Search results for: signal detection theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9130

Search results for: signal detection theory

7510 Supply Chain Management Strategies of the Private Residential Construction Sector in South Africa

Authors: R. Khoza, K. K. Govender

Abstract:

The aim of the study was to review and critically evaluate the supply chain management (SCM) strategies and challenges in the private residential construction sector in South Africa. The study was grounded in three theories, namely, theory of constraints, principal-agency theory, and stakeholder theory. A quantitative approach was used to survey 320 private residential construction companies which registered with the National Homebuilders Registration Council (NHBRC) within the Gauteng province. The data from 250 questionnaires returned were analysed using SPSS (Versions 23) and Smart PLS. It became evident that the SCM challenges included lack of trust between the supplier and the organization; lack of adoption of SCM system; lack of a sufficiently skilled SCM workforce; and poor implementation of contract management. The findings also indicate that there is a significant positive relationship between the performance of the private residential construction sector in South Africa and SCM challenges, SCM strategies and SCM processes. A framework is proposed comprising SCM practices and strategies of private residential construction sector in South Africa, which will enable them to enhance performance.

Keywords: management challenges, residential housing, South Africa, supply chain management

Procedia PDF Downloads 63
7509 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 346
7508 Real Time Detection, Prediction and Reconstitution of Rain Drops

Authors: R. Burahee, B. Chassinat, T. de Laclos, A. Dépée, A. Sastim

Abstract:

The purpose of this paper is to propose a solution to detect, predict and reconstitute rain drops in real time – during the night – using an embedded material with an infrared camera. To prevent the system from needing too high hardware resources, simple models are considered in a powerful image treatment algorithm reducing considerably calculation time in OpenCV software. Using a smart model – drops will be matched thanks to a process running through two consecutive pictures for implementing a sophisticated tracking system. With this system drops computed trajectory gives information for predicting their future location. Thanks to this technique, treatment part can be reduced. The hardware system composed by a Raspberry Pi is optimized to host efficiently this code for real time execution.

Keywords: reconstitution, prediction, detection, rain drop, real time, raspberry, infrared

Procedia PDF Downloads 400
7507 Seamless Mobility in Heterogeneous Mobile Networks

Authors: Mohab Magdy Mostafa Mohamed

Abstract:

The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into consideration power level, subscriber velocity, and target cell load instead of only power level in traditional algorithms. Simulation results show that network performance in terms of number of handovers and handover occurrence distance is improved.

Keywords: vertical handover, fuzzy control theory, power level, speed, target cell load

Procedia PDF Downloads 332
7506 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework

Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi

Abstract:

Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.

Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency

Procedia PDF Downloads 133
7505 Non-Local Behavior of a Mixed-Mode Crack in a Functionally Graded Piezoelectric Medium

Authors: Nidhal Jamia, Sami El-Borgi

Abstract:

In this paper, the problem of a mixed-Mode crack embedded in an infinite medium made of a functionally graded piezoelectric material (FGPM) with crack surfaces subjected to electro-mechanical loadings is investigated. Eringen’s non-local theory of elasticity is adopted to formulate the governing electro-elastic equations. The properties of the piezoelectric material are assumed to vary exponentially along a perpendicular plane to the crack. Using Fourier transform, three integral equations are obtained in which the unknown variables are the jumps of mechanical displacements and electric potentials across the crack surfaces. To solve the integral equations, the unknowns are directly expanded as a series of Jacobi polynomials, and the resulting equations solved using the Schmidt method. In contrast to the classical solutions based on the local theory, it is found that no mechanical stress and electric displacement singularities are present at the crack tips when nonlocal theory is employed to investigate the problem. A direct benefit is the ability to use the calculated maximum stress as a fracture criterion. The primary objective of this study is to investigate the effects of crack length, material gradient parameter describing FGPMs, and lattice parameter on the mechanical stress and electric displacement field near crack tips.

Keywords: functionally graded piezoelectric material (FGPM), mixed-mode crack, non-local theory, Schmidt method

Procedia PDF Downloads 298
7504 Social Anxiety Connection with Individual Characteristics: Theory of Mind, Verbal Irony Comprehension and Personal Traits

Authors: Anano Tenieshvili, Teona Lodia

Abstract:

Social anxiety disorder (SAD) is one of the most common mental health problems not only in adults but also in adolescents. Individuals with SAD exhibit difficulties in interpersonal relationships, understanding emotions, and regulating them as well. For social and emotional adaptation, it is crucial to identify, understand, accept and manage emotions correctly. Researchers actively learn those factors that contribute to the development and maintenance of this condition. Therefore, the main purpose of this study is to acquire knowledge about the association between social anxiety and individual characteristics, such as theory of mind (ToM), verbal irony comprehension, and personal traits. 112 adolescents aged from 12 to 18 were selected for this research. 15 of them are diagnosed with Social anxiety disorder. Statistical analysis was performed on the entire sample, and furthermore, two groups, adolescents with and without social anxiety disorder, were compared separately. Social anxiety and personal traits were assessed by questionnaires. Theory of mind and comprehension of verbal irony were measured using tests. Statistical analysis indicated a positive relationship between social anxiety and comprehension of ironic criticism. Moreover, social anxiety was significantly positively correlated with neuroticism and isolation tendency, whereas it was negatively related to extraversion and frustration tolerance. On top of that, statistical analysis revealed a positive relationship between ToM and verbal irony comprehension. However, the relationship between social anxiety and ToM was not statistically significant. In conclusion, the current research expands knowledge about social anxiety and supports the results of some previous studies.

Keywords: personal traits, social anxiety, theory of mind, verbal irony comprehension

Procedia PDF Downloads 183
7503 Social Anxiety Connection with Individual Characteristics: Theory of Mind, Verbal Irony Comprehension and Personal Traits

Authors: Anano Tenieshvili, Teona Lodia

Abstract:

Social anxiety disorder (SAD) is one of the most common mental health problems not only in adults but also in adolescents. Individuals with SAD exhibit difficulties in interpersonal relationships, understanding emotions and regulating them as well. For social and emotional adaptation, it is crucial to identify, understand, accept and manage emotions correctly. Researchers actively learn those factors that contribute to the development and maintenance of this condition. Therefore, the main purpose of this study is to acquire knowledge about the association between social anxiety and individual characteristics, such as the theory of mind (ToM), verbal irony comprehension and personal traits. 112 adolescents aged from 12 to 18 were selected for this research. 15 of them are diagnosed with Social anxiety disorder. Statistical analysis was performed on the entire sample and furthermore, two groups, adolescents with and without a social anxiety disorder, were compared separately. Social anxiety and personal traits were assessed by questionnaires. Theory of mind and comprehension of verbal irony was measured using tests. Statistical analysis indicated a positive relationship between social anxiety and comprehension of ironic criticism. Moreover, social anxiety was significantly positively correlated with neuroticism and isolation tendency, whereas it was negatively related to extraversion and frustration tolerance. On top of that, statistical analysis revealed a positive relationship between ToM and verbal irony comprehension. However, the relationship between social anxiety and ToM was not statistically significant. In conclusion, the current research expands knowledge about social anxiety and supports the results of some previous studies.

Keywords: personal traits, social anxiety, theory of mind, verbal irony comprehension

Procedia PDF Downloads 107
7502 Theory and Practice of Wavelets in Signal Processing

Authors: Jalal Karam

Abstract:

The methods of Fourier, Laplace, and Wavelet Transforms provide transfer functions and relationships between the input and the output signals in linear time invariant systems. This paper shows the equivalence among these three methods and in each case presenting an application of the appropriate (Fourier, Laplace or Wavelet) to the convolution theorem. In addition, it is shown that the same holds for a direct integration method. The Biorthogonal wavelets Bior3.5 and Bior3.9 are examined and the zeros distribution of their polynomials associated filters are located. This paper also presents the significance of utilizing wavelets as effective tools in processing speech signals for common multimedia applications in general, and for recognition and compression in particular. Theoretically and practically, wavelets have proved to be effective and competitive. The practical use of the Continuous Wavelet Transform (CWT) in processing and analysis of speech is then presented along with explanations of how the human ear can be thought of as a natural wavelet transformer of speech. This generates a variety of approaches for applying the (CWT) to many paradigms analysing speech, sound and music. For perception, the flexibility of implementation of this transform allows the construction of numerous scales and we include two of them. Results for speech recognition and speech compression are then included.

Keywords: continuous wavelet transform, biorthogonal wavelets, speech perception, recognition and compression

Procedia PDF Downloads 399
7501 Testing Psychopathy as a Unified Theory of Crime and the Psychometric properties of the Youth Psychopathic Traits Inventory - Short Version among South African Youth

Authors: Leon Holtzhausen, Emma Campbell

Abstract:

This study aimed to explore the psychometric properties of the Youth Psychopathic Traits Inventory- short version (YPI-S) and the applicability of Psychopathy as a Unified Theory of Crime among 213 young adults in South Africa. The deviant behaviour variety scale and the YPI-S were used in this study. Results from factor analysis and reliability measures indicated the YPI-S seemed to have good psychometric properties when applied to the South African sample, however applicability of the behavioural dimension was a challenge. The results related to the association between deviant behaviours and psychopathic traits suggested that Psychopathy as a Unified Theory of Crime could be applied in the South African context. It is however important to note that future research should explore how the relevant scales could be culturally and contextually adapted for better psychometric outcomes.

Keywords: testing psychopathy, adverse childhood experiences, youth psychopathic traits inventory, young adults

Procedia PDF Downloads 54
7500 Understanding Racial Disparate Treatment of Juvenile Interpersonal Violent Offenders in the Juvenile Justice System Using Focal Concerns Theory

Authors: Suzanne Overstreet-Juenke

Abstract:

Disproportionate minority contact (DMC) is a salient issue that has been found at every stage of the decision-making process in the juvenile justice system. Existing research indicates that DMC influences adjudication for drug, property, and personal crimes. Because intimate partner violence (IPV) is a major public health problem and global concern, the current study examines DMC at adjudication among youth charged for crimes of interpersonal violence. This research uses administrative, Court Designated Worker (CDW) data collected from 2014 to 2016. The results are contextualized using Steffensmeier’s version of focal concerns theory of judicial decision-making. This study assesses race and two seriousness of offense measures to establish whether a link exists between race and adjudication. The results of the study is similar to prior research on the topic. These results are discussed in terms of policy implications, limitations, and future research.

Keywords: race, disproportionate minority contact, focal concerns theory, juvenile

Procedia PDF Downloads 56
7499 Fault Diagnosis in Induction Motors Using the Discrete Wavelet Transform

Authors: Khaled Yahia

Abstract:

This paper deals with the problem of stator faults diagnosis in induction motors. Using the discrete wavelet transform (DWT) for the current Park’s vector modulus (CPVM) analysis, the inter-turn short-circuit faults diagnosis can be achieved. This method is based on the decomposition of the CPVM signal, where wavelet approximation and detail coefficients of this signal have been extracted. The energy evaluation of a known bandwidth detail permits to define a fault severity factor (FSF). This method has been tested through the simulation of an induction motor using a mathematical model based on the winding-function approach. Simulation, as well as experimental, results show the effectiveness of the used method.

Keywords: induction motors (IMs), inter-turn short-circuits diagnosis, discrete wavelet transform (DWT), current park’s vector modulus (CPVM)

Procedia PDF Downloads 551
7498 Approximate Solution of Some Mixed Boundary Value Problems of the Generalized Theory of Couple-Stress Thermo-Elasticity

Authors: Manana Chumburidze, David Lekveishvili

Abstract:

We have considered the harmonic oscillations and general dynamic (pseudo oscillations) systems of theory generalized Green-Lindsay of couple-stress thermo-elasticity for isotropic, homogeneous elastic media. Approximate solution of some mixed boundary value problems for finite domain, bounded by the some closed surface are constructed.

Keywords: the couple-stress thermoelasticity, boundary value problems, dynamic problems, approximate solution

Procedia PDF Downloads 498
7497 Excitation Experiments of a Cone Loudspeaker and Vibration-Acoustic Analysis Using FEM

Authors: Y. Hu, X. Zhao, T. Yamaguchi, M. Sasajima, Y. Koike

Abstract:

To focus on the vibration mode of a cone loudspeaker, which acts as an electroacoustic transducer, excitation experiments were performed using two types of loudspeaker units: one employing an impulse hammer and the other a sweep signal. The on-axis sound pressure frequency properties of the loudspeaker were evaluated, and the characteristic properties of the loudspeakers were successfully determined in both excitation experiments. Moreover, under conditions identical to the experiment conditions, a coupled analysis of the vibration-acoustics of the cone loudspeaker was performed using an acoustic analysis software program that considers the impact of damping caused by air viscosity. The result of sound pressure frequency properties with the numerical analysis are the most closely match that measured in the excitation experiments over a wide range of frequency bands.

Keywords: anechoic room, finite element method, impulse hammer, loudspeaker, reverberation room, sweep signal

Procedia PDF Downloads 423
7496 Analysis of Spatial and Temporal Data Using Remote Sensing Technology

Authors: Kapil Pandey, Vishnu Goyal

Abstract:

Spatial and temporal data analysis is very well known in the field of satellite image processing. When spatial data are correlated with time, series analysis it gives the significant results in change detection studies. In this paper the GIS and Remote sensing techniques has been used to find the change detection using time series satellite imagery of Uttarakhand state during the years of 1990-2010. Natural vegetation, urban area, forest cover etc. were chosen as main landuse classes to study. Landuse/ landcover classes within several years were prepared using satellite images. Maximum likelihood supervised classification technique was adopted in this work and finally landuse change index has been generated and graphical models were used to present the changes.

Keywords: GIS, landuse/landcover, spatial and temporal data, remote sensing

Procedia PDF Downloads 418
7495 On the Quantum Behavior of Nanoparticles: Quantum Theory and Nano-Pharmacology

Authors: Kurudzirayi Robson Musikavanhu

Abstract:

Nanophase particles exhibit quantum behavior by virtue of their small size, being particles of gamma to x-ray wavelength [atomic range]. Such particles exhibit high frequencies, high energy/photon, high penetration power, high ionization power [atomic behavior] and are stable at low energy levels as opposed to bulk phase matter [macro particles] which exhibit higher wavelength [radio wave end] properties, hence lower frequency, lower energy/photon, lower penetration power, lower ionizing power and are less stable at low temperatures. The ‘unique’ behavioral motion of Nano systems will remain a mystery as long as quantum theory remains a mystery, and for pharmacology, pharmacovigilance profiling of Nano systems becomes virtually impossible. Quantum theory is the 4 – 3 – 5 electromagnetic law of life and life motion systems on planet earth. Electromagnetic [wave-particle] properties of all particulate matter changes as mass [bulkiness] changes from one phase to the next [Nano-phase to micro-phase to milli-phase to meter-phase to kilometer phase etc.] and the subsequent electromagnetic effect of one phase particle on bulk matter [different phase] changes from one phase to another. All matter exhibit electromagnetic properties [wave-particle duality] in behavior and the lower the wavelength [and the lesser the bulkiness] the higher the gamma ray end properties exhibited and the higher the wavelength [and the greater the bulkiness], the more the radio-wave end properties are exhibited. Quantum theory is the 4 [moon] – 3[sun] – [earth] 5 law of the Electromagnetic spectrum [solar system]. 4 + 3 = 7; 4 + 3 + 5 = 12; 4 * 3 * 5 = 60; 42 + 32 = 52; 43 + 33 + 53 = 63. Quantum age is overdue.

Keywords: electromagnetic solar system, nano-material, nano pharmacology, pharmacovigilance, quantum theory

Procedia PDF Downloads 424
7494 Investigating Customer Engagement through the Prism of Congruity Theory

Authors: Jamid Ul Islam, Zillur Rahman

Abstract:

The impulse for customer engagement research in online brand communities (OBCs) is largely acknowledged in the literature. Applying congruity theory, this study proposes a model of customer engagement by examining how two congruities viz. self-brand image congruity and value congruity influence customers’ engagement in online brand communities. The consequent effect of customer engagement on brand loyalty is also studied. This study collected data through a questionnaire survey of 395 students of a higher educational institute in India, who were active on Facebook and followed a brand community (at least one). The data were analyzed using structure equation modelling. The results revealed that both the types of congruity i.e., self-brand image congruity and value congruity significantly affect customer engagement. A positive effect of customer engagement on brand loyalty was also affirmed by the results. This study integrates and broadens extant explanations of different congruity effects on consumer behavior-an area that has received little attention. This study is expected to add new trends to engage customers in online brand communities and offer realistic insights to the domain of social media marketing.

Keywords: congruity theory, customer engagement, Facebook, online brand communities

Procedia PDF Downloads 340
7493 Design of an Automated Deep Learning Recurrent Neural Networks System Integrated with IoT for Anomaly Detection in Residential Electric Vehicle Charging in Smart Cities

Authors: Wanchalerm Patanacharoenwong, Panaya Sudta, Prachya Bumrungkun

Abstract:

The paper focuses on the development of a system that combines Internet of Things (IoT) technologies and deep learning algorithms for anomaly detection in residential Electric Vehicle (EV) charging in smart cities. With the increasing number of EVs, ensuring efficient and reliable charging systems has become crucial. The aim of this research is to develop an integrated IoT and deep learning system for detecting anomalies in residential EV charging and enhancing EV load profiling and event detection in smart cities. This approach utilizes IoT devices equipped with infrared cameras to collect thermal images and household EV charging profiles from the database of Thailand utility, subsequently transmitting this data to a cloud database for comprehensive analysis. The methodology includes the use of advanced deep learning techniques such as Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) algorithms. IoT devices equipped with infrared cameras are used to collect thermal images and EV charging profiles. The data is transmitted to a cloud database for comprehensive analysis. The researchers also utilize feature-based Gaussian mixture models for EV load profiling and event detection. Moreover, the research findings demonstrate the effectiveness of the developed system in detecting anomalies and critical profiles in EV charging behavior. The system provides timely alarms to users regarding potential issues and categorizes the severity of detected problems based on a health index for each charging device. The system also outperforms existing models in event detection accuracy. This research contributes to the field by showcasing the potential of integrating IoT and deep learning techniques in managing residential EV charging in smart cities. The system ensures operational safety and efficiency while also promoting sustainable energy management. The data is collected using IoT devices equipped with infrared cameras and is stored in a cloud database for analysis. The collected data is then analyzed using RNN, LSTM, and feature-based Gaussian mixture models. The approach includes both EV load profiling and event detection, utilizing a feature-based Gaussian mixture model. This comprehensive method aids in identifying unique power consumption patterns among EV owners and outperforms existing models in event detection accuracy. In summary, the research concludes that integrating IoT and deep learning techniques can effectively detect anomalies in residential EV charging and enhance EV load profiling and event detection accuracy. The developed system ensures operational safety and efficiency, contributing to sustainable energy management in smart cities.

Keywords: cloud computing framework, recurrent neural networks, long short-term memory, Iot, EV charging, smart grids

Procedia PDF Downloads 47
7492 System Identification of Timber Masonry Walls Using Shaking Table Test

Authors: Timir Baran Roy, Luis Guerreiro, Ashutosh Bagchi

Abstract:

Dynamic study is important in order to design, repair and rehabilitation of structures. It has played an important role in the behavior characterization of structures; such as bridges, dams, high-rise buildings etc. There had been a substantial development in this area over the last few decades, especially in the field of dynamic identification techniques of structural systems. Frequency Domain Decomposition (FDD) and Time Domain Decomposition are most commonly used methods to identify modal parameters; such as natural frequency, modal damping, and mode shape. The focus of the present research is to study the dynamic characteristics of typical timber masonry walls commonly used in Portugal. For that purpose, a multi-storey structural prototypes of such walls have been tested on a seismic shake table at the National Laboratory for Civil Engineering, Portugal (LNEC). Signal processing has been performed of the output response, which is collected from the shaking table experiment of the prototype using accelerometers. In the present work signal processing of the output response, based on the input response has been done in two ways: FDD and Stochastic Subspace Identification (SSI). In order to estimate the values of the modal parameters, algorithms for FDD are formulated, and parametric functions for the SSI are computed. Finally, estimated values from both the methods are compared to measure the accuracy of both the techniques.

Keywords: frequency domain decomposition (fdd), modal parameters, signal processing, stochastic subspace identification (ssi), time domain decomposition

Procedia PDF Downloads 252
7491 Electron Spin Resonance of Conduction and Spin Waves Dynamics Investigations in Bi-2223 Superconductor for Decoding Pairing Mechanism

Authors: S. N. Ekbote, G. K. Padam, Manju Arora

Abstract:

Electron spin resonance (ESR) spectroscopic investigations of (Bi, Pb)₂Sr₂Ca₂Cu₃O₁₀₋ₓ (Bi-2223) bulk samples were carried out in both the normal and superconducting states. A broad asymmetric resonance signal with side signals is obtained in the normal state, and all of them disappear in the superconducting state. The temperature and angular orientation effects on these signals suggest that the broad asymmetric signal arises from electron spin resonance of conduction electrons (CESR) and the side signals from exchange interactions as Platzman-Wolff type spin waves. The disappearance of CESR and spin waves in a superconducting state demonstrates the role of exchange interactions in Cooper pair formation.

Keywords: Bi-2223 superconductor, CESR, ESR, exchange interactions, spin waves

Procedia PDF Downloads 112
7490 Comprehensive Machine Learning-Based Glucose Sensing from Near-Infrared Spectra

Authors: Bitewulign Mekonnen

Abstract:

Context: This scientific paper focuses on the use of near-infrared (NIR) spectroscopy to determine glucose concentration in aqueous solutions accurately and rapidly. The study compares six different machine learning methods for predicting glucose concentration and also explores the development of a deep learning model for classifying NIR spectra. The objective is to optimize the detection model and improve the accuracy of glucose prediction. This research is important because it provides a comprehensive analysis of various machine-learning techniques for estimating aqueous glucose concentrations. Research Aim: The aim of this study is to compare and evaluate different machine-learning methods for predicting glucose concentration from NIR spectra. Additionally, the study aims to develop and assess a deep-learning model for classifying NIR spectra. Methodology: The research methodology involves the use of machine learning and deep learning techniques. Six machine learning regression models, including support vector machine regression, partial least squares regression, extra tree regression, random forest regression, extreme gradient boosting, and principal component analysis-neural network, are employed to predict glucose concentration. The NIR spectra data is randomly divided into train and test sets, and the process is repeated ten times to increase generalization ability. In addition, a convolutional neural network is developed for classifying NIR spectra. Findings: The study reveals that the SVMR, ETR, and PCA-NN models exhibit excellent performance in predicting glucose concentration, with correlation coefficients (R) > 0.99 and determination coefficients (R²)> 0.985. The deep learning model achieves high macro-averaging scores for precision, recall, and F1-measure. These findings demonstrate the effectiveness of machine learning and deep learning methods in optimizing the detection model and improving glucose prediction accuracy. Theoretical Importance: This research contributes to the field by providing a comprehensive analysis of various machine-learning techniques for estimating glucose concentrations from NIR spectra. It also explores the use of deep learning for the classification of indistinguishable NIR spectra. The findings highlight the potential of machine learning and deep learning in enhancing the prediction accuracy of glucose-relevant features. Data Collection and Analysis Procedures: The NIR spectra and corresponding references for glucose concentration are measured in increments of 20 mg/dl. The data is randomly divided into train and test sets, and the models are evaluated using regression analysis and classification metrics. The performance of each model is assessed based on correlation coefficients, determination coefficients, precision, recall, and F1-measure. Question Addressed: The study addresses the question of whether machine learning and deep learning methods can optimize the detection model and improve the accuracy of glucose prediction from NIR spectra. Conclusion: The research demonstrates that machine learning and deep learning methods can effectively predict glucose concentration from NIR spectra. The SVMR, ETR, and PCA-NN models exhibit superior performance, while the deep learning model achieves high classification scores. These findings suggest that machine learning and deep learning techniques can be used to improve the prediction accuracy of glucose-relevant features. Further research is needed to explore their clinical utility in analyzing complex matrices, such as blood glucose levels.

Keywords: machine learning, signal processing, near-infrared spectroscopy, support vector machine, neural network

Procedia PDF Downloads 74
7489 Construction and Performance of Nanocomposite-Based Electrochemical Biosensor

Authors: Jianfang Wang, Xianzhe Chen, Zhuoliang Liu, Cheng-An Tao, Yujiao Li

Abstract:

Organophosphorus (OPs) pesticide used as insecticides are widely used in agricultural pest control, household and storage deworming. The detection of pesticides needs more simple and efficient methods. One of the best ways is to make electrochemical biosensors. In this paper, an electrochemical enzyme biosensor based on acetylcholine esterase (AChE) was constructed, and its sensing properties and sensing mechanisms were studied. Reduced graphene oxide-polydopamine complexes (RGO-PDA), gold nanoparticles (AuNPs) and silver nanoparticles (AgNPs) were prepared firstly and composited with AChE and chitosan (CS), then fixed on the glassy carbon electrode (GCE) surface to construct the biosensor GCE/RGO-PDA-AuNPs-AgNPs-AChE-CS by one-pot method. The results show that graphene oxide (GO) can be reduced by dopamine (DA) and dispersed well in RGO-PDA complexes. And the composites have a synergistic catalysis effect and can improve the surface resistance of GCE. The biosensor selectively can detect acetylcholine (ACh) and OPs pesticide with good linear range and high sensitivity. The performance of the biosensor is affected by the ratio and adding ways of AChE and the adding of AuNPs and AChE. And the biosensor can achieve a detection limit of 2.4 ng/L for methyl parathion and a wide linear detection range of 0.02 ng/L ~ 80 ng/L, and has excellent stability, good anti-interference ability, and excellent preservation performance, indicating that the sensor has practical value.

Keywords: acetylcholine esterase, electrochemical biosensor, nanoparticles, organophosphates, reduced graphene oxide

Procedia PDF Downloads 97
7488 Optimized Dynamic Bayesian Networks and Neural Verifier Test Applied to On-Line Isolated Characters Recognition

Authors: Redouane Tlemsani, Redouane, Belkacem Kouninef, Abdelkader Benyettou

Abstract:

In this paper, our system is a Markovien system which we can see it like a Dynamic Bayesian Networks. One of the major interests of these systems resides in the complete training of the models (topology and parameters) starting from training data. The Bayesian Networks are representing models of dubious knowledge on complex phenomena. They are a union between the theory of probability and the graph theory in order to give effective tools to represent a joined probability distribution on a set of random variables. The representation of knowledge bases on description, by graphs, relations of causality existing between the variables defining the field of study. The theory of Dynamic Bayesian Networks is a generalization of the Bayesians networks to the dynamic processes. Our objective amounts finding the better structure which represents the relationships (dependencies) between the variables of a dynamic bayesian network. In applications in pattern recognition, one will carry out the fixing of the structure which obliges us to admit some strong assumptions (for example independence between some variables).

Keywords: Arabic on line character recognition, dynamic Bayesian network, pattern recognition, networks

Procedia PDF Downloads 599
7487 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 121
7486 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 92
7485 A Novel Approach to Design of EDDR Architecture for High Speed Motion Estimation Testing Applications

Authors: T. Gangadhararao, K. Krishna Kishore

Abstract:

Motion Estimation (ME) plays a critical role in a video coder, testing such a module is of priority concern. While focusing on the testing of ME in a video coding system, this work presents an error detection and data recovery (EDDR) design, based on the residue-and-quotient (RQ) code, to embed into ME for video coding testing applications. An error in processing Elements (PEs), i.e. key components of a ME, can be detected and recovered effectively by using the proposed EDDR design. The proposed EDDR design for ME testing can detect errors and recover data with an acceptable area overhead and timing penalty.

Keywords: area overhead, data recovery, error detection, motion estimation, reliability, residue-and-quotient (RQ) code

Procedia PDF Downloads 413
7484 Path Integrals and Effective Field Theory of Large Scale Structure

Authors: Revant Nayar

Abstract:

In this work, we recast the equations describing large scale structure, and by extension all nonlinear fluids, in the path integral formalism. We first calculate the well known two and three point functions using Schwinger Keldysh formalism used commonly to perturbatively solve path integrals in non- equilibrium systems. Then we include EFT corrections due to pressure, viscosity, and noise as effects on the time-dependent propagator. We are able to express results for arbitrary two and three point correlation functions in LSS in terms of differential operators acting on a triple K master intergral. We also, for the first time, get analytical results for more general initial conditions deviating from the usual power law P∝kⁿ by introducing a mass scale in the initial conditions. This robust field theoretic formalism empowers us with tools from strongly coupled QFT to study the strongly non-linear regime of LSS and turbulent fluid dynamics such as OPE and holographic duals. These could be used to capture fully the strongly non-linear dynamics of fluids and move towards solving the open problem of classical turbulence.

Keywords: quantum field theory, cosmology, effective field theory, renormallisation

Procedia PDF Downloads 121
7483 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment

Authors: Ujjwall Sai Sunder Uppuluri

Abstract:

Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.

Keywords: complex systems, evolutionary theory, group theory, international political economy

Procedia PDF Downloads 118
7482 Alcohol Detection with Engine Locking System Using Arduino and ESP8266

Authors: Sukhpreet Singh, Kishan Bhojrath, Vijay, Avinash Kumar, Mandlesh Mishra

Abstract:

The project uses an Arduino and ESP8266 to construct an alcohol detection system with an engine locking mechanism, offering a distinct way to fight drunk driving. An alcohol sensor module is used by the system to determine the amount of alcohol present in the ambient air. When the system detects alcohol levels beyond a certain threshold that is deemed hazardous for driving, it activates a relay module that is linked to the engine of the car, so rendering it inoperable. By preventing people from operating a vehicle while intoxicated, this preventive measure seeks to improve road safety. Adding an ESP8266 module also allows for remote monitoring and notifications, giving users access to real-time status updates on their system. By using an integrated strategy, the initiative provides a workable and efficient way to lessen the dangers related to driving while intoxicated.

Keywords: MQ3 sensor, ESP 8266, arduino, IoT

Procedia PDF Downloads 46
7481 Localization Mobile Beacon Using RSSI

Authors: Sallama Resen, Celal Öztürk

Abstract:

Distance estimation between tow nodes has wide scope of surveillance and tracking applications. This paper suggests a Bluetooth Low Energy (BLE) technology as a media for transceiver and receiver signal in small indoor areas. As an example, BLE communication technologies used in child safety domains. Local network is designed to detect child position in indoor school area consisting Mobile Beacons (MB), Access Points (AP) and Smart Phones (SP) where MBs stuck in children’s shoes as wearable sensors. This paper presents a technique that can detect mobile beacons’ position and help finding children’s location within dynamic environment. By means of bluetooth beacons that are attached to child’s shoes, the distance between the MB and teachers SP is estimated with an accuracy of less than one meter. From the simulation results, it is shown that high accuracy of position coordinates are achieved for multi-mobile beacons in different environments.

Keywords: bluetooth low energy, child safety, mobile beacons, received signal strength

Procedia PDF Downloads 331