Search results for: fig fruit extract
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2665

Search results for: fig fruit extract

865 Anti-Cancerous Activity of Sargassum siliquastrum in Cervical Cancer: Choreographing the Fly's Danse Macabre

Authors: Sana Abbasa, Shahzad Bhattiab, Nadir Khan

Abstract:

Sargassum siliquastrum is brown seaweed with traditional claims for some medicinal properties. This research was done to investigate the methanol extract of S. siliquastrum for antiproliferative activity against human cervical cancer cell line, HeLa and its mode of cell death. From methylene blue assay, S. siliquastrum exhibited antiproliferative activity on HeLa cells with IC50 of 3.87 µg/ml without affecting non-malignant cells. Phase contrast microscopy indicated the confluency reduction in HeLa cells and changes on the cell shape. Nuclear staining with Hoechst 33258 displayed the formation of apoptotic bodies and fragmented nuclei. S. siliquastrum also induced early apoptosis event in HeLa cells as confirmed by FITC-Annexin V/propidium iodide staining by flow cytometry analysis. Cell cycle analysis indicated growth arrest of HeLa cells at G1/S phase. Protein study by flow cytometry indicated the increment of p53, slight increase of Bax and unchanged level of Bcl-2. In conclusion, S. siliquastrum demonstrated an antiproliferative activity in HeLa cell by inducing G1/S cell cycle arrest via p53-mediated pathway.

Keywords: sargassum siliquastrum, cervical cancer, P53, antiproleferation

Procedia PDF Downloads 632
864 The Capacity of Mel Frequency Cepstral Coefficients for Speech Recognition

Authors: Fawaz S. Al-Anzi, Dia AbuZeina

Abstract:

Speech recognition is of an important contribution in promoting new technologies in human computer interaction. Today, there is a growing need to employ speech technology in daily life and business activities. However, speech recognition is a challenging task that requires different stages before obtaining the desired output. Among automatic speech recognition (ASR) components is the feature extraction process, which parameterizes the speech signal to produce the corresponding feature vectors. Feature extraction process aims at approximating the linguistic content that is conveyed by the input speech signal. In speech processing field, there are several methods to extract speech features, however, Mel Frequency Cepstral Coefficients (MFCC) is the popular technique. It has been long observed that the MFCC is dominantly used in the well-known recognizers such as the Carnegie Mellon University (CMU) Sphinx and the Markov Model Toolkit (HTK). Hence, this paper focuses on the MFCC method as the standard choice to identify the different speech segments in order to obtain the language phonemes for further training and decoding steps. Due to MFCC good performance, the previous studies show that the MFCC dominates the Arabic ASR research. In this paper, we demonstrate MFCC as well as the intermediate steps that are performed to get these coefficients using the HTK toolkit.

Keywords: speech recognition, acoustic features, mel frequency, cepstral coefficients

Procedia PDF Downloads 259
863 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 315
862 Water Budget in High Drought-Borne Area in Jaffna District, Sri Lanka during Dry Season

Authors: R. Kandiah, K. Miyamoto

Abstract:

In Sri Lanka, the Jaffna area is a high drought affected area and depends mainly on groundwater aquifers for water needs. Water for daily activities is extracted from wells. As households manually extract water from the wells, it is not drawn from mid evening to early morning. The water inflow at night provides the maximum water level that decreases during the daytime due to extraction. The storage volume of water in wells is limited or at its lowest level during the dry season. This study analyzes the domestic water budget during the dry season in the Jaffna area. In order to evaluate the water inflow rate into wells, storage volume and extraction volume from wells over time, water pressure is measured at the bottom of three wells, which are located in coastal area denoted as well A, in nonspecific area denoted as well B, and agricultural area denoted as well C. The water quality at the wells A, B, and C, are mostly fresh, modest fresh, and saline respectively. From the monitoring, we can find that the daily inflow amount of water into the wells and daily water extraction depend on each other, that is, higher extraction yields higher inflow. And, in the dry season, the daily inflow volume and the daily extraction volume of each well are almost in balance.

Keywords: accessible volume, consumption volume, inflow rate, water budget

Procedia PDF Downloads 358
861 Process Mining as an Ecosystem Platform to Mitigate a Deficiency of Processes Modelling

Authors: Yusra Abdulsalam Alqamati, Ahmed Alkilany

Abstract:

The teaching staff is a distinct group whose impact is on the educational process and which plays an important role in enhancing the quality of the academic education process. To improve the management effectiveness of the academy, the Teaching Staff Management System (TSMS) proposes that all teacher processes be digitized. Since the BPMN approach can accurately describe the processes, it lacks a clear picture of the process flow map, something that the process mining approach has, which is extracting information from event logs for discovery, monitoring, and model enhancement. Therefore, these two methodologies were combined to create the most accurate representation of system operations, the ability to extract data records and mining processes, recreate them in the form of a Petri net, and then generate them in a BPMN model for a more in-depth view of process flow. Additionally, the TSMS processes will be orchestrated to handle all requests in a guaranteed small-time manner thanks to the integration of the Google Cloud Platform (GCP), the BPM engine, and allowing business owners to take part throughout the entire TSMS project development lifecycle.

Keywords: process mining, BPM, business process model and notation, Petri net, teaching staff, Google Cloud Platform

Procedia PDF Downloads 142
860 Neighborhood Graph-Optimized Preserving Discriminant Analysis for Image Feature Extraction

Authors: Xiaoheng Tan, Xianfang Li, Tan Guo, Yuchuan Liu, Zhijun Yang, Hongye Li, Kai Fu, Yufang Wu, Heling Gong

Abstract:

The image data collected in reality often have high dimensions, and it contains noise and redundant information. Therefore, it is necessary to extract the compact feature expression of the original perceived image. In this process, effective use of prior knowledge such as data structure distribution and sample label is the key to enhance image feature discrimination and robustness. Based on the above considerations, this paper proposes a local preserving discriminant feature learning model based on graph optimization. The model has the following characteristics: (1) Locality preserving constraint can effectively excavate and preserve the local structural relationship between data. (2) The flexibility of graph learning can be improved by constructing a new local geometric structure graph using label information and the nearest neighbor threshold. (3) The L₂,₁ norm is used to redefine LDA, and the diagonal matrix is introduced as the scale factor of LDA, and the samples are selected, which improves the robustness of feature learning. The validity and robustness of the proposed algorithm are verified by experiments in two public image datasets.

Keywords: feature extraction, graph optimization local preserving projection, linear discriminant analysis, L₂, ₁ norm

Procedia PDF Downloads 149
859 Two-Photon-Exchange Effects in the Electromagnetic Production of Pions

Authors: Hui-Yun Cao, Hai-Qing Zhou

Abstract:

The high precision measurements and experiments play more and more important roles in particle physics and atomic physics. To analyse the precise experimental data sets, the corresponding precise and reliable theoretical calculations are necessary. Until now, the form factors of elemental constituents such as pion and proton are still attractive issues in current Quantum Chromodynamics (QCD). In this work, the two-photon-exchange (TPE) effects in ep→enπ⁺ at small -t are discussed within a hadronic model. Under the pion dominance approximation and the limit mₑ→0, the TPE contribution to the amplitude can be described by a scalar function. We calculate TPE contributions to the amplitude, and the unpolarized differential cross section with the only elastic intermediate state is considered. The results show that the TPE corrections to the unpolarized differential cross section are about from -4% to -20% at Q²=1-1.6 GeV². After considering the TPE corrections to the experimental data sets of unpolarized differential cross section, we analyze the TPE corrections to the separated cross sections σ(L,T,LT,TT). We find that the TPE corrections (at Q²=1-1.6 GeV²) to σL are about from -10% to -30%, to σT are about 20%, and to σ(LT,TT) are much larger. By these analyses, we conclude that the TPE contributions in ep→enπ⁺ at small -t are important to extract the separated cross sections σ(L,T,LT,TT) and the electromagnetic form factor of π⁺ in the experimental analysis.

Keywords: differential cross section, form factor, hadronic, two-photon

Procedia PDF Downloads 133
858 Rheological Characterization of Gels Based on Medicinal Plant Extracts Mixture (Zingibar Officinale and Cinnamomum Cassia)

Authors: Zahia Aliche, Fatiha Boudjema, Benyoucef Khelidj, Selma Mettai, Zohra Bouriahi, Saliha Mohammed Belkebir, Ridha Mazouz

Abstract:

The purpose of this work is the study of the viscoelastic behaviour formulating gels based plant extractions. The extracts of Zingibar officinale and Cinnamomum cassia were included in the gel at different concentrations of these plants in order to be applied in anti-inflammatory drugs. The yield of ethanolic extraction of Zingibar o. is 3.98% and for Cinnamomum c., essential oil by hydrodistillation is 1.67 %. The ethanolic extract of Zingibar.o, the essential oil of Cinnamomum c. and the mixture showed an anti-DPPH radicals’ activity, presented by EC50 values of 11.32, 13.48 and 14.39 mg/ml respectively. A gel based on different concentrations of these extracts was prepared. Microbiological tests conducted against Staphylococcus aureus and Escherichia colishowed moderate inhibition of Cinnamomum c. gel and less the gel based on Cinnamomum c./ Zingibar o. (20/80). The yeast Candida albicansis resistant to gels. The viscoelastic formulation property was carried out in dynamic and creep and modeled with the Kelvin-Voigt model. The influence of some parameters on the stability of the gel (time, temperature and applied stress) has been studied.

Keywords: Cinnamomum cassia, Zingibar officinale, antioxidant activity, antimicrobien activity, gel, viscoelastic behaviour

Procedia PDF Downloads 89
857 Pathophysiological Implications in Immersion Treatment Methods of Icthyophthiriasis Disease in African Catfish (Clarias gariepinus) Using Moringa oleifera Extract

Authors: Ikele Chika Bright, Mgbenka Bernard Obialo, Ikele Chioma Faith

Abstract:

Icthyophthiriasis is a prevalent protozoan (ectoparasite) mostly affecting cultured and aquarium fishes. The majority of the chemotherapeutants lack efficacy for completely eliminating Ich parasite without affecting the environment and they are not safe for human health. The present work is focused on the evaluating different immersion treatments of African catfish (Clarias gariepinus) infected with ichthyophthiriasis and treated with a non-chemical and environmental friendly parasiticides Moringa oleifera. A total number of 800 apparently healthy parasites free (examined) post juvenile catfish were obtained from a reputable farm, disinfected with potassium permanganate in a quarantine tank to remove any possible external parasites. The fish were further challenged with approximately 44,000 infective stages of theronts which were obtained through serial passages by cohabitation. Seven groups (A-G) of post Juvenile were used for the experiment which was carried out into three stages; Dips (60minutes), short term treatment (24-96h) and prolong bath treatment (0-15 days). The concentrations selected were dependent on the outcome of the LC50 of the plant material from which dose-dependent factors were used to select various concentrations of the treatment. In Dips treatment, group D-G were treated with 1,500mg/L, 2500mg/L., 3500mg/L and 4500mg/L, short-term treatment was treated with 150mg/L, 250mg/L, 350mg/L and 450mg/L and prolong bath was treated with 15mg/L, 25mg/L, 35mg/L and 45mg/L of the plant extract whereas group A, B and C were normal control, Ich- infested not treated and Ich- infested treated with standard drug (Acriflavin), respectively. The various types of treatment applied with corresponding concentrations showed almost complete elimination of the adult parasites (trophonts) both in the gills and the body smear, thereby making M. oleifera a potential parasiticides. There were serious pathological alterations in the skin and gills which are usually the main point for Ich parasites invasion but no significant morphological characteristics was noted among the treated groups subjected to different immersion treatment patterns. Epitheliocystis, aneurysm, oedema, hemorrhage, and localization of the adult parasite in the gills were the overall common observations made in the gills whereas degeneration of muscle fibre, dermatitis, hemorrhage, oedema, abscess formation and keratinisation were observed in the skin. However, there are no pathological changes in the control group. Moreover, biochemical parameters such as urea, creatinine, albumin., globulin, total protein, ALT, AST), blood chemistry (sodium, chloride, potassium, bicarbonate), antioxidants (CAT, SOD, GPx, LPO), enzymatic activities (myeloperoxidase, thioreadoxin reductase), Inflammatory response (C-reactive protein), Stress markers (lactate dehydrogenase), heamatological parameters (RBC, PCV, WBC, HB and differential count), lipid profile (total cholesterol, tryglycerides , high density lipoprotein and low density lipoprotein) all showed various significant (P<0.05) and no significant (P>0.05) responses among the Ich-infested fish treated under three immersion treatments. It is suggested that M. oleifera may serve as an alternatives to chemotherapeutants for control of Ichthyophthiriasis in African catfish Clarias gariepinus.

Keywords: Icthyophthirius multifilis, immersion treatment, pathophysiology, African catfish

Procedia PDF Downloads 389
856 Protective Effect of Germinated Fenugreek Seeds on Keratoachantoma Cancer Skin

Authors: Zahra Sokar, Sara Oufquir, Brahim Eddafali, Abderrahman Chait

Abstract:

Fenugreek is one of the oldest plants used in traditional herbal medicine. Several studies have demonstrated the anticancer effects of seeds by inhibiting the proliferation, angiogenesis, invasion and metastasis of various cancers. While there is plenty of research demonstrating the antineoplastic effects of dormant seeds, little is known about the potential of sprouts in fighting cancer. Therefore, we propose to study the chemoprotective effect of germinating fenugreek seeds on keratoacanthoma skin cancer induced by cutaneous exposure to DMA/Croton oil in mice. The results obtained show that oral administration of 250 and 500 mg/kg aqueous sprout seed extract reduces the incidence, rate, volume, and tumor weight in a very significant manner. Histological examination revealed that mice treated with 250 mg/kg showed strong inhibition of squamous cell carcinoma formation with thickening of the epithelial layer and mild acanthosis and hyperkeratosis. A dose of 500 mg/kg prevented invasion and the occurrence of hyperkeratosis. Fenugreek sprouts appear to be a promising natural product for preventing keratoacanthoma skin cancer. Nevertheless, further studies in the same field need to be developed to evaluate the antineoplastic potential of germinated seeds.

Keywords: anticancer, fenugreek, keratoacanthoma, sprouts

Procedia PDF Downloads 77
855 Legal Issues of Collecting and Processing Big Health Data in the Light of European Regulation 679/2016

Authors: Ioannis Iglezakis, Theodoros D. Trokanas, Panagiota Kiortsi

Abstract:

This paper aims to explore major legal issues arising from the collection and processing of Health Big Data in the light of the new European secondary legislation for the protection of personal data of natural persons, placing emphasis on the General Data Protection Regulation 679/2016. Whether Big Health Data can be characterised as ‘personal data’ or not is really the crux of the matter. The legal ambiguity is compounded by the fact that, even though the processing of Big Health Data is premised on the de-identification of the data subject, the possibility of a combination of Big Health Data with other data circulating freely on the web or from other data files cannot be excluded. Another key point is that the application of some provisions of GPDR to Big Health Data may both absolve the data controller of his legal obligations and deprive the data subject of his rights (e.g., the right to be informed), ultimately undermining the fundamental right to the protection of personal data of natural persons. Moreover, data subject’s rights (e.g., the right not to be subject to a decision based solely on automated processing) are heavily impacted by the use of AI, algorithms, and technologies that reclaim health data for further use, resulting in sometimes ambiguous results that have a substantial impact on individuals. On the other hand, as the COVID-19 pandemic has revealed, Big Data analytics can offer crucial sources of information. In this respect, this paper identifies and systematises the legal provisions concerned, offering interpretative solutions that tackle dangers concerning data subject’s rights while embracing the opportunities that Big Health Data has to offer. In addition, particular attention is attached to the scope of ‘consent’ as a legal basis in the collection and processing of Big Health Data, as the application of data analytics in Big Health Data signals the construction of new data and subject’s profiles. Finally, the paper addresses the knotty problem of role assignment (i.e., distinguishing between controller and processor/joint controllers and joint processors) in an era of extensive Big Health data sharing. The findings are the fruit of a current research project conducted by a three-member research team at the Faculty of Law of the Aristotle University of Thessaloniki and funded by the Greek Ministry of Education and Religious Affairs.

Keywords: big health data, data subject rights, GDPR, pandemic

Procedia PDF Downloads 129
854 Ensemble of Deep CNN Architecture for Classifying the Source and Quality of Teff Cereal

Authors: Belayneh Matebie, Michael Melese

Abstract:

The study focuses on addressing the challenges in classifying and ensuring the quality of Eragrostis Teff, a small and round grain that is the smallest cereal grain. Employing a traditional classification method is challenging because of its small size and the similarity of its environmental characteristics. To overcome this, this study employs a machine learning approach to develop a source and quality classification system for Teff cereal. Data is collected from various production areas in the Amhara regions, considering two types of cereal (high and low quality) across eight classes. A total of 5,920 images are collected, with 740 images for each class. Image enhancement techniques, including scaling, data augmentation, histogram equalization, and noise removal, are applied to preprocess the data. Convolutional Neural Network (CNN) is then used to extract relevant features and reduce dimensionality. The dataset is split into 80% for training and 20% for testing. Different classifiers, including FVGG16, FINCV3, QSCTC, EMQSCTC, SVM, and RF, are employed for classification, achieving accuracy rates ranging from 86.91% to 97.72%. The ensemble of FVGG16, FINCV3, and QSCTC using the Max-Voting approach outperforms individual algorithms.

Keywords: Teff, ensemble learning, max-voting, CNN, SVM, RF

Procedia PDF Downloads 53
853 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 211
852 Emotion Classification Using Recurrent Neural Network and Scalable Pattern Mining

Authors: Jaishree Ranganathan, MuthuPriya Shanmugakani Velsamy, Shamika Kulkarni, Angelina Tzacheva

Abstract:

Emotions play an important role in everyday life. An-alyzing these emotions or feelings from social media platforms like Twitter, Facebook, blogs, and forums based on user comments and reviews plays an important role in various factors. Some of them include brand monitoring, marketing strategies, reputation, and competitor analysis. The opinions or sentiments mined from such data helps understand the current state of the user. It does not directly provide intuitive insights on what actions to be taken to benefit the end user or business. Actionable Pattern Mining method provides suggestions or actionable recommendations on what changes or actions need to be taken in order to benefit the end user. In this paper, we propose automatic classification of emotions in Twitter data using Recurrent Neural Network - Gated Recurrent Unit. We achieve training accuracy of 87.58% and validation accuracy of 86.16%. Also, we extract action rules with respect to the user emotion that helps to provide actionable suggestion.

Keywords: emotion mining, twitter, recurrent neural network, gated recurrent unit, actionable pattern mining

Procedia PDF Downloads 168
851 A phytochemical and Biological Study of Viscum schemperi Engl. Growing in Saudi Arabia

Authors: Manea A. I. Alqrad, Alaa Sirwi, Sabrin R. M. Ibrahim, Hossam M. Abdallah, Gamal A. Mohamed

Abstract:

Phytochemical study of the methanolic extract of the air dried powdered of the parts of Viscum schemperi Engl. (Family: Viscaceae) using different chromatographic techniques led to the isolation of five compounds: -amyrenone (1), betulinic acid (2), (3β)-olean-12-ene-3,23-diol (3), -oleanolic acid (4), and α-oleanolic acid (5). Their structures were established based on physical, chemical, and spectral data. Anti-inflammatory and anti-apoptotic activities of oleanolic acid in a mouse model of acute hepatorenal damage were assessed. This study showed the efficacy of oleanolic acid to counteract thioacetamide-induced hepatic and kidney injury in mice through the reduction of hepatocyte oxidative damage, suppression of inflammation, and apoptosis. More importantly, oleanolic acid suppressed thioacetamide-induced hepatic and kidney injury by inhibiting NF-κB/TNF-α-mediated inflammation/apoptosis and enhancing SIRT1/Nrf2/Heme-oxygenase signalling pathway. These promising pharmacological activities suggest the potential use of oleanolic acid against hepatorenal damage.

Keywords: oleanolic acid, viscum schimperi, thioacetamide, SIRT1/Nrf2/NF-κB, hepatorenal damage

Procedia PDF Downloads 98
850 Aspect-Level Sentiment Analysis with Multi-Channel and Graph Convolutional Networks

Authors: Jiajun Wang, Xiaoge Li

Abstract:

The purpose of the aspect-level sentiment analysis task is to identify the sentiment polarity of aspects in a sentence. Currently, most methods mainly focus on using neural networks and attention mechanisms to model the relationship between aspects and context, but they ignore the dependence of words in different ranges in the sentence, resulting in deviation when assigning relationship weight to other words other than aspect words. To solve these problems, we propose a new aspect-level sentiment analysis model that combines a multi-channel convolutional network and graph convolutional network (GCN). Firstly, the context and the degree of association between words are characterized by Long Short-Term Memory (LSTM) and self-attention mechanism. Besides, a multi-channel convolutional network is used to extract the features of words in different ranges. Finally, a convolutional graph network is used to associate the node information of the dependency tree structure. We conduct experiments on four benchmark datasets. The experimental results are compared with those of other models, which shows that our model is better and more effective.

Keywords: aspect-level sentiment analysis, attention, multi-channel convolution network, graph convolution network, dependency tree

Procedia PDF Downloads 219
849 α-Amylase Inhibitory Activity of Some Tunisian Aromatic and Medicinal Plants

Authors: Hamdi Belfeki, Belgacem Chandoul, Mnasser Hassouna, Mondher Mejri

Abstract:

Aqueous and ethanolic extracts of eight Tunisian aromatic and medicinal plants (TAMP) were characterized by studying their composition in polyphenols and also their antiradical and antioxidant capacities. In absence and in the presence of the various extracts, α-amylase from Bacillus subtlis activity, was measured in order to detect a potential inhibition. The total contents of polyphenols and flavonoid vary in function of TAMP and the mobile phase used for the extraction (distilled water or ethanol). The ethanolic extracts showed the most significant antiradical and antioxidant activities. Only the extracts from Coriandrum sativum showed a significant inhibiting effect on the α-amylase activity. This inhibiting capacity could be correlated with the chemical profile of the two extracts, due to the fact that they have the greatest amount of total flavonoid. The ethanolic extract has the most important antioxidant and anti-radicalizing activities among the sixteen extracts studied. The inhibition kinetics of the two coriander extracts were evaluated by pre-incubation method, using Lineweaver-Burk’s equation, obtained by linearization of Michaeilis-Menten’s expression. The results showed that both extracts exercised a competitive inhibition mechanism.

Keywords: α-amylase, antioxidant activity, aromatic and medicinal plants, inhibition

Procedia PDF Downloads 450
848 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection

Authors: Maryam Heidari, James H. Jones Jr.

Abstract:

Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.

Keywords: bot detection, natural language processing, neural network, social media

Procedia PDF Downloads 116
847 The Occurrence of Clavibacter michiganensis subsp. sepedonicus on Potato in South Sulawesi, Indonesia

Authors: Baharuddin Patandjengi, A. Pabborong, T. Kuswinanti

Abstract:

Bacterial ring rot caused by a gram-positive Coryneform bacterium Corynebacterium michiganensis subsp. sepedonicus is an important disease on potato crops in the world. The disease still belongs to an A1 quarantine pathogen in Indonesia, although it was found in West Java since 2013. The objective of this study was to know the presence of bacterial ring rot in four potato district areas in South Sulawesi. Infected samples were collected from potato fields and storage warehouses in Enrekang, Gowa, Jeneponto and Bantaeng districts. Potato tuber samples were cut and observed their vasiculer vessels and the bacterial ooze was used for isolation on Nutrient Agar and Nutrient Broth–Yeast extract medium. Bacterial isolates were then morphologically and physiologically characterized. A patogenicity test on eggplant and molecular characterization using PCR with specific primer for Cms (50F and Cms 50 R) was revealed for further identification. The results showed that Cms has become widespread in four districts of South Sulawesi. The bacterial ringrot disease incidence in these districts was reached above 30 %. All of 14 bacterial isolates that identified before using standard methods of EPPO, showed DNA band in size of 224 bp in PCR test, which indicated positively belong to C. michiganensis subsp. sepedonicus.

Keywords: bacterial ring rot, clavibacter michiganensis pv. sepedonicus, PCR, potato

Procedia PDF Downloads 334
846 Evalution of Antiurolithiatic Potentials from Cucumis sativus Fruits

Authors: H. J. Pramod, S. Pethkar

Abstract:

The evaluation of antiurolithiatic potentials from the extracts of Cucumis sativus fruits at different doses and cystone (standard formulation) at a dose of 750 mg/kg were measured for both preventive and curative regimen in wistar rats by adding 0.75% v/v ethylene glycol (EG) to drinking water for 28 days, except normal rats. After the completion of the experimental period, (28th day) urinary parameters like (urine volume, routine urine analysis, levels of calcium, phosphate, oxalate, magnesium, sodium) serum biomarkers like (creatinine, BUN, uric acid, ALP, ALT, AST) kidney homogenate analysis for (levels of calcium, oxalate and phosphate) were analysed. The treated groups shows increased in the urine output significantly compared to the normal. The extract shows significantly decreased in the urinary excretion of the calcium, phosphate, magnesium, sodium and oxalate. The both preventive and curative treatment of extracts showed decrease in the stone forming constituents in the kidneys of urolithiatic rats further the kidneys of all the groups were excised and sectioned for histopathological examination which further claims to posses antiurolithiatic activity.

Keywords: Cucumis sativus, urolithiasis, ethylene glycol, cystone

Procedia PDF Downloads 548
845 An Analytic Comparison between Arabic and English Prosodies: Poetical Feet and Meters

Authors: Jamil Jafari, Sharafat Karimi

Abstract:

The Arabic Language has a complicated system of prosody invented by the great grammarian Khalil Ibn Ahmad Farahidi. He could extract 15 meters out of his innovative five circles, which were used in Arabic poetry of the 7th and 8th centuries. Then after a while, his student Akhfash added or compensated another meter to his tutor's meters, so overall, we now have 16 different meters in Arabic poetry. These meters have been formed by various combinations of 8 different feet and each foot is combined of rudimentary units called Sabab and Wated which are combinations of movement (/) and silent (ʘ) letters. On the other hand in English, we are dealing with another system of metrical prosody. In this language, feet are consisted of stressed and unstressed syllables and are of six types: iamb, trochee, dactyl, anapest, spondee, and pyrrhic. Using the descriptive-analytic method, in this research we aim at making a comparison between Arabic and English systems of metrical prosody to investigate their similarities and differences. The results show that both of them are quantitative and both of them rely on syllables in afoot. But unlike Arabic, English is utilizing another rhyme system and the number of feet in a line differs from Arabic; also, its feet are combined of stressed and unstressed syllables, while those of Arabic is a combination of movement and silent letters.

Keywords: Arabic prosody, English prosody, foot, meter, poetry

Procedia PDF Downloads 146
844 Detecting Manipulated Media Using Deep Capsule Network

Authors: Joseph Uzuazomaro Oju

Abstract:

The ease at which manipulated media can be created, and the increasing difficulty in identifying fake media makes it a great threat. Most of the applications used for the creation of these high-quality fake videos and images are built with deep learning. Hence, the use of deep learning in creating a detection mechanism cannot be overemphasized. Any successful fake media that is being detected before it reached the populace will save people from the self-doubt of either a content is genuine or fake and will ensure the credibility of videos and images. The methodology introduced in this paper approaches the manipulated media detection challenge using a combo of VGG-19 and a deep capsule network. In the case of videos, they are converted into frames, which, in turn, are resized and cropped to the face region. These preprocessed images/videos are fed to the VGG-19 network to extract the latent features. The extracted latent features are inputted into a deep capsule network enhanced with a 3D -convolution dynamic routing agreement. The 3D –convolution dynamic routing agreement algorithm helps to reduce the linkages between capsules networks. Thereby limiting the poor learning shortcoming of multiple capsule network layers. The resultant output from the deep capsule network will indicate a media to be either genuine or fake.

Keywords: deep capsule network, dynamic routing, fake media detection, manipulated media

Procedia PDF Downloads 134
843 Proposing an Architecture for Drug Response Prediction by Integrating Multiomics Data and Utilizing Graph Transformers

Authors: Nishank Raisinghani

Abstract:

Efficiently predicting drug response remains a challenge in the realm of drug discovery. To address this issue, we propose four model architectures that combine graphical representation with varying positions of multiheaded self-attention mechanisms. By leveraging two types of multi-omics data, transcriptomics and genomics, we create a comprehensive representation of target cells and enable drug response prediction in precision medicine. A majority of our architectures utilize multiple transformer models, one with a graph attention mechanism and the other with a multiheaded self-attention mechanism, to generate latent representations of both drug and omics data, respectively. Our model architectures apply an attention mechanism to both drug and multiomics data, with the goal of procuring more comprehensive latent representations. The latent representations are then concatenated and input into a fully connected network to predict the IC-50 score, a measure of cell drug response. We experiment with all four of these architectures and extract results from all of them. Our study greatly contributes to the future of drug discovery and precision medicine by looking to optimize the time and accuracy of drug response prediction.

Keywords: drug discovery, transformers, graph neural networks, multiomics

Procedia PDF Downloads 153
842 A Framework of Product Information Service System Using Mobile Image Retrieval and Text Mining Techniques

Authors: Mei-Yi Wu, Shang-Ming Huang

Abstract:

The online shoppers nowadays often search the product information on the Internet using some keywords of products. To use this kind of information searching model, shoppers should have a preliminary understanding about their interesting products and choose the correct keywords. However, if the products are first contact (for example, the worn clothes or backpack of passengers which you do not have any idea about the brands), these products cannot be retrieved due to insufficient information. In this paper, we discuss and study the applications in E-commerce using image retrieval and text mining techniques. We design a reasonable E-commerce application system containing three layers in the architecture to provide users product information. The system can automatically search and retrieval similar images and corresponding web pages on Internet according to the target pictures which taken by users. Then text mining techniques are applied to extract important keywords from these retrieval web pages and search the prices on different online shopping stores with these keywords using a web crawler. Finally, the users can obtain the product information including photos and prices of their favorite products. The experiments shows the efficiency of proposed system.

Keywords: mobile image retrieval, text mining, product information service system, online marketing

Procedia PDF Downloads 359
841 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 323
840 Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution

Authors: Haiyan Wu, Ying Liu, Shaoyun Shi

Abstract:

Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets.

Keywords: authorship attribution, attention mechanism, syntactic feature, feature extraction

Procedia PDF Downloads 136
839 Screening, Selection and Optimization of Extracellular Methanol and Ethanol Tolerant Lipase from Acinetobacter sp. K5B4

Authors: Khaled M. Khleifat

Abstract:

An extracellular methanol and ethanol tolerant lipase producing bacterial strain K5b4 was isolated from soil samples contaminated with hydrocarbon residues. It was identified by using morphological and biochemical characteristics and 16srRNA technique as Acinetobacter species. The immobilized lipase from Acinetobacter sp. K5b4 retained more than 98% of its residual activity after incubation with pure methanol and ethanol for 24 hours. The highest hydrolytic activity of the immobilized enzyme was obtained in the presence of 75% (v/v) methanol in the assay solution. In contrary, the enzyme was able to maintain its original activity up to only 25% (v/v) ethanol whereas at elevated concentrations of 50 and 75% (v/v) the enzyme activity was reduced to 10 and 40%, respectively. Maximum lipase activity of 31.5 mU/mL was achieved after 48 hr cultivation when the optimized medium (pH 7.0) that composed of 1.0% (w/v) olive oil, 0.2% (w/v) glycerol, 0.15% (w/v) yeast extract, and 0.05% (w/v) NaCl was inoculated with 0.4% (v/v) seed culture and incubated at 30°C and 150 rpm agitation speed. However, the presence of CaCl2 in the growth media did not show any inhibitory or stimulatory effect on the enzyme production as it compared to the control experiment. Meanwhile, the other mineral salts MgCl2, MnCl2, KCl and CoCl2 were negatively affected the production of lipase enzyme. The inhibition of lipase production from Acinetobacter sp. K5b4 in presence of glucose suggesting that lipase gene expression is prone to catabolic repression.

Keywords: K5B4, methanol and ethanol, acinetobacter, morphological

Procedia PDF Downloads 318
838 Model-Based Field Extraction from Different Class of Administrative Documents

Authors: Jinen Daghrir, Anis Kricha, Karim Kalti

Abstract:

The amount of incoming administrative documents is massive and manually processing these documents is a costly task especially on the timescale. In fact, this problem has led an important amount of research and development in the context of automatically extracting fields from administrative documents, in order to reduce the charges and to increase the citizen satisfaction in administrations. In this matter, we introduce an administrative document understanding system. Given a document in which a user has to select fields that have to be retrieved from a document class, a document model is automatically built. A document model is represented by an attributed relational graph (ARG) where nodes represent fields to extract, and edges represent the relation between them. Both of vertices and edges are attached with some feature vectors. When another document arrives to the system, the layout objects are extracted and an ARG is generated. The fields extraction is translated into a problem of matching two ARGs which relies mainly on the comparison of the spatial relationships between layout objects. Experimental results yield accuracy rates from 75% to 100% tested on eight document classes. Our proposed method has a good performance knowing that the document model is constructed using only one single document.

Keywords: administrative document understanding, logical labelling, logical layout analysis, fields extraction from administrative documents

Procedia PDF Downloads 213
837 Water Footprint for the Palm Oil Industry in Malaysia

Authors: Vijaya Subramaniam, Loh Soh Kheang, Astimar Abdul Aziz

Abstract:

Water footprint (WFP) has gained importance due to the increase in water scarcity in the world. This study analyses the WFP for an agriculture sector, i.e., the oil palm supply chain, which produces oil palm fresh fruit bunch (FFB), crude palm oil, palm kernel, and crude palm kernel oil. The water accounting and vulnerability evaluation (WAVE) method was used. This method analyses the water depletion index (WDI) based on the local blue water scarcity. The main contribution towards the WFP at the plantation was the production of FFB from the crop itself at 0.23m³/tonne FFB. At the mill, the burden shifts to the water added during the process, which consists of the boiler and process water, which accounted for 6.91m³/tonne crude palm oil. There was a 33% reduction in the WFP when there was no dilution or water addition after the screw press at the mill. When allocation was performed, the WFP reduced by 42% as the burden was shared with the palm kernel and palm kernel shell. At the kernel crushing plant (KCP), the main contributor towards the WFP 4.96 m³/tonne crude palm kernel oil which came from the palm kernel which carried the burden from upstream followed by electricity, 0.33 m³/tonne crude palm kernel oil used for the process and 0.08 m³/tonne crude palm kernel oil for transportation of the palm kernel. A comparison was carried out for mills with biogas capture versus no biogas capture, and the WFP had no difference for both scenarios. The comparison when the KCPs operate in the proximity of mills as compared to those operating in the proximity of ports only gave a reduction of 6% for the WFP. Both these scenarios showed no difference and insignificant difference, which differed from previous life cycle assessment studies on the carbon footprint, which showed significant differences. This shows that findings change when only certain impact categories are focused on. It can be concluded that the impact from the water used by the oil palm tree is low due to the practice of no irrigation at the plantations and the high availability of water from rainfall in Malaysia. This reiterates the importance of planting oil palm trees in regions with high rainfall all year long, like the tropics. The milling stage had the most significant impact on the WFP. Mills should avoid dilution to reduce this impact.

Keywords: life cycle assessment, water footprint, crude palm oil, crude palm kernel oil, WAVE method

Procedia PDF Downloads 175
836 Anticataract Activity of Betulinic Acid in Chick Embryo Lens Model

Authors: Surendra Bodakhe

Abstract:

In this investigation, anticataract activity was determined using cataract formation in developing chick embryo by hydrocortisone. Lenses were evaluated firstly for the extent of opacity and secondly, for lens glutathione (GSH) levels. Betulinic acid was isolated from the chloroform fraction of the crude ethanolic extract of Bauhinia variegata bark (SBE). Fourteen days old Australorp fertilized eggs were divided into different groups of six eggs each. After 24 hrs incubation in a humidified incubator (37οC), at 15 days of age; hydrocortisone (0.25µM/0.2ml/egg) was administered to the chorioallantoic membrane of chick embryos through a small hole in the egg shell on the air sack. Ascorbic acid (standard) or Betulinic acid (test) were administered at 3, 10 and 20 hr after hydrocortisone administration at a specified dose. The puncture was sealed with a cellophane tape and eggs were incubated for 48 hrs in a humidified incubator at 37οC. After 48 hrs, the lenses were isolated for the determination of the extent of opacity and Glutathione level. The betulinic acid prevented the opacification of the chick embryo lenses induced by hydrocortisone. The betulinic acid also prevented the decline of GSH content caused by hydrocortisone. The results indicate that betulinic acid protect the cataract formation in chick embryo lenses induced by hydrocortisone.

Keywords: betulinic acid, cataract, cloudiness, ovine

Procedia PDF Downloads 344