provides a better performance than the conventional algorithms in bit error rate (BER).

Keywords: multi-hop, OFDM, relay, relaying selection

Procedia PDF Downloads 443
1539 A Rapid Code Acquisition Scheme in OOC-Based CDMA Systems

Authors: Keunhong Chae, Seokho Yoon

Abstract:

We propose a code acquisition scheme called improved multiple-shift (IMS) for optical code division multiple access systems, where the optical orthogonal code is used instead of the pseudo noise code. Although the IMS algorithm has a similar process to that of the conventional MS algorithm, it has a better code acquisition performance than the conventional MS algorithm. We analyze the code acquisition performance of the IMS algorithm and compare the code acquisition performances of the MS and the IMS algorithms in single-user and multi-user environments.

Keywords: code acquisition, optical CDMA, optical orthogonal code, serial algorithm

Procedia PDF Downloads 537
1538 Error Analysis of Wavelet-Based Image Steganograhy Scheme

Authors: Geeta Kasana, Kulbir Singh, Satvinder Singh

Abstract:

In this paper, a steganographic scheme for digital images using Integer Wavelet Transform (IWT) is proposed. The cover image is decomposed into wavelet sub bands using IWT. Each of the subband is divided into blocks of equal size and secret data is embedded into the largest and smallest pixel values of each block of the subband. Visual quality of stego images is acceptable as PSNR between cover image and stego is above 40 dB, imperceptibility is maintained. Experimental results show better tradeoff between capacity and visual perceptivity compared to the existing algorithms. Maximum possible error analysis is evaluated for each of the wavelet subbands of an image.

Keywords: DWT, IWT, MSE, PSNR

Procedia PDF Downloads 503
1537 A Survey on Concurrency Control Methods in Distributed Database

Authors: Seyed Mohsen Jameii

Abstract:

In the last years, remarkable improvements have been made in the ability of distributed database systems performance. A distributed database is composed of some sites which are connected to each other through network connections. In this system, if good harmonization is not made between different transactions, it may result in database incoherence. Nowadays, because of the complexity of many sites and their connection methods, it is difficult to extend different models in distributed database serially. The principle goal of concurrency control in distributed database is to ensure not interfering in accessibility of common database by different sites. Different concurrency control algorithms have been suggested to use in distributed database systems. In this paper, some available methods have been introduced and compared for concurrency control in distributed database.

Keywords: distributed database, two phase locking protocol, transaction, concurrency

Procedia PDF Downloads 350
1536 Using Probe Person Data for Travel Mode Detection

Authors: Muhammad Awais Shafique, Eiji Hato, Hideki Yaginuma

Abstract:

Recently GPS data is used in a lot of studies to automatically reconstruct travel patterns for trip survey. The aim is to minimize the use of questionnaire surveys and travel diaries so as to reduce their negative effects. In this paper data acquired from GPS and accelerometer embedded in smart phones is utilized to predict the mode of transportation used by the phone carrier. For prediction, Support Vector Machine (SVM) and Adaptive boosting (AdaBoost) are employed. Moreover a unique method to improve the prediction results from these algorithms is also proposed. Results suggest that the prediction accuracy of AdaBoost after improvement is relatively better than the rest.

Keywords: accelerometer, AdaBoost, GPS, mode prediction, support vector machine

Procedia PDF Downloads 358
1535 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: communication, computer network, data collection, probe

Procedia PDF Downloads 358
1534 Methodology for Temporary Analysis of Production and Logistic Systems on the Basis of Distance Data

Authors: M. Mueller, M. Kuehn, M. Voelker

Abstract:

In small and medium-sized enterprises (SMEs), the challenge is to create a well-grounded and reliable basis for process analysis, optimization and planning due to a lack of data. SMEs have limited access to methods with which they can effectively and efficiently analyse processes and identify cause-and-effect relationships in order to generate the necessary database and derive optimization potential from it. The implementation of digitalization within the framework of Industry 4.0 thus becomes a particular necessity for SMEs. For these reasons, the abstract presents an analysis methodology that is subject to the objective of developing an SME-appropriate methodology for efficient, temporarily feasible data collection and evaluation in flexible production and logistics systems as a basis for process analysis and optimization. The overall methodology focuses on retrospective, event-based tracing and analysis of material flow objects. The technological basis consists of Bluetooth low energy (BLE)-based transmitters, so-called beacons, and smart mobile devices (SMD), e.g. smartphones as receivers, between which distance data can be measured and derived motion profiles. The distance is determined using the Received Signal Strength Indicator (RSSI), which is a measure of signal field strength between transmitter and receiver. The focus is the development of a software-based methodology for interpretation of relative movements of transmitters and receivers based on distance data. The main research is on selection and implementation of pattern recognition methods for automatic process recognition as well as methods for the visualization of relative distance data. Due to an existing categorization of the database regarding process types, classification methods (e.g. Support Vector Machine) from the field of supervised learning are used. The necessary data quality requires selection of suitable methods as well as filters for smoothing occurring signal variations of the RSSI, the integration of methods for determination of correction factors depending on possible signal interference sources (columns, pallets) as well as the configuration of the used technology. The parameter settings on which respective algorithms are based have a further significant influence on result quality of the classification methods, correction models and methods for visualizing the position profiles used. The accuracy of classification algorithms can be improved up to 30% by selected parameter variation; this has already been proven in studies. Similar potentials can be observed with parameter variation of methods and filters for signal smoothing. Thus, there is increased interest in obtaining detailed results on the influence of parameter and factor combinations on data quality in this area. The overall methodology is realized with a modular software architecture consisting of independently modules for data acquisition, data preparation and data storage. The demonstrator for initialization and data acquisition is available as mobile Java-based application. The data preparation, including methods for signal smoothing, are Python-based with the possibility to vary parameter settings and to store them in the database (SQLite). The evaluation is divided into two separate software modules with database connection: the achievement of an automated assignment of defined process classes to distance data using selected classification algorithms and the visualization as well as reporting in terms of a graphical user interface (GUI).

Keywords: event-based tracing, machine learning, process classification, parameter settings, RSSI, signal smoothing

Procedia PDF Downloads 129
1533 Sustainable Development in India: Towards a New Paradigm

Authors: Raghav Srivastava, Namrata Ramachandran

Abstract:

Strong sustainability has been, by consensus, imagined as comprising economic and extra-economic variables and cannot be viewed merely in terms of a trade-off between the economic needs of today and the potential left for tomorrow. Specifically, the cultural as well the ecological impacts of development projects on the affected communities should be evaluated, in addition to the economic. In developing and densely populated economies such as India, energy intensive development is seen as a sine qua non – a necessary trade off with ecological conservation. Although social impact assessment has been included as an inalienable part of the Environmental Impact Assessment required to be conducted under Indian law, it seems that the same is unable to meet the ends it seeks to achieve. The dissociation between those bearing the costs of development, and those reaping its benefits, lies at the heart of this failure. This paper attempts to study the various cost–benefit relationships for these minority stakeholders using the proposed Nyamjang Chhu hydroelectric power plant in Tawang District of Arunachal Pradesh (in North-east India) as the chief object of study, and discusses whether the current model of sustainable development is truly sustainable, given the level of social dissociation and disintegration that occurs between affected communities and their environment. The economic allure of hydroelectric projects in the hilly regions of India very rarely results in a proper assessment of their ecological and social externalities. Examining the various issues that have been agitated in the course of litigation over the Nyamjang Chhu hydroelectric project, the authors argue that there is a pressing need to re-evaluate the current Indian model of sustainable development going forward.

Keywords: hydroelectric power, socio-cultural dissociation, sustainable development, trade offs

Procedia PDF Downloads 286
1532 A Comparative Study of Multi-SOM Algorithms for Determining the Optimal Number of Clusters

Authors: Imèn Khanchouch, Malika Charrad, Mohamed Limam

Abstract:

The interpretation of the quality of clusters and the determination of the optimal number of clusters is still a crucial problem in clustering. We focus in this paper on multi-SOM clustering method which overcomes the problem of extracting the number of clusters from the SOM map through the use of a clustering validity index. We then tested multi-SOM using real and artificial data sets with different evaluation criteria not used previously such as Davies Bouldin index, Dunn index and silhouette index. The developed multi-SOM algorithm is compared to k-means and Birch methods. Results show that it is more efficient than classical clustering methods.

Keywords: clustering, SOM, multi-SOM, DB index, Dunn index, silhouette index

Procedia PDF Downloads 597
1531 Half-Circle Fuzzy Number Threshold Determination via Swarm Intelligence Method

Authors: P. W. Tsai, J. W. Chen, C. W. Chen, C. Y. Chen

Abstract:

In recent years, many researchers are involved in the field of fuzzy theory. However, there are still a lot of issues to be resolved. Especially on topics related to controller design such as the field of robot, artificial intelligence, and nonlinear systems etc. Besides fuzzy theory, algorithms in swarm intelligence are also a popular field for the researchers. In this paper, a concept of utilizing one of the swarm intelligence method, which is called Bacterial-GA Foraging, to find the stabilized common P matrix for the fuzzy controller system is proposed. An example is given in in the paper, as well.

Keywords: half-circle fuzzy numbers, predictions, swarm intelligence, Lyapunov method

Procedia PDF Downloads 684
1530 Partial Knowledge Transfer Between the Source Problem and the Target Problem in Genetic Algorithms

Authors: Terence Soule, Tami Al Ghamdi

Abstract:

To study how the partial knowledge transfer may affect the Genetic Algorithm (GA) performance, we model the Transfer Learning (TL) process using GA as the model solver. The objective of the TL is to transfer the knowledge from one problem to another related problem. This process imitates how humans think in their daily life. In this paper, we proposed to study a case where the knowledge transferred from the S problem has less information than what the T problem needs. We sampled the transferred population using different strategies of TL. The results showed transfer part of the knowledge is helpful and speeds the GA process of finding a solution to the problem.

Keywords: transfer learning, partial transfer, evolutionary computation, genetic algorithm

Procedia PDF Downloads 130
1529 Patriarchy in Caste Society and Control over Women’s Sexuality in India

Authors: Renu Singh

Abstract:

The caste system in Indian society plays an important role in subjugation of women. It creates divides and controls over women’s sexuality in various ways. This paper attempts to look into various modes in which the institution of caste makes some forms of sexuality as socially “acceptable” norms, while deems others as obscene, immoral and against social ethos. Based on a review of existing literature in this area this paper attempts to understand the notion of sexuality in Indian context. It tries to understand how the emergence of norms and values of sexual behaviour has been entwined with the evolution of caste system and the subjugation of many sections of Indian society. It also attempts to trace the internalisation of patriarchal values in Indian society, and the role played by the colonial rulers in creating and maintaining stringent division of space into public and private ones. It is argued here that brahmanical patriarchy, which is a unique phenomenon of the Indian Subcontinent, plays a crucial role in subjugating and controlling women in general and their sexuality in particular. It also creates a divide among women of different castes. Furthermore, the process of colonisation played an important role in shaping the discourse of sexuality in its present form. There were contradictions as well as consensus between the colonial rulers over the questions of regulation of the private domain, as in introducing reform legislation in the nineteenth century informed the debate on sexuality in postcolonial India. The process of emergence of the dichotomous notions of ‘good’ and ‘bad’ sexuality, and the resistance to any ‘deviation’ from the ‘normal’ sexuality is located, not merely in the ‘passive’ evolution of society, but in the actual politics of it.

Keywords: caste, control, sexuality, regulation, brahmanical patriarchy, India

Procedia PDF Downloads 331
1528 Disturbance Observer for Lateral Trajectory Tracking Control for Autonomous and Cooperative Driving

Authors: Christian Rathgeber, Franz Winkler, Dirk Odenthal, Steffen Müller

Abstract:

In this contribution a structure for high level lateral vehicle tracking control based on the disturbance observer is presented. The structure is characterized by stationary compensating side forces disturbances and guaranteeing a cooperative behavior at the same time. Driver inputs are not compensated by the disturbance observer. Moreover the structure is especially useful as it robustly stabilizes the vehicle. Therefore the parameters are selected using the Parameter Space Approach. The implemented algorithms are tested in real world scenarios.

Keywords: disturbance observer, trajectory tracking, robust control, autonomous driving, cooperative driving

Procedia PDF Downloads 561
1527 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings

Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian

Abstract:

Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.

Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM

Procedia PDF Downloads 107
1526 Spatial Analysis of Flood Vulnerability in Highly Urbanized Area: A Case Study in Taipei City

Authors: Liang Weichien

Abstract:

Without adequate information and mitigation plan for natural disaster, the risk to urban populated areas will increase in the future as populations grow, especially in Taiwan. Taiwan is recognized as the world's high-risk areas, where an average of 5.7 times of floods occur per year should seek to strengthen coherence and consensus in how cities can plan for flood and climate change. Therefore, this study aims at understanding the vulnerability to flooding in Taipei city, Taiwan, by creating indicators and calculating the vulnerability of each study units. The indicators were grouped into sensitivity and adaptive capacity based on the definition of vulnerability of Intergovernmental Panel on Climate Change. The indicators were weighted by using Principal Component Analysis. However, current researches were based on the assumption that the composition and influence of the indicators were the same in different areas. This disregarded spatial correlation that might result in inaccurate explanation on local vulnerability. The study used Geographically Weighted Principal Component Analysis by adding geographic weighting matrix as weighting to get the different main flood impact characteristic in different areas. Cross Validation Method and Akaike Information Criterion were used to decide bandwidth and Gaussian Pattern as the bandwidth weight scheme. The ultimate outcome can be used for the reduction of damage potential by integrating the outputs into local mitigation plan and urban planning.

Keywords: flood vulnerability, geographically weighted principal components analysis, GWPCA, highly urbanized area, spatial correlation

Procedia PDF Downloads 284
1525 Understanding the Manifestation of Psychosocial Difficulties in Children with Developmental Language Disorder, with a Focus on Anxiety and Social Frustration

Authors: Annabel Burnley, Michelle St. Clair, Charlotte Dack, Yvonne Wren

Abstract:

Children with Developmental Language Disorder (DLD) are well documented to experience social and emotional difficulties. Despite this, there is little consensus as to how these difficulties manifest, without which the ability to develop prevention initiatives is limited. An online survey was completed by 107 parents of either child with DLD (‘DLD sample’; n=57), or typically developing children (‘typical sample’; n=50), all aged 6-12 years old. Psychosocial symptom measures were used, alongside 11 psychosocial statements generated from previous qualitative work. Qualitative interviews were then held to understand the manifestation of key difficulties in more depth (n=4). The DLD sample scored significantly higher on all psychosocial statements than the typical sample. Experiencing anxiety (80.7%), requiring routine and sameness (75.4%) and struggling to regulate their emotions (75.4%) were the most common difficulties for a majority of children with DLD. For this DLD sample, family communication and coping styles were found not to contribute to the manifestation of these difficulties. Two separate mediation models were run to understand the role of other psychosocial difficulties in the manifestation of (1) anxiety and (2) social frustration. ‘Intolerance of uncertainty was found to strongly mediate the relationship between DLD diagnosis and symptoms of anxiety. Emotion regulation was found to moderately mediate the relationship between DLD diagnosis and social frustration. Parents appear to cope well with their children’s complex psychosocial needs, but further external intervention is needed. Intervention focussing on intolerance of uncertainty and emotion dysregulation may help the management of anxiety and social frustration. Further research is needed to understand the children’s routined behaviors.

Keywords: psychosocial difficulties, developmental language disorder, specific language impairment, parent, anxiety

Procedia PDF Downloads 110
1524 A Metaheuristic for the Layout and Scheduling Problem in a Job Shop Environment

Authors: Hernández Eva Selene, Reyna Mary Carmen, Rivera Héctor, Barragán Irving

Abstract:

We propose an approach that jointly addresses the layout of a facility and the scheduling of a sequence of jobs. In real production, these two problems are interrelated. However, they are treated separately in the literature. Our approach is an extension of the job shop problem with transportation delay, where the location of the machines is selected among possible sites. The model minimizes the makespan, using the short processing times rule with two algorithms; the first one considers all the permutations for the location of machines, and the second only a heuristic to select some specific permutations that reduces computational time. Some instances are proved and compared with literature.

Keywords: layout problem, job shop scheduling problem, concurrent scheduling and layout problem, metaheuristic

Procedia PDF Downloads 604
1523 Mood Recognition Using Indian Music

Authors: Vishwa Joshi

Abstract:

The study of mood recognition in the field of music has gained a lot of momentum in the recent years with machine learning and data mining techniques and many audio features contributing considerably to analyze and identify the relation of mood plus music. In this paper we consider the same idea forward and come up with making an effort to build a system for automatic recognition of mood underlying the audio song’s clips by mining their audio features and have evaluated several data classification algorithms in order to learn, train and test the model describing the moods of these audio songs and developed an open source framework. Before classification, Preprocessing and Feature Extraction phase is necessary for removing noise and gathering features respectively.

Keywords: music, mood, features, classification

Procedia PDF Downloads 493
1522 A Survey of Grammar-Based Genetic Programming and Applications

Authors: Matthew T. Wilson

Abstract:

This paper covers a selection of research utilizing grammar-based genetic programming, and illustrates how context-free grammar can be used to constrain genetic programming. It focuses heavily on grammatical evolution, one of the most popular variants of grammar-based genetic programming, and the way its operators and terminals are specialized and modified from those in genetic programming. A variety of implementations of grammatical evolution for general use are covered, as well as research each focused on using grammatical evolution or grammar-based genetic programming on a single application, or to solve a specific problem, including some of the classically considered genetic programming problems, such as the Santa Fe Trail.

Keywords: context-free grammar, genetic algorithms, genetic programming, grammatical evolution

Procedia PDF Downloads 185
1521 Making Good Samaritans: An Exploration of Criminal Liability for Failure to Rescue in England and Wales

Authors: Usmaan Siddiqui

Abstract:

In England and Wales, there is no duty to rescue strangers. We will be investigating whether this is correct, and whether we should introduce a Good Samaritan law. In order to explore this, firstly, we will be exploring the nature of our moral duties. How far do our moral duties extend? Do they extend only to our family and friends, or do they also extend to strangers? Secondly, even if there does exist a moral duty, should this duty be enforced by criminal law? To what extent should the criminal law reflect morality? Under English criminal law, the consensus is, that it is not the job of the English criminal law to perfect human behaviour, and whilst the law should prevent us from causing harm, it should not force us to be good. This approach is radically different from many other European countries that actually do have a Good Samaritan law. If there are compelling in principle reasons to introduce a Good Samaritan law how would we deal with the pragmatic institutional constraints? Such a law has been stated as being unworkable in practice and difficult in defining its limits. In order to verify this, we shall carry out a comparative analysis between England and selected states in the US to gauge how successful the Good Samaritan law has been in dealing with these institutional constraints. In terms of methodology, as well as a comparative analysis, we shall also be carrying out a doctrinal analysis exploring what the English criminal law’s position is regarding Omissions. In conclusion, the findings so far are, whilst it is not the job of the law to perfect human behaviour, both respect for the law and the level of social co-operation will be greatly improved if the law encourages morally desirable conduct. Whilst it is possible for society to exist without a duty to assist the distressed, a society which ignores the vulnerable is cold, callous, and uncaring. After all, we all need to face up to the possibility that we may be one day be vulnerable and in need of urgent aid, and it is about time English criminal law, catches up with the majority of Europe and protects the vulnerable.

Keywords: criminal, law, omissions, philosophy

Procedia PDF Downloads 228
1520 Frenotomy for Tongue Tie: The Unlikely Benefit of Massage

Authors: Kailas Bhandarkar, Talib Dar, Laura Karia, Manasvi Upadhyaya

Abstract:

Introduction: Frenotomy for tongue tie is commonly performed in breastfed infants who experience difficulty in latching after failed conservative management for tongue tie. However, there is no consensus for the routine use of massage following frenotomy. Our aim was to assess the efficacy of massage in preventing recurrence following frenotomy. Methods: The tongue tie service in our tertiary referral hospital consists of 5 consultants and a breastfeeding (BF) midwife. 3 consultants routinely advice massage post procedure. Babies are assessed by the midwife after the procedure and a follow-up consultation after a week. After due ethical approval, data were collected by two staff members who were independent of TT service on a standardized questionnaire to avoid bias. Fischer exact test was employed (p < 0.05 considered significant). Results: Six hundred and thirty-two babies attended the clinic from January 2018 to December 2018. Thirty-three of these were excluded as the procedure was not needed. Parents were contacted at a median of six months post-procedure (range 2-10 months). 282/599 were advised massage. 92/282 could be contacted. 40/ 92 adhered to massage regimen. None of these had a recurrence. 52/92 (54%), although advised, did not perform massage. Reasons cited for lack of adherence to massage included difficulty in performing massaging and conflicting advice given by other health care professionals involved in patient care like paediatricians and group practice and lack of information on the internet). Overall, 4/599 (0.66%) had recurrences, and this difference was not statistically significant. Conclusion: In our experience, the rate of recurrence after frenotomy is low enough for us to conclude that there is no significant benefit of massage after frenotomy for tongue tie. We could also conclude that among parents who were advised massage more than half failed to adhere to the advice.

Keywords: tongue tie, frenotomy, massage, recurrence

Procedia PDF Downloads 133
1519 Exploring Counting Methods for the Vertices of Certain Polyhedra with Uncertainties

Authors: Sammani Danwawu Abdullahi

Abstract:

Vertex Enumeration Algorithms explore the methods and procedures of generating the vertices of general polyhedra formed by system of equations or inequalities. These problems of enumerating the extreme points (vertices) of general polyhedra are shown to be NP-Hard. This lead to exploring how to count the vertices of general polyhedra without listing them. This is also shown to be #P-Complete. Some fully polynomial randomized approximation schemes (fpras) of counting the vertices of some special classes of polyhedra associated with Down-Sets, Independent Sets, 2-Knapsack problems and 2 x n transportation problems are presented together with some discovered open problems.

Keywords: counting with uncertainties, mathematical programming, optimization, vertex enumeration

Procedia PDF Downloads 355
1518 The Different Ways to Describe Regular Languages by Using Finite Automata and the Changing Algorithm Implementation

Authors: Abdulmajid Mukhtar Afat

Abstract:

This paper aims at introducing finite automata theory, the different ways to describe regular languages and create a program to implement the subset construction algorithms to convert nondeterministic finite automata (NFA) to deterministic finite automata (DFA). This program is written in c++ programming language. The program reads FA 5tuples from text file and then classifies it into either DFA or NFA. For DFA, the program will read the string w and decide whether it is acceptable or not. If accepted, the program will save the tracking path and point it out. On the other hand, when the automation is NFA, the program will change the Automation to DFA so that it is easy to track and it can decide whether the w exists in the regular language or not.

Keywords: finite automata, subset construction, DFA, NFA

Procedia PDF Downloads 425
1517 The Correlation between Three-Dimensional Implant Positions and Esthetic Outcomes of Single-Tooth Implant Restoration

Authors: Pongsakorn Komutpol, Pravej Serichetaphongse, Soontra Panmekiate, Atiphan Pimkhaokham

Abstract:

Statement of Problem: The important parameter of esthetic assessment in anterior maxillary implant include pink esthetic of gingiva and white esthetic of restoration. While the 3 dimensional (3D) implant position are recently concerned as a key for succeeding in implant treatment. However, to our knowledge, the authors did not come across any publication that demonstrated the relations of esthetic outcome and 3D implant position. Objectives: To investigate the correlation between positional accuracy of single-tooth implant restoration (STIR) in all 3 dimensions and their esthetic outcomes. Materials and Methods: 17 patients’ data who had a STIR at central incisor with pristine contralateral tooth were included in this study. Intraoral photographs, dental models, and cone beam computed tomography (CBCT) images were retrieved. The esthetic outcome was assessed in accordance with pink esthetic score and white esthetic score (PES/WES). While the number of correct position in each dimension (mesiodistal, labiolingual, apicocoronal) of the implant were evaluated and defined as 'right' or 'wrong' according to ITI consensus conference by one investigator using CBCT data. The different mean score between right and wrong position in all dimensions was analyzed by Mann-Whitney U test with 0.05 was the significant level of the study. Results: The average score of PES/WES was 15.88 ± 1.65 which was considered as clinically acceptable. The average PES/WES score in 1, 2 and 3 right dimension of the implant position were 16.71, 15.75 and 15.17 respectively. None of the implants placed wrongly in all three dimensions. Statistically significant difference of the PES/WES score was found between the implants that placed right in 3 dimensions and 1 dimension (p = 0.041). Conclusion: This study supported the principle of 3D position of implant. The more properly implant was placed, the higher esthetic outcome was found.

Keywords: accuracy, dental implant, esthetic, 3D implant position

Procedia PDF Downloads 177