Search results for: passive optical networks (PONs)
4185 Modifying the Electrical Properties of Liquid Crystal Cells by Including TiO₂ Nanoparticles on a Substrate
Authors: V. Marzal, J. C. Torres, B. Garcia-Camara, Manuel Cano-Garcia, Xabier Quintana, I. Perez Garcilopez, J. M. Sanchez-Pena
Abstract:
At the present time, the use of nanostructures in complex media, like liquid crystals, is widely extended to manipulate their properties, either electrical or optical. In addition, these media can also be used to control the optical properties of the nanoparticles, for instance when they are resonant. In this work, the change on electrical properties of a liquid crystal cell by adding TiO₂ nanoparticles on one of the alignment layers has been analyzed. These nanoparticles, with a diameter of 100 nm and spherical shape, were deposited in one of the substrates (ITO + polyimide) by spin-coating in order to produce a homogeneous layer. These substrates were checked using an optical microscope (objective x100) to avoid potential agglomerates. The liquid crystal cell is then fabricated, using one of these substrates and another without nanoparticles, and filled with E7. The study of the electrical response was done through impedance measurements in a long range of frequencies (3 Hz- 6 MHz) and at ambient temperature. Different nanoparticle concentrations were considered, as well as pure E7 and an empty cell for comparison purposes. Results about the effective dielectric permittivity and conductivity are presented along with models of equivalent electric circuits and its physical interpretation. As a summary, it has been observed the clear influence of the presence of the nanoparticles, strongly modifying the electric response of the device. In particular, a variation of both the effective permittivity and the conductivity of the device have been observed. This result requires a deep analysis of the effect of these nanoparticles on the trapping of free ions in the device, allowing a controlled manipulation and frequency tuning of the electrical response of these devices.Keywords: alignment layer, electrical behavior, liquid crystal, TiO₂ nanoparticles
Procedia PDF Downloads 2154184 Shades of Violence – Risks of Male Violence Exposure for Mental and Somatic-Disorders and Risk-Taking Behavior: A Prevalence Study
Authors: Dana Cassandra Winkler, Delia Leiding, Rene Bergs, Franziska Kaiser, Ramona Kirchhart, Ute Habel
Abstract:
Background: Violence is a multidimensional phenomenon, affecting people of every age, socio-economic status and gender. Nevertheless, most studies primarily focus on men perpetrating women. Aim of the present study is to identify the likelihood of mental and somatic disorders and risk-taking behavior in male violence affected. In addition, the relationship between age of violence experience and the risk for health-related problems was analyzed. Method: On the basis of current evidence, a questionnaire was developed focusing on demographic background, health status, risk-taking behavior, and active and passive violence exposure. In total, 5221 males (Mean: 56,1 years, SD: 17,6) were consulted. To account for the time of violence experience in an efficient way, age clusters ‘0-12 years’, ‘13-20 years’, ‘21-35 years’, ‘36-65 years’ and ‘over 65 years’ were defined. A binary logistic regression was calculated to reveal differences in violence-affected and non-violence affected males regarding health and risk-taking factors. Males who experienced violence on a daily/ almost daily basis vs. males who reported violence occurrence once/ several times a month/ year were compared with respect to health factors and risk-taking behavior. Data of males, who indicated active and passive violence exposure, were analyzed by a chi²-analysis, to investigate a possible relation between the age of victimization and violence perpetration. Findings: Results imply that general violence experience, independent of active and passive violence exposure increases the likelihood in favor of somatic-, psychosomatic- and mental disorders as well as risk-taking behavior in males. Experiencing violence on a daily or almost daily basis in childhood and adolescence may serve as a predictor for increased health problems and risk-taking behavior. Furthermore, the violence experience and perpetration occur significantly within the same age cluster. This underlines the importance of a near-term intervention to minimize the risk, that victims become perpetrators later. Conclusion: The present study reveals predictors concerning health risk factors as well as risk-taking behavior in males with violence exposure. The results of this study may underscore the benefit of intervention and regular health care approaches in violence-affected males and underline the importance of acknowledging the overlap of violence experience and perpetration for further research.Keywords: health disease, male, mental health, prevalence, risk-taking behavior, violence
Procedia PDF Downloads 2154183 An Adaptive Opportunistic Transmission for Unlicensed Spectrum Sharing in Heterogeneous Networks
Authors: Daehyoung Kim, Pervez Khan, Hoon Kim
Abstract:
Efficient utilization of spectrum resources is a fundamental issue of wireless communications due to its scarcity. To improve the efficiency of spectrum utilization, the spectrum sharing for unlicensed bands is being regarded as one of key technologies in the next generation wireless networks. A number of schemes such as Listen-Before-Talk(LBT) and carrier sensor adaptive transmission (CSAT) have been suggested from this aspect, but more efficient sharing schemes are required for improving spectrum utilization efficiency. This work considers an opportunistic transmission approach and a dynamic Contention Window (CW) adjustment scheme for LTE-U users sharing the unlicensed spectrum with Wi-Fi, in order to enhance the overall system throughput. The decision criteria for the dynamic adjustment of CW are based on the collision evaluation, derived from the collision probability of the system. The overall performance can be improved due to the adaptive adjustment of the CW. Simulation results show that our proposed scheme outperforms the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 MAC.Keywords: spectrum sharing, adaptive opportunistic transmission, unlicensed bands, heterogeneous networks
Procedia PDF Downloads 3524182 An Evaluation of Neural Network Efficacies for Image Recognition on Edge-AI Computer Vision Platform
Abstract:
Image recognition, as one of the most critical technologies in computer vision, works to help machine-like robotics understand a scene, that is, if deployed appropriately, will trigger the revolution in remote sensing and industry automation. With the developments of AI technologies, there are many prevailing and sophisticated neural networks as technologies developed for image recognition. However, computer vision platforms as hardware, supporting neural networks for image recognition, as crucial as the neural network technologies, need to be more congruently addressed as the research subjects. In contrast, different computer vision platforms are deterministic to leverage the performance of different neural networks for recognition. In this paper, three different computer vision platforms – Jetson Nano(with 4GB), a standalone laptop(with RTX 3000s, using CUDA), and Google Colab (web-based, using GPU) are explored and four prominent neural network architectures (including AlexNet, VGG(16/19), GoogleNet, and ResNet(18/34/50)), are investigated. In the context of pairwise usage between different computer vision platforms and distinctive neural networks, with the merits of recognition accuracy and time efficiency, the performances are evaluated. In the case study using public imageNets, our findings provide a nuanced perspective on optimizing image recognition tasks across Edge-AI platforms, offering guidance on selecting appropriate neural network structures to maximize performance under hardware constraints.Keywords: alexNet, VGG, googleNet, resNet, Jetson nano, CUDA, COCO-NET, cifar10, imageNet large scale visual recognition challenge (ILSVRC), google colab
Procedia PDF Downloads 924181 The Laser Line Detection for Autonomous Mapping Based on Color Segmentation
Authors: Pavel Chmelar, Martin Dobrovolny
Abstract:
Laser projection or laser footprint detection is today widely used in many fields of robotics, measurement, or electronics. The system accuracy strictly depends on precise laser footprint detection on target objects. This article deals with the laser line detection based on the RGB segmentation and the component labeling. As a measurement device was used the developed optical rangefinder. The optical rangefinder is equipped with vertical sweeping of the laser beam and high quality camera. This system was developed mainly for automatic exploration and mapping of unknown spaces. In the first section is presented a new detection algorithm. In the second section are presented measurements results. The measurements were performed in variable light conditions in interiors. The last part of the article present achieved results and their differences between day and night measurements.Keywords: color segmentation, component labelling, laser line detection, automatic mapping, distance measurement, vector map
Procedia PDF Downloads 4334180 Contention Window Adjustment in IEEE 802.11-based Industrial Wireless Networks
Authors: Mohsen Maadani, Seyed Ahmad Motamedi
Abstract:
The use of wireless technology in industrial networks has gained vast attraction in recent years. In this paper, we have thoroughly analyzed the effect of contention window (CW) size on the performance of IEEE 802.11-based industrial wireless networks (IWN), from delay and reliability perspective. Results show that the default values of CWmin, CWmax, and retry limit (RL) are far from the optimum performance due to the industrial application characteristics, including short packet and noisy environment. An adaptive CW algorithm (payload-dependent) has been proposed to minimize the average delay. Finally a simple, but effective CW and RL setting has been proposed for industrial applications which outperforms the minimum-average-delay solution from maximum delay and jitter perspective, at the cost of a little higher average delay. Simulation results show an improvement of up to 20%, 25%, and 30% in average delay, maximum delay and jitter respectively.Keywords: average delay, contention window, distributed coordination function (DCF), jitter, industrial wireless network (IWN), maximum delay, reliability, retry limit
Procedia PDF Downloads 4194179 Fight against Money Laundering with Optical Character Recognition
Authors: Saikiran Subbagari, Avinash Malladhi
Abstract:
Anti Money Laundering (AML) regulations are designed to prevent money laundering and terrorist financing activities worldwide. Financial institutions around the world are legally obligated to identify, assess and mitigate the risks associated with money laundering and report any suspicious transactions to governing authorities. With increasing volumes of data to analyze, financial institutions seek to automate their AML processes. In the rise of financial crimes, optical character recognition (OCR), in combination with machine learning (ML) algorithms, serves as a crucial tool for automating AML processes by extracting the data from documents and identifying suspicious transactions. In this paper, we examine the utilization of OCR for AML and delve into various OCR techniques employed in AML processes. These techniques encompass template-based, feature-based, neural network-based, natural language processing (NLP), hidden markov models (HMMs), conditional random fields (CRFs), binarizations, pattern matching and stroke width transform (SWT). We evaluate each technique, discussing their strengths and constraints. Also, we emphasize on how OCR can improve the accuracy of customer identity verification by comparing the extracted text with the office of foreign assets control (OFAC) watchlist. We will also discuss how OCR helps to overcome language barriers in AML compliance. We also address the implementation challenges that OCR-based AML systems may face and offer recommendations for financial institutions based on the data from previous research studies, which illustrate the effectiveness of OCR-based AML.Keywords: anti-money laundering, compliance, financial crimes, fraud detection, machine learning, optical character recognition
Procedia PDF Downloads 1464178 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 3004177 Energy-Efficient Clustering Protocol in Wireless Sensor Networks for Healthcare Monitoring
Authors: Ebrahim Farahmand, Ali Mahani
Abstract:
Wireless sensor networks (WSNs) can facilitate continuous monitoring of patients and increase early detection of emergency conditions and diseases. High density WSNs helps us to accurately monitor a remote environment by intelligently combining the data from the individual nodes. Due to energy capacity limitation of sensors, enhancing the lifetime and the reliability of WSNs are important factors in designing of these networks. The clustering strategies are verified as effective and practical algorithms for reducing energy consumption in WSNs and can tackle WSNs limitations. In this paper, an Energy-efficient weight-based Clustering Protocol (EWCP) is presented. Artificial retina is selected as a case study of WSNs applied in body sensors. Cluster heads’ (CHs) selection is equipped with energy efficient parameters. Moreover, cluster members are selected based on their distance to the selected CHs. Comparing with the other benchmark protocols, the lifetime of EWCP is improved significantly.Keywords: WSN, healthcare monitoring, weighted based clustering, lifetime
Procedia PDF Downloads 3114176 Applying Artificial Neural Networks to Predict Speed Skater Impact Concussion Risk
Authors: Yilin Liao, Hewen Li, Paula McConvey
Abstract:
Speed skaters often face a risk of concussion when they fall on the ice floor and impact crash mats during practices and competitive races. Several variables, including those related to the skater, the crash mat, and the impact position (body side/head/feet impact), are believed to influence the severity of the skater's concussion. While computer simulation modeling can be employed to analyze these accidents, the simulation process is time-consuming and does not provide rapid information for coaches and teams to assess the skater's injury risk in competitive events. This research paper promotes the exploration of the feasibility of using AI techniques for evaluating skater’s potential concussion severity, and to develop a fast concussion prediction tool using artificial neural networks to reduce the risk of treatment delays for injured skaters. The primary data is collected through virtual tests and physical experiments designed to simulate skater-mat impact. It is then analyzed to identify patterns and correlations; finally, it is used to train and fine-tune the artificial neural networks for accurate prediction. The development of the prediction tool by employing machine learning strategies contributes to the application of AI methods in sports science and has theoretical involvements for using AI techniques in predicting and preventing sports-related injuries.Keywords: artificial neural networks, concussion, machine learning, impact, speed skater
Procedia PDF Downloads 1114175 Wireless Sensor Networks Optimization by Using 2-Stage Algorithm Based on Imperialist Competitive Algorithm
Authors: Hamid R. Lashgarian Azad, Seyed N. Shetab Boushehri
Abstract:
Wireless sensor networks (WSN) have become progressively popular due to their wide range of applications. Wireless Sensor Network is made of numerous tiny sensor nodes that are battery-powered. It is a very significant problem to maximize the lifetime of wireless sensor networks. In this paper, we propose a two-stage protocol based on an imperialist competitive algorithm (2S-ICA) to solve a sensor network optimization problem. The energy of the sensors can be greatly reduced and the lifetime of the network reduced by long communication distances between the sensors and the sink. We can minimize the overall communication distance considerably, thereby extending the lifetime of the network lifetime through connecting sensors into a series of independent clusters using 2SICA. Comparison results of the proposed protocol and LEACH protocol, which is common to solving WSN problems, show that our protocol has a better performance in terms of improving network life and increasing the number of transmitted data.Keywords: wireless sensor network, imperialist competitive algorithm, LEACH protocol, k-means clustering
Procedia PDF Downloads 1064174 Interbrain Synchronization and Multilayer Hyper brain Networks when Playing Guitar in Quartet
Authors: Viktor Müller, Ulman Lindenberger
Abstract:
Neurophysiological evidence suggests that the physiological states of the system are characterized by specific network structures and network topology dynamics, demonstrating a robust interplay between network topology and function. It is also evident that interpersonal action coordination or social interaction (e.g., playing music in duets or groups) requires strong intra- and interbrain synchronization resulting in a specific hyper brain network activity across two or more brains to support such coordination or interaction. Such complex hyper brain networks can be described as multiplex or multilayer networks that have a specific multidimensional or multilayer network organization characteristic for superordinate systems and their constituents. The aim of the study was to describe multilayer hyper brain networks and synchronization patterns of guitarists playing guitar in a quartet by using electroencephalography (EEG) hyper scanning (simultaneous EEG recording from multiple brains) and following time-frequency decomposition and multilayer network construction, where within-frequency coupling (WFC) represents communication within different layers, and cross-frequency coupling (CFC) depicts communication between these layers. Results indicate that communication or coupling dynamics, both within and between the layers across the brains of the guitarists, play an essential role in action coordination and are particularly enhanced during periods of high demands on musical coordination. Moreover, multilayer hyper brain network topology and dynamical structure of guitar sounds showed specific guitar-guitar, brain-brain, and guitar-brain causal associations, indicating multilevel dynamics with upward and downward causation, contributing to the superordinate system dynamics and hyper brain functioning. It is concluded that the neuronal dynamics during interpersonal interaction are brain-wide and frequency-specific with the fine-tuned balance between WFC and CFC and can best be described in terms of multilayer multi-brain networks with specific network topology and connectivity strengths. Further sophisticated research is needed to deepen our understanding of these highly interesting and complex phenomena.Keywords: EEG hyper scanning, intra- and interbrain coupling, multilayer hyper brain networks, social interaction, within- and cross-frequency coupling
Procedia PDF Downloads 744173 A New Reliability based Channel Allocation Model in Mobile Networks
Authors: Anujendra, Parag Kumar Guha Thakurta
Abstract:
The data transmission between mobile hosts and base stations (BSs) in Mobile networks are often vulnerable to failure. Thus, efficient link connectivity, in terms of the services of both base stations and communication channels of the network, is required in wireless mobile networks to achieve highly reliable data transmission. In addition, it is observed that the number of blocked hosts is increased due to insufficient number of channels during heavy load in the network. Under such scenario, the channels are allocated accordingly to offer a reliable communication at any given time. Therefore, a reliability-based channel allocation model with acceptable system performance is proposed as a MOO problem in this paper. Two conflicting parameters known as Resource Reuse factor (RRF) and the number of blocked calls are optimized under reliability constraint in this problem. The solution to such MOO problem is obtained through NSGA-II (Non-dominated Sorting Genetic Algorithm). The effectiveness of the proposed model in this work is shown with a set of experimental results.Keywords: base station, channel, GA, pareto-optimal, reliability
Procedia PDF Downloads 4094172 Reliability Improvement of Power System Networks Using Adaptive Genetic Algorithm
Authors: Alireza Alesaadi
Abstract:
Reliability analysis is a powerful method for determining the weak points of the electrical networks. In designing of electrical network, it is tried to design the most reliable network with minimal system shutting down, but it is usually associated with increasing the cost. In this paper, using adaptive genetic algorithm, a method was presented that provides the most reliable system with a certain economical cost. Finally, the proposed method is applied to a sample network and results will be analyzed.Keywords: reliability, adaptive genetic algorithm, electrical network, communication engineering
Procedia PDF Downloads 5134171 Investigation of the Carbon Dots Optical Properties Using Laser Scanning Confocal Microscopy and TimE-resolved Fluorescence Microscopy
Authors: M. S. Stepanova, V. V. Zakharov, P. D. Khavlyuk, I. D. Skurlov, A. Y. Dubovik, A. L. Rogach
Abstract:
Carbon dots are small carbon-based spherical nanoparticles, which are typically less than 10 nm in size that can be modified with surface passivation and heteroatoms doping. The light-absorbing ability of carbon dots has attracted a significant amount of attention in photoluminescence for bioimaging and fluorescence sensing applications owing to their advantages, such as tunable fluorescence emission, photo- and thermostability and low toxicity. In this study, carbon dots were synthesized by the solvothermal method from citric acid and ethylenediamine dissolved in water. The solution was heated for 5 hours at 200°C and then cooled down to room temperature. The carbon dots films were obtained by evaporation from a high-concentration aqueous solution. The increase of both luminescence intensity and light transmission was obtained as a result of a 405 nm laser exposure to a part of the carbon dots film, which was detected using a confocal laser scanning microscope (LSM 710, Zeiss). Blueshift up to 35 nm of the luminescence spectrum is observed as luminescence intensity, which is increased more than twofold. The exact value of the shift depends on the time of the laser exposure. This shift can be caused by the modification of surface groups at the carbon dots, which are responsible for long-wavelength luminescence. In addition, a shift of the absorption peak by 10 nm and a decrease in the optical density at the wavelength of 350 nm is detected, which is responsible for the absorption of surface groups. The obtained sample was also studied with time-resolved confocal fluorescence microscope (MicroTime 100, PicoQuant), which made it possible to receive a time-resolved photoluminescence image and construct emission decays of the laser-exposed and non-exposed areas. 5 MHz pulse rate impulse laser has been used as a photoluminescence excitation source. Photoluminescence decay was approximated by two exhibitors. The laser-exposed area has the amplitude of the first-lifetime component (A1) twice as much as before, with increasing τ1. At the same time, the second-lifetime component (A2) decreases. These changes evidence a modification of the surface groups of carbon dots. The detected effect can be used to create thermostable fluorescent marks, the physical size of which is bounded by the diffraction limit of the optics (~ 200-300 nm) used for exposure and to improve the optical properties of carbon dots or in the field of optical encryption. Acknowledgements: This work was supported by the Ministry of Science and Higher Education of Russian Federation, goszadanie no. 2019-1080 and financially supported by Government of Russian Federation, Grant 08-08.Keywords: carbon dots, photoactivation, optical properties, photoluminescence and absorption spectra
Procedia PDF Downloads 1654170 Generating Swarm Satellite Data Using Long Short-Term Memory and Generative Adversarial Networks for the Detection of Seismic Precursors
Authors: Yaxin Bi
Abstract:
Accurate prediction and understanding of the evolution mechanisms of earthquakes remain challenging in the fields of geology, geophysics, and seismology. This study leverages Long Short-Term Memory (LSTM) networks and Generative Adversarial Networks (GANs), a generative model tailored to time-series data, for generating synthetic time series data based on Swarm satellite data, which will be used for detecting seismic anomalies. LSTMs demonstrated commendable predictive performance in generating synthetic data across multiple countries. In contrast, the GAN models struggled to generate synthetic data, often producing non-informative values, although they were able to capture the data distribution of the time series. These findings highlight both the promise and challenges associated with applying deep learning techniques to generate synthetic data, underscoring the potential of deep learning in generating synthetic electromagnetic satellite data.Keywords: LSTM, GAN, earthquake, synthetic data, generative AI, seismic precursors
Procedia PDF Downloads 344169 Innovative Technologies of Distant Spectral Temperature Control
Authors: Leonid Zhukov, Dmytro Petrenko
Abstract:
Optical thermometry has no alternative in many cases of industrial most effective continuous temperature control. Classical optical thermometry technologies can be used on available for pyrometers controlled objects with stable radiation characteristics and transmissivity of the intermediate medium. Without using temperature corrections, it is possible in the case of a “black” body for energy pyrometry and the cases of “black” and “grey” bodies for spectral ratio pyrometry or with using corrections – for any colored bodies. Consequently, with increasing the number of operating waves, optical thermometry possibilities to reduce methodical errors significantly expand. That is why, in recent 25-30 years, research works have been reoriented on more perfect spectral (multicolor) thermometry technologies. There are two physical material substances, i.e., substance (controlled object) and electromagnetic field (thermal radiation), to be operated in optical thermometry. Heat is transferred by radiation; therefore, radiation has the energy, entropy, and temperature. Optical thermometry was originating simultaneously with the developing of thermal radiation theory when the concept and the term "radiation temperature" was not used, and therefore concepts and terms "conditional temperatures" or "pseudo temperature" of controlled objects were introduced. They do not correspond to the physical sense and definitions of temperature in thermodynamics, molecular-kinetic theory, and statistical physics. Launched by the scientific thermometric society, discussion about the possibilities of temperature measurements of objects, including colored bodies, using the temperatures of their radiation is not finished. Are the information about controlled objects transferred by their radiation enough for temperature measurements? The positive and negative answers on this fundamental question divided experts into two opposite camps. Recent achievements of spectral thermometry develop events in her favour and don’t leave any hope for skeptics. This article presents the results of investigations and developments in the field of spectral thermometry carried out by the authors in the Department of Thermometry and Physics-Chemical Investigations. The authors have many-year’s of experience in the field of modern optical thermometry technologies. Innovative technologies of optical continuous temperature control have been developed: symmetric-wave, two-color compensative, and based on obtained nonlinearity equation of spectral emissivity distribution linear, two-range, and parabolic. Тhe technologies are based on direct measurements of physically substantiated and proposed by Prof. L. Zhukov, radiation temperatures with the next calculation of the controlled object temperature using this radiation temperatures and corresponding mathematical models. Тhe technologies significantly increase metrological characteristics of continuous contactless and light-guide temperature control in energy, metallurgical, ceramic, glassy, and other productions. For example, under the same conditions, the methodical errors of proposed technologies are less than the errors of known spectral and classical technologies in 2 and 3-13 times, respectively. Innovative technologies provide quality products obtaining at the lowest possible resource-including energy costs. More than 600 publications have been published on the completed developments, including more than 100 domestic patents, as well as 34 patents in Australia, Bulgaria, Germany, France, Canada, the USA, Sweden, and Japan. The developments have been implemented in the enterprises of USA, as well as Western Europe and Asia, including Germany and Japan.Keywords: emissivity, radiation temperature, object temperature, spectral thermometry
Procedia PDF Downloads 994168 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System
Authors: Vuk M. Popovic, Dunja D. Popovic
Abstract:
Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs
Procedia PDF Downloads 3604167 Representativity Based Wasserstein Active Regression
Authors: Benjamin Bobbia, Matthias Picard
Abstract:
In recent years active learning methodologies based on the representativity of the data seems more promising to limit overfitting. The presented query methodology for regression using the Wasserstein distance measuring the representativity of our labelled dataset compared to the global distribution. In this work a crucial use of GroupSort Neural Networks is made therewith to draw a double advantage. The Wasserstein distance can be exactly expressed in terms of such neural networks. Moreover, one can provide explicit bounds for their size and depth together with rates of convergence. However, heterogeneity of the dataset is also considered by weighting the Wasserstein distance with the error of approximation at the previous step of active learning. Such an approach leads to a reduction of overfitting and high prediction performance after few steps of query. After having detailed the methodology and algorithm, an empirical study is presented in order to investigate the range of our hyperparameters. The performances of this method are compared, in terms of numbers of query needed, with other classical and recent query methods on several UCI datasets.Keywords: active learning, Lipschitz regularization, neural networks, optimal transport, regression
Procedia PDF Downloads 814166 Influence of the Refractory Period on Neural Networks Based on the Recognition of Neural Signatures
Authors: José Luis Carrillo-Medina, Roberto Latorre
Abstract:
Experimental evidence has revealed that different living neural systems can sign their output signals with some specific neural signature. Although experimental and modeling results suggest that neural signatures can have an important role in the activity of neural networks in order to identify the source of the information or to contextualize a message, the functional meaning of these neural fingerprints is still unclear. The existence of cellular mechanisms to identify the origin of individual neural signals can be a powerful information processing strategy for the nervous system. We have recently built different models to study the ability of a neural network to process information based on the emission and recognition of specific neural fingerprints. In this paper we further analyze the features that can influence on the information processing ability of this kind of networks. In particular, we focus on the role that the duration of a refractory period in each neuron after emitting a signed message can play in the network collective dynamics.Keywords: neural signature, neural fingerprint, processing based on signal identification, self-organizing neural network
Procedia PDF Downloads 4934165 Impact of Social Networks on Agricultural Technology Adoption: A Case Study of Ongoing Extension Programs for Paddy Cultivation in Matara District in Sri Lanka
Authors: Paulu Saramge Shalika Nirupani Seram
Abstract:
The study delves into the complex dynamics of social networks and how they affect paddy farmers’ adoption of agricultural technologies, which are included in Yaya Development program, Weedy rice program and Good Agricultural Practices (GAP) program in Matara district. Identify the social networks among the farmers of ongoing Extension Programs in Matara district, examine the farmers’ adoption level to the ongoing extension programs in Matara district, analyze the impacts of social networks for the adoption to the technologies of ongoing extension programs and give suggestions and recommendations to improve the social network of paddy farmers in Matara District for ongoing extension programs are the objectives of this research. A structured questionnaire survey was conducted with 25 farmers from Matara-North (Wilpita), 25 farmers from Matara-Central (Kamburupitiya), and 25 farmers from Matara-South (Malimbada). UCINET (Version -6.771) software was used for social network analysis, and other than that, descriptive statistics and inferential statistics were used to analyze the findings. Matara-North has the highest social network density, and Matara-South has the lowest social network density according to the social network analysis. Dissemination of intensive technologies requires the most prominent actors of the social network, and in Matara district, agricultural instructors have the highest ability to disseminate technologies. The influence of actors in the social network, the trustworthiness of AI officers, and the trust of indigenous knowledge about paddy cultivation have a significant effect on the technology adoption of farmers. The research endeavors to contribute a nuanced understanding of the social networks and agricultural technology adoption in Matara District, offering practical insights for stakeholders involved in agricultural extension services.Keywords: agricultural extension, paddy cultivation, social network, technology adoption
Procedia PDF Downloads 674164 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 864163 Metal-Semiconductor-Metal Photodetector Based on Porous In0.08Ga0.92N
Authors: Saleh H. Abud, Z. Hassan, F. K. Yam
Abstract:
Characteristics of MSM photodetector based on a porous In0.08Ga0.92N thin film were reported. Nanoporous structures of n-type In0.08Ga0.92N/AlN/Si thin films were synthesized by photoelectrochemical (PEC) etching at a ratio of 1:4 of HF:C2H5OH solution for 15 min. The structural and optical properties of pre- and post-etched thin films were investigated. Field emission scanning electron microscope and atomic force microscope images showed that the pre-etched thin film has a sufficiently smooth surface over a large region and the roughness increased for porous film. Blue shift has been observed in photoluminescence emission peak at 300 K for porous sample. The photoluminescence intensity of the porous film indicated that the optical properties have been enhanced. A high work function metals (Pt and Ni) were deposited as a metal contact on the porous films. The rise and recovery times of the devices were investigated at 390 nm chopped light. Finally, the sensitivity and quantum efficiency were also studied.Keywords: porous InGaN, photoluminescence, SMS photodetector, atomic force microscopy
Procedia PDF Downloads 4894162 The Impact of Neighbourhood Built-Environment on the Formulation and Facilitation of Bottom-up Mutual Help Networks for Senior Residents in Singapore
Authors: Wei Zhang, Chye Kiang Heng, John Chye Fung
Abstract:
Background: The world’s demographics is currently undergoing the largest wave of both rapid ageing and dramatic urbanisation in human history. As one of the most rapidly ageing countries, Singapore will see about one in four residents aged 65 years and above by 2030 in its high-rise and high-density urban environment. Research questions: To support urban seniors ageing in place and interdependence among senior residents and their informal caregivers, this study argues a community-based care model with bottom-up mutual help networks and asks how neighbourhood built-environment influences the formulation and facilitation of bottom-up mutual help networks in Singapore. Methods: Two public housing communities with different physical environment and rich age-friendly neighbourhood initiatives were chosen as the case studies. The categories, participants and places of bottom-up mutual help activities will be obtained via field observation, non-structural interviews of participants, service providers and managers of care facilities, and documents. Mapping and content analysis will be used to explore the influences of neighbourhood built-environment on the formulation and facilitation of bottom-up mutual help networks. Results and conclusions: The results showed that neighbourhood design, place programming, and place governance have a confluence on the bottom-up mutual help networks for senior residents. Significance: The outcomes of this study will provide fresh evidence for paradigm shifts of community-based care for the elderly and neighbourhood planning. In addition, the research findings will shed light on meaningful implications of urban planners and policy makers as they tackle with the issues arising from the ageing society.Keywords: Built environment, Mutual help, Neighbourhood, Senior residents, Singapore
Procedia PDF Downloads 1394161 Increase in the Persistence of Various Invaded Multiplex Metacommunities Induced by Heterogeneity of Motifs
Authors: Dweepabiswa Bagchi, D. V. Senthilkumar
Abstract:
Numerous studies have typically demonstrated the devastation of invasions on an isolated ecosystem or, at most, a network of dispersively coupled similar ecosystem patches. Using such a simplistic 2-D network model, one can only consider dispersal coupling and inter-species trophic interactions. However, in a realistic ecosystem, numerous species co-exist and interact trophically and non-trophically in groups of 2 or more. Even different types of dispersal can introduce complexity in an ecological network. Therefore, a more accurate representation of actual ecosystems (or ecological networks) is a complex network consisting of motifs formed by two or more interacting species. Here, the apropos structure of the network should be multiplex or multi-layered. Motifs between different patches or species should be identical within the same layer and vary from one layer to another. This study investigates three distinct ecological multiplex networks facing invasion from one or more external species. This work determines and quantifies the criteria for the increased extinction risk of these networks. The dynamical states of the network with high extinction risk, i.e., the danger states, and those with low extinction risk, i.e., the resistive network states, are both subsequently identified. The analysis done in this study further quantifies the persistence of the entire network corresponding to simultaneous changes in the strength of invasive dispersal and higher-order trophic and non-trophic interactions. This study also demonstrates that the ecosystems enjoy an inherent advantage against invasions due to their multiplex network structure.Keywords: increased ecosystem persistence, invasion on ecosystems, multiplex networks, non-trophic interactions
Procedia PDF Downloads 694160 Construction of the Large Scale Biological Networks from Microarrays
Authors: Fadhl Alakwaa
Abstract:
One of the sustainable goals of the system biology is understanding gene-gene interactions. Hence, gene regulatory networks (GRN) need to be constructed for understanding the disease ontology and to reduce the cost of drug development. To construct gene regulatory from gene expression we need to overcome many challenges such as data denoising and dimensionality. In this paper, we develop an integrated system to reduce data dimension and remove the noise. The generated network from our system was validated via available interaction databases and was compared to previous methods. The result revealed the performance of our proposed method.Keywords: gene regulatory network, biclustering, denoising, system biology
Procedia PDF Downloads 2404159 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 6614158 Nonlinear Passive Shunt for Electroacoustic Absorbers Using Nonlinear Energy Sink
Authors: Diala Bitar, Emmanuel Gourdon, Claude H. Lamarque, Manuel Collet
Abstract:
Acoustic absorber devices play an important role reducing the noise at the propagation and reception paths. An electroacoustic absorber consists of a loudspeaker coupled to an electric shunt circuit, where the membrane is playing the role of an absorber/reflector of sound. Although the use of linear shunt resistors at the transducer terminals, has shown to improve the performances of the dynamical absorbers, it is nearly efficient in a narrow frequency band. Therefore, and since nonlinear phenomena are promising for their ability to absorb the vibrations and sound on a larger frequency range, we propose to couple a nonlinear electric shunt circuit at the loudspeaker terminals. Then, the equivalent model can be described by a 2 degrees of freedom system, consisting of a primary linear oscillator describing the dynamics of the loudspeaker membrane, linearly coupled to a cubic nonlinear energy sink (NES). The system is analytically treated for the case of 1:1 resonance, using an invariant manifold approach at different time scales. The proposed methodology enables us to detect the equilibrium points and fold singularities at the first slow time scales, providing a predictive tool to design the nonlinear circuit shunt during the energy exchange process. The preliminary results are promising; a significant improvement of acoustic absorption performances are obtained.Keywords: electroacoustic absorber, multiple-time-scale with small finite parameter, nonlinear energy sink, nonlinear passive shunt
Procedia PDF Downloads 2224157 Incidence of Post-Stroke Depression in a Tertiary Hospital in Cebu City, Philippines
Authors: Ivory A. Rulona, Jarungchai Anton S. Vatanagul
Abstract:
Background: Depression is common after stroke with quoted rates ranging from 18% to 61%. 8 Mood disturbance is common after stroke and may present as depression or anxiety. Psychological mood disturbance is associated with higher rates of mortality, long term disability, and hospital readmission. Objectives: To investigate the incidence of post-stroke depression in a tertiary hospital in Cebu City, Philippines and to determine its associated factors. The study is designed to be prospective, descriptive, cross-sectional survey. Participants: Adult patients seen and diagnosed to have stroke either infarct or hemorrhage within the period of January 1 to July 31, 2014. Results: A total of 100 patients with stroke were interviewed using the 17-item Hamilton Depression Rating Scale (HDRS) questionnaire. The average age of the respondents was 60.50 years old ±1.18, majority were males (55%), 83% were married, and 81% were employed. The most common co-morbidity was hypertension 78% followed by diabetes mellitus at 50%. Moreover, 39% of these patients had stroke in months, 26% in years, and 18% in weeks. The average functional capacity based on Modified Rankin Scale was 2.14+/-0.14. Among 100 patients, a total of 30 patients (30%) had depression: 2 (2%) very severe, 5 (5%) moderate and 23 (23%) had mild depression while 70 patients (70%) had no depression. Stroke located at the dominant hemisphere was not associated with severe depression (p=0.102). A similar trend was also noted among those with stroke at the right side (p=0.183), pons (p=0.634), bilateral (p=0.776), and midbrain (p=0.336). Conclusion: This study showed that majority of stroke patients were males with average age of 60.50 years. Hypertension was the most common co-morbidity. There was no association between stroke location and depression. The incidence of PSD was 30%.Keywords: post-stroke depression, co-morbidity, disturbance, bilateral
Procedia PDF Downloads 2994156 A Review of Accuracy Optical Surface Imaging Systems for Setup Verification During Breast Radiotherapy Treatment
Authors: Auwal Abubakar, Ahmed Ahidjo, Shazril Imran Shaukat, Noor Khairiah A. Karim, Gokula Kumar Appalanaido, Hafiz Mohd Zin
Abstract:
Background: The use of optical surface imaging systems (OSISs) is increasingly becoming popular in radiotherapy practice, especially during breast cancer treatment. This study reviews the accuracy of the available commercial OSISs for breast radiotherapy. Method: A literature search was conducted and identified the available commercial OSISs from different manufacturers that are integrated into radiotherapy practice for setup verification during breast radiotherapy. Studies that evaluated the accuracy of the OSISs during breast radiotherapy using cone beam computed tomography (CBCT) as a reference were retrieved and analyzed. The physics and working principles of the systems from each manufacturer were discussed together with their respective strength and limitations. Results: A total of five (5) different commercially available OSISs from four (4) manufacturers were identified, each with a different working principle. Six (6) studies were found to evaluate the accuracy of the systems during breast radiotherapy in conjunction with CBCT as a goal standard. The studies revealed that the accuracy of the system in terms of mean difference ranges from 0.1 to 2.1 mm. The correlation between CBCT and OSIS ranges between 0.4 and 0.9. The limit of agreements obtained using bland Altman analysis in the studies was also within an acceptable range. Conclusion: The OSISs have an acceptable level of accuracy and could be used safely during breast radiotherapy. The systems are non-invasive, ionizing radiation-free, and provide real-time imaging of the target surface at no extra concomitant imaging dose. However, the system should only be used to complement rather than replace x-ray-based image guidance techniques such as CBCT.Keywords: optical surface imaging system, Cone beam computed tomography (CBCT), surface guided radiotherapy, Breast radiotherapy
Procedia PDF Downloads 66