Search results for: implicit neural representations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2448

Search results for: implicit neural representations

1218 A Real-Time Snore Detector Using Neural Networks and Selected Sound Features

Authors: Stelios A. Mitilineos, Nicolas-Alexander Tatlas, Georgia Korompili, Lampros Kokkalas, Stelios M. Potirakis

Abstract:

Obstructive Sleep Apnea Hypopnea Syndrome (OSAHS) is a widespread chronic disease that mostly remains undetected, mainly due to the fact that it is diagnosed via polysomnography which is a time and resource-intensive procedure. Screening the disease’s symptoms at home could be used as an alternative approach in order to alert individuals that potentially suffer from OSAHS without compromising their everyday routine. Since snoring is usually linked to OSAHS, developing a snore detector is appealing as an enabling technology for screening OSAHS at home using ubiquitous equipment like commodity microphones (included in, e.g., smartphones). In this context, this study developed a snore detection tool and herein present the approach and selection of specific sound features that discriminate snoring vs. environmental sounds, as well as the performance of the proposed tool. Furthermore, a Real-Time Snore Detector (RTSD) is built upon the snore detection tool and employed in whole-night sleep sound recordings resulting to a large dataset of snoring sound excerpts that are made freely available to the public. The RTSD may be used either as a stand-alone tool that offers insight to an individual’s sleep quality or as an independent component of OSAHS screening applications in future developments.

Keywords: obstructive sleep apnea hypopnea syndrome, apnea screening, snoring detection, machine learning, neural networks

Procedia PDF Downloads 208
1217 Representation of Women in TV Commercials

Authors: Elmira Fotoohi

Abstract:

Representation of women in commercials and the place of sex in advertising is a part of communication studies and all of them are subset of advertising sociology. In this context, a lot of national and international studies have been done from different aspects. But in the meantime, and in connection with women issues, researchers in Communication Science and Sociology are interested in two topics “use of pornographic images of women” and “repeated representations of women in traditional roles and gender stereotypes by emphasizing the differences between men and women”, more than any other topics. Considering a number of changes that have occurred in social institutions and at different levels, the main research question currently are, what is the role of women in our TV ads and how are they represented in them? Do the local television ads represent women in the same issues as the researchers on this topic has proposed or new changes have occurred? Many scholars and thinkers in the field of media outlet that, today, media not just focus on women as gender issues or sex objects, but also seeks to strengthen the gender division of labor in the family and emphasize on the traditional muliebrity and masculinity stereotype.

Keywords: women, representation, tv commercials, advertising sociology, gender stereotypes

Procedia PDF Downloads 525
1216 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 161
1215 Reduction of the Number of Traffic Accidents by Function of Driver's Anger Detection

Authors: Masahiro Miyaji

Abstract:

When a driver happens to be involved in some traffic congestion or after traffic incidents, the driver may fall in a state of anger. State of anger may encounter decisive risk resulting in severer traffic accidents. Preventive safety function using driver’s psychosomatic state with regard to anger may be one of solutions which would avoid that kind of risks. Identifying driver’s anger state is important to create countermeasures to prevent the risk of traffic accidents. As a first step, this research figured out root cause of traffic incidents by means of using Internet survey. From statistical analysis of the survey, dominant psychosomatic states immediately before traffic incidents were haste, distraction, drowsiness and anger. Then, we replicated anger state of a driver while driving, and then, replicated it by means of using driving simulator on bench test basis. Six types of facial expressions including anger were introduced as alternative characteristics. Kohonen neural network was adopted to classify anger state. Then, we created a methodology to detect anger state of a driver in high accuracy. We presented a driving support safety function. The function adapts driver’s anger state in cooperation with an autonomous driving unit to reduce the number of traffic accidents. Consequently, e evaluated reduction rate of driver’s anger in the traffic accident. To validate the estimation results, we referred the reduction rate of Advanced Safety Vehicle (ASV) as well as Intelligent Transportation Systems (ITS).

Keywords: Kohonen neural network, driver’s anger state, reduction of traffic accidents, driver’s state adaptive driving support safety

Procedia PDF Downloads 359
1214 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach

Authors: Rajvir Kaur, Jeewani Anupama Ginige

Abstract:

With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.

Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall

Procedia PDF Downloads 278
1213 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 260
1212 Development of Variable Order Block Multistep Method for Solving Ordinary Differential Equations

Authors: Mohamed Suleiman, Zarina Bibi Ibrahim, Nor Ain Azeany, Khairil Iskandar Othman

Abstract:

In this paper, a class of variable order fully implicit multistep Block Backward Differentiation Formulas (VOBBDF) using uniform step size for the numerical solution of stiff ordinary differential equations (ODEs) is developed. The code will combine three multistep block methods of order four, five and six. The order selection is based on approximation of the local errors with specific tolerance. These methods are constructed to produce two approximate solutions simultaneously at each iteration in order to further increase the efficiency. The proposed VOBBDF is validated through numerical results on some standard problems found in the literature and comparisons are made with single order Block Backward Differentiation Formula (BBDF). Numerical results shows the advantage of using VOBBDF for solving ODEs.

Keywords: block backward differentiation formulas, uniform step size, ordinary differential equations

Procedia PDF Downloads 447
1211 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 104
1210 Deep Learning-Based Object Detection on Low Quality Images: A Case Study of Real-Time Traffic Monitoring

Authors: Jean-Francois Rajotte, Martin Sotir, Frank Gouineau

Abstract:

The installation and management of traffic monitoring devices can be costly from both a financial and resource point of view. It is therefore important to take advantage of in-place infrastructures to extract the most information. Here we show how low-quality urban road traffic images from cameras already available in many cities (such as Montreal, Vancouver, and Toronto) can be used to estimate traffic flow. To this end, we use a pre-trained neural network, developed for object detection, to count vehicles within images. We then compare the results with human annotations gathered through crowdsourcing campaigns. We use this comparison to assess performance and calibrate the neural network annotations. As a use case, we consider six months of continuous monitoring over hundreds of cameras installed in the city of Montreal. We compare the results with city-provided manual traffic counting performed in similar conditions at the same location. The good performance of our system allows us to consider applications which can monitor the traffic conditions in near real-time, making the counting usable for traffic-related services. Furthermore, the resulting annotations pave the way for building a historical vehicle counting dataset to be used for analysing the impact of road traffic on many city-related issues, such as urban planning, security, and pollution.

Keywords: traffic monitoring, deep learning, image annotation, vehicles, roads, artificial intelligence, real-time systems

Procedia PDF Downloads 200
1209 Parameter Estimation of False Dynamic EIV Model with Additive Uncertainty

Authors: Dalvinder Kaur Mangal

Abstract:

For the past decade, noise corrupted output measurements have been a fundamental research problem to be investigated. On the other hand, the estimation of the parameters for linear dynamic systems when also the input is affected by noise is recognized as more difficult problem which only recently has received increasing attention. Representations where errors or measurement noises/disturbances are present on both the inputs and outputs are usually called errors-in-variables (EIV) models. These disturbances may also have additive effects which are also considered in this paper. Parameter estimation of false EIV problem using equation error, output error and iterative prefiltering identification schemes with and without additive uncertainty, when only the output observation is corrupted by noise has been dealt in this paper. The comparative study of these three schemes has also been carried out.

Keywords: errors-in-variable (EIV), false EIV, equation error, output error, iterative prefiltering, Gaussian noise

Procedia PDF Downloads 497
1208 Parallel Transformation Processes of Historical Centres: The Cases of Sevilla and Valparaiso

Authors: Jorge Ferrada Herrera, Pablo M. Millán-Millán

Abstract:

The delimitation in the cities of heritage areas implicit in strong processes of transformation, both social and material. The study shows how two cities, seemingly different as Seville (Spain) and Valparaiso (Chile), share the same transformation process from its declaration as heritage cities. The metdología used in research has been on the one hand the analytic-criticism has shown us all processes and the level of involvement of these. On the other hand the direct observation methodology has allowed us to ratify all studied. Faced with these processes research shows social resources that people have developed to address each of them. The study concludes the need to strengthen the social and associative fabric in heritage areas as a resource to ensure the survival of heritage, not only material but also social and cultural. As examples, we have chosen Seville and Valparaiso: the gentrification of Seville prior to the universal exhibition of ‘92 –with pretty specific plans-- is paralleled by Valparaiso’s plan to revitalize its port and its protected (UNESCO) area. The whole of our theoretical discourse will be based thereupon.

Keywords: historical centers, tourism, heritage, social processes

Procedia PDF Downloads 307
1207 Water Body Detection and Estimation from Landsat Satellite Images Using Deep Learning

Authors: M. Devaki, K. B. Jayanthi

Abstract:

The identification of water bodies from satellite images has recently received a great deal of attention. Different methods have been developed to distinguish water bodies from various satellite images that vary in terms of time and space. Urban water identification issues body manifests in numerous applications with a great deal of certainty. There has been a sharp rise in the usage of satellite images to map natural resources, including urban water bodies and forests, during the past several years. This is because water and forest resources depend on each other so heavily that ongoing monitoring of both is essential to their sustainable management. The relevant elements from satellite pictures have been chosen using a variety of techniques, including machine learning. Then, a convolution neural network (CNN) architecture is created that can identify a superpixel as either one of two classes, one that includes water or doesn't from input data in a complex metropolitan scene. The deep learning technique, CNN, has advanced tremendously in a variety of visual-related tasks. CNN can improve classification performance by reducing the spectral-spatial regularities of the input data and extracting deep features hierarchically from raw pictures. Calculate the water body using the satellite image's resolution. Experimental results demonstrate that the suggested method outperformed conventional approaches in terms of water extraction accuracy from remote-sensing images, with an average overall accuracy of 97%.

Keywords: water body, Deep learning, satellite images, convolution neural network

Procedia PDF Downloads 91
1206 Neuroplasticity in Language Acquisition in English as Foreign Language Classrooms

Authors: Sabitha Rahim

Abstract:

In the context of teaching vocabulary of English as Foreign Language (EFL), the confluence of memory and retention is one of the most significant factors in students' language acquisition. The progress of students engaged in foreign language acquisition is often stymied by vocabulary attrition, which leads to learners' lack of confidence and motivation. However, among other factors, little research has investigated the importance of neuroplasticity in Foreign Language acquisition and how underused neural pathways lead to the loss of plasticity, thereby affecting the learners’ vocabulary retention and motivation. This research explored the effect of enhancing vocabulary acquisition of EFL students in the Foundation Year at King Abdulaziz University through various methods and neuroplasticity exercises that reinforced their attention, motivation, and engagement. It analyzed the results to determine if stimulating the brain of EFL learners by various physical and mental activities led to the improvement in short and long term memory in vocabulary retention. The main data collection methods were student surveys, assessment records of teachers, student achievement test results, and students' follow-up interviews. A key implication of this research is for the institutions to consider having multiple varieties of student activities promoting brain plasticity within the classrooms as an effective tool for foreign language acquisition. Building awareness among the faculty and adapting the curriculum to include activities that promote brain plasticity ensures an enhanced learning environment and effective language acquisition in EFL classrooms.

Keywords: language acquisition, neural paths, neuroplasticity, vocabulary attrition

Procedia PDF Downloads 177
1205 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition

Authors: Qin Long, Li Xiaoge

Abstract:

The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.

Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network

Procedia PDF Downloads 96
1204 Exploring the Representations of the Moroccan Female Body on Social Media: YouTube as a Case Study

Authors: Nadir Akrachi

Abstract:

YouTube is one of the social media platforms that has gained popularity over the last decade. With the use of YouTube channels, young girls are able to post videos about their opinions of the ideal body and beauty and connect to their audience through likes, comments, and shares. In addition, it has become apparent that these young women associate their bodies with the ideal body image. They relate their body to the ideal body aspects that are produced by YouTubers, which causes differences between their body shape and the ideal body. Thus, this has led many researchers to explore whether these social media outlets are influencing the ways women look at their bodies and whether these social media associations cause a negative body image. The purpose of the study is to examine body image perceptions of Moroccan YouTubers. In other words, the study will explore the ways Moroccan YouTubers perceive their body and whether they follow a pattern of objectification or not.

Keywords: body image, gender, social media, representation, female body

Procedia PDF Downloads 20
1203 Artificial Neural Networks Application on Nusselt Number and Pressure Drop Prediction in Triangular Corrugated Plate Heat Exchanger

Authors: Hany Elsaid Fawaz Abdallah

Abstract:

This study presents a new artificial neural network(ANN) model to predict the Nusselt Number and pressure drop for the turbulent flow in a triangular corrugated plate heat exchanger for forced air and turbulent water flow. An experimental investigation was performed to create a new dataset for the Nusselt Number and pressure drop values in the following range of dimensionless parameters: The plate corrugation angles (from 0° to 60°), the Reynolds number (from 10000 to 40000), pitch to height ratio (from 1 to 4), and Prandtl number (from 0.7 to 200). Based on the ANN performance graph, the three-layer structure with {12-8-6} hidden neurons has been chosen. The training procedure includes back-propagation with the biases and weight adjustment, the evaluation of the loss function for the training and validation dataset and feed-forward propagation of the input parameters. The linear function was used at the output layer as the activation function, while for the hidden layers, the rectified linear unit activation function was utilized. In order to accelerate the ANN training, the loss function minimization may be achieved by the adaptive moment estimation algorithm (ADAM). The ‘‘MinMax’’ normalization approach was utilized to avoid the increase in the training time due to drastic differences in the loss function gradients with respect to the values of weights. Since the test dataset is not being used for the ANN training, a cross-validation technique is applied to the ANN network using the new data. Such procedure was repeated until loss function convergence was achieved or for 4000 epochs with a batch size of 200 points. The program code was written in Python 3.0 using open-source ANN libraries such as Scikit learn, TensorFlow and Keras libraries. The mean average percent error values of 9.4% for the Nusselt number and 8.2% for pressure drop for the ANN model have been achieved. Therefore, higher accuracy compared to the generalized correlations was achieved. The performance validation of the obtained model was based on a comparison of predicted data with the experimental results yielding excellent accuracy.

Keywords: artificial neural networks, corrugated channel, heat transfer enhancement, Nusselt number, pressure drop, generalized correlations

Procedia PDF Downloads 90
1202 Prediction of Distillation Curve and Reid Vapor Pressure of Dual-Alcohol Gasoline Blends Using Artificial Neural Network for the Determination of Fuel Performance

Authors: Leonard D. Agana, Wendell Ace Dela Cruz, Arjan C. Lingaya, Bonifacio T. Doma Jr.

Abstract:

The purpose of this paper is to study the predict the fuel performance parameters, which include drivability index (DI), vapor lock index (VLI), and vapor lock potential using distillation curve and Reid vapor pressure (RVP) of dual alcohol-gasoline fuel blends. Distillation curve and Reid vapor pressure were predicted using artificial neural networks (ANN) with macroscopic properties such as boiling points, RVP, and molecular weights as the input layers. The ANN consists of 5 hidden layers and was trained using Bayesian regularization. The training mean square error (MSE) and R-value for the ANN of RVP are 91.4113 and 0.9151, respectively, while the training MSE and R-value for the distillation curve are 33.4867 and 0.9927. Fuel performance analysis of the dual alcohol–gasoline blends indicated that highly volatile gasoline blended with dual alcohols results in non-compliant fuel blends with D4814 standard. Mixtures of low-volatile gasoline and 10% methanol or 10% ethanol can still be blended with up to 10% C3 and C4 alcohols. Intermediate volatile gasoline containing 10% methanol or 10% ethanol can still be blended with C3 and C4 alcohols that have low RVPs, such as 1-propanol, 1-butanol, 2-butanol, and i-butanol. Biography: Graduate School of Chemical, Biological, and Materials Engineering and Sciences, Mapua University, Muralla St., Intramuros, Manila, 1002, Philippines

Keywords: dual alcohol-gasoline blends, distillation curve, machine learning, reid vapor pressure

Procedia PDF Downloads 103
1201 Estimation of the Length and Location of Ground Surface Deformation Caused by the Reverse Faulting

Authors: Nader Khalafian, Mohsen Ghaderi

Abstract:

Field observations have revealed many examples of structures which were damaged due to ground surface deformation caused by the faulting phenomena. In this paper some efforts were made in order to estimate the length and location of the ground surface where large displacements were created due to the reverse faulting. This research has conducted in two steps; (1) in the first step, a 2D explicit finite element model were developed using ABAQUS software. A subroutine for Mohr-Coulomb failure criterion with strain softening model was developed by the authors in order to properly model the stress strain behavior of the soil in the fault rapture zone. The results of the numerical analysis were verified with the results of available centrifuge experiments. Reasonable coincidence was found between the numerical and experimental data. (2) In the second step, the effects of the fault dip angle (δ), depth of soil layer (H), dilation and friction angle of sand (ψ and φ) and the amount of fault offset (d) on the soil surface displacement and fault rupture path were investigated. An artificial neural network-based model (ANN), as a powerful prediction tool, was developed to generate a general model for predicting faulting characteristics. A properly sized database was created to train and test network. It was found that the length and location of the zone of displaced ground surface can be accurately estimated using the proposed model.

Keywords: reverse faulting, surface deformation, numerical, neural network

Procedia PDF Downloads 422
1200 A Convolutional Neural Network-Based Model for Lassa fever Virus Prediction Using Patient Blood Smear Image

Authors: A. M. John-Otumu, M. M. Rahman, M. C. Onuoha, E. P. Ojonugwa

Abstract:

A Convolutional Neural Network (CNN) model for predicting Lassa fever was built using Python 3.8.0 programming language, alongside Keras 2.2.4 and TensorFlow 2.6.1 libraries as the development environment in order to reduce the current high risk of Lassa fever in West Africa, particularly in Nigeria. The study was prompted by some major flaws in existing conventional laboratory equipment for diagnosing Lassa fever (RT-PCR), as well as flaws in AI-based techniques that have been used for probing and prognosis of Lassa fever based on literature. There were 15,679 blood smear microscopic image datasets collected in total. The proposed model was trained on 70% of the dataset and tested on 30% of the microscopic images in avoid overfitting. A 3x3x3 convolution filter was also used in the proposed system to extract features from microscopic images. The proposed CNN-based model had a recall value of 96%, a precision value of 93%, an F1 score of 95%, and an accuracy of 94% in predicting and accurately classifying the images into clean or infected samples. Based on empirical evidence from the results of the literature consulted, the proposed model outperformed other existing AI-based techniques evaluated. If properly deployed, the model will assist physicians, medical laboratory scientists, and patients in making accurate diagnoses for Lassa fever cases, allowing the mortality rate due to the Lassa fever virus to be reduced through sound decision-making.

Keywords: artificial intelligence, ANN, blood smear, CNN, deep learning, Lassa fever

Procedia PDF Downloads 122
1199 Analysing the Variables That Affect Digital Game-Based L2 Vocabulary Learning

Authors: Jose Ramon Calvo-Ferrer

Abstract:

Video games have been extensively employed in educational contexts to teach contents and skills, upon the premise that they engage students and provide instant feedback, which makes them adequate tools in the field of education and training. Term frequency, along with metacognition and implicit corrective feedback, has often been identified as powerful variables in the learning of vocabulary in a foreign language. This study analyses the learning of L2 mobile operating system terminology by a group of students and uses the data collected by the video game The Conference Interpreter to identify the predictive strength of term frequency (times a term is shown), positive metacognition (times a right answer is provided), and negative metacognition (times a term is shown as wrong) regarding L2 vocabulary learning and perceived learning outcomes. The regression analysis shows that the factor ‘positive metacognition’ is a positive predictor of both dependent variables, whereas the other factors seem to have no statistical effect on any of them.

Keywords: digital game-based learning, feedback, metacognition, frequency, video games

Procedia PDF Downloads 158
1198 Classification of EEG Signals Based on Dynamic Connectivity Analysis

Authors: Zoran Šverko, Saša Vlahinić, Nino Stojković, Ivan Markovinović

Abstract:

In this article, the classification of target letters is performed using data from the EEG P300 Speller paradigm. Neural networks trained with the results of dynamic connectivity analysis between different brain regions are used for classification. Dynamic connectivity analysis is based on the adaptive window size and the imaginary part of the complex Pearson correlation coefficient. Brain dynamics are analysed using the relative intersection of confidence intervals for the imaginary component of the complex Pearson correlation coefficient method (RICI-imCPCC). The RICI-imCPCC method overcomes the shortcomings of currently used dynamical connectivity analysis methods, such as the low reliability and low temporal precision for short connectivity intervals encountered in constant sliding window analysis with wide window size and the high susceptibility to noise encountered in constant sliding window analysis with narrow window size. This method overcomes these shortcomings by dynamically adjusting the window size using the RICI rule. This method extracts information about brain connections for each time sample. Seventy percent of the extracted brain connectivity information is used for training and thirty percent for validation. Classification of the target word is also done and based on the same analysis method. As far as we know, through this research, we have shown for the first time that dynamic connectivity can be used as a parameter for classifying EEG signals.

Keywords: dynamic connectivity analysis, EEG, neural networks, Pearson correlation coefficients

Procedia PDF Downloads 217
1197 An Expert System for Assessment of Learning Outcomes for ABET Accreditation

Authors: M. H. Imam, Imran A. Tasadduq, Abdul-Rahim Ahmad, Fahd M. Aldosari

Abstract:

Learning outcomes of a course (CLOs) and the abilities at the time of graduation referred to as Student Outcomes (SOs) are required to be assessed for ABET accreditation. A question in an assessment must target a CLO as well as an SO and must represent a required level of competence. This paper presents the idea of an Expert System (ES) to select a proper question to satisfy ABET accreditation requirements. For ES implementation, seven attributes of a question are considered including the learning outcomes and Bloom’s Taxonomy level. A database contains all the data about a course including course content topics, course learning outcomes and the CLO-SO relationship matrix. The knowledge base of the presented ES contains a pool of questions each with tags of the specified attributes. Questions and the attributes represent expert opinions. With implicit rule base the inference engine finds the best possible question satisfying the required attributes. It is shown that the novel idea of such an ES can be implemented and applied to a course with success. An application example is presented to demonstrate the working of the proposed ES.

Keywords: expert system, student outcomes, course learning outcomes, question attributes

Procedia PDF Downloads 252
1196 A Long Short-Term Memory Based Deep Learning Model for Corporate Bond Price Predictions

Authors: Vikrant Gupta, Amrit Goswami

Abstract:

The fixed income market forms the basis of the modern financial market. All other assets in financial markets derive their value from the bond market. Owing to its over-the-counter nature, corporate bonds have relatively less data publicly available and thus is researched upon far less compared to Equities. Bond price prediction is a complex financial time series forecasting problem and is considered very crucial in the domain of finance. The bond prices are highly volatile and full of noise which makes it very difficult for traditional statistical time-series models to capture the complexity in series patterns which leads to inefficient forecasts. To overcome the inefficiencies of statistical models, various machine learning techniques were initially used in the literature for more accurate forecasting of time-series. However, simple machine learning methods such as linear regression, support vectors, random forests fail to provide efficient results when tested on highly complex sequences such as stock prices and bond prices. hence to capture these intricate sequence patterns, various deep learning-based methodologies have been discussed in the literature. In this study, a recurrent neural network-based deep learning model using long short term networks for prediction of corporate bond prices has been discussed. Long Short Term networks (LSTM) have been widely used in the literature for various sequence learning tasks in various domains such as machine translation, speech recognition, etc. In recent years, various studies have discussed the effectiveness of LSTMs in forecasting complex time-series sequences and have shown promising results when compared to other methodologies. LSTMs are a special kind of recurrent neural networks which are capable of learning long term dependencies due to its memory function which traditional neural networks fail to capture. In this study, a simple LSTM, Stacked LSTM and a Masked LSTM based model has been discussed with respect to varying input sequences (three days, seven days and 14 days). In order to facilitate faster learning and to gradually decompose the complexity of bond price sequence, an Empirical Mode Decomposition (EMD) has been used, which has resulted in accuracy improvement of the standalone LSTM model. With a variety of Technical Indicators and EMD decomposed time series, Masked LSTM outperformed the other two counterparts in terms of prediction accuracy. To benchmark the proposed model, the results have been compared with traditional time series models (ARIMA), shallow neural networks and above discussed three different LSTM models. In summary, our results show that the use of LSTM models provide more accurate results and should be explored more within the asset management industry.

Keywords: bond prices, long short-term memory, time series forecasting, empirical mode decomposition

Procedia PDF Downloads 137
1195 The Effect of Unconscious Exposure to Religious Concepts on Mutual Stereotypes of Jews and Muslims in Israel

Authors: Lipaz Shamoa-Nir, Irene Razpurker-Apfeld

Abstract:

This research examined the impact of subliminal exposure to religious content on the mutual attitudes of majority group members (Jews) and minority group members (Muslims). Participants were subliminally exposed to religious concepts (e.g., Mezuzah, yarmulke or veil) and then they filled questionnaires assessing their stereotypes towards the out-group members. Each participant was primed with either in-group religious concepts, out-group concepts or neutral ones. The findings show that the Muslim participants were not influenced by the religious content to which they were exposed while the Jewish participants perceived the Muslims as less 'hostile' when subliminally exposed to religious concepts, regardless of concept type (out-group/in-group). This research highlights the influence of evoked religious content on out-group attitudes even when the perceiver is unaware of prime content. The power that exposure to content in a non-native language has in activating attitudes towards the out-group is also discussed.

Keywords: intergroup attitudes, stereotypes, majority-minority, religious out-group, implicit content, native language

Procedia PDF Downloads 246
1194 Comparison Learning Vocabulary Implicitly and Explicitly

Authors: Akram Hashemi

Abstract:

This study provided an empirical evidence for learners of elementary level of language proficiency to investigate the potential role of contextualization in vocabulary learning. Prior to the main study, pilot study was performed to determine the reliability and validity of the researcher-made pretest and posttest. After manifesting the homogeneity of the participants, the participants (n = 90) were randomly assigned into three equal groups, i.e., two experimental groups and a control group. They were pretested by a vocabulary test, in order to test participants' pre-knowledge of vocabulary. Then, vocabulary instruction was provided through three methods of visual instruction, the use of context and the use of conventional techniques. At the end of the study, all participants took the same posttest in order to assess their vocabulary gain. The results of independent sample t-test indicated that there is a significant difference between learning vocabulary visually and learning vocabulary contextually. The results of paired sample t-test showed that different teaching strategies have significantly different impacts on learners’ vocabulary gains. Also, the contextual strategy was significantly more effective than visual strategy in improving students’ performance in vocabulary test.

Keywords: vocabulary instruction, explicit instruction, implicit instruction, strategy

Procedia PDF Downloads 337
1193 Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People's Republic of China in 2012-2016

Authors: María Victoria Alvarez Magañini, Lautaro Nahuel Rubbi

Abstract:

According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out.

Keywords: asymmetric warfare, China, United States, hegemonic warfare

Procedia PDF Downloads 266
1192 A Quantitative Evaluation of Text Feature Selection Methods

Authors: B. S. Harish, M. B. Revanasiddappa

Abstract:

Due to rapid growth of text documents in digital form, automated text classification has become an important research in the last two decades. The major challenge of text document representations are high dimension, sparsity, volume and semantics. Since the terms are only features that can be found in documents, selection of good terms (features) plays an very important role. In text classification, feature selection is a strategy that can be used to improve classification effectiveness, computational efficiency and accuracy. In this paper, we present a quantitative analysis of most widely used feature selection (FS) methods, viz. Term Frequency-Inverse Document Frequency (tfidf ), Mutual Information (MI), Information Gain (IG), CHISquare (x2), Term Frequency-Relevance Frequency (tfrf ), Term Strength (TS), Ambiguity Measure (AM) and Symbolic Feature Selection (SFS) to classify text documents. We evaluated all the feature selection methods on standard datasets like 20 Newsgroups, 4 University dataset and Reuters-21578.

Keywords: classifiers, feature selection, text classification

Procedia PDF Downloads 461
1191 Decision-Making Under Uncertainty in Obsessive-Compulsive Disorder

Authors: Helen Pushkarskaya, David Tolin, Lital Ruderman, Ariel Kirshenbaum, J. MacLaren Kelly, Christopher Pittenger, Ifat Levy

Abstract:

Obsessive-Compulsive Disorder (OCD) produces profound morbidity. Difficulties with decision making and intolerance of uncertainty are prominent clinical features of OCD. The nature and etiology of these deficits are poorly understood. We used a well-validated choice task, grounded in behavioral economic theory, to investigate differences in valuation and value-based choice during decision making under uncertainty in 20 unmedicated participants with OCD and 20 matched healthy controls. Participants’ choices were used to assess individual decision-making characteristics. Compared to controls, individuals with OCD were less consistent in their choices and less able to identify options that were unambiguously preferable. These differences correlated with symptom severity. OCD participants did not differ from controls in how they valued uncertain options when outcome probabilities were known (risk) but were more likely than controls to avoid uncertain options when these probabilities were imprecisely specified (ambiguity). These results suggest that the underlying neural mechanisms of valuation and value-based choices during decision-making are abnormal in OCD. Individuals with OCD show elevated intolerance of uncertainty, but only when outcome probabilities are themselves uncertain. Future research focused on the neural valuation network, which is implicated in value-based computations, may provide new neurocognitive insights into the pathophysiology of OCD. Deficits in decision-making processes may represent a target for therapeutic intervention.

Keywords: obsessive compulsive disorder, decision-making, uncertainty intolerance, risk aversion, ambiguity aversion, valuation

Procedia PDF Downloads 616
1190 Critical Thinking Skills in Activities Included in 11th Grade Chemistry Textbook - An Analytical Study

Authors: Sozan H. Omar, Luluah A. Al Jabr

Abstract:

The current study aimed to identify critical thinking skills and its level of inclusion in all the activities (44) listed in 11th grade chemistry textbooks. The researcher used a descriptive analytical method by using the content analyzing design. An instrument was created for this purpose and tested for validity and reliability. Results showed that, all activities included critical thinking skills with different ratios as follow: conclusion skill was (87.72%), induction skill was (80.90%), interpretation skill was (77. 72%), discussion of evaluation skill was (68.64%), and assumption skill was (50.45%). Also, the study results indicated that, the level of inclusion of critical thinking skills in the scientific activities was more explicit than implicit with same order as the level of inclusions. In the light of the study's results, the researcher provided some recommendations including the need to provide and redistribute critical thinking skills in the activities listed the chemistry textbook, as well as the need to pay attention to the inclusion level of these skills more implicitly in the activities.

Keywords: critical thinking skills, chemistry textbooks, scientific activities

Procedia PDF Downloads 409
1189 Improving Similarity Search Using Clustered Data

Authors: Deokho Kim, Wonwoo Lee, Jaewoong Lee, Teresa Ng, Gun-Ill Lee, Jiwon Jeong

Abstract:

This paper presents a method for improving object search accuracy using a deep learning model. A major limitation to provide accurate similarity with deep learning is the requirement of huge amount of data for training pairwise similarity scores (metrics), which is impractical to collect. Thus, similarity scores are usually trained with a relatively small dataset, which comes from a different domain, causing limited accuracy on measuring similarity. For this reason, this paper proposes a deep learning model that can be trained with a significantly small amount of data, a clustered data which of each cluster contains a set of visually similar images. In order to measure similarity distance with the proposed method, visual features of two images are extracted from intermediate layers of a convolutional neural network with various pooling methods, and the network is trained with pairwise similarity scores which is defined zero for images in identical cluster. The proposed method outperforms the state-of-the-art object similarity scoring techniques on evaluation for finding exact items. The proposed method achieves 86.5% of accuracy compared to the accuracy of the state-of-the-art technique, which is 59.9%. That is, an exact item can be found among four retrieved images with an accuracy of 86.5%, and the rest can possibly be similar products more than the accuracy. Therefore, the proposed method can greatly reduce the amount of training data with an order of magnitude as well as providing a reliable similarity metric.

Keywords: visual search, deep learning, convolutional neural network, machine learning

Procedia PDF Downloads 217