Search results for: mental health detection
11713 Advanced Machine Learning Algorithm for Credit Card Fraud Detection
Authors: Manpreet Kaur
Abstract:
When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card
Procedia PDF Downloads 11911712 A Review of Brain Implant Device: Current Developments and Applications
Authors: Ardiansyah I. Ryan, Ashsholih K. R., Fathurrohman G. R., Kurniadi M. R., Huda P. A
Abstract:
The burden of brain-related disease is very high. There are a lot of brain-related diseases with limited treatment result and thus raise the burden more. The Parkinson Disease (PD), Mental Health Problem, or Paralysis of extremities treatments had risen concern, as the patients for those diseases usually had a low quality of life and low chance to recover fully. There are also many other brain or related neural diseases with the similar condition, mainly the treatments for those conditions are still limited as our understanding of the brain function is insufficient. Brain Implant Technology had given hope to help in treating this condition. In this paper, we examine the current update of the brain implant technology. Neurotechnology is growing very rapidly worldwide. The United States Food and Drug Administration (FDA) has approved the use of Deep Brain Stimulation (DBS) as a brain implant in humans. As for neural implant both the cochlear implant and retinal implant are approved by FDA too. All of them had shown a promising result. DBS worked by stimulating a specific region in the brain with electricity. This device is planted surgically into a very specific region of the brain. This device consists of 3 main parts: Lead (thin wire inserted into the brain), neurostimulator (pacemaker-like device, planted surgically in the chest) and an external controller (to turn on/off the device by patient/programmer). FDA had approved DBS for the treatment of PD, Pain Management, Epilepsy and Obsessive Compulsive Disorder (OCD). The target treatment of DBS in PD is to reduce the tremor and dystonia symptoms. DBS has been showing the promising result in animal and limited human trial for other conditions such as Alzheimer, Mental Health Problem (Major Depression, Tourette Syndrome), etc. Every surgery has risks of complications, although in DBS the chance is very low. DBS itself had a very satisfying result as long as the subject criteria to be implanted this device based on indication and strictly selection. Other than DBS, there are several brain implant devices that still under development. It was included (not limited to) implant to treat paralysis (In Spinal Cord Injury/Amyotrophic Lateral Sclerosis), enhance brain memory, reduce obesity, treat mental health problem and treat epilepsy. The potential of neurotechnology is unlimited. When brain function and brain implant were fully developed, it may be one of the major breakthroughs in human history like when human find ‘fire’ for the first time. Support from every sector for further research is very needed to develop and unveil the true potential of this technology.Keywords: brain implant, deep brain stimulation (DBS), deep brain stimulation, Parkinson
Procedia PDF Downloads 15711711 Health Trajectory Clustering Using Deep Belief Networks
Authors: Farshid Hajati, Federico Girosi, Shima Ghassempour
Abstract:
We present a Deep Belief Network (DBN) method for clustering health trajectories. Deep Belief Network (DBN) is a deep architecture that consists of a stack of Restricted Boltzmann Machines (RBM). In a deep architecture, each layer learns more complex features than the past layers. The proposed method depends on DBN in clustering without using back propagation learning algorithm. The proposed DBN has a better a performance compared to the deep neural network due the initialization of the connecting weights. We use Contrastive Divergence (CD) method for training the RBMs which increases the performance of the network. The performance of the proposed method is evaluated extensively on the Health and Retirement Study (HRS) database. The University of Michigan Health and Retirement Study (HRS) is a nationally representative longitudinal study that has surveyed more than 27,000 elderly and near-elderly Americans since its inception in 1992. Participants are interviewed every two years and they collect data on physical and mental health, insurance coverage, financial status, family support systems, labor market status, and retirement planning. The dataset is publicly available and we use the RAND HRS version L, which is easy to use and cleaned up version of the data. The size of sample data set is 268 and the length of the trajectories is equal to 10. The trajectories do not stop when the patient dies and represent 10 different interviews of live patients. Compared to the state-of-the-art benchmarks, the experimental results show the effectiveness and superiority of the proposed method in clustering health trajectories.Keywords: health trajectory, clustering, deep learning, DBN
Procedia PDF Downloads 37711710 Clothing as Cure: Dress as Moral Treatment in Psychiatry
Authors: Dorothy Chyung
Abstract:
In the psychiatric interview, the mental status exam begins with an assessment of the patient's appearance, noting aspects such as grooming and hygiene. However, it is not well established whether further examination of a patient's attire can provide further useful information. The popular assumption is that those who are mentally unwell will manifest this in unusual clothing. In the moral treatment of the 19th century, proper clothing was also seen as a pivotal therapeutic concern. This project examines assumptions about clothing, both as a reflection of and treatment for psychopathology. The methodology considers the opinions expressed in 19th century art and journals, as well as asylum rules, in comparison to contemporary psychiatric practice and research evidence. Per moral treatment in the 19th century, self-discipline and a proper environment would cure insanity. Madness was evident in the opposite of these ideals—such as ragged or ‘improper’ clothing—and rules about attire delineated the most correct (i.e. sane) ways to dress. These rules applied not only for the patients but also for staff. Despite these ideals, accusations were made that asylums, in fact, dressed patients to look more mentally unwell and further removed patients’ agency. Current practice in psychiatric hospitals retains remnants of moral treatment. Patients are expected to dress ‘appropriately’ while retaining some choice to build self-esteem, with arguments about safety being used to justify the removal of choice. Meanwhile, staff is expected to dress professionally and as role models, based on the assumption that conservative dress is least pathological. Research on this subject is limited, and there is little evidence that discrete psychiatric diagnoses manifest in the particular dress, nor that conservative dress would result in a reduction in pathology. Dressing unusually has become a privilege granted only to those without association with mental illness.Keywords: fashion, history of psychiatry, medical humanities, mental health treatment
Procedia PDF Downloads 22211709 Self-Esteem, Self-Efficacy and Psychological Distress among the High School Teachers in Afghanistan
Authors: Mustafa Jahanara
Abstract:
The purpose of the research was to study the relationship between self-esteem, self-Efficacy with psychological distress in the high school teachers. A total of 245 teachers (92 male and 153 female) in the high school of Kabul and Mazar-e-Sharif from Afghanistan completed inventories General Self-Efficacy, Rosenberg Self-Esteem Scale, and General Health Questionnaire-12 and that assessed their Self-Efficacy, self-esteem with psychological distress. Correlational analysis showed that self-efficacy and self-esteem were significantly and positively correlated with each other. The results of the study indicated that psychological distress is negatively related to self-esteem, and self-efficacy. However, the findings suggest that self-esteem, and self-efficacy could influence on mental health.Keywords: high school teachers, self-esteem, self-efficacy, psychological distress
Procedia PDF Downloads 37911708 Mental Health and Secondary Trauma in Service Providers Working with Refugees
Authors: Marko Živanović, Jovana Bjekić, Maša Vukčević Marković
Abstract:
Professionals and volunteers involved in refugee protection and support are on a daily basis faced with people who have experienced numerous traumatic experiences and, as such, are subjected to secondary traumatization (ST). The aim of this study was to provide insight into risk factors for ST in helpers working with refugees in Serbia. A total of 175 participants working with refugees fulfilled: Secondary Traumatization Questionnaire, checklist of refugees’ traumatic experiences, Hopkins Symptoms Checklist (HSCL) assessing depression and anxiety symptoms, quality of life questionnaire (MANSA), HEXACO personality inventory, and COPE assessing coping mechanisms. In addition, participants provided information on work-related problems. Qualitative analysis of answers to the question about most difficult part of their job has shown that burnout-related issues are clustered around three recurrent topics that can be considered as the most prominent generators of stress, namely: ‘lack of organization and cooperation’, ‘not been able to do enough’, and ‘hard to take it and to process it’. Factor analysis (Maximum likelihood extraction, Promax rotation) have shown that ST comprises of two correlated factors (r = .533, p < .01), namely Psychological deficits and Intrusions. Results have shown that risk factor for ST could be find in three interrelated sources: 1) work-related problems; 2) personality-related risk factors and 3) clients’ traumatic experiences. Among personality related factors, it was shown that risk factor for Intrusions could be find in – high Emotionality (β = .221, p < .05), and Altruism (β = .322, p < .01), while low Extraversion (β = -.365, p < .01) represents risk factor for Psychological deficits. In addition, usage of maladaptive coping mechanisms –mental disengagement (r = .253, p < .01), behavioral disengagement (r = .274, p < .01), focusing on distress and venting of emotions (r = .220, p < .05), denial (r = .164, p < .05), and substance use (r = .232, p < .01) correlate with Psychological deficits while Intrusions corelate with Mental disengagement (r = .251, p < .01) and denial (r = .183, p < .05). Regarding clients’ traumatic experiences it was shown that both quantity of traumatic events in country of origin (for Deficits r = .226, p < .01; for Intrusions r = .174, p < .05) and in transit (for Deficits r = .288, p < .01), as well as certain content-related features of such experiences (especially experiences which are severely dislocated from ‘everyday reality’) are related to ST. In addition, Psychological deficits and Intrusions have shown to be accompanied by symptoms of depression (r = .760, p < .01; r = .552, p < .01) and anxiety (r = .740, p < .01; r = .447, p < .01) and overall lower life quality (r = -.454, p < .01; r = .256, p < .01). Results indicate that psychological vulnerability of persons who are working with traumatized individuals can be found in certain personality traits, and usage of maladaptive coping mechanisms, which disable one to deal with work-related issues, and to cope with quantity and quality of traumatic experiences they were faced with, affecting ones’ psychological well-being. Acknowledgement: This research was funded by IRC Serbia.Keywords: mental health, refugees, secondary traumatization, traumatic experiences
Procedia PDF Downloads 24111707 Real-Time Automated Detection of Violent Content in Animated Cartoons Using YOLOv9
Authors: Omaima Jbara, Mohame Amine Omrani, Mounir Zrigui
Abstract:
The detection of violent content in animated cartoons is anessential step toward safeguarding young audiences and promoting responsible media consumption. This study introduces an automated approach to identify violent scenes in cartoons using advanced object detection models. A custom dataset comprising 1,200 frames was curated from various animated sources, focusing on four key classes: Explosion, Blood, Fight, and Gunshot. Data augmentation techniques, including rotation, scaling, and color adjustments, expanded the dataset to 2,000 frames, enhancing diversity and model generalization. YOLO versions 8, 9, and 10 were trained and evaluated on this dataset. Among these, YOLOv9 achieved the highest performance with a mean Average Precision (mAP) of 94%, demonstrating superior accuracy and robustness. These findings highlight YOLOv9’s potential as a reliable tool for detecting violent content in animated media, contributing to the development of effective content moderation systems.Keywords: cartoon violence detection, YOLO model, computer Vi sion, Real-time content analysis
Procedia PDF Downloads 1311706 Duplex Real-Time Loop-Mediated Isothermal Amplification Assay for Simultaneous Detection of Beef and Pork
Authors: Mi-Ju Kim, Hae-Yeong Kim
Abstract:
Product mislabeling and adulteration have been increasing the concerns in processed meat products. Relatively inexpensive pork meat compared to meat such as beef was adulterated for economic benefit. These food fraud incidents related to pork were concerned due to economic, religious and health reasons. In this study, a rapid on-site detection method using loop-mediated isothermal amplification (LAMP) was developed for the simultaneous identification of beef and pork. Each specific LAMP primer for beef and pork was designed targeting on mitochondrial D-loop region. The LAMP assay reaction was performed at 65 ℃ for 40 min. The specificity of each primer for beef and pork was evaluated using DNAs extracted from 13 animal species including beef and pork. The sensitivity of duplex LAMP assay was examined by serial dilution of beef and pork DNAs, and reference binary mixtures. This assay was applied to processed meat products including beef and pork meat for monitoring. Each set of primers amplified only the targeted species with no cross-reactivity with animal species. The limit of detection of duplex real-time LAMP was 1 pg for each DNA of beef and pork and 1% pork in a beef-meat mixture. Commercial meat products that declared the presence of beef and/or pork meat on the label showed positive results for those species. This method was successfully applied to detect simultaneous beef and pork meats in processed meat products. The optimized duplex LAMP assay can identify simultaneously beef and pork meat within less than 40 min. A portable real-time fluorescence device used in this study is applicable for on-site detection of beef and pork in processed meat products. Thus, this developed assay was considered to be an efficient tool for monitoring meat products.Keywords: beef, duplex real-time LAMP, meat identification, pork
Procedia PDF Downloads 22711705 MAS Capped CdTe/ZnS Core/Shell Quantum Dot Based Sensor for Detection of Hg(II)
Authors: Dilip Saikia, Suparna Bhattacharjee, Nirab Adhikary
Abstract:
In this piece of work, we have presented the synthesis and characterization of CdTe/ZnS core/shell (CS) quantum dots (QD). CS QDs are used as a fluorescence probe to design a simple cost-effective and ultrasensitive sensor for the detection of toxic Hg(II) in an aqueous medium. Mercaptosuccinic acid (MSA) has been used as a capping agent for the synthesis CdTe/ZnS CS QD. Photoluminescence quenching mechanism has been used in the detection experiment of Hg(II). The designed sensing technique shows a remarkably low detection limit of about 1 picomolar (pM). Here, the CS QDs are synthesized by a simple one-pot aqueous method. The synthesized CS QDs are characterized by using advanced diagnostics tools such as UV-vis, Photoluminescence, XRD, FTIR, TEM and Zeta potential analysis. The interaction between CS QDs and the Hg(II) ions results in the quenching of photoluminescence (PL) intensity of QDs, via the mechanism of excited state electron transfer. The proposed mechanism is explained using cyclic voltammetry and zeta potential analysis. The designed sensor is found to be highly selective towards Hg (II) ions. The analysis of the real samples such as drinking water and tap water has been carried out and the CS QDs show remarkably good results. Using this simple sensing method we have designed a prototype low-cost electronic device for the detection of Hg(II) in an aqueous medium. The findings of the experimental results of the designed sensor is crosschecked by using AAS analysis.Keywords: photoluminescence, quantum dots, quenching, sensor
Procedia PDF Downloads 26911704 Enhanced Traffic Light Detection Method Using Geometry Information
Authors: Changhwan Choi, Yongwan Park
Abstract:
In this paper, we propose a method that allows faster and more accurate detection of traffic lights by a vision sensor during driving, DGPS is used to obtain physical location of a traffic light, extract from the image information of the vision sensor only the traffic light area at this location and ascertain if the sign is in operation and determine its form. This method can solve the problem in existing research where low visibility at night or reflection under bright light makes it difficult to recognize the form of traffic light, thus making driving unstable. We compared our success rate of traffic light recognition in day and night road environments. Compared to previous researches, it showed similar performance during the day but 50% improvement at night.Keywords: traffic light, intelligent vehicle, night, detection, DGPS
Procedia PDF Downloads 32911703 Quantum Dot Biosensing for Advancing Precision Cancer Detection
Authors: Sourav Sarkar, Manashjit Gogoi
Abstract:
In the evolving landscape of cancer diagnostics, optical biosensing has emerged as a promising tool due to its sensitivity and specificity. This study explores the potential of CdS/ZnS core-shell quantum dots (QDs) capped with 3-Mercaptopropionic acid (3-MPA), which aids in the linking chemistry of QDs to various cancer antibodies. The QDs, with their unique optical and electronic properties, have been integrated into the biosensor design. Their high quantum yield and size-dependent emission spectra have been exploited to improve the sensor’s detection capabilities. The study presents the design of this QD-enhanced optical biosensor. The use of these QDs can also aid multiplexed detection, enabling simultaneous monitoring of different cancer biomarkers. This innovative approach holds significant potential for advancing cancer diagnostics, contributing to timely and accurate detection. Future work will focus on optimizing the biosensor design for clinical applications and exploring the potential of QDs in other biosensing applications. This study underscores the potential of integrating nanotechnology and biosensing for cancer research, paving the way for next-generation diagnostic tools. It is a step forward in our quest for achieving precision oncology.Keywords: quantum dots, biosensing, cancer, device
Procedia PDF Downloads 6111702 Qualitative Narrative Framework as Tool for Reduction of Stigma and Prejudice
Authors: Anastasia Schnitzer, Oliver Rehren
Abstract:
Mental health has become an increasingly important topic in society in recent years, not least due to the challenges posed by the corona pandemic. Along with this, the public has become more and more aware that a lack of enlightenment and proper coping mechanisms may result in a notable risk to develop mental disorders. Yet, there are still many biases against those affected, which are further connected to issues of stigmatization and societal exclusion. One of the main strategies to combat these forms of prejudice and stigma is to induce intergroup contact. More specifically, the Intergroup Contact Theory states engaging in certain types of contact with members of marginalized groups may be an effective way to improve attitudes towards these groups. However, due to the persistent prejudice and stigmatization, affected individuals often do not dare to speak openly about their mental disorders, so that intergroup contact often goes unnoticed. As a result, many people only experience conscious contact with individuals with a mental disorder through media. As an analogy to the Intergroup Contact Theory, the Parasocial Contact Hypothesis proposes that repeatedly being exposed to positive media representations of outgroup members can lead to a reduction of negative prejudices and attitudes towards this outgroup. While there is a growing body of research on the merit of this mechanism, measurements often only consist of 'positive' or 'negative' parasocial contact conditions (or examine the valence or quality of the previous contact with the outgroup); meanwhile, more specific conditions are often neglected. The current study aims to tackle this shortcoming. By scrutinizing the potential of contemporary series as a narrative framework of high quality, we strive to elucidate more detailed aspects of beneficial parasocial contact -for the sake of reducing prejudice and stigma towards individuals with mental disorders. Thus, a two-factorial between-subject online panel study with three measurement points was conducted (N = 95). Participants were randomly assigned to one of two groups, having to watch episodes of either a series with a narrative framework of high (Quality-TV) or low quality (Continental-TV), with one-week interval in-between the episodes. Suitable series were determined with the help of a pretest. Prejudice and stigma towards people with mental disorders were measured at the beginning of the study, before and after each episode, and in a final follow-up one week after the last two episodes. Additionally, parasocial interaction (PSI), quality of contact (QoC), and transportation were measured several times. Based on these data, multivariate multilevel analyses were performed in R using the lavaan package. Latent growth models showed moderate to high increases in QoC and PSI as well as small to moderate decreases in stigma and prejudice over time. Multilevel path analysis with individual and group levels further revealed that a qualitative narrative framework leads to a higher quality of contact experience, which then leads to lower prejudice and stigma, with effects ranging from moderate to high.Keywords: prejudice, quality of contact, parasocial contact, narrative framework
Procedia PDF Downloads 8811701 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 40611700 Perception of Quality of Life and Self-Assessed Health in Patients Undergoing Haemodialysis
Authors: Magdalena Barbara Kaziuk, Waldemar Kosiba
Abstract:
Introduction: Despite the development of technologies and improvements in the interior of dialysis stations, dialysis remains an unpleasant procedure, difficult to accept by the patients (who undergo it 2 to 3 times a week, a single treatment lasting several hours). Haemodialysis is one of the renal replacement therapies, in Poland most commonly used in patients with chronic or acute kidney failure. Purpose: An attempt was made to evaluate the quality of life in haemodialysed patients using the WHOQOL-BREF questionnaire. Material and methods: The study covered 422 patients (200 women and 222 men, aged 60.5 ± 12.9 years) undergoing dialysis at three selected stations in Poland. The patients were divided into 2 groups, depending on the duration of their dialysis treatment. The evaluation was conducted with the WHOQOL-BREF questionnaire containing 26 questions analysing 4 areas of life, as well as the perception of the quality of life and health self-assessment. A 5-point scale is used to answer them. The maximum score in each area is 20 points. The results in individual areas have a positive direction. Results: In patients undergoing dialysis for more than 3 years, a reduction in the quality of life was found in the physical area and in their environment versus a group of patients undergoing dialysis for less than 3 years, where a reduced quality of life was found in the areas of social relations and mental well-being (p < 0.05). A significant correlation (p < 0.01) between the two groups was found in self-perceived general health, while no significant differences were observed in the general perception of the quality of life (p > 0.05). Conclusions: The study confirmed that in patients undergoing dialysis for more than three years, the quality of life is especially reduced in their environment (access to and quality of healthcare, financial resources, and mental and physical safety). The assessment of the quality of life should form a part of the therapeutic process, in which the role of the patient in chronic renal care should be emphasised, reflected in the quality of services provided by dialysis stations.Keywords: haemodialysis, perception of quality of life, quality of services provided, dialysis station
Procedia PDF Downloads 26911699 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 36211698 Self-Determination and Mental Disorders: Phenomenological Approach
Authors: Neringa Bagdonaite
Abstract:
Background: The main focus of this paper is to explore how self-determination interplays in suicidal and addictive context leading one to autonomously choose self-destructive addictive behaviour or suicidal intentions. Methods: Phenomenological descriptions of the experiential structure of self-determination in addiction and suicidal mental life are used. The phenomenological method describes structures of mental life from the first-person-perspective, with a focus on how an experienced object is given in a subject’s conscious experience. Results: A sense of self-determination in the context of suicidal and addictive behaviour is possibly impaired. In the context of suicide, it's proposed that suicide is always experienced at least minimally self-determined, as it's the last freely discovered self-efficient behaviour, in terms of radically changing one's desperate mental state. Suicide can never be experienced as fully self-determined because no future retrospective re-evaluation of behaviour is possible. Understanding self-determination in addiction is challenging because addicts perceive themselves and experience situations differently depending on: (I) their level of intoxication; (II) whether the situation is in the moment or in retrospect; and (III) the goals set out in that situation. Furthermore, within phenomenology addiction is described as an embodied custom, which‘s acquired and established while performing 'psychotropic technique'. The main goal of performing such a technique is to continue 'floating in an indifference state' or being 'comfortably numb'. Conclusions: Based on rich phenomenological descriptions of the studied phenomenon, this paper draws on the premise that to experience self-determination in both suicide and addiction, underlying desperate or negative emotional states are needed. Such underlying desperate or negative mental life experiences are required for one to pre-reflectively evaluate suicide or addictive behaviours as positive, relieving or effective in terms of changing one's emotional states. Such pre-reflective positive evaluations serve as the base for the continuation of behaviour and later are identified reflectively.Keywords: addiction, phenomenology, self-determination, self-effectivity, suicide
Procedia PDF Downloads 16511697 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 11211696 A Machine Learning Approach for Detecting and Locating Hardware Trojans
Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He
Abstract:
The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.Keywords: hardware trojans, physical properties, machine learning, hardware security
Procedia PDF Downloads 15311695 Analytical Modeling of Drain Current for DNA Biomolecule Detection in Double-Gate Tunnel Field-Effect Transistor Biosensor
Authors: Ashwani Kumar
Abstract:
Abstract- This study presents an analytical modeling approach for analyzing the drain current behavior in Tunnel Field-Effect Transistor (TFET) biosensors used for the detection of DNA biomolecules. The proposed model focuses on elucidating the relationship between the drain current and the presence of DNA biomolecules, taking into account the impact of various device parameters and biomolecule characteristics. Through comprehensive analysis, the model offers insights into the underlying mechanisms governing the sensing performance of TFET biosensors, aiding in the optimization of device design and operation. A non-local tunneling model is incorporated with other essential models to accurately trace the simulation and modeled data. An experimental validation of the model is provided, demonstrating its efficacy in accurately predicting the drain current response to DNA biomolecule detection. The sensitivity attained from the analytical model is compared and contrasted with the ongoing research work in this area.Keywords: biosensor, double-gate TFET, DNA detection, drain current modeling, sensitivity
Procedia PDF Downloads 6211694 The Mental Workload of ICU Nurses in Performing Human-Machine Tasks: A Cross-sectional Survey
Authors: Yan Yan, Erhong Sun, Lin Peng, Xuchun Ye
Abstract:
Aims: The present study aimed to explore Intensive Care Unit(ICU) nurses’ mental workload (MWL) and associated factors with it in performing human-machine tasks. Background: A wide range of emerging technologies have penetrated widely in the field of health care, and ICU nurses are facing a dramatic increase in nursing human-machine tasks. However, there is still a paucity of literature reporting on the general MWL of ICU nurses performing human-machine tasks and the associated influencing factors. Methods: A cross-sectional survey was employed. The data was collected from January to February 2021 from 9 tertiary hospitals in 6 provinces (Shanghai, Gansu, Guangdong, Liaoning, Shandong, and Hubei). Two-stage sampling was used to recruit eligible ICU nurses (n=427). The data were collected with an electronic questionnaire comprising sociodemographic characteristics and the measures of MWL, self-efficacy, system usability, and task difficulty. The univariate analysis, two-way analysis of variance(ANOVA), and a linear mixed model were used for data analysis. Results: Overall, the mental workload of ICU nurses in performing human-machine tasks was medium (score 52.04 on a 0-100 scale). Among the typical nursing human-machine tasks selected, the MWL of ICU nurses in completing first aid and life support tasks (‘Using a defibrillator to defibrillate’ and ‘Use of ventilator’) was significantly higher than others (p < .001). And ICU nurses’ MWL in performing human-machine tasks was also associated with age (p = .001), professional title (p = .002), years of working in ICU (p < .001), willingness to study emerging technology actively (p = .006), task difficulty (p < .001), and system usability (p < .001). Conclusion: The MWL of ICU nurses is at a moderate level in the context of a rapid increase in nursing human-machine tasks. However, there are significant differences in MWL when performing different types of human-machine tasks, and MWL can be influenced by a combination of factors. Nursing managers need to develop intervention strategies in multiple ways. Implications for practice: Multidimensional approaches are required to perform human-machine tasks better, including enhancing nurses' willingness to learn emerging technologies actively, developing training strategies that vary with tasks, and identifying obstacles in the process of human-machine system interaction.Keywords: mental workload(MWL), nurse, ICU, human-machine, tasks, cross-sectional study, linear mixed model, China
Procedia PDF Downloads 11211693 Labview-Based System for Fiber Links Events Detection
Authors: Bo Liu, Qingshan Kong, Weiqing Huang
Abstract:
With the rapid development of modern communication, diagnosing the fiber-optic quality and faults in real-time is widely focused. In this paper, a Labview-based system is proposed for fiber-optic faults detection. The wavelet threshold denoising method combined with Empirical Mode Decomposition (EMD) is applied to denoise the optical time domain reflectometer (OTDR) signal. Then the method based on Gabor representation is used to detect events. Experimental measurements show that signal to noise ratio (SNR) of the OTDR signal is improved by 1.34dB on average, compared with using the wavelet threshold denosing method. The proposed system has a high score in event detection capability and accuracy. The maximum detectable fiber length of the proposed Labview-based system can be 65km.Keywords: empirical mode decomposition, events detection, Gabor transform, optical time domain reflectometer, wavelet threshold denoising
Procedia PDF Downloads 12611692 A Simple Approach to Reliability Assessment of Structures via Anomaly Detection
Authors: Rims Janeliukstis, Deniss Mironovs, Andrejs Kovalovs
Abstract:
Operational Modal Analysis (OMA) is widely applied as a method for Structural Health Monitoring for structural damage identification and assessment by tracking the changes of the identified modal parameters over time. Unfortunately, modal parameters also depend on such external factors as temperature and loads. Any structural condition assessment using modal parameters should be done taking into consideration those external factors, otherwise there is a high chance of false positives. A method of structural reliability assessment based on anomaly detection technique called Machalanobis Squared Distance (MSD) is proposed. It requires a set of reference conditions to learn healthy state of a structure, which all future parameters are compared to. In this study, structural modal parameters (natural frequency and mode shape), as well as ambient temperature and loads acting on the structure are used as features. Numerical tests were performed on a finite element model of a carbon fibre reinforced polymer composite beam with delamination damage at various locations and of various severities. The advantages of the demonstrated approach include relatively few computational steps, ability to distinguish between healthy and damaged conditions and discriminate between different damage severities. It is anticipated to be promising in reliability assessment of massively produced structural parts.Keywords: operational modal analysis, reliability assessment, anomaly detection, damage, mahalanobis squared distance
Procedia PDF Downloads 11811691 Indicator-Immobilized, Cellulose Based Optical Sensing Membrane for the Detection of Heavy Metal Ions
Authors: Nisha Dhariwal, Anupama Sharma
Abstract:
The synthesis of cellulose nanofibrils quaternized with 3‐chloro‐2‐hydroxypropyltrimethylammonium chloride (CHPTAC) in NaOH/urea aqueous solution has been reported. Xylenol Orange (XO) has been used as an indicator for selective detection of Sn (II) ions, by its immobilization on quaternized cellulose membrane. The effects of pH, reagent concentration and reaction time on the immobilization of XO have also been studied. The linear response, limit of detection, and interference of other metal ions have also been studied and no significant interference has been observed. The optical chemical sensor displayed good durability and short response time with negligible leaching of the reagent.Keywords: cellulose, chemical sensor, heavy metal ions, indicator immobilization
Procedia PDF Downloads 30311690 A Study on Assertiveness, Stigmatization, Gender Role Beliefs and Attitudes toward Seeking Professional Psychological Help among Young Adults in South East Asian
Authors: Chee Kwan Foong, Foong Mei Kei
Abstract:
This study aimed to investigate the influence of self-stigma, perceived public stigma, assertiveness and gender role beliefs on attitudes toward seeking professional psychological help. Two hundred and fifty young adults from universities in Brunei were recruited through convenience sampling to complete a survey. Individuals facing higher stigmatisation (both self-stigma and public-stigma) had less positive attitude towards seeking professional psychological help. Individuals who were more assertive had more positive attitude towards seeking professional psychological help. For males, individuals with more traditional gender role belief showed less positive attitude towards seeking professional psychological help. For female, there was no relationship between gender role beliefs and attitude towards seeking professional psychological help. Results confirmed there was a significant mediating effect between public stigma and attitude toward seeking professional psychological help. This study could guide the mental-health professionals in promoting more positive help-seeking attitude and raise the awareness about mental challenges which could assist in reducing stigmatization, and therefore, gain a deeper understanding.Keywords: assertiveness, attitude towards seeking professional psychological help, gender role beliefs, stigmatization
Procedia PDF Downloads 40511689 Surface Hole Defect Detection of Rolled Sheets Based on Pixel Classification Approach
Authors: Samira Taleb, Sakina Aoun, Slimane Ziani, Zoheir Mentouri, Adel Boudiaf
Abstract:
Rolling is a pressure treatment technique that modifies the shape of steel ingots or billets between rotating rollers. During this process, defects may form on the surface of the rolled sheets and are likely to affect the performance and quality of the finished product. In our study, we developed a method for detecting surface hole defects using a pixel classification approach. This work includes several steps. First, we performed image preprocessing to delimit areas with and without hole defects on the sheet image. Then, we developed the histograms of each area to generate the gray level membership intervals of the pixels that characterize each area. As we noticed an intersection between the characteristics of the gray level intervals of the images of the two areas, we finally performed a learning step based on a series of detection tests to refine the membership intervals of each area, and to choose the defect detection criterion in order to optimize the recognition of the surface hole.Keywords: classification, defect, surface, detection, hole
Procedia PDF Downloads 3011688 Minimizing the Impact of Covariate Detection Limit in Logistic Regression
Authors: Shahadut Hossain, Jacek Wesolowski, Zahirul Hoque
Abstract:
In many epidemiological and environmental studies covariate measurements are subject to the detection limit. In most applications, covariate measurements are usually truncated from below which is known as left-truncation. Because the measuring device, which we use to measure the covariate, fails to detect values falling below the certain threshold. In regression analyses, it causes inflated bias and inaccurate mean squared error (MSE) to the estimators. This paper suggests a response-based regression calibration method to correct the deleterious impact introduced by the covariate detection limit in the estimators of the parameters of simple logistic regression model. Compared to the maximum likelihood method, the proposed method is computationally simpler, and hence easier to implement. It is robust to the violation of distributional assumption about the covariate of interest. In producing correct inference, the performance of the proposed method compared to the other competing methods has been investigated through extensive simulations. A real-life application of the method is also shown using data from a population-based case-control study of non-Hodgkin lymphoma.Keywords: environmental exposure, detection limit, left truncation, bias, ad-hoc substitution
Procedia PDF Downloads 24011687 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 26911686 Developing an Accurate AI Algorithm for Histopathologic Cancer Detection
Authors: Leah Ning
Abstract:
This paper discusses the development of a machine learning algorithm that accurately detects metastatic breast cancer (cancer has spread elsewhere from its origin part) in selected images that come from pathology scans of lymph node sections. Being able to develop an accurate artificial intelligence (AI) algorithm would help significantly in breast cancer diagnosis since manual examination of lymph node scans is both tedious and oftentimes highly subjective. The usage of AI in the diagnosis process provides a much more straightforward, reliable, and efficient method for medical professionals and would enable faster diagnosis and, therefore, more immediate treatment. The overall approach used was to train a convolution neural network (CNN) based on a set of pathology scan data and use the trained model to binarily classify if a new scan were benign or malignant, outputting a 0 or a 1, respectively. The final model’s prediction accuracy is very high, with 100% for the train set and over 70% for the test set. Being able to have such high accuracy using an AI model is monumental in regard to medical pathology and cancer detection. Having AI as a new tool capable of quick detection will significantly help medical professionals and patients suffering from cancer.Keywords: breast cancer detection, AI, machine learning, algorithm
Procedia PDF Downloads 9611685 Collision Detection Algorithm Based on Data Parallelism
Authors: Zhen Peng, Baifeng Wu
Abstract:
Modern computing technology enters the era of parallel computing with the trend of sustainable and scalable parallelism. Single Instruction Multiple Data (SIMD) is an important way to go along with the trend. It is able to gather more and more computing ability by increasing the number of processor cores without the need of modifying the program. Meanwhile, in the field of scientific computing and engineering design, many computation intensive applications are facing the challenge of increasingly large amount of data. Data parallel computing will be an important way to further improve the performance of these applications. In this paper, we take the accurate collision detection in building information modeling as an example. We demonstrate a model for constructing a data parallel algorithm. According to the model, a complex object is decomposed into the sets of simple objects; collision detection among complex objects is converted into those among simple objects. The resulting algorithm is a typical SIMD algorithm, and its advantages in parallelism and scalability is unparalleled in respect to the traditional algorithms.Keywords: data parallelism, collision detection, single instruction multiple data, building information modeling, continuous scalability
Procedia PDF Downloads 29411684 Diagnostic Evaluation of Urinary Angiogenin (ANG) and Clusterin (CLU) as Biomarker for Bladder Cancer
Authors: Marwa I. Shabayek, Ola A. Said, Hanan A. Attaia, Heba A. Awida
Abstract:
Bladder carcinoma is an important worldwide health problem. Both cystoscopy and urine cytology used in detecting bladder cancer suffer from drawbacks where cystoscopy is an invasive method and urine cytology shows low sensitivity in low grade tumors. This study validates easier and less time-consuming techniques to evaluate the value of combined use of angiogenin and clusterin in comparison and combination with voided urine cytology in the detection of bladder cancer patients. This study includes malignant (bladder cancer patients, n= 50), benign (n=20), and healthy (n=20) groups. The studied groups were subjected to cystoscopic examination, detection of bilharzial antibodies, urine cytology, and estimation of urinary angiogenin and clusterin by ELISA. The overall sensitivity and specifcity were 66% and 75% for angiogenin, 70% and 82.5% for clusterin and 46% and 80% for voided urine cytology. Combined sensitivity of angiogenin and clusterin with urine cytology increased from 82 to 88%.Keywords: angiogenin, bladder cancer, clusterin, cytology
Procedia PDF Downloads 301