Search results for: protein-protein interaction networks
5622 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.Keywords: cyber security, vulnerability detection, neural networks, feature extraction
Procedia PDF Downloads 895621 Docking and Dynamic Molecular Study of Isoniazid Derivatives as Anti-Tuberculosis Drug Candidate
Authors: Richa Mardianingrum, Srie R. N. Endah
Abstract:
In this research, we have designed four isoniazid derivatives i.e., isonicotinohydrazide (1-isonicotinoyl semicarbazide, 1-thiosemi isonicotinoyl carbazide, N '-(1,3-dimethyl-1 h-pyrazole-5-carbonyl) isonicotino hydrazide, and N '-(1,2,3- 4-thiadiazole-carbonyl) isonicotinohydrazide. The docking and molecular dynamic have performed to them in order to study its interaction with Mycobacterium tuberculosis Enoyl-Acyl Carrier Protein Reductase (InhA). Based on this research, all of the compounds were predicted to have a stable interaction with Mycobacterium tuberculosis Enoyl-Acyl Carrier Protein Reductase (INHA) receptor, so they could be used as an anti-tuberculosis drug candidate.Keywords: anti-tuberculosis, docking, Inhibin alpha subunit, InhA, inhibition, synthesis, isonicotinohydrazide
Procedia PDF Downloads 1815620 Religious Government Interaction in Urban Settings
Authors: Rebecca Sager, Gary Adler, Damon Mayrl, Jonathan Cooley
Abstract:
The United States’ unique constitutional structure and religious roots have fostered the flourishing of local communities through the close interaction of church and state. Today, these local relationships play out in these circumstances, including increased religious diversity and changing jurisprudence to more accommodating church-state interaction. This project seeks to understand the meanings of church-state interaction among diverse religious leaders in a variety of local settings. Using data from interviews with over 200 religious leaders in six states in the US, we examine how religious groups interact with various non-elected and elected government officials. We have interviewed local religious actors in eight communities characterized by the difference in location and religious homogeneity. These include a small city within a major metropolitan area, several religiously diverse cities in various areas across the country, a small college town with religious diversity set in a religiously-homogenous rural area, and a small farming community with minimal religious diversity. We identified three types of religious actors in each of our geographic areas: congregations, religious non-profit organizations, and clergy coalitions. Given the well-known difficulties in identifying religious organizations, we used the following to construct a local population list from which to sample: the Association of Religion Data Archives ProPublica’s Nonprofit Explorer, Guidestar, and the Internal Revenue Service Exempt Business Master File. Our sample for selecting interviewees were stratified by three criteria: religious tradition (Christian v. non-Christian), sectarian orientation (Mainline/Catholic v. Evangelical Protestant), and organizational form (congregation vs. other). Each interview included the elicitation of local church-state interactions experienced by the organization and organizational members, the enumeration of information sources for navigating church-state interactions, and the personal and community background of interviewees. We coded interviews to identify the cognitive schema of “church” and “state,” the models of legitimate relations between the two, and discretion rules for managing interaction and avoiding conflict. We also enumerate arenas in which and issues for which local state officials are engaged. In this paper, we focus on Korean religious groups and examine how their interactions differ from other congregations, including other immigrant congregations. These churches were particularly common in one large metropolitan area. We find that Korean churches are much more likely to be concerned about any governmental interactions and have fewer connections than non-Korean churches leading to more disconnection from their communities. We argue that due to their status as new immigrant churches without a lot of community ties for many members and being in a large city, Korean churches were particularly concerned about too much interaction with any type of government officials, even ones that could be potentially helpful. While other immigrant churches were somewhat willing to work with government groups, such as Latino-based Catholic groups, Korean churches were the least likely to want to create these connections. Understanding these churches and how immigrant church identity varies and creates different types of interaction is crucial to understanding how church/state interaction can be more meaningful over space and place.Keywords: religion, congregations, government, politics
Procedia PDF Downloads 885619 BiFormerDTA: Structural Embedding of Protein in Drug Target Affinity Prediction Using BiFormer
Authors: Leila Baghaarabani, Parvin Razzaghi, Mennatolla Magdy Mostafa, Ahmad Albaqsami, Al Warith Al Rushaidi, Masoud Al Rawahi
Abstract:
Predicting the interaction between drugs and their molecular targets is pivotal for advancing drug development processes. Due to the time and cost limitations, computational approaches have emerged as an effective approach to drug-target interaction (DTI) prediction. Most of the introduced computational based approaches utilize the drug molecule and protein sequence as input. This study does not only utilize these inputs, it also introduces a protein representation developed using a masked protein language model. In this representation, for every individual amino acid residue within the protein sequence, there exists a corresponding probability distribution that indicates the likelihood of each amino acid being present at that particular position. Then, the similarity between each pair of amino-acids is computed to create similarity matrix. To encode the knowledge of the similarity matrix, Bi-Level Routing Attention (BiFormer) is utilized, which combines aspects of transformer-based models with protein sequence analysis and represents a significant advancement in the field of drug-protein interaction prediction. BiFormer has the ability to pinpoint the most effective regions of the protein sequence that are responsible for facilitating interactions between the protein and drugs, thereby enhancing the understanding of these critical interactions. Thus, it appears promising in its ability to capture the local structural relationship of the proteins by enhancing the understanding of how it contributes to drug protein interactions, thereby facilitating more accurate predictions. To evaluate the proposed method, it was tested on two widely recognized datasets: Davis and KIBA. A comprehensive series of experiments was conducted to illustrate its effectiveness in comparison to cuttingedge techniques.Keywords: BiFormer, transformer, protein language processing, self-attention mechanism, binding affinity, drug target interaction, similarity matrix, protein masked representation, protein language model
Procedia PDF Downloads 75618 An Early Detection Type 2 Diabetes Using K - Nearest Neighbor Algorithm
Authors: Ng Liang Shen, Ngahzaifa Abdul Ghani
Abstract:
This research aimed at developing an early warning system for pre-diabetic and diabetics by analyzing simple and easily determinable signs and symptoms of diabetes among the people living in Malaysia using Particle Swarm Optimized Artificial. With the skyrocketing prevalence of Type 2 diabetes in Malaysia, the system can be used to encourage affected people to seek further medical attention to prevent the onset of diabetes or start managing it early enough to avoid the associated complications. The study sought to find out the best predictive variables of Type 2 Diabetes Mellitus, developed a system to diagnose diabetes from the variables using Artificial Neural Networks and tested the system on accuracy to find out the patent generated from diabetes diagnosis result in machine learning algorithms even at primary or advanced stages.Keywords: diabetes diagnosis, Artificial Neural Networks, artificial intelligence, soft computing, medical diagnosis
Procedia PDF Downloads 3365617 Atomic Force Microscopy Studies of DNA Binding Properties of the Archaeal Mini Chromosome Maintenance Complex
Authors: Amna Abdalla Mohammed Khalid, Pietro Parisse, Silvia Onesti, Loredana Casalis
Abstract:
Basic cellular processes as DNA replication are crucial to cell life. Understanding at the molecular level the mechanisms that govern DNA replication in proliferating cells is fundamental to understand disease connected to genomic instabilities, as a genetic disease and cancer. A key step for DNA replication to take place, is unwinding the DNA double helix and this carried out by proteins called helicases. The archaeal MCM (minichromosome maintenance) complex from Methanothermobacter thermautotrophicus have being studied using Atomic Force Microscopy (AFM), imaging in air and liquid (Physiological environment). The accurate analysis of AFM topographic images allowed to understand the static conformations as well the interaction dynamic of MCM and DNA double helix in the present of ATP.Keywords: DNA, protein-DNA interaction, MCM (mini chromosome manteinance) complex, atomic force microscopy (AFM)
Procedia PDF Downloads 3095616 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms
Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos
Abstract:
The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution
Procedia PDF Downloads 3465615 MarginDistillation: Distillation for Face Recognition Neural Networks with Margin-Based Softmax
Authors: Svitov David, Alyamkin Sergey
Abstract:
The usage of convolutional neural networks (CNNs) in conjunction with the margin-based softmax approach demonstrates the state-of-the-art performance for the face recognition problem. Recently, lightweight neural network models trained with the margin-based softmax have been introduced for the face identification task for edge devices. In this paper, we propose a distillation method for lightweight neural network architectures that outperforms other known methods for the face recognition task on LFW, AgeDB-30 and Megaface datasets. The idea of the proposed method is to use class centers from the teacher network for the student network. Then the student network is trained to get the same angles between the class centers and face embeddings predicted by the teacher network.Keywords: ArcFace, distillation, face recognition, margin-based softmax
Procedia PDF Downloads 1465614 Formation of Convergence Culture in the Framework of Conventional Media and New Media
Authors: Berkay Buluş, Aytekin İşman, Kübra Yüzüncüyıl
Abstract:
Developments in media and communication technologies have changed the way we use media. The importance of convergence culture has been increasing day by day within the framework of these developments. With new media, it is possible to say that social networks are the most powerful platforms that are integrated to this digitalization process. Although social networks seem like the place that people can socialize, they can also be utilized as places of production. On the other hand, audience has become users within the framework of transformation from national to global broadcasting. User generated contents make conventional media and new media collide. In this study, these communication platforms will be examined not as platforms that replace one another but mediums that unify each other. In the light of this information, information that is produced by users regarding new media platforms and all new media use practices are called convergence culture. In other words, convergence culture means intersections of conventional and new media. In this study, examples of convergence culture will be analyzed in detail.Keywords: new media, convergence culture, convergence, use of new media, user generated content
Procedia PDF Downloads 2715613 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 1215612 Three Dimensional Dynamic Analysis of Water Storage Tanks Considering FSI Using FEM
Authors: S. Mahdi S. Kolbadi, Ramezan Ali Alvand, Afrasiab Mirzaei
Abstract:
In this study, to investigate and analyze the seismic behavior of concrete in open rectangular water storage tanks in two-dimensional and three-dimensional spaces, the Finite Element Method has been used. Through this method, dynamic responses can be investigated together in fluid storages system. Soil behavior has been simulated using tanks boundary conditions in linear form. In this research, in addition to flexibility of wall, the effects of fluid-structure interaction on seismic response of tanks have been investigated to account for the effects of flexible foundation in linear boundary conditions form, and a dynamic response of rectangular tanks in two-dimensional and three-dimensional spaces using finite element method has been provided. The boundary conditions of both rigid and flexible walls in two-dimensional finite element method have been considered to investigate the effect of wall flexibility on seismic response of fluid and storage system. Furthermore, three-dimensional model of fluid-structure interaction issue together with wall flexibility has been analyzed under the three components of earthquake. The obtained results show that two-dimensional model is also accurately near to the results of three-dimension as well as flexibility of foundation leads to absorb received energy and relative reduction of responses.Keywords: dynamic behavior, flexible wall, fluid-structure interaction, water storage tank
Procedia PDF Downloads 1855611 Improvement of the Q-System Using the Rock Engineering System: A Case Study of Water Conveyor Tunnel of Azad Dam
Authors: Sahand Golmohammadi, Sana Hosseini Shirazi
Abstract:
Because the status and mechanical parameters of discontinuities in the rock mass are included in the calculations, various methods of rock engineering classification are often used as a starting point for the design of different types of structures. The Q-system is one of the most frequently used methods for stability analysis and determination of support systems of underground structures in rock, including tunnel. In this method, six main parameters of the rock mass, namely, the rock quality designation (RQD), joint set number (Jn), joint roughness number (Jr), joint alteration number (Ja), joint water parameter (Jw) and stress reduction factor (SRF) are required. In this regard, in order to achieve a reasonable and optimal design, identifying the effective parameters for the stability of the mentioned structures is one of the most important goals and the most necessary actions in rock engineering. Therefore, it is necessary to study the relationships between the parameters of a system and how they interact with each other and, ultimately, the whole system. In this research, it has attempted to determine the most effective parameters (key parameters) from the six parameters of rock mass in the Q-system using the rock engineering system (RES) method to improve the relationships between the parameters in the calculation of the Q value. The RES system is, in fact, a method by which one can determine the degree of cause and effect of a system's parameters by making an interaction matrix. In this research, the geomechanical data collected from the water conveyor tunnel of Azad Dam were used to make the interaction matrix of the Q-system. For this purpose, instead of using the conventional methods that are always accompanied by defects such as uncertainty, the Q-system interaction matrix is coded using a technique that is actually a statistical analysis of the data and determining the correlation coefficient between them. So, the effect of each parameter on the system is evaluated with greater certainty. The results of this study show that the formed interaction matrix provides a reasonable estimate of the effective parameters in the Q-system. Among the six parameters of the Q-system, the SRF and Jr parameters have the maximum and minimum impact on the system, respectively, and also the RQD and Jw parameters have the maximum and minimum impact on the system, respectively. Therefore, by developing this method, we can obtain a more accurate relation to the rock mass classification by weighting the required parameters in the Q-system.Keywords: Q-system, rock engineering system, statistical analysis, rock mass, tunnel
Procedia PDF Downloads 735610 Golden Dawn's Rhetoric on Social Networks: Populism, Xenophobia and Antisemitism
Authors: Georgios Samaras
Abstract:
New media such as Facebook, YouTube and Twitter introduced the world to a new era of instant communication. An era where online interactions could replace a lot of offline actions. Technology can create a mediated environment in which participants can communicate (one-to-one, one-to-many, and many-to-many) both synchronously and asynchronously and participate in reciprocal message exchanges. Currently, social networks are attracting similar academic attention to that of the internet after its mainstream implementation into public life. Websites and platforms are seen as the forefront of a new political change. There is a significant backdrop of previous methodologies employed to research the effects of social networks. New approaches are being developed to be able to adapt to the growth of social networks and the invention of new platforms. Golden Dawn was the first openly neo-Nazi party post World War II to win seats in the parliament of a European country. Its racist rhetoric and violent tactics on social networks were rewarded by their supporters, who in the face of Golden Dawn’s leaders saw a ‘new dawn’ in Greek politics. Mainstream media banned its leaders and members of the party indefinitely after Ilias Kasidiaris attacked Liana Kanelli, a member of the Greek Communist Party, on live television. This media ban was seen as a treasonous move by a significant percentage of voters, who believed that the system was desperately trying to censor Golden Dawn to favor mainstream parties. The shocking attack on live television received international coverage and while European countries were condemning this newly emerged neo-Nazi rhetoric, almost 7 percent of the Greek population rewarded Golden Dawn with 18 seats in the Greek parliament. Many seem to think that Golden Dawn mobilised its voters online and this approach played a significant role in spreading their message and appealing to wider audiences. No strict online censorship existed back in 2012 and although Golden Dawn was openly used neo-Nazi symbolism, it was allowed to use social networks without serious restrictions until 2017. This paper used qualitative methods to investigate Golden Dawn’s rise in social networks from 2012 to 2019. The focus of the content analysis was set on three social networking platforms: Facebook, Twitter and YouTube, while the existence of Golden Dawn’s website, which was used as a news sharing hub, was also taken into account. The content analysis included text and visual analyses that sampled content from their social networking pages to translate their political messaging through an ideological lens focused on extreme-right populism. The absence of hate speech regulations on social network platforms in 2012 allowed the free expression of those heavily ultranationalist and populist views, as they were employed by Golden Dawn in the Greek political scene. On YouTube, Facebook and Twitter, the influence of their rhetoric was particularly strong. Official channels and MPs profiles were investigated to explore the messaging in-depth and understand its ideological elements.Keywords: populism, far-right, social media, Greece, golden dawn
Procedia PDF Downloads 1485609 Angular Correlation and Independent Particle Model in Two-Electron Atomic Systems
Authors: Tokuei Sako
Abstract:
The ground and low-lying singly-excited states of He and He-like atomic ions have been studied by the Full Configuration Interaction (FCI) method focusing on the angular correlation between two electrons in the studied systems. The two-electron angle density distribution obtained by integrating the square-modulus of the FCI wave function over the coordinates other than the interelectronic angle shows a distinct trend between the singlet-triplet pair of states for different values of the nuclear charge Zn. Further, both of these singlet and triplet distributions tend to show an increasingly stronger dependence on the interelectronic angle as Zn increases, in contrast to the well-known fact that the correlation energy approaches towards zero for increasing Zn. This controversial observation has been rationalized on the basis of the recently introduced concept of so-called conjugate Fermi holes.Keywords: He-like systems, angular correlation, configuration interaction wave function, conjugate Fermi hole
Procedia PDF Downloads 4135608 Predicting Costs in Construction Projects with Machine Learning: A Detailed Study Based on Activity-Level Data
Authors: Soheila Sadeghi
Abstract:
Construction projects are complex and often subject to significant cost overruns due to the multifaceted nature of the activities involved. Accurate cost estimation is crucial for effective budget planning and resource allocation. Traditional methods for predicting overruns often rely on expert judgment or analysis of historical data, which can be time-consuming, subjective, and may fail to consider important factors. However, with the increasing availability of data from construction projects, machine learning techniques can be leveraged to improve the accuracy of overrun predictions. This study applied machine learning algorithms to enhance the prediction of cost overruns in a case study of a construction project. The methodology involved the development and evaluation of two machine learning models: Random Forest and Neural Networks. Random Forest can handle high-dimensional data, capture complex relationships, and provide feature importance estimates. Neural Networks, particularly Deep Neural Networks (DNNs), are capable of automatically learning and modeling complex, non-linear relationships between input features and the target variable. These models can adapt to new data, reduce human bias, and uncover hidden patterns in the dataset. The findings of this study demonstrate that both Random Forest and Neural Networks can significantly improve the accuracy of cost overrun predictions compared to traditional methods. The Random Forest model also identified key cost drivers and risk factors, such as changes in the scope of work and delays in material delivery, which can inform better project risk management. However, the study acknowledges several limitations. First, the findings are based on a single construction project, which may limit the generalizability of the results to other projects or contexts. Second, the dataset, although comprehensive, may not capture all relevant factors influencing cost overruns, such as external economic conditions or political factors. Third, the study focuses primarily on cost overruns, while schedule overruns are not explicitly addressed. Future research should explore the application of machine learning techniques to a broader range of projects, incorporate additional data sources, and investigate the prediction of both cost and schedule overruns simultaneously.Keywords: cost prediction, machine learning, project management, random forest, neural networks
Procedia PDF Downloads 545607 Ultrasonic Investigation as Tool for Study of Molecular Interaction of 2-Hydroxy Substituted Pyrimidine Derivative at Different Concentrations
Authors: Shradha S. Binani, P. S. Bodke, R. V. Joat
Abstract:
Recent decades have witnessed an exponential growth in the field of acoustical parameters and ultrasound on solid, liquid and gases. Ultrasonic propagation parameters yield valuable information regarding the behavior of liquid systems because intra and intermolecular association, dipolar interaction, complex formation and related structural changes affecting the compressibility of the system which in turn produces variations in the ultrasonic velocity. The acoustic and thermo dynamical parameters obtained in ultrasonic study show that ion-solvation is accompanied by the destruction or enhancement of the solvent structure. In the present paper the ultrasonic velocity (v), density (ρ), viscosity(η) have been measured for the pharmacological important compound 2-hydroxy substituted phenyl pyrimidine derivative (2-hydroxy-4-(4’-methoxy phenyl)-6-(2’-hydroxy-4’-methyl-5’-chlorophenyl)pyrimidine) in ethanol as a solvent by using different concentration at constant room temperature. These experimental data have been used to estimate physical parameter like adiabatic compressibility, intermolecular free length, relaxation time, free volume, specific acoustic impedance, relative association, Wada’s constant, Rao’s constant etc. The above parameters provide information in understanding the structural and molecular interaction between solute-solvent in the drug solution with respect to change in concentration.Keywords: acoustical parameters, ultrasonic velocity, density, viscosity, 2-hydroxy substituted phenyl pyrimidine derivative
Procedia PDF Downloads 4715606 Exploring the Effectiveness of Robotic Companions Through the Use of Symbiotic Autonomous Plant Care Robots
Authors: Angelos Kaminis, Dakotah Stirnweis
Abstract:
Advances in robotic technology have driven the development of improved robotic companions in the last couple decades. However, commercially available robotic companions lack the ability to create an emotional connection with their user. By developing a companion robot that has a symbiotic relationship with a plant, an element of co-dependency is introduced into the human companion robot dynamic. This companion robot, while theoretically capable of providing most of the plant’s needs, still requires human interaction for watering, moving obstacles, and solar panel cleaning. To facilitate the interaction between human and robot, the robot is capable of limited auditory and visual communication to help express its and the plant’s needs. This paper seeks to fully describe the Autonomous Plant Care Robot system and its symbiotic relationship with its botanical ward and the plant and robot’s dependent relationship with their owner.Keywords: symbiotic, robotics, autonomous, plant-care, companion
Procedia PDF Downloads 1445605 Mean Monthly Rainfall Prediction at Benina Station Using Artificial Neural Networks
Authors: Hasan G. Elmazoghi, Aisha I. Alzayani, Lubna S. Bentaher
Abstract:
Rainfall is a highly non-linear phenomena, which requires application of powerful supervised data mining techniques for its accurate prediction. In this study the Artificial Neural Network (ANN) technique is used to predict the mean monthly historical rainfall data collected from BENINA station in Benghazi for 31 years, the period of “1977-2006” and the results are compared against the observed values. The specific objective to achieve this goal was to determine the best combination of weather variables to be used as inputs for the ANN model. Several statistical parameters were calculated and an uncertainty analysis for the results is also presented. The best ANN model is then applied to the data of one year (2007) as a case study in order to evaluate the performance of the model. Simulation results reveal that application of ANN technique is promising and can provide reliable estimates of rainfall.Keywords: neural networks, rainfall, prediction, climatic variables
Procedia PDF Downloads 4885604 Link People from Different Age Together: Attitude and Behavior Changes in Inter-Generational Interaction Program
Authors: Qian Sun, Dannie Dai, Vivian Lou
Abstract:
Background: Changes in population structure and modernization have left traditional channels of achieving intergenerational solidarity in crisis. Policies and projects purposefully structuring intergenerational interaction are regarded as effective ways to enhance positive attitude changes between generations. However, few inter-generational interaction program has put equal emphasis on promoting positive changes on both attitude and behavior across generational groups. Objective: This study evaluated the effectiveness of an intergenerational interaction program which aims to facilitate positive attitude and behavioral interaction between both young and old individuals in Hong Kong. Method: A quasi-experimental design was adopted with the sample of 150 older participants and 161 young participants. Among 73 older and 78 young participants belong to experiment groups while 77 older participants and 84 young participants belong to control groups. The Age Group Evaluation and Description scale (AGED) was adopted to measure attitude toward young people by older participants and the Chinese version of Kogan’s Attitude towards Older People (KAOP) as well as Polizzi’s refined version of the Ageing Semantic Differential Scale (ASD) were used to measure attitude toward older people by the younger generation. The interpersonal behaviour of participants was assessed using Beglgrave’s behavioural observation tool. Six primary verbal or non-verbal interpersonal behaviours including smiles, looks, touches, encourages, initiated conversations and assists were identified and observed. Findings Effectiveness of attitude and behavior changes on both younger and older participants was confirmed in results. Compared with participants from the control group, experimental participants of elderly showed significant positive changes of attitudes toward the younger generation as assessed by AGED (F=138.34, p < .001). Moreover, older participants showed significant positive changes on three out of six behaviours (visual attention: t=2.26, p<0.05; initiate conversation: t=3.42, p<0.01; and touch: t=2.28, p<0.05). For younger participants, participants from experimental group showed significant positive changes in attitude toward older people (with F-score of 47.22 for KAOP and 72.75 for ASD, p<.001). Young participants also showed significant positive changes in two out of six behaviours (visual attention: t=3.70, p<0.01; initiate conversation: t=2.04, p<0.001). There is no significant relationship between attitude change and behaviour change in both older (p=0.86) and younger (p=0.22) groups. Conclusion: This study has brought practical implications for social work. The effective model of this program could assist social workers and allied professionals to design relevant projects for nurture intergenerational solidarity. Furthermore, insignificant results between attitude and behavior changes revealed that attitude change was not a strong predictor for behavior change, hence, intergenerational programs against age-stereotype should put equal emphasis on both attitudinal and behavioral aspects.Keywords: attitude and behaviour changes, intergenerational interaction, intergenerational solidarity, program design
Procedia PDF Downloads 2435603 Understanding Health Behavior Using Social Network Analysis
Authors: Namrata Mishra
Abstract:
Health of a person plays a vital role in the collective health of his community and hence the well-being of the society as a whole. But, in today’s fast paced technology driven world, health issues are increasingly being associated with human behaviors – their lifestyle. Social networks have tremendous impact on the health behavior of individuals. Many researchers have used social network analysis to understand human behavior that implicates their social and economic environments. It would be interesting to use a similar analysis to understand human behaviors that have health implications. This paper focuses on concepts of those behavioural analyses that have health implications using social networks analysis and provides possible algorithmic approaches. The results of these approaches can be used by the governing authorities for rolling out health plans, benefits and take preventive measures, while the pharmaceutical companies can target specific markets, helping health insurance companies to better model their insurance plans.Keywords: breadth first search, directed graph, health behaviors, social network analysis
Procedia PDF Downloads 4715602 Modulation of Receptor-Activation Due to Hydrogen Bond Formation
Authors: Sourav Ray, Christoph Stein, Marcus Weber
Abstract:
A new class of drug candidates, initially derived from mathematical modeling of ligand-receptor interactions, activate the μ-opioid receptor (MOR) preferentially at acidic extracellular pH-levels, as present in injured tissues. This is of commercial interest because it may preclude the adverse effects of conventional MOR agonists like fentanyl, which include but are not limited to addiction, constipation, sedation, and apnea. Animal studies indicate the importance of taking the pH value of the chemical environment of MOR into account when designing new drugs. Hydrogen bonds (HBs) play a crucial role in stabilizing protein secondary structure and molecular interaction, such as ligand-protein interaction. These bonds may depend on the pH value of the chemical environment. For the MOR, antagonist naloxone and agonist [D-Ala2,N-Me-Phe4,Gly5-ol]-enkephalin (DAMGO) form HBs with ionizable residue HIS 297 at physiological pH to modulate signaling. However, such interactions were markedly reduced at acidic pH. Although fentanyl-induced signaling is also diminished at acidic pH, HBs with HIS 297 residue are not observed at either acidic or physiological pH for this strong agonist of the MOR. Molecular dynamics (MD) simulations can provide greater insight into the interaction between the ligand of interest and the HIS 297 residue. Amino acid protonation states are adjusted to the model difference in system acidity. Unbiased and unrestrained MD simulations were performed, with the ligand in the proximity of the HIS 297 residue. Ligand-receptor complexes were embedded in 1-palmitoyl-2-oleoyl-sn glycero-3-phosphatidylcholine (POPC) bilayer to mimic the membrane environment. The occurrence of HBs between the different ligands and the HIS 297 residue of MOR at acidic and physiological pH values were tracked across the various simulation trajectories. No HB formation was observed between fentanyl and HIS 297 residue at either acidic or physiological pH. Naloxone formed some HBs with HIS 297 at pH 5, but no such HBs were noted at pH 7. Interestingly, DAMGO displayed an opposite yet more pronounced HB formation trend compared to naloxone. Whereas a marginal number of HBs could be observed at even pH 5, HBs with HIS 297 were more stable and widely present at pH 7. The HB formation plays no and marginal role in the interaction of fentanyl and naloxone, respectively, with the HIS 297 residue of MOR. However, HBs play a significant role in the DAMGO and HIS 297 interaction. Post DAMGO administration, these HBs might be crucial for the remediation of opioid tolerance and restoration of opioid sensitivity. Although experimental studies concur with our observations regarding the influence of HB formation on the fentanyl and DAMGO interaction with HIS 297, the same could not be conclusively stated for naloxone. Therefore, some other supplementary interactions might be responsible for the modulation of the MOR activity by naloxone binding at pH 7 but not at pH 5. Further elucidation of the mechanism of naloxone action on the MOR could assist in the formulation of cost-effective naloxone-based treatment of opioid overdose or opioid-induced side effects.Keywords: effect of system acidity, hydrogen bond formation, opioid action, receptor activation
Procedia PDF Downloads 1755601 Construction Unit Rate Factor Modelling Using Neural Networks
Authors: Balimu Mwiya, Mundia Muya, Chabota Kaliba, Peter Mukalula
Abstract:
Factors affecting construction unit cost vary depending on a country’s political, economic, social and technological inclinations. Factors affecting construction costs have been studied from various perspectives. Analysis of cost factors requires an appreciation of a country’s practices. Identified cost factors provide an indication of a country’s construction economic strata. The purpose of this paper is to identify the essential factors that affect unit cost estimation and their breakdown using artificial neural networks. Twenty-five (25) identified cost factors in road construction were subjected to a questionnaire survey and employing SPSS factor analysis the factors were reduced to eight. The 8 factors were analysed using the neural network (NN) to determine the proportionate breakdown of the cost factors in a given construction unit rate. NN predicted that political environment accounted 44% of the unit rate followed by contractor capacity at 22% and financial delays, project feasibility, overhead and profit each at 11%. Project location, material availability and corruption perception index had minimal impact on the unit cost from the training data provided. Quantified cost factors can be incorporated in unit cost estimation models (UCEM) to produce more accurate estimates. This can create improvements in the cost estimation of infrastructure projects and establish a benchmark standard to assist the process of alignment of work practises and training of new staff, permitting the on-going development of best practises in cost estimation to become more effective.Keywords: construction cost factors, neural networks, roadworks, Zambian construction industry
Procedia PDF Downloads 3645600 Using Self Organizing Feature Maps for Classification in RGB Images
Authors: Hassan Masoumi, Ahad Salimi, Nazanin Barhemmat, Babak Gholami
Abstract:
Artificial neural networks have gained a lot of interest as empirical models for their powerful representational capacity, multi input and output mapping characteristics. In fact, most feed-forward networks with nonlinear nodal functions have been proved to be universal approximates. In this paper, we propose a new supervised method for color image classification based on self organizing feature maps (SOFM). This algorithm is based on competitive learning. The method partitions the input space using self-organizing feature maps to introduce the concept of local neighborhoods. Our image classification system entered into RGB image. Experiments with simulated data showed that separability of classes increased when increasing training time. In additional, the result shows proposed algorithms are effective for color image classification.Keywords: classification, SOFM algorithm, neural network, neighborhood, RGB image
Procedia PDF Downloads 4785599 The Role of Context in Interpreting Emotional Body Language in Robots
Authors: Jekaterina Novikova, Leon Watts
Abstract:
In the emerging world of human-robot interaction, people and robots will interact socially in real-world situations. This paper presents the results of an experimental study probing the interaction between situational context and emotional body language in robots. 34 people rated video clips of robots performing expressive behaviours in different situational contexts both for emotional expressivity on Valence-Arousal-Dominance dimensions and by selecting a specific emotional term from a list of suggestions. Results showed that a contextual information enhanced a recognition of emotional body language of a robot, although it did not override emotional signals provided by robot expressions. Results are discussed in terms of design guidelines on how an emotional body language of a robot can be used by roboticists developing social robots.Keywords: social robotics, non-verbal communication, situational context, artificial emotions, body language
Procedia PDF Downloads 2895598 Regression of Hand Kinematics from Surface Electromyography Data Using an Long Short-Term Memory-Transformer Model
Authors: Anita Sadat Sadati Rostami, Reza Almasi Ghaleh
Abstract:
Surface electromyography (sEMG) offers important insights into muscle activation and has applications in fields including rehabilitation and human-computer interaction. The purpose of this work is to predict the degree of activation of two joints in the index finger using an LSTM-Transformer architecture trained on sEMG data from the Ninapro DB8 dataset. We apply advanced preprocessing techniques, such as multi-band filtering and customizable rectification methods, to enhance the encoding of sEMG data into features that are beneficial for regression tasks. The processed data is converted into spike patterns and simulated using Leaky Integrate-and-Fire (LIF) neuron models, allowing for neuromorphic-inspired processing. Our findings demonstrate that adjusting filtering parameters and neuron dynamics and employing the LSTM-Transformer model improves joint angle prediction performance. This study contributes to the ongoing development of deep learning frameworks for sEMG analysis, which could lead to improvements in motor control systems.Keywords: surface electromyography, LSTM-transformer, spiking neural networks, hand kinematics, leaky integrate-and-fire neuron, band-pass filtering, muscle activity decoding
Procedia PDF Downloads 75597 Metal-Based Anticancer Agents: In vitro DNA Binding, Cleavage and Cytotoxicity
Authors: Mala Nath, Nagamani Kompelli, Partha Roy, Snehasish Das
Abstract:
Two new metal-based anticancer chemotherapeutic agents, [(Ph2Sn)2(HGuO)2(phen)Cl2] 1 and [(Ph3Sn)(HGuO)(phen)]- Cl.CH3OH.H2O 2, were designed, prepared and characterized by analytical and spectral (IR, ESI-Mass, 1H, 13C and 119Sn NMR) techniques. The proposed geometry of Sn(IV) in 1 and 2 is distorted octahedral and distorted trigonal-bipyramidal, respectively. Both 1 and 2 exhibit potential cytotoxicity in vitro against MCF-7, HepG-2 and DU-145 cell lines. The intrinsic binding constant (Kb) values of 1 (2.33 × 105 M-1) and 2 (2.46 × 105 M-1) evaluated from UV-Visible absorption studies suggest non-classical electrostatic mode of interaction via phosphate backbone of DNA double helix. The Stern-Volmer quenching constant (Ksv) of 1 (9.74 × 105 M-1) and 2 (2.9 × 106 M-1) determined by fluorescence studies suggests the groove binding and intercalation mode for 1 and 2, respectively. Effective cleavage of pBR322 DNA is induced by 1. Their interaction with DNA of cancer cells may account for potency.Keywords: anticancer agents, DNA binding studies, NMR spectroscopy, organotin
Procedia PDF Downloads 2575596 Axial Flux Permanent Magnet Motor Design and Optimization by Using Artificial Neural Networks
Authors: Tugce Talay, Kadir Erkan
Abstract:
In this study, the necessary steps for the design of axial flow permanent magnet motors are shown. The design and analysis of the engine were carried out based on ANSYS Maxwell program. The design parameters of the ANSYS Maxwell program and the artificial neural network system were established in MATLAB and the most efficient design parameters were found with the trained neural network. The results of the Maxwell program and the results of the artificial neural networks are compared and optimal working design parameters are found. The most efficient design parameters were submitted to the ANSYS Maxwell 3D design and the cogging torque was examined and design studies were carried out to reduce the cogging torque.Keywords: AFPM, ANSYS Maxwell, cogging torque, design optimisation, efficiency, NNTOOL
Procedia PDF Downloads 2205595 Facial Emotion Recognition with Convolutional Neural Network Based Architecture
Authors: Koray U. Erbas
Abstract:
Neural networks are appealing for many applications since they are able to learn complex non-linear relationships between input and output data. As the number of neurons and layers in a neural network increase, it is possible to represent more complex relationships with automatically extracted features. Nowadays Deep Neural Networks (DNNs) are widely used in Computer Vision problems such as; classification, object detection, segmentation image editing etc. In this work, Facial Emotion Recognition task is performed by proposed Convolutional Neural Network (CNN)-based DNN architecture using FER2013 Dataset. Moreover, the effects of different hyperparameters (activation function, kernel size, initializer, batch size and network size) are investigated and ablation study results for Pooling Layer, Dropout and Batch Normalization are presented.Keywords: convolutional neural network, deep learning, deep learning based FER, facial emotion recognition
Procedia PDF Downloads 2745594 Neural Network Mechanisms Underlying the Combination Sensitivity Property in the HVC of Songbirds
Authors: Zeina Merabi, Arij Dao
Abstract:
The temporal order of information processing in the brain is an important code in many acoustic signals, including speech, music, and animal vocalizations. Despite its significance, surprisingly little is known about its underlying cellular mechanisms and network manifestations. In the songbird telencephalic nucleus HVC, a subset of neurons shows temporal combination sensitivity (TCS). These neurons show a high temporal specificity, responding differently to distinct patterns of spectral elements and their combinations. HVC neuron types include basal-ganglia-projecting HVCX, forebrain-projecting HVCRA, and interneurons (HVC¬INT), each exhibiting distinct cellular, electrophysiological and functional properties. In this work, we develop conductance-based neural network models connecting the different classes of HVC neurons via different wiring scenarios, aiming to explore possible neural mechanisms that orchestrate the combination sensitivity property exhibited by HVCX, as well as replicating in vivo firing patterns observed when TCS neurons are presented with various auditory stimuli. The ionic and synaptic currents for each class of neurons that are presented in our networks and are based on pharmacological studies, rendering our networks biologically plausible. We present for the first time several realistic scenarios in which the different types of HVC neurons can interact to produce this behavior. The different networks highlight neural mechanisms that could potentially help to explain some aspects of combination sensitivity, including 1) interplay between inhibitory interneurons’ activity and the post inhibitory firing of the HVCX neurons enabled by T-type Ca2+ and H currents, 2) temporal summation of synaptic inputs at the TCS site of opposing signals that are time-and frequency- dependent, and 3) reciprocal inhibitory and excitatory loops as a potent mechanism to encode information over many milliseconds. The result is a plausible network model characterizing auditory processing in HVC. Our next step is to test the predictions of the model.Keywords: combination sensitivity, songbirds, neural networks, spatiotemporal integration
Procedia PDF Downloads 655593 The Effective Use of the Network in the Distributed Storage
Authors: Mamouni Mohammed Dhiya Eddine
Abstract:
This work aims at studying the exploitation of high-speed networks of clusters for distributed storage. Parallel applications running on clusters require both high-performance communications between nodes and efficient access to the storage system. Many studies on network technologies led to the design of dedicated architectures for clusters with very fast communications between computing nodes. Efficient distributed storage in clusters has been essentially developed by adding parallelization mechanisms so that the server(s) may sustain an increased workload. In this work, we propose to improve the performance of distributed storage systems in clusters by efficiently using the underlying high-performance network to access distant storage systems. The main question we are addressing is: do high-speed networks of clusters fit the requirements of a transparent, efficient and high-performance access to remote storage? We show that storage requirements are very different from those of parallel computation. High-speed networks of clusters were designed to optimize communications between different nodes of a parallel application. We study their utilization in a very different context, storage in clusters, where client-server models are generally used to access remote storage (for instance NFS, PVFS or LUSTRE). Our experimental study based on the usage of the GM programming interface of MYRINET high-speed networks for distributed storage raised several interesting problems. Firstly, the specific memory utilization in the storage access system layers does not easily fit the traditional memory model of high-speed networks. Secondly, client-server models that are used for distributed storage have specific requirements on message control and event processing, which are not handled by existing interfaces. We propose different solutions to solve communication control problems at the filesystem level. We show that a modification of the network programming interface is required. Data transfer issues need an adaptation of the operating system. We detail several propositions for network programming interfaces which make their utilization easier in the context of distributed storage. The integration of a flexible processing of data transfer in the new programming interface MYRINET/MX is finally presented. Performance evaluations show that its usage in the context of both storage and other types of applications is easy and efficient.Keywords: distributed storage, remote file access, cluster, high-speed network, MYRINET, zero-copy, memory registration, communication control, event notification, application programming interface
Procedia PDF Downloads 219