Search results for: feature selection feature subset selection feature extraction/transformation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7128

Search results for: feature selection feature subset selection feature extraction/transformation

5838 Evaluation of Opposite Type Heterologous MAT Genes Transfer in the Filamentous Fungi Neofusicoccum mediterraneum and Verticillium dahliae

Authors: Stavros Palavouzis, Alexandra Triantafyllopoulou, Aliki Tzima, Epaminondas Paplomatas

Abstract:

Mating-type genes are present in most filamentous fungi, even though teleomorphs for all species have not been recorded. Our study tries to explore the effect of different growth conditions on the expression of MAT genes in Neofusicoccum mediterraneum. As such, selected isolates were grown in potato dextrose broth or in water agar supplemented with pine needles under a 12 h photoperiod, as well as in constant darkness. Mycelia and spores were collected at different time points, and RNA extraction was performed, with the extracted product being used for cDNA synthesis. New primers for MAT gene expression were designed while qPCR results are underway. The second part of the study involved the isolation and cloning in a selected pGEM-T vector of the Botryosphaeria dothidea MAT1 1 1 and MAT1 2 1 mating genes, including flanking regions. As a next step, the genes were amplified using newly designed primers with engineered restriction sites. Amplicons were excised and subsequently sub-cloned in appropriate binary vectors. The constructs were afterward inserted into Agrobacterium tumefaciens and utilized for Agrobacterium-mediated transformation (ATMT) of Neofusicoccum mediterraneum. At the same time, the transformation of a Verticillium dahliae tomato race 1 strain (70V) was performed as a control. While the procedure was successful in regards to V. dahliae, transformed strains of N. mediterraneum could not be obtained. At present, a new transformation protocol, which utilizes a combination of protoplast and Agro transformation, is being evaluated.

Keywords: anamorph, heterothallism, perithecia, pycnidia, sexual stage

Procedia PDF Downloads 180
5837 A Selection Approach: Discriminative Model for Nominal Attributes-Based Distance Measures

Authors: Fang Gong

Abstract:

Distance measures are an indispensable part of many instance-based learning (IBL) and machine learning (ML) algorithms. The value difference metrics (VDM) and inverted specific-class distance measure (ISCDM) are among the top-performing distance measures that address nominal attributes. VDM performs well in some domains owing to its simplicity and poorly in others that exist missing value and non-class attribute noise. ISCDM, however, typically works better than VDM on such domains. To maximize their advantages and avoid disadvantages, in this paper, a selection approach: a discriminative model for nominal attributes-based distance measures is proposed. More concretely, VDM and ISCDM are built independently on a training dataset at the training stage, and the most credible one is recorded for each training instance. At the test stage, its nearest neighbor for each test instance is primarily found by any of VDM and ISCDM and then chooses the most reliable model of its nearest neighbor to predict its class label. It is simply denoted as a discriminative distance measure (DDM). Experiments are conducted on the 34 University of California at Irvine (UCI) machine learning repository datasets, and it shows DDM retains the interpretability and simplicity of VDM and ISCDM but significantly outperforms the original VDM and ISCDM and other state-of-the-art competitors in terms of accuracy.

Keywords: distance measure, discriminative model, nominal attributes, nearest neighbor

Procedia PDF Downloads 115
5836 Cakrawala Baca Transformation Model into Social Enterprise: A Benchmark Approach from Socentra Agro Mandiri (SAM) and Agritektur

Authors: Syafinatul Fitri

Abstract:

Cakrawala Baca is one of social organization in Indonesia that realize to transform its organization into social enterprise to create more sustainable organization that result more sustainable social impact. Cakrawala Baca implements voluntary system for its organization and it has passive social target. It funds its program by several fund rising activities that depend on donors or sponsor. Therefore social activity that held does not create sustainable social impact. It is different with social enterprise that usually more independent in funding its activity through social business and implement active social target and professional work for organization member. Therefore social enterprise can sustain its organization and then able to create sustainable social impact. Developing transformation model from social movement into social enterprise is the focus of this study. To achieve the aim of study, benchmark approach from successful social enterprise in Indonesia that has previously formed as social movement is employed. The benchmark is conducted through internal and external scanning that result the understanding of how they transformed into social enterprise. After understanding SAM and Agritektur transformation, transformation pattern is formulated based on their transformation similarities. This transformation pattern will be implemented to formulate the transformation plan for Cakrawala Baca to be a social enterprise.

Keywords: social movement/social organization, non-profit organization (NPO), social enterprise, transformation, Benchmarks approach

Procedia PDF Downloads 510
5835 Features Vector Selection for the Recognition of the Fragmented Handwritten Numeric Chains

Authors: Salim Ouchtati, Aissa Belmeguenai, Mouldi Bedda

Abstract:

In this study, we propose an offline system for the recognition of the fragmented handwritten numeric chains. Firstly, we realized a recognition system of the isolated handwritten digits, in this part; the study is based mainly on the evaluation of neural network performances, trained with the gradient backpropagation algorithm. The used parameters to form the input vector of the neural network are extracted from the binary images of the isolated handwritten digit by several methods: the distribution sequence, sondes application, the Barr features, and the centered moments of the different projections and profiles. Secondly, the study is extended for the reading of the fragmented handwritten numeric chains constituted of a variable number of digits. The vertical projection was used to segment the numeric chain at isolated digits and every digit (or segment) was presented separately to the entry of the system achieved in the first part (recognition system of the isolated handwritten digits).

Keywords: features extraction, handwritten numeric chains, image processing, neural networks

Procedia PDF Downloads 267
5834 Geophysical Methods and Machine Learning Algorithms for Stuck Pipe Prediction and Avoidance

Authors: Ammar Alali, Mahmoud Abughaban

Abstract:

Cost reduction and drilling optimization is the goal of many drilling operators. Historically, stuck pipe incidents were a major segment of non-productive time (NPT) associated costs. Traditionally, stuck pipe problems are part of the operations and solved post-sticking. However, the real key to savings and success is in predicting the stuck pipe incidents and avoiding the conditions leading to its occurrences. Previous attempts in stuck-pipe predictions have neglected the local geology of the problem. The proposed predictive tool utilizes geophysical data processing techniques and Machine Learning (ML) algorithms to predict drilling activities events in real-time using surface drilling data with minimum computational power. The method combines two types of analysis: (1) real-time prediction, and (2) cause analysis. Real-time prediction aggregates the input data, including historical drilling surface data, geological formation tops, and petrophysical data, from wells within the same field. The input data are then flattened per the geological formation and stacked per stuck-pipe incidents. The algorithm uses two physical methods (stacking and flattening) to filter any noise in the signature and create a robust pre-determined pilot that adheres to the local geology. Once the drilling operation starts, the Wellsite Information Transfer Standard Markup Language (WITSML) live surface data are fed into a matrix and aggregated in a similar frequency as the pre-determined signature. Then, the matrix is correlated with the pre-determined stuck-pipe signature for this field, in real-time. The correlation used is a machine learning Correlation-based Feature Selection (CFS) algorithm, which selects relevant features from the class and identifying redundant features. The correlation output is interpreted as a probability curve of stuck pipe incidents prediction in real-time. Once this probability passes a fixed-threshold defined by the user, the other component, cause analysis, alerts the user of the expected incident based on set pre-determined signatures. A set of recommendations will be provided to reduce the associated risk. The validation process involved feeding of historical drilling data as live-stream, mimicking actual drilling conditions, of an onshore oil field. Pre-determined signatures were created for three problematic geological formations in this field prior. Three wells were processed as case studies, and the stuck-pipe incidents were predicted successfully, with an accuracy of 76%. This accuracy of detection could have resulted in around 50% reduction in NPT, equivalent to 9% cost saving in comparison with offset wells. The prediction of stuck pipe problem requires a method to capture geological, geophysical and drilling data, and recognize the indicators of this issue at a field and geological formation level. This paper illustrates the efficiency and the robustness of the proposed cross-disciplinary approach in its ability to produce such signatures and predicting this NPT event.

Keywords: drilling optimization, hazard prediction, machine learning, stuck pipe

Procedia PDF Downloads 232
5833 Practical Evaluation of High-Efficiency Si-based Tandem Solar Cells

Authors: Sue-Yi Chen, Wei-Chun Hsu, Jon-Yiew Gan

Abstract:

Si-based double-junction tandem solar cells have become a popular research topic because of the advantages of low manufacturing cost and high energy conversion efficiency. However, there is no set of calculations to select the appropriate top cell materials. Therefore, this paper will propose a simple but practical selection method. First of all, we calculate the S-Q limit and explain the reasons for developing tandem solar cells. Secondly, we calculate the theoretical energy conversion efficiency of the double-junction tandem solar cells while combining the commercial monocrystalline Si and materials' practical efficiency to consider the actual situation. Finally, we conservatively conclude that if considering 75% performance of the theoretical energy conversion efficiency of the top cell, the suitable bandgap energy range will fall between 1.38eV to 2.5eV. Besides, we also briefly describe some improvements of several proper materials, CZTS, CdSe, Cu2O, ZnTe, and CdS, hoping that future research can select and manufacture high-efficiency Si-based tandem solar cells based on this paper successfully. Most importantly, our calculation method is not limited to silicon solely. If other materials’ performances match or surpass silicon's ability in the future, researchers can also apply this set of deduction processes.

Keywords: high-efficiency solar cells, material selection, Si-based double-junction solar cells, Tandem solar cells, photovoltaics.

Procedia PDF Downloads 117
5832 Multimedia Data Fusion for Event Detection in Twitter by Using Dempster-Shafer Evidence Theory

Authors: Samar M. Alqhtani, Suhuai Luo, Brian Regan

Abstract:

Data fusion technology can be the best way to extract useful information from multiple sources of data. It has been widely applied in various applications. This paper presents a data fusion approach in multimedia data for event detection in twitter by using Dempster-Shafer evidence theory. The methodology applies a mining algorithm to detect the event. There are two types of data in the fusion. The first is features extracted from text by using the bag-ofwords method which is calculated using the term frequency-inverse document frequency (TF-IDF). The second is the visual features extracted by applying scale-invariant feature transform (SIFT). The Dempster - Shafer theory of evidence is applied in order to fuse the information from these two sources. Our experiments have indicated that comparing to the approaches using individual data source, the proposed data fusion approach can increase the prediction accuracy for event detection. The experimental result showed that the proposed method achieved a high accuracy of 0.97, comparing with 0.93 with texts only, and 0.86 with images only.

Keywords: data fusion, Dempster-Shafer theory, data mining, event detection

Procedia PDF Downloads 411
5831 Fractionation of Biosynthetic Mixture of Gentamicins by Reactive Extraction

Authors: L. Kloetzer, M. Poştaru, A. I. Galaction, D. Caşcaval

Abstract:

Gentamicin is an aminoglycoside antibiotic industrially obtained by biosynthesis of Micromonospora purpurea or echinospora, the product being a complex mixture of components with very similar structures. Among them, three exhibit the most important biological activity: gentamicins C1, C1a, C2, and C2a. The separation of gentamicin from the fermentation broths at industrial scale is rather difficult and it does not allow the fractionation of the complex mixture of gentamicins in order to increase the therapeutic activity of the product. The aim of our experiments is to analyze the possibility to selectively separate the less active gentamicin, namely gentamicin C1, from the biosynthetic mixture by reactive extraction with di-(2-ethylhexyl) phosphoric acid (D2EHPA) dissolved in dichloromethane, followed selective re-extraction of the most active gentamicins C1a, C2, and C2a. The experiments on the reactive extraction of gentamicins indicated the possibility to separate selectively the gentamicin C1 from the mixture obtained by biosynthesis. The extraction selectivity is positively influenced by increasing the pH-value of an aqueous solution and by using a D2EHPA concentration in organic phase closer to the value needed for an equimolecular ratio between the extractant and this gentamicin. For quantifying the selectivity of separation, the selectivity factor, calculated as the ratio between the degree of reactive extraction of gentamicin C1 and the overall extraction degree of gentamicins were used. The possibility to remove the gentamicin C1 at an extractant concentration of 10 g l-1 and pH = 8 is presented. In these conditions, it was obtained the maximum value of the selectivity factor of 2.14, which corresponds to the modification of the gentamicin C1 concentration from 31.92% in the biosynthetic mixture to 72% in the extract. The re-extraction of gentamicins C1, C1a, C2, and C2a with sulfuric acid from the extract previously obtained by reactive extraction (mixture A – extract obtained by non-selective reactive extraction; mixture B – extract obtained by selective reactive extraction) allows for separating selectively the most active gentamicins C1a, C2, and C2a. For recovering only the active gentamicins C1a, C2, and C2a, the re-extraction must be carried out at very low acid concentrations, far below those corresponding to the stoichiometry of its chemical reactions with these gentamicins. Therefore, the mixture resulted by re-extraction contained 92.6% gentamicins C1a, C2, and C2a. By bringing together the aqueous solutions obtained by reactive extraction and re-extraction, the overall content of the active gentamicins in the final product becomes 89%, their loss reaching 0.3% related to the initial biosynthetic product.

Keywords: di-(2-ethylhexyl) phosphoric acid, gentamicin, reactive extraction, selectivity factor

Procedia PDF Downloads 324
5830 “Ethical Porn” and the Right to Withdraw Consent

Authors: Nathan Elvidge

Abstract:

This paper offers a philosophical argument against the possibility of so-called “ethical porn,” that is, pornographic material produced in a way attempting to remain consistent with feminist principles and female empowerment. One key feature of such material is the requirement for the material to be consensual on the part of the actors or those involved in the material. However, in the contemporary pornography industry, this typically amounts to a single historic act of consent given in exchange for a lump-sum payment which grants the producer lifetime property rights over the explicit material. This paper argues that, by the lights of feminist principles, this situation is inherently unjust and that, as a consequence, the pornography industry requires a radical systematic upheaval before any material produced within it can be considered genuinely ethical. These feminist principles require that for the consumption of pornography to be genuinely ethical, the actors must consent not only to the acts recorded in the material but also to the consumption of that material. This paper argues that this consent to consumption should be treated as on par with other matters of sexual consent and, therefore, that actors should have the right to withdraw consent to the consumption of their material. From this, it is argued to follow that the system of third-party ownership of property rights over someone else’s sexually explicit material legally nullifies this right and therefore is inherently unjust.

Keywords: consent, feminism, pornography, sex work

Procedia PDF Downloads 116
5829 Event Extraction, Analysis, and Event Linking

Authors: Anam Alam, Rahim Jamaluddin Kanji

Abstract:

With the rapid growth of event in everywhere, event extraction has now become an important matter to retrieve the information from the unstructured data. One of the challenging problems is to extract the event from it. An event is an observable occurrence of interaction among entities. The paper investigates the effectiveness of event extraction capabilities of three software tools that are Wandora, Nitro and SPSS. We performed standard text mining techniques of these tools on the data sets of (i) Afghan War Diaries (AWD collection), (ii) MUC4 and (iii) WebKB. Information retrieval measures such as precision and recall which are computed under extensive set of experiments for Event Extraction. The experimental study analyzes the difference between events extracted by the software and human. This approach helps to construct an algorithm that will be applied for different machine learning methods.

Keywords: event extraction, Wandora, nitro, SPSS, event analysis, extraction method, AFG, Afghan War Diaries, MUC4, 4 universities, dataset, algorithm, precision, recall, evaluation

Procedia PDF Downloads 598
5828 A Local Invariant Generalized Hough Transform Method for Integrated Circuit Visual Positioning

Authors: Wei Feilong

Abstract:

In this study, an local invariant generalized Houghtransform (LI-GHT) method is proposed for integrated circuit (IC) visual positioning. The original generalized Hough transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the four-dimensionality (4D) of parameter space which leads to the substantial storage requirement and high computational complexity. The proposed LI-GHT method can reduce the dimensionality of parameter space to 2D thanks to the rotational invariance of local invariant geometric feature and it can estimate the accuracy position and rotation angle of IC chips in real-time under noise and blur influence. The experiment results show that the proposed LI-GHT can estimate position and rotation angle of IC chips with high accuracy and fast speed. The proposed LI-GHT algorithm was implemented in IC visual positioning system of radio frequency identification (RFID) packaging equipment.

Keywords: Integrated Circuit Visual Positioning, Generalized Hough Transform, Local invariant Generalized Hough Transform, ICpacking equipment

Procedia PDF Downloads 266
5827 High Purity Germanium Detector Characterization by Means of Monte Carlo Simulation through Application of Geant4 Toolkit

Authors: Milos Travar, Jovana Nikolov, Andrej Vranicar, Natasa Todorovic

Abstract:

Over the years, High Purity Germanium (HPGe) detectors proved to be an excellent practical tool and, as such, have established their today's wide use in low background γ-spectrometry. One of the advantages of gamma-ray spectrometry is its easy sample preparation as chemical processing and separation of the studied subject are not required. Thus, with a single measurement, one can simultaneously perform both qualitative and quantitative analysis. One of the most prominent features of HPGe detectors, besides their excellent efficiency, is their superior resolution. This feature virtually allows a researcher to perform a thorough analysis by discriminating photons of similar energies in the studied spectra where otherwise they would superimpose within a single-energy peak and, as such, could potentially scathe analysis and produce wrongly assessed results. Naturally, this feature is of great importance when the identification of radionuclides, as well as their activity concentrations, is being practiced where high precision comes as a necessity. In measurements of this nature, in order to be able to reproduce good and trustworthy results, one has to have initially performed an adequate full-energy peak (FEP) efficiency calibration of the used equipment. However, experimental determination of the response, i.e., efficiency curves for a given detector-sample configuration and its geometry, is not always easy and requires a certain set of reference calibration sources in order to account for and cover broader energy ranges of interest. With the goal of overcoming these difficulties, a lot of researches turned towards the application of different software toolkits that implement the Monte Carlo method (e.g., MCNP, FLUKA, PENELOPE, Geant4, etc.), as it has proven time and time again to be a very powerful tool. In the process of creating a reliable model, one has to have well-established and described specifications of the detector. Unfortunately, the documentation that manufacturers provide alongside the equipment is rarely sufficient enough for this purpose. Furthermore, certain parameters tend to evolve and change over time, especially with older equipment. Deterioration of these parameters consequently decreases the active volume of the crystal and can thus affect the efficiencies by a large margin if they are not properly taken into account. In this study, the optimisation method of two HPGe detectors through the implementation of the Geant4 toolkit developed by CERN is described, with the goal of further improving simulation accuracy in calculations of FEP efficiencies by investigating the influence of certain detector variables (e.g., crystal-to-window distance, dead layer thicknesses, inner crystal’s void dimensions, etc.). Detectors on which the optimisation procedures were carried out were a standard traditional co-axial extended range detector (XtRa HPGe, CANBERRA) and a broad energy range planar detector (BEGe, CANBERRA). Optimised models were verified through comparison with experimentally obtained data from measurements of a set of point-like radioactive sources. Acquired results of both detectors displayed good agreement with experimental data that falls under an average statistical uncertainty of ∼ 4.6% for XtRa and ∼ 1.8% for BEGe detector within the energy range of 59.4−1836.1 [keV] and 59.4−1212.9 [keV], respectively.

Keywords: HPGe detector, γ spectrometry, efficiency, Geant4 simulation, Monte Carlo method

Procedia PDF Downloads 121
5826 Improved Performance in Content-Based Image Retrieval Using Machine Learning Approach

Authors: B. Ramesh Naik, T. Venugopal

Abstract:

This paper presents a novel approach which improves the high-level semantics of images based on machine learning approach. The contemporary approaches for image retrieval and object recognition includes Fourier transforms, Wavelets, SIFT and HoG. Though these descriptors helpful in a wide range of applications, they exploit zero order statistics, and this lacks high descriptiveness of image features. These descriptors usually take benefit of primitive visual features such as shape, color, texture and spatial locations to describe images. These features do not adequate to describe high-level semantics of the images. This leads to a gap in semantic content caused to unacceptable performance in image retrieval system. A novel method has been proposed referred as discriminative learning which is derived from machine learning approach that efficiently discriminates image features. The analysis and results of proposed approach were validated thoroughly on WANG and Caltech-101 Databases. The results proved that this approach is very competitive in content-based image retrieval.

Keywords: CBIR, discriminative learning, region weight learning, scale invariant feature transforms

Procedia PDF Downloads 183
5825 The Different Ways to Describe Regular Languages by Using Finite Automata and the Changing Algorithm Implementation

Authors: Abdulmajid Mukhtar Afat

Abstract:

This paper aims at introducing finite automata theory, the different ways to describe regular languages and create a program to implement the subset construction algorithms to convert nondeterministic finite automata (NFA) to deterministic finite automata (DFA). This program is written in c++ programming language. The program reads FA 5tuples from text file and then classifies it into either DFA or NFA. For DFA, the program will read the string w and decide whether it is acceptable or not. If accepted, the program will save the tracking path and point it out. On the other hand, when the automation is NFA, the program will change the Automation to DFA so that it is easy to track and it can decide whether the w exists in the regular language or not.

Keywords: finite automata, subset construction, DFA, NFA

Procedia PDF Downloads 427
5824 Design of a Service-Enabled Dependable Integration Environment

Authors: Fuyang Peng, Donghong Li

Abstract:

The aim of information systems integration is to make all the data sources, applications and business flows integrated into the new environment so that unwanted redundancies are reduced and bottlenecks and mismatches are eliminated. Two issues have to be dealt with to meet such requirements: the software architecture that supports resource integration, and the adaptor development tool that help integration and migration of legacy applications. In this paper, a service-enabled dependable integration environment (SDIE), is presented, which has two key components, i.e., a dependable service integration platform and a legacy application integration tool. For the dependable platform for service integration, the service integration bus, the service management framework, the dependable engine for service composition, and the service registry and discovery components are described. For the legacy application integration tool, its basic organization, functionalities and dependable measures taken are presented. Due to its service-oriented integration model, the light-weight extensible container, the service component combination-oriented p-lattice structure, and other features, SDIE has advantages in openness, flexibility, performance-price ratio and feature support over commercial products, is better than most of the open source integration software in functionality, performance and dependability support.

Keywords: application integration, dependability, legacy, SOA

Procedia PDF Downloads 361
5823 Infinite Impulse Response Digital Filters Design

Authors: Phuoc Si Nguyen

Abstract:

Infinite impulse response (IIR) filters can be designed from an analogue low pass prototype by using frequency transformation in the s-domain and bilinear z-transformation with pre-warping frequency; this method is known as frequency transformation from the s-domain to the z-domain. This paper will introduce a new method to transform an IIR digital filter to another type of IIR digital filter (low pass, high pass, band pass, band stop or narrow band) using a technique based on inverse bilinear z-transformation and inverse matrices. First, a matrix equation is derived from inverse bilinear z-transformation and Pascal’s triangle. This Low Pass Digital to Digital Filter Pascal Matrix Equation is used to transform a low pass digital filter to other digital filter types. From this equation and the inverse matrix, a Digital to Digital Filter Pascal Matrix Equation can be derived that is able to transform any IIR digital filter. This paper will also introduce some specific matrices to replace the inverse matrix, which is difficult to determine due to the larger size of the matrix in the current method. This will make computing and hand calculation easier when transforming from one IIR digital filter to another in the digital domain.

Keywords: bilinear z-transformation, frequency transformation, inverse bilinear z-transformation, IIR digital filters

Procedia PDF Downloads 425
5822 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 213
5821 English Learning Speech Assistant Speak Application in Artificial Intelligence

Authors: Albatool Al Abdulwahid, Bayan Shakally, Mariam Mohamed, Wed Almokri

Abstract:

Artificial intelligence has infiltrated every part of our life and every field we can think of. With technical developments, artificial intelligence applications are becoming more prevalent. We chose ELSA speak because it is a magnificent example of Artificial intelligent applications, ELSA speak is a smartphone application that is free to download on both IOS and Android smartphones. ELSA speak utilizes artificial intelligence to help non-native English speakers pronounce words and phrases similar to a native speaker, as well as enhance their English skills. It employs speech-recognition technology that aids the application to excel the pronunciation of its users. This remarkable feature distinguishes ELSA from other voice recognition algorithms and increase the efficiency of the application. This study focused on evaluating ELSA speak application, by testing the degree of effectiveness based on survey questions. The results of the questionnaire were variable. The generality of the participants strongly agreed that ELSA has helped them enhance their pronunciation skills. However, a few participants were unconfident about the application’s ability to assist them in their learning journey.

Keywords: ELSA speak application, artificial intelligence, speech-recognition technology, language learning, english pronunciation

Procedia PDF Downloads 106
5820 Alienation in Somecontemporary Anglo Arab Novels

Authors: Atef Abdallah Abouelmaaty

Abstract:

The aim of this paper is to study the theme of alienation in some contemporary novels of the most prominent Arab writers who live in Britain and write in English. The paper will focus on three female novelists of Arab origins who won wide fame among reading public, and also won international prizes for their literary creation. The first is the Egyptian Ahdaf Soueif(born in 1950) whose novel The Map of Love(1999) was shortlisted for the Man Booker Prize, and has been translated into twenty one languages and sold over a million copies. The second is the Jordanian Fadia Faqir (born in 1956) whose My Name is Salma(2007) was translated into thirteen languages, and was a runner up for the ALOA literary prize. The third is the Sudanese Leila Aboulela(born in 1964) who The Translator was nominated for the Orange Prize and was chosen as a a notable book of the year by the New York Times in 2006. The main reason of choosing the theme of alienation is that it is the qualifying feature of the above mentioned novels. This is because the theme is clearly projected and we can see different kinds of alienation: alienation of man from himself, alienation of man from other men, and alienation of man from society. The paper is concerned with studying this central theme together with its different forms. Moreover, the paper will try to identify the main causes of this alienation among which are frustrated love, the failure to adjust to change, and ethnic pride.

Keywords: alienation, Anglo-Arab, contemporary, novels

Procedia PDF Downloads 441
5819 Fuzzy-Machine Learning Models for the Prediction of Fire Outbreak: A Comparative Analysis

Authors: Uduak Umoh, Imo Eyoh, Emmauel Nyoho

Abstract:

This paper compares fuzzy-machine learning algorithms such as Support Vector Machine (SVM), and K-Nearest Neighbor (KNN) for the predicting cases of fire outbreak. The paper uses the fire outbreak dataset with three features (Temperature, Smoke, and Flame). The data is pre-processed using Interval Type-2 Fuzzy Logic (IT2FL) algorithm. Min-Max Normalization and Principal Component Analysis (PCA) are used to predict feature labels in the dataset, normalize the dataset, and select relevant features respectively. The output of the pre-processing is a dataset with two principal components (PC1 and PC2). The pre-processed dataset is then used in the training of the aforementioned machine learning models. K-fold (with K=10) cross-validation method is used to evaluate the performance of the models using the matrices – ROC (Receiver Operating Curve), Specificity, and Sensitivity. The model is also tested with 20% of the dataset. The validation result shows KNN is the better model for fire outbreak detection with an ROC value of 0.99878, followed by SVM with an ROC value of 0.99753.

Keywords: Machine Learning Algorithms , Interval Type-2 Fuzzy Logic, Fire Outbreak, Support Vector Machine, K-Nearest Neighbour, Principal Component Analysis

Procedia PDF Downloads 185
5818 The Hotel Logging Behavior and Factors of Tourists in Bankontee District, Samut Songkhram Province, Thailand

Authors: Aticha Kwaengsopha

Abstract:

The purpose of this research was to study the behaviour and related factors that tourists utilized for making decisions to choose their accommodations at a tourist destination, Bangkontee district, Samut Songkhran Province, Thailand. The independent variables included gender, age, income, occupation, and region, while the three important dependent variables included selection behaviour, factors related selection process, and satisfaction of the accommodation service. A total of 400 Thai and international tourists were interviewed at tourist destination of Bangkontee. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and standard deviation. The findings revealed that the majority of respondents were single, female, and with the age between 23-30 years old. Most of the international tourists were from Asia and planned to stay in Thailand about 1-6 days. In addition, the majority of tourists preferred to travel in small groups of 3 persons. The majority of respondents used internet and word of mouth as the main tool to search for information. The majority of respondents spent most of their budget on food & drink, accommodation, and travelling. Even though the majority of tourists were satisfied with the quality of accommodation, the price range of accommodation, and the image of accommodation and the facilities of the accommodation, they indicated that they were not likely to re-visit Thailand in the near future.

Keywords: behaviour, decision factors, tourists, media engineering

Procedia PDF Downloads 276
5817 Indoor Fingerprint Localization Using 5G NR Multi-SSB Beam Features with GAN-Based Interpolation

Authors: LiRen Kang, LingXia Li, KaiKai Liu, Yue Jin, ZengShan Tian

Abstract:

With the widespread adoption of 5G technology in the Internet of Things (IoT), indoor localization methods based on 5G signals have gradually become a research hotspot. However, traditional methods often perform poorly in multipath interference and signal attenuation environments. To address these challenges, this paper proposes an innovative fingerprint localization method that utilizes the multiple synchronization signal block (SSB) beam features of 5G signals combined with generative adversarial networks (GANs) for interpolation. Our method incorporates a ray tracing model as an auxiliary, integrating signal propagation models to enhance the interpolation process. We precisely extract the multiple SSB beam features from 5G signals; in the localization stage, deep learning neural networks (DNN) are used for localization. Field tests show that localization errors of less than 1.5 meters can be achieved within about 200 square meters of indoor environment. Our method represents a 56.7% improvement compared to traditional methods that use received signal strength (RSS) as a single feature.

Keywords: 5G NR, fingerprint localization, generative adversarial networks, Internet of Things, indoor localization systems

Procedia PDF Downloads 7
5816 A Simple Algorithm for Real-Time 3D Capturing of an Interior Scene Using a Linear Voxel Octree and a Floating Origin Camera

Authors: Vangelis Drosos, Dimitrios Tsoukalos, Dimitrios Tsolis

Abstract:

We present a simple algorithm for capturing a 3D scene (focused on the usage of mobile device cameras in the context of augmented/mixed reality) by using a floating origin camera solution and storing the resulting information in a linear voxel octree. Data is derived from cloud points captured by a mobile device camera. For the purposes of this paper, we assume a scene of fixed size (known to us or determined beforehand) and a fixed voxel resolution. The resulting data is stored in a linear voxel octree using a hashtable. We commence by briefly discussing the logic behind floating origin approaches and the usage of linear voxel octrees for efficient storage. Following that, we present the algorithm for translating captured feature points into voxel data in the context of a fixed origin world and storing them. Finally, we discuss potential applications and areas of future development and improvement to the efficiency of our solution.

Keywords: voxel, octree, computer vision, XR, floating origin

Procedia PDF Downloads 133
5815 Scale-Up Process for Phyllanthus niruri Enriched Extract by Supercritical Fluid Extraction

Authors: Norsyamimi Hassim, Masturah Markom

Abstract:

Supercritical fluid extraction (SFE) has been known as a sustainable and safe extraction technique for plant extraction due to the minimal usage of organic solvent. In this study, a scale-up process for the selected herbal plant (Phyllanthus niruri) was investigated by using supercritical carbon dioxide (SC-CO2) with food-grade (ethanol-water) cosolvent. The quantification of excess ethanol content in the final dry extracts was conducted to determine the safety of enriched extracts. The extraction yields obtained by scale-up SFE unit were not much different compared to the predicted extraction yields with an error of 2.92%. For component contents, the scale-up extracts showed comparable quality with laboratory-scale experiments. The final dry extract showed that the excess ethanol content was 1.56% g/g extract. The fish embryo toxicity test (FETT) on the zebrafish embryos showed no toxicity effects by the extract, where the LD50 value was found to be 505.71 µg/mL. Thus, it has been proven that SFE with food-grade cosolvent is a safe extraction technique for the production of bioactive compounds from P. niruri.

Keywords: scale-up, supercritical fluid extraction, enriched extract, toxicity, ethanol content

Procedia PDF Downloads 134
5814 Selective Solvent Extraction of Calcium and Magnesium from Concentrate Nickel Solutions Using Mixtures of Cyanex 272 and D2EHPA

Authors: Alexandre S. Guimarães, Marcelo B. Mansur

Abstract:

The performance of organophosphorus extractants Cyanex 272 and D2EHPA on the purification of concentrate nickel sulfate solutions was evaluated. Batch scale tests were carried out at pH range of 2 to 7 using a laboratory solution simulating concentrate nickel liquors as those typically obtained when sulfate intermediates from nickel laterite are re-leached and treated for the selective removal of cobalt, zinc, manganese and copper with Cyanex 272 ([Ca] = 0.57 g/L, [Mg] = 3.2 g/L, and [Ni] = 88 g/L). The increase on the concentration of D2EHPA favored the calcium extraction. The extraction of magnesium is dependent on the pH and of ratio of extractants D2EHPA and Cyanex 272 in the organic phase. The composition of the investigated organic phase did not affect nickel extraction. The number of stages is dependent on the magnesium extraction. The most favorable operating condition to selectively remove calcium and magnesium was determined.

Keywords: solvent extraction, organophosphorus extractants, alkaline earth metals, nickel

Procedia PDF Downloads 525
5813 Output-Feedback Control Design for a General Class of Systems Subject to Sampling and Uncertainties

Authors: Tomas Menard

Abstract:

The synthesis of output-feedback control law has been investigated by many researchers since the last century. While many results exist for the case of Linear Time Invariant systems whose measurements are continuously available, nowadays, control laws are usually implemented on micro-controller, then the measurements are discrete-time by nature. This fact has to be taken into account explicitly in order to obtain a satisfactory behavior of the closed-loop system. One considers here a general class of systems corresponding to an observability normal form and which is subject to uncertainties in the dynamics and sampling of the output. Indeed, in practice, the modeling of the system is never perfect, this results in unknown uncertainties in the dynamics of the model. We propose here an output feedback algorithm which is based on a linear state feedback and a continuous-discrete time observer. The main feature of the proposed control law is that only discrete-time measurements of the output are needed. Furthermore, it is formally proven that the state of the closed loop system exponentially converges toward the origin despite the unknown uncertainties. Finally, the performances of this control scheme are illustrated with simulations.

Keywords: dynamical systems, output feedback control law, sampling, uncertain systems

Procedia PDF Downloads 286
5812 Smart Water Main Inspection and Condition Assessment Using a Systematic Approach for Pipes Selection

Authors: Reza Moslemi, Sebastien Perrier

Abstract:

Water infrastructure deterioration can result in increased operational costs owing to increased repair needs and non-revenue water and consequently cause a reduced level of service and customer service satisfaction. Various water main condition assessment technologies have been introduced to the market in order to evaluate the level of pipe deterioration and to develop appropriate asset management and pipe renewal plans. One of the challenges for any condition assessment and inspection program is to determine the percentage of the water network and the combination of pipe segments to be inspected in order to obtain a meaningful representation of the status of the entire water network with a desirable level of accuracy. Traditionally, condition assessment has been conducted by selecting pipes based on age or location. However, this may not necessarily offer the best approach, and it is believed that by using a smart sampling methodology, a better and more reliable estimate of the condition of a water network can be achieved. This research investigates three different sampling methodologies, including random, stratified, and systematic. It is demonstrated that selecting pipes based on the proposed clustering and sampling scheme can considerably improve the ability of the inspected subset to represent the condition of a wider network. With a smart sampling methodology, a smaller data sample can provide the same insight as a larger sample. This methodology offers increased efficiency and cost savings for condition assessment processes and projects.

Keywords: condition assessment, pipe degradation, sampling, water main

Procedia PDF Downloads 152
5811 Different in Factors of the Distributor Selection for Food and Non-Food OTOP Entrepreneur in Thailand

Authors: Phutthiwat Waiyawuththanapoom

Abstract:

This study has only one objective which is to identify the different in factors of choosing the distributor for food and non-food OTOP entrepreneur in Thailand. In this research, the types of OTOP product will be divided into two groups which are food and non-food. The sample for the food type OTOP product was the processed fruit and vegetable from Nakorn Pathom province and the sample for the non-food type OTOP product was the court doll from Ang Thong province. The research was divided into 3 parts which were a study of the distribution pattern and how to choose the distributor of the food type OTOP product, a study of the distribution pattern and how to choose the distributor of the non-food type OTOP product and a comparison between 2 types of products to find the differentiation in the factor of choosing distributor. The data and information was collected by using the interview. The populations in the research were 5 producers of the processed fruit and vegetable from Nakorn Pathom province and 5 producers of the court doll from Ang Thong province. The significant factor in choosing the distributor of the food type OTOP product is the material handling efficiency and on-time delivery but for the non-food type OTOP product is focused on the channel of distribution and cost of the distributor.

Keywords: distributor, OTOP, food and non-food, selection

Procedia PDF Downloads 355
5810 Machine Learning Data Architecture

Authors: Neerav Kumar, Naumaan Nayyar, Sharath Kashyap

Abstract:

Most companies see an increase in the adoption of machine learning (ML) applications across internal and external-facing use cases. ML applications vend output either in batch or real-time patterns. A complete batch ML pipeline architecture comprises data sourcing, feature engineering, model training, model deployment, model output vending into a data store for downstream application. Due to unclear role expectations, we have observed that scientists specializing in building and optimizing models are investing significant efforts into building the other components of the architecture, which we do not believe is the best use of scientists’ bandwidth. We propose a system architecture created using AWS services that bring industry best practices to managing the workflow and simplifies the process of model deployment and end-to-end data integration for an ML application. This narrows down the scope of scientists’ work to model building and refinement while specialized data engineers take over the deployment, pipeline orchestration, data quality, data permission system, etc. The pipeline infrastructure is built and deployed as code (using terraform, cdk, cloudformation, etc.) which makes it easy to replicate and/or extend the architecture to other models that are used in an organization.

Keywords: data pipeline, machine learning, AWS, architecture, batch machine learning

Procedia PDF Downloads 65
5809 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 129