Search results for: social network ties
12136 An Acerbate Psychotics Symptoms, Social Support, Stressful Life Events, Medication Use Self-Efficacy Impact on Social Dysfunction: A Cross Sectional Self-Rated Study of Persons with Schizophrenia Patient and Misusing Methamphetamines
Authors: Ek-Uma Imkome, Jintana Yunibhand, Waraporn Chaiyawat
Abstract:
Background: Persons with schizophrenia patient and misusing methamphetamines suffering from social dysfunction that impact on their quality of life. Knowledge of factors related to social dysfunction will guide the effective intervention. Objectives: To determine the direct effect, indirect effect and total effect of an acerbate Psychotics’ Symptoms, Social Support, Stressful life events, Medication use self-efficacy impact on social dysfunction in Thai schizophrenic patient and methamphetamine misuse. Methods: Data were collected from schizophrenic and methamphetamine misuse patient by self report. A linear structural relationship was used to test the hypothesized path model. Results: The hypothesized model was found to fit the empirical data and explained 54% of the variance of the psychotic symptoms (X2 = 114.35, df = 92, p-value = 0.05, X2 /df = 1.24, GFI = 0.96, AGFI = 0.92, CFI = 1.00, NFI = 0.99, NNFI = 0.99, RMSEA = 0.02). The highest total effect on social dysfunction was psychotic symptoms (0.67, p<0.05). Medication use self-efficacy had a direct effect on psychotic symptoms (-0.25, p<0.01), and social support had direct effect on medication use self efficacy (0.36, p <0.01). Conclusions: Psychotic symptoms and stressful life events were the significance factors that influenced direct on social dysfunctioning. Therefore, interventions that are designed to manage these factors are crucial in order to enhance social functioning in this population.Keywords: psychotic symptoms, methamphetamine, schizophrenia, stressful life events, social dysfunction, social support, medication use self efficacy
Procedia PDF Downloads 20812135 Mediating Role of Psychological Capital in Relations Between Social Support and Subjective Wellbeing among Students with Learning Disabilities and Attention Deficit Hyperactivity Disorder
Authors: Ofra Walter Btel Liran Hazan
Abstract:
This study’s goal was to clarify whether psychological capital (PsyCap) mediated the relations between social support and subjective well-being among post-secondary students during the Covid-19 pandemic and to assess whether students diagnosed with a learning disability (LD) and/or attention deficit hyperactivity disorder (ADHD) differed from others in their reliance on social support and their level of PsyCap and subjective wellbeing. Participants were257 students, 152 diagnosed with LD/ADHD and the rest neurotypical. The study used four questionnaires: demographic and academic information; Psychological Capital Questionnaire (PCQ); Subjective Well-Being Index; social support questionnaire. The results indicated PsyCapmediated relations between social support and subjective wellbeing. Students diagnosed with LD/ADHD differed from neurotypicals in their PsyCap and subjective wellbeing levels but not in their social support. In addition, the relations between PsyCap and social support were stronger among students diagnosed with LD/ADHD. PsyCap was an important resource for all participants and was related to social support and subjective wellbeing, making it especially valuable for LD/ADHD students facing new and threatening situations, such as the Covid-19 pandemic.Keywords: LD/ADHD post-secondary students, subjective wellbeing, social support, PsyCap, covid-19
Procedia PDF Downloads 9612134 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 8012133 Brain Age Prediction Based on Brain Magnetic Resonance Imaging by 3D Convolutional Neural Network
Authors: Leila Keshavarz Afshar, Hedieh Sajedi
Abstract:
Estimation of biological brain age from MR images is a topic that has been much addressed in recent years due to the importance it attaches to early diagnosis of diseases such as Alzheimer's. In this paper, we use a 3D Convolutional Neural Network (CNN) to provide a method for estimating the biological age of the brain. The 3D-CNN model is trained by MRI data that has been normalized. In addition, to reduce computation while saving overall performance, some effectual slices are selected for age estimation. By this method, the biological age of individuals using selected normalized data was estimated with Mean Absolute Error (MAE) of 4.82 years.Keywords: brain age estimation, biological age, 3D-CNN, deep learning, T1-weighted image, SPM, preprocessing, MRI, canny, gray matter
Procedia PDF Downloads 14712132 Relationship between Codependency, Perceived Social Support, and Depression in Mothers of Children with Intellectual Disability
Authors: Sajed Yaghoubnezhad, Mina Karimi, Seyede Marjan Modirkhazeni
Abstract:
The goal of this research was to study the relationship between codependency, perceived social support and depression in mothers of children with intellectual disability (ID). The correlational method was used in this study. The research population is comprised of mothers of educable children with ID in the age range of 25 to 61 years. From among this, a sample of 251 individuals, in the multistage cluster sampling method, was selected from educational districts in Tehran, who responded to the Spann-Fischer Codependency Scale (SFCDS), the Social Support Questionnaire and the Beck Depression Inventory (BDI). The findings of this study indicate that among mothers of children with ID depression has a positive and significant correlation with codependency (P<0.01, r=0.4) and a negative and significant correlation with the total score of social support (P<0.01, r=-0.34). Moreover, the results of stepwise multiple regression analysis showed that codependency is allocated a higher variance than social support in explaining depression (R2=0.023).Keywords: codependency, social support, depression, mothers of children with ID
Procedia PDF Downloads 36812131 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study
Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh
Abstract:
Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.Keywords: education, smartphone, social networks, teenagers
Procedia PDF Downloads 45312130 Analysis of Decentralized on Demand Cross Layer in Cognitive Radio Ad Hoc Network
Authors: A. Sri Janani, K. Immanuel Arokia James
Abstract:
Cognitive radio ad hoc networks different unlicensed users may acquire different available channel sets. This non-uniform spectrum availability imposes special design challenges for broadcasting in CR ad hoc networks. Cognitive radio automatically detects available channels in wireless spectrum. This is a form of dynamic spectrum management. Cross-layer optimization is proposed, using this can allow far away secondary users can also involve into channel work. So it can increase the throughput and it will overcome the collision and time delay.Keywords: cognitive radio, cross layer optimization, CR mesh network, heterogeneous spectrum, mesh topology, random routing optimization technique
Procedia PDF Downloads 35912129 The Pangs of Unemployment and Its Impediment to Nation Building
Authors: Vitalis Okwuchukwu Opara
Abstract:
The task of nation building primarily consist in welding together, diverse cultural groups into a united nation state, which develops a centripetal political culture that makes its people see themselves as members of one nation linked together by more reliable ties than the coercion offered by the state. Comparatively on the contrary, most countries in the world today are comprised of diverse nationalities, each with its unique set of norms and values, which often come into conflict with others. As such, the task of nation building is in uniting these diverse cultural groups into a united nation state and various human elements that make up its geopolitical zone. The most outstanding impediment to achieving this task is unemployment. Unemployment is like a peril against the nation building. Unemployment is an obstacle for growth of a nation. Often it is said that the wise see obstacles as stepping-stones to advance further. The pangs of unemployment impede nation building such that sometimes it takes very long time to do away with the problem. In recent times, there has been a revolutionary wind blowing across the world. This wind is bound to wake up nations leaders to sit up to their responsibility. Unemployment causes youth restiveness, brings leaders to their knees. It breeds problem. This work is intended to expose the pangs of unemployment and its impending peril to nation building.Keywords: pangs, unemployment, obstacles, nation-building
Procedia PDF Downloads 35512128 Effects of Artificial Intelligence and Machine Learning on Social Media for Health Organizations
Authors: Ricky Leung
Abstract:
Artificial intelligence (AI) and machine learning (ML) have revolutionized the way health organizations approach social media. The sheer volume of data generated through social media can be overwhelming, but AI and ML can help organizations effectively manage this information to improve the health and well-being of individuals and communities. One way AI can be used to enhance social media in health organizations is through sentiment analysis. This involves analyzing the emotions expressed in social media posts to better understand public opinion and respond accordingly. This can help organizations gauge the impact of their campaigns, track the spread of misinformation, and improve communication with the public. While social media is a useful tool, researchers and practitioners have expressed fear that it will be used for the spread of misinformation, which can have serious consequences for public health. Health organizations must work to ensure that AI systems are transparent, trustworthy, and unbiased so they can help minimize the spread of misinformation. In conclusion, AI and ML have the potential to greatly enhance the use of social media in health organizations. These technologies can help organizations effectively manage large amounts of data and understand stakeholders' sentiments. However, it is important to carefully consider the potential consequences and ensure that these systems are carefully designed to minimize the spread of misinformation.Keywords: AI, ML, social media, health organizations
Procedia PDF Downloads 8912127 Family Homicide: A Comparison of Rural and Urban Communities in California
Authors: Bohsiu Wu
Abstract:
This study compares the differences in social dynamics between rural and urban areas in California to explain homicides involving family members. It is hypothesized that rural homicides are better explained by social isolation and lack of intervention resources, whereas urban homicides are attributed to social disadvantage factors. Several critical social dynamics including social isolation, social disadvantages, acculturation, and intervention resources were entered in a hierarchical linear model (HLM) to examine whether county-level factors affect how each specific dynamic performs at the ZIP code level, a proxy measure for communities. Homicide data are from the Supplementary Homicide Report for all 58 counties in California from 1997 to 1999. Predictors at both the county and ZIP code levels are derived from the 2000 US census. Preliminary results from a HLM analysis show that social isolation is a significant but moderate predictor to explain rural family homicide and various social disadvantage factors are significant factors accounting for urban family homicide. Acculturation has little impact. Rurality and urbanity appear to interact with various social dynamics in explaining family homicide. The implications for prevention at both the county and community level as well as directions for future study on the differences between rural and urban locales are explored in the paper.Keywords: communities, family, HLM, homicide, rural, urban
Procedia PDF Downloads 32612126 Studying Growth as a Pursuit of Disseminating Social Impact: A Conceptual Study
Authors: Saila Tykkyläinen
Abstract:
The purpose of this study is to pave the way for more focused accumulation of knowledge on social enterprise growth. The body of research touching upon the phenomenon is somewhat fragmented. In order to make an effort to create a solid common ground, this study draws from the theoretical starting points and guidelines developed within small firm growth research. By analyzing their use in social enterprise growth literature, the study offers insights on whether the proven theories and concepts from small firm context could be more systematically applied when investigating growth of social enterprises. Towards this end, the main findings from social enterprise growth research are classified under the three research streams on growth. One of them focuses on factors of growth, another investigates growth as a process and the third is interested in outcomes of growth. During the analysis, special attention is paid on exploring how social mission of the company and the pursuit of augmenting its social impact are dealt within those lines of research. The next step is to scrutinize and discuss some of the central building blocks of growth research, namely the unit of analysis, conceptualization of a firm and operationalizing growth, in relation to social enterprise studies. It appears that the social enterprise growth literature stresses the significance of 'social' both as a main driver and principle outcome of growth. As for the growth process, this emphasis is manifested by special interest in strategies and models tailored to disseminate social impact beyond organizational limits. Consequently, this study promotes more frequent use of business activity as a unit of analysis in the social enterprise context. Most of the times, it is their products, services or programs with which social enterprises and entrepreneurs aim to create the impact. Thus the focus should be placed on activities rather than on organizations. The study also seeks to contribute back to the small firm growth research. Even though the recommendation to think of business activities as an option for unit of analysis stems from there, it is all too rarely used. Social entrepreneurship makes a good case for testing and developing the approach further.Keywords: conceptual study, growth, scaling, social enterprise
Procedia PDF Downloads 31512125 Detecting HCC Tumor in Three Phasic CT Liver Images with Optimization of Neural Network
Authors: Mahdieh Khalilinezhad, Silvana Dellepiane, Gianni Vernazza
Abstract:
The aim of the present work is to build a model based on tissue characterization that is able to discriminate pathological and non-pathological regions from three-phasic CT images. Based on feature selection in different phases, in this research, we design a neural network system that has optimal neuron number in a hidden layer. Our approach consists of three steps: feature selection, feature reduction, and classification. For each ROI, 6 distinct set of texture features are extracted such as first order histogram parameters, absolute gradient, run-length matrix, co-occurrence matrix, autoregressive model, and wavelet, for a total of 270 texture features. We show that with the injection of liquid and the analysis of more phases the high relevant features in each region changed. Our results show that for detecting HCC tumor phase3 is the best one in most of the features that we apply to the classification algorithm. The percentage of detection between these two classes according to our method, relates to first order histogram parameters with the accuracy of 85% in phase 1, 95% phase 2, and 95% in phase 3.Keywords: multi-phasic liver images, texture analysis, neural network, hidden layer
Procedia PDF Downloads 26212124 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19
Procedia PDF Downloads 6812123 Semantic Indexing Improvement for Textual Documents: Contribution of Classification by Fuzzy Association Rules
Authors: Mohsen Maraoui
Abstract:
In the aim of natural language processing applications improvement, such as information retrieval, machine translation, lexical disambiguation, we focus on statistical approach to semantic indexing for multilingual text documents based on conceptual network formalism. We propose to use this formalism as an indexing language to represent the descriptive concepts and their weighting. These concepts represent the content of the document. Our contribution is based on two steps. In the first step, we propose the extraction of index terms using the multilingual lexical resource Euro WordNet (EWN). In the second step, we pass from the representation of index terms to the representation of index concepts through conceptual network formalism. This network is generated using the EWN resource and pass by a classification step based on association rules model (in attempt to discover the non-taxonomic relations or contextual relations between the concepts of a document). These relations are latent relations buried in the text and carried by the semantic context of the co-occurrence of concepts in the document. Our proposed indexing approach can be applied to text documents in various languages because it is based on a linguistic method adapted to the language through a multilingual thesaurus. Next, we apply the same statistical process regardless of the language in order to extract the significant concepts and their associated weights. We prove that the proposed indexing approach provides encouraging results.Keywords: concept extraction, conceptual network formalism, fuzzy association rules, multilingual thesaurus, semantic indexing
Procedia PDF Downloads 14112122 Traffic Study and Proposal for a Bike Lane for the University of the Basque Country
Authors: Elisabete Alberdi, Irantzu Álvarez, Laura Girón
Abstract:
The objective of this work is to propose a cycle path or network of paths to the UPV/EHU Campus in Leioa. The proposal will be presented from the point of view of sustainability. In order to achieve this, the roads that are already built will be used, and the road or network will be proposed to be built with the least amount of money possible. To select the most suitable route for the bike lane, various sources of information have been used. Through this data, we analyse the transport infrastructure and the mobility around the UPV/EHU Campus in Leioa. This work aims to satisfy the mobility needs of users on the University Campus to contribute to the sustainability of the campus.Keywords: cycle lane, sustainability, accessibility, transport, agenda 2030
Procedia PDF Downloads 22812121 Scientific Production on Lean Supply Chains Published in Journals Indexed by SCOPUS and Web of Science Databases: A Bibliometric Study
Authors: T. Botelho de Sousa, F. Raphael Cabral Furtado, O. Eduardo da Silva Ferri, A. Batista, W. Augusto Varella, C. Eduardo Pinto, J. Mimar Santa Cruz Yabarrena, S. Gibran Ruwer, F. Müller Guerrini, L. Adalberto Philippsen Júnior
Abstract:
Lean Supply Chain Management (LSCM) is an emerging research field in Operations Management (OM). As a strategic model that focuses on reduced cost and waste with fulfilling the needs of customers, LSCM attracts great interest among researchers and practitioners. The purpose of this paper is to present an overview of Lean Supply Chains literature, based on bibliometric analysis through 57 papers published in indexed journals by SCOPUS and/or Web of Science databases. The results indicate that the last three years (2015, 2016, and 2017) were the most productive on LSCM discussion, especially in Supply Chain Management and International Journal of Lean Six Sigma journals. India, USA, and UK are the most productive countries; nevertheless, cross-country studies by collaboration among researchers were detected, by social network analysis, as a research practice, appearing to play a more important role on LSCM studies. Despite existing limitation, such as limited indexed journal database, bibliometric analysis helps to enlighten ongoing efforts on LSCM researches, including most used technical procedures and collaboration network, showing important research gaps, especially, for development countries researchers.Keywords: Lean Supply Chains, Bibliometric Study, SCOPUS, Web of Science
Procedia PDF Downloads 34712120 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).Keywords: mininet, OpenFlow, POX controller, SDN
Procedia PDF Downloads 23512119 Student-Athletes Self-Concept, GPA and Training in the Climate of Social Networking
Authors: Indhumathi Gopal, Ashley Johnson
Abstract:
Social media use for communication among college student-athletes is growing. There is little research on student-athletes use of Blogs, one of the online communication tool outlets. Twenty-seven student-athletes, aged 18-24 years completed a student perception questionnaire which assessed demographics, the effect of blogging on college student-athletes self-concept, the correlation of age, GPA and blogging as well as the training students received in the use of social media. Descriptive statistics and Pearson correlations were analyzed examined. Results indicated a significant correlation between use of Blogs and student age (p < .01) and student GPA earned (p < .01). With respect to self-concept, results suggest that blogging could be a useful tool for communication but can present challenges, could affect student self-esteem either, positively or negatively. The training student-athletes received in the use of social media was not adequate. College athletes’ can more easily divulge information about their personal lives and opinions on social media and challenge the athletic programs and their own future. The findings of the study suggest implications for student-athletes to be better prepared for the current media climate.Keywords: college student-athletes, self-concept, use of social media training, social networking
Procedia PDF Downloads 59212118 The Detection of Implanted Radioactive Seeds on Ultrasound Images Using Convolution Neural Networks
Authors: Edward Holupka, John Rossman, Tye Morancy, Joseph Aronovitz, Irving Kaplan
Abstract:
A common modality for the treatment of early stage prostate cancer is the implantation of radioactive seeds directly into the prostate. The radioactive seeds are positioned inside the prostate to achieve optimal radiation dose coverage to the prostate. These radioactive seeds are positioned inside the prostate using Transrectal ultrasound imaging. Once all of the planned seeds have been implanted, two dimensional transaxial transrectal ultrasound images separated by 2 mm are obtained through out the prostate, beginning at the base of the prostate up to and including the apex. A common deep neural network, called DetectNet was trained to automatically determine the position of the implanted radioactive seeds within the prostate under ultrasound imaging. The results of the training using 950 training ultrasound images and 90 validation ultrasound images. The commonly used metrics for successful training were used to evaluate the efficacy and accuracy of the trained deep neural network and resulted in an loss_bbox (train) = 0.00, loss_coverage (train) = 1.89e-8, loss_bbox (validation) = 11.84, loss_coverage (validation) = 9.70, mAP (validation) = 66.87%, precision (validation) = 81.07%, and a recall (validation) = 82.29%, where train and validation refers to the training image set and validation refers to the validation training set. On the hardware platform used, the training expended 12.8 seconds per epoch. The network was trained for over 10,000 epochs. In addition, the seed locations as determined by the Deep Neural Network were compared to the seed locations as determined by a commercial software based on a one to three months after implant CT. The Deep Learning approach was within \strikeout off\uuline off\uwave off2.29\uuline default\uwave default mm of the seed locations determined by the commercial software. The Deep Learning approach to the determination of radioactive seed locations is robust, accurate, and fast and well within spatial agreement with the gold standard of CT determined seed coordinates.Keywords: prostate, deep neural network, seed implant, ultrasound
Procedia PDF Downloads 19812117 Sacred Spaces, Scarred Bodies: Understanding Forms of and Meanings Associated with Female Circumcision amongst Somali Women in Johannesburg
Authors: Z. Jinnah
Abstract:
International migration is associated with a disruption of social environments and social control. At the same time, the reproduction of cultural and social norms in the Diaspora provides a space for the (re)negotiation of gender roles, rights, and practices. This paper explores the relationship between mobility and the practice of female circumcision amongst Somalis in Johannesburg. Based on 4 years of ethnographic fieldwork, this paper explores the social determinants of cultural norms and practices, the linkages between class and tradition, and argues that the new social environment in South Africa conditions the ways in which Somali women relate to their bodies, and therefore understand the meanings associated with and practices of female circumcision.Keywords: migration, gender, Somali women, female circumcision, Johannesburg
Procedia PDF Downloads 37012116 Too Well to Die; Too Ill to Live
Authors: Deepak Jugran
Abstract:
The last century has witnessed rapid scientific growth, and social policies mainly targeted to increase the “life expectancy” of the people. As a result of these developments, the aging as well as ailing population, is increasing by every day. Despite an increase in “life expectancy”, we have not recorded compression in morbidity numbers as the age of onset of the majority of health issues has not increased substantially. In recent years, the prevalence of chronic diseases along with the improved treatment has also resulted in the increase of people living with chronic diseases. The last decade has also focused on social policies to increase the life expectancy in the population; however, in recent decades, social policies and biomedical research are gradually shifting on the potential of increasing healthy life or healthspan. In this article, we review the existing framework of lifespan and healthspan and wish to ignite a discussion among social scientists and public health experts to propose a wholistic framework to balance the trade-offs on social policies for “lifespan” and “healthspan”.Keywords: lifespan, healthspan, chronic diseases, social policies
Procedia PDF Downloads 10612115 An Improved Tie Force Method for Progressive Collapse Resistance Design of Precast Concrete Cross Wall Structures
Authors: M. Tohidi, J. Yang, C. Baniotopoulos
Abstract:
Progressive collapse of buildings typically occurs when abnormal loading conditions cause local damages, which leads to a chain reaction of failure and ultimately catastrophic collapse. The tie force (TF) method is one of the main design approaches for progressive collapse. As the TF method is a simplified method, further investigations on the reliability of the method is necessary. This study aims to develop an improved TF method to design the cross wall structures for progressive collapse. To this end, the pullout behavior of strands in grout was firstly analyzed; and then, by considering the tie force-slip relationship in the friction stage together with the catenary action mechanism, a comprehensive analytical method was developed. The reliability of this approach is verified by the experimental results of concrete block pullout tests and full scale floor-to-floor joints tests undertaken by Portland Cement Association (PCA). Discrepancies in the tie force between the analytical results and codified specifications have suggested the deficiency of TF method, hence an improved model based on the analytical results has been proposed to address this concern.Keywords: cross wall, progressive collapse, ties force method, catenary, analytical
Procedia PDF Downloads 46912114 The Role of Indigenous Informal Local Institutions and Social Capital for Adoption of Agricultural Innovation: A Special Emphasis in Ethiopia
Authors: Molla Tadesse Lakew
Abstract:
Researchers tried to find out the socio-economic and supply-side constraint factors to adoption. However, they overlooked the role of social networks and relationships among the community. Therefore, the aims of this review were to review the roles and negative effects of social capital. Based on its contents, relevancy, and time duration, only 121 (journals, books, and paper reports) were selected. It concludes that social capital has an indispensable role in facilitating cooperation and connection between members of the farmers' community, informal and experiential knowledge sharing, and access to research-based knowledge and contributes to reducing the transaction cost of adoption. On the contrary, inside the black box of social capital, the negative effects include the exclusion of outsider’s knowledge and experiences, excessive claims on group members, and restrictions on individual freedom.Keywords: social capital, local institutions, adoption, Ethiopia
Procedia PDF Downloads 9612113 Simulation and Hardware Implementation of Data Communication Between CAN Controllers for Automotive Applications
Authors: R. M. Kalayappan, N. Kathiravan
Abstract:
In automobile industries, Controller Area Network (CAN) is widely used to reduce the system complexity and inter-task communication. Therefore, this paper proposes the hardware implementation of data frame communication between one controller to other. The CAN data frames and protocols will be explained deeply, here. The data frames are transferred without any collision or corruption. The simulation is made in the KEIL vision software to display the data transfer between transmitter and receiver in CAN. ARM7 micro-controller is used to transfer data’s between the controllers in real time. Data transfer is verified using the CRO.Keywords: control area network (CAN), automotive electronic control unit, CAN 2.0, industry
Procedia PDF Downloads 39812112 Identification of Landslide Features Using Back-Propagation Neural Network on LiDAR Digital Elevation Model
Authors: Chia-Hao Chang, Geng-Gui Wang, Jee-Cheng Wu
Abstract:
The prediction of a landslide is a difficult task because it requires a detailed study of past activities using a complete range of investigative methods to determine the changing condition. In this research, first step, LiDAR 1-meter by 1-meter resolution of digital elevation model (DEM) was used to generate six environmental factors of landslide. Then, back-propagation neural networks (BPNN) was adopted to identify scarp, landslide areas and non-landslide areas. The BPNN uses 6 environmental factors in input layer and 1 output layer. Moreover, 6 landslide areas are used as training areas and 4 landslide areas as test areas in the BPNN. The hidden layer is set to be 1 and 2; the hidden layer neurons are set to be 4, 5, 6, 7 and 8; the learning rates are set to be 0.01, 0.1 and 0.5. When using 1 hidden layer with 7 neurons and the learning rate sets to be 0.5, the result of Network training root mean square error is 0.001388. Finally, evaluation of BPNN classification accuracy by the confusion matrix shows that the overall accuracy can reach 94.4%, and the Kappa value is 0.7464.Keywords: digital elevation model, DEM, environmental factors, back-propagation neural network, BPNN, LiDAR
Procedia PDF Downloads 14412111 Media and Women Empowerment: An Exploration of TV Popular Shows in India
Authors: Mamita Panda
Abstract:
Popular shows are considered to be powerful medium for bringing social change and development. It has the responsibility for not only entertaining, but spreading awareness among common mass which it results social intervention in the major social institutions. Gender construction in one of these social institutions where one can build their capacity to construct a better human society. Mass media in general, TV in particular has an important intervening factor in responding to these processes. The obligatory role of media not only through news but popular shows (serials) becomes compulsion for social formation including construction through gender. This paper attempts to map and examine the gendered contents from serials including viewer’s response to understand the level of influence. The regression analysis shows that socio-economic factors have wider influence on understanding of gender equality including TV popular contents. The social construction of gender through serials remains a serious debatable issue and concern thereafter.Keywords: construction, empowerment, gender, media and women
Procedia PDF Downloads 50412110 The Amount of Conformity of Persian Subject Headlines with Users' Social Tagging
Authors: Amir Reza Asnafi, Masoumeh Kazemizadeh, Najmeh Salemi
Abstract:
Due to the diversity of information resources in the web0.2 environment, which is increasing in number from time to time, the social tagging system should be used to discuss Internet resources. Studying the relevance of social tags to thematic headings can help enrich resources and make them more accessible to resources. The present research is of applied-theoretical type and research method of content analysis. In this study, using the listing method and content analysis, the level of accurate, approximate, relative, and non-conformity of social labels of books available in the field of information science and bibliography of Kitabrah website with Persian subject headings was determined. The exact matching of subject headings with social tags averaged 22 items, the approximate matching of subject headings with social tags averaged 36 items, the relative matching of thematic headings with social tags averaged 36 social items, and the average matching titles did not match the title. The average is 116. According to the findings, the exact matching of subject headings with social labels is the lowest and the most inconsistent. This study showed that the average non-compliance of subject headings with social labels is even higher than the sum of the three types of exact, relative, and approximate matching. As a result, the relevance of thematic titles to social labels is low. Due to the fact that the subject headings are in the form of static text and users are not allowed to interact and insert new selected words and topics, and on the other hand, in websites based on Web 2 and based on the social classification system, this possibility is available for users. An important point of the present study and the studies that have matched the syntactic and semantic matching of social labels with thematic headings is that the degree of conformity of thematic headings with social labels is low. Therefore, these two methods can complement each other and create a hybrid cataloging that includes subject headings and social tags. The low level of conformity of thematic headings with social tags confirms the results of backgrounds and writings that have compared the social tags of books with the thematic headings of the Library of Congress. It is not enough to match social labels with thematic headings. It can be said that these two methods can be complementary.Keywords: Web 2/0, social tags, subject headings, hybrid cataloging
Procedia PDF Downloads 15912109 Hyperspectral Band Selection for Oil Spill Detection Using Deep Neural Network
Authors: Asmau Mukhtar Ahmed, Olga Duran
Abstract:
Hydrocarbon (HC) spills constitute a significant problem that causes great concern to the environment. With the latest technology (hyperspectral images) and state of the earth techniques (image processing tools), hydrocarbon spills can easily be detected at an early stage to mitigate the effects caused by such menace. In this study; a controlled laboratory experiment was used, and clay soil was mixed and homogenized with different hydrocarbon types (diesel, bio-diesel, and petrol). The different mixtures were scanned with HYSPEX hyperspectral camera under constant illumination to generate the hypersectral datasets used for this experiment. So far, the Short Wave Infrared Region (SWIR) has been exploited in detecting HC spills with excellent accuracy. However, the Near-Infrared Region (NIR) is somewhat unexplored with regards to HC contamination and how it affects the spectrum of soils. In this study, Deep Neural Network (DNN) was applied to the controlled datasets to detect and quantify the amount of HC spills in soils in the Near-Infrared Region. The initial results are extremely encouraging because it indicates that the DNN was able to identify features of HC in the Near-Infrared Region with a good level of accuracy.Keywords: hydrocarbon, Deep Neural Network, short wave infrared region, near-infrared region, hyperspectral image
Procedia PDF Downloads 11312108 Resiliency, Peer and Parental Support as Determinants of Adolescents' Social Adjustment among Secondary Students in Ilorin, Kwara State
Authors: Titilola Adebowale
Abstract:
Some factors are responsible for the social adjustment among the adolescents. The study investigated resiliency, peer and parental support as factors that could determine social adjustment among adolescents in Ilorin, Kwara state. The study adopted descriptive survey research design. A sample size of 300 SS1 & SS2 students from ten secondary schools, six public and four private schools were randomly selected within Ilorin Metropolis. Self-structured questionnaire that was validated and the reliability ensured was used to collect data from the respondents. Four hypotheses were postulated and tested at 0.05 level of significance. Data collected was analysed using Pearson Product Moment Correlation (PPMC) and Regression Analysis. The findings revealed that there was a positive relationship between resiliency and social adjustment: r (298) = .402, p<0.01, r2 = .162; that there was a positive relationship between peer support and social adjustment: r (298) = .570, p<0.01, r2 = .325; that there was a positive relationship between parental support and social adjustment: r (298) = .451, p<0.01, r2 = .203; also reveals significant joint contribution of the independent variables (resilience, peer support, parental support) to the prediction of social adjustment: F (3,296) = 55.587, P<0.01. Various recommendations were given which includes the roles of government, agencies, individuals, parents, teachers, religious and marriage institutions.Keywords: resiliency, peer support, parental support, adolescents, social adjustment
Procedia PDF Downloads 17512107 Public Participation as a Social Inclusion Tool in the Urban Planning Process: A Case Study of Abuja, Nigeria
Authors: Nwachi Prosper Louis, Cynthia Ogonna Ikesee
Abstract:
The urban planning system of cities varies by country, but in general, it is an instrument for establishing long-term sustainable frameworks and plans for social, institutional and economic development. There is limited knowledge, development, and implementation of effective and sustainable urban planning structures and plans that encourage social inclusion in most communities. This has led to social, economic and environmental deficiencies resulting in community isolation and segregation in class, ethnicity, and race. Encouraging public participation in the urban planning process is one of the instruments that cities can utilise to achieve better social inclusion outcomes. This paper explores how public participation can be used as a social inclusion tool in the urban planning process to achieve better outcomes in Abuja urban planning system. The purpose of this study is to investigate the effectiveness of this approach. Also, a conceptual model was developed which evaluates the relationship between public participation and social inclusion outcomes in the urban planning process. It was seen that every community has its peculiar way of life and challenges, and an understanding of these social societal needs is paramount in the urban planning process. Therefore, the involvement of the public in identifying their needs, selecting priorities and identifying strategies offer better chances for developing solutions that are sustainable, feasible and implementable.Keywords: public participation, social inclusion, urban planning, urban planning process
Procedia PDF Downloads 200