Search results for: extra trees classifier
546 Automated Distribution System Management: Substation Remote Diagnostic and Operation Solution for Obafemi Awolowo University
Authors: Aderonke Oluseun Akinwumi, Olusola A. Komolaf
Abstract:
This paper gives information about the wide array of challenges facing both the electric utilities and consumers in the distribution system in developing countries, using Obafemi Awolowo University, Ile-Ife Nigeria as a case study. It also proffers cost-effective solution through remote monitoring, diagnostic and operation of distribution networks without compromising the system reliability. As utilities move from manned and unintelligent networks to completely unmanned smart grids, switching activities at substations and feeders will be managed and controlled remotely by dedicated systems hence this design. The Substation Remote Diagnostic and Operation Solution (sRDOs) would remotely monitor the load on Medium Voltage (MV) and Low Voltage (LV) feeders as well as distribution transformers and allow the utility disconnect non-paying customers with absolutely no extra resource deployment and without interrupting supply to paying customers. The aftermath of the implementation of this design improved the lifetime of key distribution infrastructure by automatically isolating feeders during overload conditions and more importantly erring consumers. This increased the ratio of revenue generated on electricity bills to total network load.Keywords: electric utility, consumers, remote monitoring, diagnostic, system reliability, manned and unintelligent networks, unmanned smart grids, switching activities, medium voltage, low voltage, distribution transformer
Procedia PDF Downloads 132545 Novel Poly Schiff Bases as Corrosion Inhibitors for Carbon Steel in Sour Petroleum Conditions
Authors: Shimaa A. Higazy, Olfat E. El-Azabawy, Ahmed M. Al-Sabagh, Notaila M. Nasser, Eman A. Khamis
Abstract:
In this work, two novel Schiff base polymers (PSB1 and PSB₂) with extra-high protective barrier features were facilely prepared via Polycondensation reactions. They were applied for the first time as effective corrosion inhibitors in the sour corrosive media of petroleum environments containing hydrogen sulfide (H₂S) gas. For studying the polymers' inhibitive action on the carbon steel, numerous corrosion testing methods including potentiodynamic polarization (PDP), open circuit potential, and electrochemical impedance spectroscopy (EIS) have been employed at various temperatures (298-328 K) in the oil wells formation water with H₂S concentrations of 100, 400, and 700 ppm as aggressive media. The activation energy (Ea) and other thermodynamic parameters were computed to describe the mechanism of adsorption. The corrosion morphological traits and steel samples' surfaces composition were analyzed by field emission scanning electron microscope and energy dispersive X-ray analysis. The PSB2 inhibited sour corrosion more effectively than PSB1 when subjected to electrochemical testing. The 100 ppm concentration of PSB2 exhibited 82.18 % and 81.14 % inhibition efficiencies at 298 K in PDP and EIS measurements, respectively. While at 328 K, the inhibition efficiencies were 61.85 % and 67.4 % at the same dosage and measurements. These poly Schiff bases exhibited fascinating performance as corrosion inhibitors in sour environment. They provide a great corrosion inhibition platform for the sustainable future environment.Keywords: schiff base polymers, corrosion inhibitors, sour corrosive media, potentiodynamic polarization, H₂S concentrations
Procedia PDF Downloads 102544 Slovenia Rider/Driver Gaze Behavior Comparative Analysis
Authors: Tomaž Tollazzi, Matjaž Šraml, Chiara Gruden, Marko Renčelj
Abstract:
Motorcycle riders are an increasing group of road users. The intrinsic characteristics of powered two-wheelers (PTW) allow them to be particularly flexible, both in urban and extra-urban environments. Nevertheless, crash statistics indicate that riders involved in road accidents are highly likely to suffer severe injuries, underlining the vulnerability of this group of road users. An element that can greatly affect the safety of PTW users is road design, as roads are usually designed for two-track vehicles (cars, buses, and lorries) and usually do not consider the needs of PTWs. Additionally, handling a motorcycle is quite different from driving a car; thus, the behavior of riders is different from that of drivers. The aim of this research was to compare how different road designs are perceived by riders and drivers and to preliminarily assess if riders’ behavior and attention allocation are related. For this research, an eye-tracking experiment was developed outdoors. Both drivers and riders travelled along a route comprising four different road designs and various road layouts, and the output was analyzed both qualitatively and quantitatively. Although it was not possible to carry out a statistical analysis due to the limited number of participants, the results demonstrate that there is a difference in the gaze behavior of drivers and riders, with the latter being far more focused on the left-hand side of the road and concentrating on defined elements of road design. Furthermore, the experiment demonstrated that a higher number of fixations is related to lower speeds. Finally, it was noted that both kinds of road users focus well on the carriageway, leading to the conclusion that the indications given through road markings may be much more effective than vertical signalization, which has rarely been observed.Keywords: road safety, powered two-wheelers, eye-tracking, gaze behavior
Procedia PDF Downloads 83543 Extracting Terrain Points from Airborne Laser Scanning Data in Densely Forested Areas
Authors: Ziad Abdeldayem, Jakub Markiewicz, Kunal Kansara, Laura Edwards
Abstract:
Airborne Laser Scanning (ALS) is one of the main technologies for generating high-resolution digital terrain models (DTMs). DTMs are crucial to several applications, such as topographic mapping, flood zone delineation, geographic information systems (GIS), hydrological modelling, spatial analysis, etc. Laser scanning system generates irregularly spaced three-dimensional cloud of points. Raw ALS data are mainly ground points (that represent the bare earth) and non-ground points (that represent buildings, trees, cars, etc.). Removing all the non-ground points from the raw data is referred to as filtering. Filtering heavily forested areas is considered a difficult and challenging task as the canopy stops laser pulses from reaching the terrain surface. This research presents an approach for removing non-ground points from raw ALS data in densely forested areas. Smoothing splines are exploited to interpolate and fit the noisy ALS data. The presented filter utilizes a weight function to allocate weights for each point of the data. Furthermore, unlike most of the methods, the presented filtering algorithm is designed to be automatic. Three different forested areas in the United Kingdom are used to assess the performance of the algorithm. The results show that the generated DTMs from the filtered data are accurate (when compared against reference terrain data) and the performance of the method is stable for all the heavily forested data samples. The average root mean square error (RMSE) value is 0.35 m.Keywords: airborne laser scanning, digital terrain models, filtering, forested areas
Procedia PDF Downloads 139542 Improve B-Tree Index’s Performance Using Lock-Free Hash Table
Authors: Zhanfeng Ma, Zhiping Xiong, Hu Yin, Zhengwei She, Aditya P. Gurajada, Tianlun Chen, Ying Li
Abstract:
Many RDBMS vendors use B-tree index to achieve high performance for point queries and range queries, and some of them also employ hash index to further enhance the performance as hash table is more efficient for point queries. However, there are extra overheads to maintain a separate hash index, for example, hash mapping for all data records must always be maintained, which results in more memory space consumption; locking, logging and other mechanisms are needed to guarantee ACID, which affects the concurrency and scalability of the system. To relieve the overheads, Hash Cached B-tree (HCB) index is proposed in this paper, which consists of a standard disk-based B-tree index and an additional in-memory lock-free hash table. Initially, only the B-tree index is constructed for all data records, the hash table is built on the fly based on runtime workload, only data records accessed by point queries are indexed using hash table, this helps reduce the memory footprint. Changes to hash table are done using compare-and-swap (CAS) without performing locking and logging, this helps improve the concurrency and avoid contention. The hash table is also optimized to be cache conscious. HCB index is implemented in SAP ASE database, compared with the standard B-tree index, early experiments and customer adoptions show significant performance improvement. This paper provides an overview of the design of HCB index and reports the experimental results.Keywords: B-tree, compare-and-swap, lock-free hash table, point queries, range queries, SAP ASE database
Procedia PDF Downloads 288541 Comparison of Deep Learning and Machine Learning Algorithms to Diagnose and Predict Breast Cancer
Authors: F. Ghazalnaz Sharifonnasabi, Iman Makhdoom
Abstract:
Breast cancer is a serious health concern that affects many people around the world. According to a study published in the Breast journal, the global burden of breast cancer is expected to increase significantly over the next few decades. The number of deaths from breast cancer has been increasing over the years, but the age-standardized mortality rate has decreased in some countries. It’s important to be aware of the risk factors for breast cancer and to get regular check- ups to catch it early if it does occur. Machin learning techniques have been used to aid in the early detection and diagnosis of breast cancer. These techniques, that have been shown to be effective in predicting and diagnosing the disease, have become a research hotspot. In this study, we consider two deep learning approaches including: Multi-Layer Perceptron (MLP), and Convolutional Neural Network (CNN). We also considered the five-machine learning algorithm titled: Decision Tree (C4.5), Naïve Bayesian (NB), Support Vector Machine (SVM), K-Nearest Neighbors (KNN) Algorithm and XGBoost (eXtreme Gradient Boosting) on the Breast Cancer Wisconsin Diagnostic dataset. We have carried out the process of evaluating and comparing classifiers involving selecting appropriate metrics to evaluate classifier performance and selecting an appropriate tool to quantify this performance. The main purpose of the study is predicting and diagnosis breast cancer, applying the mentioned algorithms and also discovering of the most effective with respect to confusion matrix, accuracy and precision. It is realized that CNN outperformed all other classifiers and achieved the highest accuracy (0.982456). The work is implemented in the Anaconda environment based on Python programing language.Keywords: breast cancer, multi-layer perceptron, Naïve Bayesian, SVM, decision tree, convolutional neural network, XGBoost, KNN
Procedia PDF Downloads 78540 Classification for Obstructive Sleep Apnea Syndrome Based on Random Forest
Authors: Cheng-Yu Tsai, Wen-Te Liu, Shin-Mei Hsu, Yin-Tzu Lin, Chi Wu
Abstract:
Background: Obstructive Sleep apnea syndrome (OSAS) is a common respiratory disorder during sleep. In addition, Body parameters were identified high predictive importance for OSAS severity. However, the effects of body parameters on OSAS severity remain unclear. Objective: In this study, the objective is to establish a prediction model for OSAS by using body parameters and investigate the effects of body parameters in OSAS. Methodologies: Severity was quantified as the polysomnography and the mean hourly number of greater than 3% dips in oxygen saturation during examination in a hospital in New Taipei City (Taiwan). Four levels of OSAS severity were classified by the apnea and hypopnea index (AHI) with American Academy of Sleep Medicine (AASM) guideline. Body parameters, including neck circumference, waist size, and body mass index (BMI) were obtained from questionnaire. Next, dividing the collecting subjects into two groups: training and testing groups. The training group was used to establish the random forest (RF) to predicting, and test group was used to evaluated the accuracy of classification. Results: There were 3330 subjects recruited in this study, whom had been done polysomnography for evaluating severity for OSAS. A RF of 1000 trees achieved correctly classified 79.94 % of test cases. When further evaluated on the test cohort, RF showed the waist and BMI as the high import factors in OSAS. Conclusion It is possible to provide patient with prescreening by body parameters which can pre-evaluate the health risks.Keywords: apnea and hypopnea index, Body parameters, obstructive sleep apnea syndrome, Random Forest
Procedia PDF Downloads 154539 Contribution to the Production of Phenazine Antibiotics Effect Type Compounds by Some Strains of Pseudomonas spp.fluorescent
Authors: Nacéra Benoussaid, Lehalali Meriem, Benchabane Messaoud
Abstract:
Our work focuses on the production of compound antibiotic effect of volatile nature namely hydrogen cyanide and the production and identification of molecules phénazinique by some strains of fluorescent Pseudomonas spp isolated from the rhizosphere of some trees for a possible use as bio pesticides antifungal effect and/or antibiotic. We tested the production of hydrogen cyanide of 21 strains of Pseudomonas spp. fluorescent among them 19 strains (90, 47%) showed a positive cyanogenesis.The antagonism test executed in vitro showed that Pseudomonas strains have a higher anti fungal effect relative to their antibacterial effect with diameters of inhibition zones up to 3, 9 cm recorded by the strain F48 against Coleosporiumsp compared with recorded results against bacteria with a maximum inhibition of 1, 26 cm among this antagonistic strain.Three strains were selected by testing for producing phénazines namely PI9, BB9 and F20. The effect of the antimicrobial activity was performed on different culture media (GN, King B, ISP2 and PDA). The results of our study allowed us to retain the King B medium as ideal medium for the production of secondary metabolite. The produced phenazinique compounds was extracted from various organic solvents, and after the results of antibiographie against germs - targets, the extracts of ethyl acetate gave the best results compared to dichloromethane and hexane.The Analysis of these compounds of antibiotic phenazinique effect within layer chromatography (CCM) and high performance liquid chromatography( HPLC) indicate that both strains PI9 and F20 are productive of phenazine-1-carboxylic acid (PCA). The BB9 strain is suspected to be productive of another phenazinique compound.Keywords: Pseudomonas ssp. fluorescents, antagonism in vitro, secondary metabolite, phenazines, biopesticide.
Procedia PDF Downloads 512538 Biosynthesis of Healthy Secondary Metabolites in Olive Fruit in Response to Different Agronomic Treatments
Authors: Anna Perrone, Federico Martinelli
Abstract:
Olive fruit is well-known for the high content in secondary metabolites with high interest at nutritional, nutraceutical, antioxidant, and healthy levels. The content of secondary metabolites in olive at harvest may be affected by different water regimes, with significant effects on olive oil composition and quality and, consequently, on its healthy and nutritional features. In this work, a summary of several research studies dealing with the biosynthesis of healthy and nutraceutical metabolites of the secondary metabolism in olive fruit will be reported. The phytochemical findings have been correlated with the expression of key genes involved in polyphenol, terpenoid, and carotenoid biosynthesis and metabolism in response to different development stages and water regimes. Flavonoids were highest in immature fruits, while anthocyanins increased at ripening. In epicarp tissue, this was clearly associated with an up-regulation of the UFGT gene. Olive fruits cultivated under different water regimes were analyzed by metabolomics. This method identified several hundred metabolites in the ripe mesocarp. Among them, 46 were differentially accumulated in the comparison between rain-fed and irrigated conditions. Well-known healthy metabolites were more abundant at a higher level of water regimes. Increased content of polyphenols was observed in the rain-fed fruit; particularly, anthocyanin concentration was higher at ripening. Several secondary metabolites were differentially accumulated between different irrigation conditions. These results showed that these metabolic approaches could be efficiently used to determine the effects of agronomic treatments on olive fruit physiology and, consequently, on nutritional and healthy properties of the obtained extra-virgin olive oil.Keywords: olea europea, anthocyanins, polyphenols, water regimes
Procedia PDF Downloads 150537 Sentiment Analysis of Fake Health News Using Naive Bayes Classification Models
Authors: Danielle Shackley, Yetunde Folajimi
Abstract:
As more people turn to the internet seeking health-related information, there is more risk of finding false, inaccurate, or dangerous information. Sentiment analysis is a natural language processing technique that assigns polarity scores to text, ranging from positive, neutral, and negative. In this research, we evaluate the weight of a sentiment analysis feature added to fake health news classification models. The dataset consists of existing reliably labeled health article headlines that were supplemented with health information collected about COVID-19 from social media sources. We started with data preprocessing and tested out various vectorization methods such as Count and TFIDF vectorization. We implemented 3 Naive Bayes classifier models, including Bernoulli, Multinomial, and Complement. To test the weight of the sentiment analysis feature on the dataset, we created benchmark Naive Bayes classification models without sentiment analysis, and those same models were reproduced, and the feature was added. We evaluated using the precision and accuracy scores. The Bernoulli initial model performed with 90% precision and 75.2% accuracy, while the model supplemented with sentiment labels performed with 90.4% precision and stayed constant at 75.2% accuracy. Our results show that the addition of sentiment analysis did not improve model precision by a wide margin; while there was no evidence of improvement in accuracy, we had a 1.9% improvement margin of the precision score with the Complement model. Future expansion of this work could include replicating the experiment process and substituting the Naive Bayes for a deep learning neural network model.Keywords: sentiment analysis, Naive Bayes model, natural language processing, topic analysis, fake health news classification model
Procedia PDF Downloads 97536 Lexical Based Method for Opinion Detection on Tripadvisor Collection
Authors: Faiza Belbachir, Thibault Schienhinski
Abstract:
The massive development of online social networks allows users to post and share their opinions on various topics. With this huge volume of opinion, it is interesting to extract and interpret these information for different domains, e.g., product and service benchmarking, politic, system of recommendation. This is why opinion detection is one of the most important research tasks. It consists on differentiating between opinion data and factual data. The difficulty of this task is to determine an approach which returns opinionated document. Generally, there are two approaches used for opinion detection i.e. Lexical based approaches and Machine Learning based approaches. In Lexical based approaches, a dictionary of sentimental words is used, words are associated with weights. The opinion score of document is derived by the occurrence of words from this dictionary. In Machine learning approaches, usually a classifier is trained using a set of annotated document containing sentiment, and features such as n-grams of words, part-of-speech tags, and logical forms. Majority of these works are based on documents text to determine opinion score but dont take into account if these texts are really correct. Thus, it is interesting to exploit other information to improve opinion detection. In our work, we will develop a new way to consider the opinion score. We introduce the notion of trust score. We determine opinionated documents but also if these opinions are really trustable information in relation with topics. For that we use lexical SentiWordNet to calculate opinion and trust scores, we compute different features about users like (numbers of their comments, numbers of their useful comments, Average useful review). After that, we combine opinion score and trust score to obtain a final score. We applied our method to detect trust opinions in TRIPADVISOR collection. Our experimental results report that the combination between opinion score and trust score improves opinion detection.Keywords: Tripadvisor, opinion detection, SentiWordNet, trust score
Procedia PDF Downloads 200535 Using Time Series NDVI to Model Land Cover Change: A Case Study in the Berg River Catchment Area, Western Cape, South Africa
Authors: Adesuyi Ayodeji Steve, Zahn Munch
Abstract:
This study investigates the use of MODIS NDVI to identify agricultural land cover change areas on an annual time step (2007 - 2012) and characterize the trend in the study area. An ISODATA classification was performed on the MODIS imagery to select only the agricultural class producing 3 class groups namely: agriculture, agriculture/semi-natural, and semi-natural. NDVI signatures were created for the time series to identify areas dominated by cereals and vineyards with the aid of ancillary, pictometry and field sample data. The NDVI signature curve and training samples aided in creating a decision tree model in WEKA 3.6.9. From the training samples two classification models were built in WEKA using decision tree classifier (J48) algorithm; Model 1 included ISODATA classification and Model 2 without, both having accuracies of 90.7% and 88.3% respectively. The two models were used to classify the whole study area, thus producing two land cover maps with Model 1 and 2 having classification accuracies of 77% and 80% respectively. Model 2 was used to create change detection maps for all the other years. Subtle changes and areas of consistency (unchanged) were observed in the agricultural classes and crop practices over the years as predicted by the land cover classification. 41% of the catchment comprises of cereals with 35% possibly following a crop rotation system. Vineyard largely remained constant over the years, with some conversion to vineyard (1%) from other land cover classes. Some of the changes might be as a result of misclassification and crop rotation system.Keywords: change detection, land cover, modis, NDVI
Procedia PDF Downloads 403534 Chemical Fingerprinting of Complex Samples With the Aid of Parallel Outlet Flow Chromatography
Authors: Xavier A. Conlan
Abstract:
Speed of analysis is a significant limitation to current high-performance liquid chromatography/mass spectrometry (HPLC/MS) and ultra-high-pressure liquid chromatography (UHPLC)/MS systems both of which are used in many forensic investigations. The flow rate limitations of MS detection require a compromise in the chromatographic flow rate, which in turn reduces throughput, and when using modern columns, a reduction in separation efficiency. Commonly, this restriction is combated through the post-column splitting of flow prior to entry into the mass spectrometer. However, this results in a loss of sensitivity and a loss in efficiency due to the post-extra column dead volume. A new chromatographic column format known as 'parallel segmented flow' involves the splitting of eluent flow within the column outlet end fitting, and in this study we present its application in order to interrogate the provenience of methamphetamine samples with mass spectrometry detection. Using parallel segmented flow, column flow rates as high as 3 mL/min were employed in the analysis of amino acids without post-column splitting to the mass spectrometer. Furthermore, when parallel segmented flow chromatography columns were employed, the sensitivity was more than twice that of conventional systems with post-column splitting when the same volume of mobile phase was passed through the detector. These finding suggest that this type of column technology will particularly enhance the capabilities of modern LC/MS enabling both high-throughput and sensitive mass spectral detection.Keywords: chromatography, mass spectrometry methamphetamine, parallel segmented outlet flow column, forensic sciences
Procedia PDF Downloads 492533 Wood Energy in Bangladesh: An Overview of Status, Challenges and Development
Authors: Md. Kamrul Hassan, Ari Pappinen
Abstract:
Wood energy is the single most important form of renewable energy in many parts of the world especially in the least developing countries in South Asia like Bangladesh. The last portion of the national population of this country depends on wood energy for their daily primary energy need. This paper deals with the estimation of wood fuel at the current level and identifies the challenges and strategies related to the development of this resource. Desk research, interactive research and field survey were conducted for gathering and analyzing of data for this study. The study revealed that wood fuel plays a significant role in total primary energy supply in Bangladesh, and the contribution of wood fuel in final energy consumption in 2013 was about 24%. Trees on homestead areas, secondary plantation on off forest lands, and forests are the main sources of supplying wood fuel in the country. Insufficient supply of wood fuel against high upward demand is the main cause of concern for sustainable consumption, which eventually leads deterioration and depletion of the resources. Inadequate afforestation programme, lack of initiatives towards the utilization of set-aside lands for wood energy plantations, and inefficient management of the existing resources have been identified as the major impediments to the development of wood energy in Bangladesh. The study argued that enhancement of public-private-partnership afforestation programmes, intensifying the waste and marginal lands with short-rotation tree species, and formulation of biomass-based rural energy strategies at the regional level are relevant to the promotion of sustainable wood energy in the country.Keywords: Bangladesh, challenge, supply, wood energy
Procedia PDF Downloads 190532 A Machine Learning-Based Model to Screen Antituberculosis Compound Targeted against LprG Lipoprotein of Mycobacterium tuberculosis
Authors: Syed Asif Hassan, Syed Atif Hassan
Abstract:
Multidrug-resistant Tuberculosis (MDR-TB) is an infection caused by the resistant strains of Mycobacterium tuberculosis that do not respond either to isoniazid or rifampicin, which are the most important anti-TB drugs. The increase in the occurrence of a drug-resistance strain of MTB calls for an intensive search of novel target-based therapeutics. In this context LprG (Rv1411c) a lipoprotein from MTB plays a pivotal role in the immune evasion of Mtb leading to survival and propagation of the bacterium within the host cell. Therefore, a machine learning method will be developed for generating a computational model that could predict for a potential anti LprG activity of the novel antituberculosis compound. The present study will utilize dataset from PubChem database maintained by National Center for Biotechnology Information (NCBI). The dataset involves compounds screened against MTB were categorized as active and inactive based upon PubChem activity score. PowerMV, a molecular descriptor generator, and visualization tool will be used to generate the 2D molecular descriptors for the actives and inactive compounds present in the dataset. The 2D molecular descriptors generated from PowerMV will be used as features. We feed these features into three different classifiers, namely, random forest, a deep neural network, and a recurring neural network, to build separate predictive models and choosing the best performing model based on the accuracy of predicting novel antituberculosis compound with an anti LprG activity. Additionally, the efficacy of predicted active compounds will be screened using SMARTS filter to choose molecule with drug-like features.Keywords: antituberculosis drug, classifier, machine learning, molecular descriptors, prediction
Procedia PDF Downloads 392531 A Bayesian Classification System for Facilitating an Institutional Risk Profile Definition
Authors: Roman Graf, Sergiu Gordea, Heather M. Ryan
Abstract:
This paper presents an approach for easy creation and classification of institutional risk profiles supporting endangerment analysis of file formats. The main contribution of this work is the employment of data mining techniques to support set up of the most important risk factors. Subsequently, risk profiles employ risk factors classifier and associated configurations to support digital preservation experts with a semi-automatic estimation of endangerment group for file format risk profiles. Our goal is to make use of an expert knowledge base, accuired through a digital preservation survey in order to detect preservation risks for a particular institution. Another contribution is support for visualisation of risk factors for a requried dimension for analysis. Using the naive Bayes method, the decision support system recommends to an expert the matching risk profile group for the previously selected institutional risk profile. The proposed methods improve the visibility of risk factor values and the quality of a digital preservation process. The presented approach is designed to facilitate decision making for the preservation of digital content in libraries and archives using domain expert knowledge and values of file format risk profiles. To facilitate decision-making, the aggregated information about the risk factors is presented as a multidimensional vector. The goal is to visualise particular dimensions of this vector for analysis by an expert and to define its profile group. The sample risk profile calculation and the visualisation of some risk factor dimensions is presented in the evaluation section.Keywords: linked open data, information integration, digital libraries, data mining
Procedia PDF Downloads 428530 Timetabling for Interconnected LRT Lines: A Package Solution Based on a Real-world Case
Authors: Huazhen Lin, Ruihua Xu, Zhibin Jiang
Abstract:
In this real-world case, timetabling the LRT network as a whole is rather challenging for the operator: they are supposed to create a timetable to avoid various route conflicts manually while satisfying a given interval and the number of rolling stocks, but the outcome is not satisfying. Therefore, the operator adopts a computerised timetabling tool, the Train Plan Maker (TPM), to cope with this problem. However, with various constraints in the dual-line network, it is still difficult to find an adequate pairing of turnback time, interval and rolling stocks’ number, which requires extra manual intervention. Aiming at current problems, a one-off model for timetabling is presented in this paper to simplify the procedure of timetabling. Before the timetabling procedure starts, this paper presents how the dual-line system with a ring and several branches is turned into a simpler structure. Then, a non-linear programming model is presented in two stages. In the first stage, the model sets a series of constraints aiming to calculate a proper timing for coordinating two lines by adjusting the turnback time at termini. Then, based on the result of the first stage, the model introduces a series of inequality constraints to avoid various route conflicts. With this model, an analysis is conducted to reveal the relation between the ratio of trains in different directions and the possible minimum interval, observing that the more imbalance the ratio is, the less possible to provide frequent service under such strict constraints.Keywords: light rail transit (LRT), non-linear programming, railway timetabling, timetable coordination
Procedia PDF Downloads 90529 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 161528 Mayan Culture and Attitudes towards Sustainability
Authors: Sarah Ryu
Abstract:
Agricultural methods and ecological approaches employed by the pre-colonial Mayans may provide valuable insights into forest management and viable alternatives for resource sustainability in the face of major deforestation across Central and South America.Using a combination of observation data collected from the modern indigenous inhabitants near Mixco in Guatemala and historical data, this study was able to create a holistic picture of how the Maya maintained their ecosystems. Surveys and observations were conducted in the field, over a period of twelve weeks across two years. Geographic and archaeological data for this area was provided by Guatemalan organizations such as the Universidad de San Carlos de Guatemala. Observations of current indigenous populations around Mixco showed that they adhered to traditional Mayan methods of agriculture, such as terrace construction and arboriculture. Rather than planting one cash crop as was done by the Spanish, indigenous peoples practice agroforestry, cultivating forests that would provide trees for construction material, wild plant foods, habitat for game, and medicinal herbs. The emphasis on biodiversity prevented deforestation and created a sustainable balance between human consumption and forest regrowth. Historical data provided by MayaSim showed that the Mayans successfully maintained their ecosystems from about 800BCE to 700CE. When the Mayans practiced natural resource conservation and cultivated a harmonious relationship with the forest around them, they were able to thrive and prosper alongside nature. Having lasted over a thousand years, the Mayan empire provides a valuable lesson in sustainability and human attitudes towards the environment.Keywords: biodiversity, forestry, mayan, sustainability
Procedia PDF Downloads 177527 Methods Employed to Mitigate Wind Damage on Ancient Egyptian Architecture
Authors: Hossam Mohamed Abdelfattah Helal Hegazi
Abstract:
Winds and storms are considered crucial weathering factors, representing primary causes of destruction and erosion for all materials on the Earth's surface. This naturally includes historical structures, with the impact of winds and storms intensifying their deterioration, particularly when carrying high-hardness sand particles during their passage across the ground. Ancient Egyptians utilized various methods to prevent wind damage to their ancient architecture throughout the ancient Egyptian periods . One of the techniques employed by ancient Egyptians was the use of clay or compacted earth as a filling material between opposing walls made of stone, bricks, or mud bricks. The walls made of reeds or woven tree branches were covered with clay to prevent the infiltration of winds and rain, enhancing structural integrity, this method was commonly used in hollow layers . Additionally, Egyptian engineers innovated a type of adobe brick with uniformly leveled sides, manufactured from dried clay. They utilized stone barriers, constructed wind traps, and planted trees in rows parallel to the prevailing wind direction. Moreover, they employed receptacles to drain rainwater resulting from wind-loaded rain and used mortar to fill gaps in roofs and structures. Furthermore, proactive measures such as the removal of sand from around historical and archaeological buildings were taken to prevent adverse effectsKeywords: winds, storms, weathering, destruction, erosion, materials, Earth's surface, historical structures, impact
Procedia PDF Downloads 64526 Challenges Faced by Teachers during Teaching with Developmental Disable Students at Primary Level in Lahore
Authors: Zikra Faiz, Nisar Abid, Muhammad Waqas
Abstract:
This study aim to examine the challenges faced by teachers during teaching to those students who are intellectually disable, suffering from autism spectrum disorder, learning disability, and ADHD at the primary level. The descriptive research design of quantitative approach was adopted to conduct this study; a cross-sectional survey method was used to collect data. The sample was comprised of 258 (43 male and 215 female) teachers who teach at special education institutes of Lahore district selected through proportionate stratified random sampling technique. Self-developed questionnaire was used which was comprised of 22 closed-ended items. Collected data were analyzed through descriptive and inferential statistical techniques by using Statistical Package for Social Sciences (SPSS) version 21. Results show that teachers faced problems during group activities, to handle bad behavior and different disabilities of students. It is concluded that there was a significant difference between male and female teachers perceptions about challenges faced during teaching with developmental disable students. Furthermore, there was a significant difference exist in the perceptions of teachers regarding challenges faced during teaching to students with developmental disabilities in term of teachers’ age and area of specialization. It is recommended that developmentally disable student require extra attention so that, teacher should trained through pre-service and in-service training to teach developmentally disabled students.Keywords: intellectual disability, autism spectrum disorder, ADHD, learning disability
Procedia PDF Downloads 140525 Self-Organizing Maps for Credit Card Fraud Detection
Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 60524 Survey and Identification of Coinfecting Botryosphaeriales Causing Stem Canker Diseases of Eucalyptus camaldulensis in Ethiopia
Authors: Wendu Admasu, Assefa Sintayehu, Alemu Gezahgne, Zewdu Terefework
Abstract:
Eucalyptus is the most widely planted forest tree species in the world. In Ethiopia, pathogenic fungi pose an increasing threat to Eucalyptus species. Due to limited research, there is insufficient information on the associated diseases and pathogens. This study investigated Eucalyptus diseases, the extent of their damage, and the causal fungal pathogens. A Eucalyptus disease survey was conducted in the Eucalyptus forestry areas of Ethiopia during the growth years 2019/20 and 2020/21. Disease assessment and sampling were carried out in eighteen plantations at nine locations. E. camaldulensis was the most dominant species planted in the surveyed areas. The field study shows a high incidence and severity of canker diseases. Diseased stem and branch samples were collected, cultured on malt extract agar media and studied. The results of morphological and ITS sequence analysis confirmed that the fungal species Neofusicoccum parvum, Lasiodiplodia theobromae, and Aplosporella hesperidica caused the observed canker symptoms. This is the first report of Lasiodiplodia theobromae and Aplosporella hesperidica causing diseases in Eucalyptus plants in Ethiopia. Changes in global climate and environmental factors, such as altitude, are believed to have a strong impact on the susceptibility of Eucalyptus plants to diseases. Strict quarantine practices and continuous monitoring of pathogenic and endophytic fungal species associated with Eucalyptus trees are issued to be prioritized to effectively control and manage the disease.Keywords: Neofusicoccum, Lasiodiplodia, Aplosporella, pathogenicity, phylogeny, severity
Procedia PDF Downloads 70523 A Machine Learning Approach for Detecting and Locating Hardware Trojans
Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He
Abstract:
The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.Keywords: hardware trojans, physical properties, machine learning, hardware security
Procedia PDF Downloads 148522 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 198521 A Survey of WhatsApp as a Tool for Instructor-Learner Dialogue, Learner-Content Dialogue, and Learner-Learner Dialogue
Authors: Ebrahim Panah, Muhammad Yasir Babar
Abstract:
Thanks to the development of online technology and social networks, people are able to communicate as well as learn. WhatsApp is a popular social network which is growingly gaining popularity. This app can be used for communication as well as education. It can be used for instructor-learner, learner-learner, and learner-content interactions; however, very little knowledge is available on these potentials of WhatsApp. The current study was undertaken to investigate university students’ perceptions of WhatsApp used as a tool for instructor-learner dialogue, learner-content dialogue, and learner-learner dialogue. The study adopted a survey approach and distributed the questionnaire developed by Google Forms to 54 (11 males and 43 females) university students. The obtained data were analyzed using SPSS version 20. The result of data analysis indicates that students have positive attitudes towards WhatsApp as a tool for Instructor-Learner Dialogue: it easy to reach the lecturer (4.07), the instructor gives me valuable feedback on my assignment (4.02), the instructor is supportive during course discussion and offers continuous support with the class (4.00). Learner-Content Dialogue: WhatsApp allows me to academically engage with lecturers anytime, anywhere (4.00), it helps to send graphics such as pictures or charts directly to the students (3.98), it also provides out of class, extra learning materials and homework (3.96), and Learner-Learner Dialogue: WhatsApp is a good tool for sharing knowledge with others (4.09), WhatsApp allows me to academically engage with peers anytime, anywhere (4.07), and we can interact with others through the use of group discussion (4.02). It was also found that there are significant positive correlations between students’ perceptions of Instructor-Learner Dialogue (ILD), Learner-Content Dialogue (LCD), Learner-Learner Dialogue (LLD) and WhatsApp Application in classroom. The findings of the study have implications for lectures, policy makers and curriculum developers.Keywords: instructor-learner dialogue, learners-contents dialogue, learner-learner dialogue, whatsapp application
Procedia PDF Downloads 161520 An Unsupervised Domain-Knowledge Discovery Framework for Fake News Detection
Authors: Yulan Wu
Abstract:
With the rapid development of social media, the issue of fake news has gained considerable prominence, drawing the attention of both the public and governments. The widespread dissemination of false information poses a tangible threat across multiple domains of society, including politics, economy, and health. However, much research has concentrated on supervised training models within specific domains, their effectiveness diminishes when applied to identify fake news across multiple domains. To solve this problem, some approaches based on domain labels have been proposed. By segmenting news to their specific area in advance, judges in the corresponding field may be more accurate on fake news. However, these approaches disregard the fact that news records can pertain to multiple domains, resulting in a significant loss of valuable information. In addition, the datasets used for training must all be domain-labeled, which creates unnecessary complexity. To solve these problems, an unsupervised domain knowledge discovery framework for fake news detection is proposed. Firstly, to effectively retain the multidomain knowledge of the text, a low-dimensional vector for each news text to capture domain embeddings is generated. Subsequently, a feature extraction module utilizing the unsupervisedly discovered domain embeddings is used to extract the comprehensive features of news. Finally, a classifier is employed to determine the authenticity of the news. To verify the proposed framework, a test is conducted on the existing widely used datasets, and the experimental results demonstrate that this method is able to improve the detection performance for fake news across multiple domains. Moreover, even in datasets that lack domain labels, this method can still effectively transfer domain knowledge, which can educe the time consumed by tagging without sacrificing the detection accuracy.Keywords: fake news, deep learning, natural language processing, multiple domains
Procedia PDF Downloads 101519 Self-Organizing Maps for Credit Card Fraud Detection and Visualization
Authors: Peng Chun-Yi, Chen Wei-Hsuan, Ueng Shyh-Kuang
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 60518 Effects of Nut Quality and Yield by Raising Poultry in Chestnut Tree Plantation
Authors: Yunmi Park, Mahn-Jo Kim
Abstract:
The purpose of this research is to find out the effect of raising poultry in environment-friendly producing area to fruit quality and crop within chestnut tree yield. This study was conducted on chestnut tree cultivation sites raising poultry at intervals of five to ten days for three years in the mountainous area which was located in the middle corner of Chungcheongbuk-do province, Korea. The quality of chestnut fruit and the control effects of harmful insects have been investigated between the sites raising poultry and control sites for three years. As a result, the harvest yielded were two to five kilograms higher in the chestnut tree cultivation sites raising poultry compared with the control site without poultry. Also, for the purposes of determining the price when selling, the ratio of the biggest fruit is higher by 3% to 14% in the chestnut tree cultivation sites raising poultry. In order to investigate the effects of pest control through raising poultry, the ratio of harmful insect species to treatment sites was relatively low compared to control site. The appreciable result is that the control effect of larvae of the chestnut leaf-cut weevil was higher in the position where raising the poultry of 4 to 5 weeks compared to the position where raising the poultry of 12 weeks. This study found that the spread of poultry in the cultivation of chestnut trees increased the fruit quality by improving the size of fruits and lowering the dosage of harmful insect, chestnut leaf-cut weevil. Also, the eco-friendly chicken produced by these mountainous regions is expected to contribute to enhancing the incomes of the farmers by differentiating themselves from existing products.Keywords: chestnut tree, environment-friendly, fruit quality, raising poultry
Procedia PDF Downloads 288517 Environment-Friendly Biogas Technology: Comparative Analysis of Benefits as Perceived by Biogas Users and Non-User Livestock Farmers of Tehsil Jhang
Authors: Anees Raza, Liu Chunyan
Abstract:
Renewable energy technologies are need of the time and are already making the big impact in the climatic outlook of the world. Biogas technology is one of those, and it has a lot of benefits for its users. It is cost effective because it is produced from the raw material which is available free of cost to the livestock farmers. Bio-slurry, a by-product of biogas, is being used as fertilizer for the crops production and increasing soil fertility. There are many other household benefits of technology. Research paper discusses the benefits of biogas as perceived by the biogas users as well as non-users of Tehsil Jhang. Data were collected from 60 respondents (30 users and 30 non-users) selected purposively through validated and pre-tested interview schedule from the respondents. Collected data were analyzed by using Statistical Package for Social Sciences (SPSS). Household benefits like ‘makes cooking easy,’ ‘Less breathing issues for working women in kitchens’ and ‘Use of bio-slurry as organic fertilizer’ had the highly significant relationship between them with t-values of 3.24, 4.39 and 2.80 respectively. Responses of the respondents about environmental benefits of biogas technology showed that ‘less air pollution’ had a significant relationship between them while ‘less temperature rise up than due to the burning of wood /dung’ had the non-significant relationship in the responses of interviewed respondents. It was clear from the research that biogas users were becoming influential in convincing non-users to adopt this technology due to its noticeable benefits. Research area where people were depending on wood to be used as fire fuel could be helped in reduction of cutting of trees which will help in controlling deforestation and saving the environment.People should be encouraged in using of biogas technology through providing them subsidies and low mark up loans.Keywords: biogas technology, deforestation, environmental benefits, renewable energy
Procedia PDF Downloads 266