Search results for: Features of Bitcoin
2025 Human Action Recognition Using Wavelets of Derived Beta Distributions
Authors: Neziha Jaouedi, Noureddine Boujnah, Mohamed Salim Bouhlel
Abstract:
In the framework of human machine interaction systems enhancement, we focus throw this paper on human behavior analysis and action recognition. Human behavior is characterized by actions and reactions duality (movements, psychological modification, verbal and emotional expression). It’s worth noting that many information is hidden behind gesture, sudden motion points trajectories and speeds, many research works reconstructed an information retrieval issues. In our work we will focus on motion extraction, tracking and action recognition using wavelet network approaches. Our contribution uses an analysis of human subtraction by Gaussian Mixture Model (GMM) and body movement through trajectory models of motion constructed from kalman filter. These models allow to remove the noise using the extraction of the main motion features and constitute a stable base to identify the evolutions of human activity. Each modality is used to recognize a human action using wavelets of derived beta distributions approach. The proposed approach has been validated successfully on a subset of KTH and UCF sports database.Keywords: feautures extraction, human action classifier, wavelet neural network, beta wavelet
Procedia PDF Downloads 4112024 Accidents Involving Pedestrians Walking along with/against Traffic: An Evaluation of Crash Characteristics and Injuries
Authors: Chih-Wei Pai, Rong-Chang Jou
Abstract:
Using A1 A2 police-reported accident data for years 2003–2010 in Taiwan, the paper examines anatomic injuries and crash characteristics specific to pedestrians in “facing traffic” and “back to traffic” crashes. There were 2768 and 7558 accidents involving pedestrians walking along with/against traffic respectively. Injuries sustained by pedestrians and crash characteristics in these two crash types were compared with those in other crash types (nearside crash, nearside dart-out crash, offside crash, offside dart-out crash). Main findings include that “back to traffic” crashes resulted in more severe injuries, and pedestrians in “back to traffic” crashes had increased head, neck, and spine injuries than those in other crash types; and there was an elevated risk of head injuries in unlit darkness and NBU (non-built-up) roadways. Several crash features (e.g. unlit darkness, overtaking maneuvers, phone use by pedestrians and drivers, intoxicated drivers) appear to be over-involved in “back to traffic” crashes. The implications of the research findings regarding pedestrian/driver education, enforcement, and remedial engineering design are discussed.Keywords: pedestrian accident, crash characteristics, injury, facing traffic, back to traffic
Procedia PDF Downloads 3782023 Modeling User Departure Time Choice for Trips in Urban Streets
Authors: Saeed Sayyad Hagh Shomar
Abstract:
Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using questionnaire of stated preference models users’ departure time choice affected by congestion pricing plan in downtown Tehran. Experimental results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.Keywords: modeling, departure time, travel timing, time of the day, congestion pricing, transportation planning
Procedia PDF Downloads 4332022 MSIpred: A Python 2 Package for the Classification of Tumor Microsatellite Instability from Tumor Mutation Annotation Data Using a Support Vector Machine
Authors: Chen Wang, Chun Liang
Abstract:
Microsatellite instability (MSI) is characterized by high degree of polymorphism in microsatellite (MS) length due to a deficiency in mismatch repair (MMR) system. MSI is associated with several tumor types and its status can be considered as an important indicator for tumor prognostic. Conventional clinical diagnosis of MSI examines PCR products of a panel of MS markers using electrophoresis (MSI-PCR) which is laborious, time consuming, and less reliable. MSIpred, a python 2 package for automatic classification of MSI was released by this study. It computes important somatic mutation features from files in mutation annotation format (MAF) generated from paired tumor-normal exome sequencing data, subsequently using these to predict tumor MSI status with a support vector machine (SVM) classifier trained by MAF files of 1074 tumors belonging to four types. Evaluation of MSIpred on an independent 358-tumor test set achieved overall accuracy of over 98% and area under receiver operating characteristic (ROC) curve of 0.967. These results indicated that MSIpred is a robust pan-cancer MSI classification tool and can serve as a complementary diagnostic to MSI-PCR in MSI diagnosis.Keywords: microsatellite instability, pan-cancer classification, somatic mutation, support vector machine
Procedia PDF Downloads 1732021 Advancing in Cricket Analytics: Novel Approaches for Pitch and Ball Detection Employing OpenCV and YOLOV8
Authors: Pratham Madnur, Prathamkumar Shetty, Sneha Varur, Gouri Parashetti
Abstract:
In order to overcome conventional obstacles, this research paper investigates novel approaches for cricket pitch and ball detection that make use of cutting-edge technologies. The research integrates OpenCV for pitch inspection and modifies the YOLOv8 model for cricket ball detection in order to overcome the shortcomings of manual pitch assessment and traditional ball detection techniques. To ensure flexibility in a range of pitch environments, the pitch detection method leverages OpenCV’s color space transformation, contour extraction, and accurate color range defining features. Regarding ball detection, the YOLOv8 model emphasizes the preservation of minor object details to improve accuracy and is specifically trained to the unique properties of cricket balls. The methods are more reliable because of the careful preparation of the datasets, which include novel ball and pitch information. These cutting-edge methods not only improve cricket analytics but also set the stage for flexible methods in more general sports technology applications.Keywords: OpenCV, YOLOv8, cricket, custom dataset, computer vision, sports
Procedia PDF Downloads 812020 Subjective Time as a Marker of the Present Consciousness
Authors: Anastasiya Paltarzhitskaya
Abstract:
Subjective time plays an important role in consciousness processes and self-awareness at the moment. The concept of intrinsic neural timescales (INT) explains the difference in perceiving various time intervals. The capacity to experience the present builds on the fundamental properties of temporal cognition. The challenge that both philosophy and neuroscience try to answer is how the brain differentiates the present from the past and future. In our work, we analyze papers which describe mechanisms involved in the perception of ‘present’ and ‘non-present’, i.e., future and past moments. Taking into account that we perceive time intervals even during rest or relaxation, we suppose that the default-mode network activity can code time features, including the present moment. We can compare some results of time perceptual studies, where brain activity was shown in states with different flows of time, including resting states and during “mental time travel”. According to the concept of mental traveling, we employ a range of scenarios which demand episodic memory. However, some papers show that the hippocampal region does not activate during time traveling. It is a controversial result that is further complicated by the phenomenological aspect that includes a holistic set of information about the individual’s past and future.Keywords: temporal consciousness, time perception, memory, present
Procedia PDF Downloads 762019 English as a Lingua Franca Elicited in ASEAN Accents
Authors: Choedchoo Kwanhathai
Abstract:
This study explores attitudes towards ASEAN plus ONE (namely ASEAN plus China) accents of English as a Lingua Franca. The study draws attention to features of ASEAN’s diversity of English and specifically examines the extent of which the English accent in ASEAN countries of three of the ten members plus one were perceived in terms of correctness, acceptability, pleasantness, and familiarity. Three accents were used for this study; Chinese, Philippine and Thai. The participants were ninety eight Thai students enrolled in a foundation course of Suan Dusit Rajabhat University, Bangkok Thailand. The students were asked in questionnaires to rank how they perceived each specifically ASEAN plus One English accent after listening to audio recordings of three stories spoken by the three different ASEAN plus ONE English speakers. SPSS was used to analyze the data. The findings of attitudes towards varieties of English accent from the 98 respondents regarding correctness, acceptability, pleasantness, and familiarity of Thai English accents found that Thai accent was overall at level 3 (X = 2.757, SD= o.33), %Then Philippines accents was at level 2 (X = 2.326, SD = 16.12), and Chinese accents w2as at level 3 (X 3.198, SD = 0.18). Finally, the present study proposes pedagogical implications for teaching regarding awareness of ‘Englishes’ of ASEAN and their respective accents and their lingua cultural background of instructors.Keywords: English as a lingua franca, English accents, English as an international language, ASEAN plus one, ASEAN English varieties
Procedia PDF Downloads 4212018 Meta-Learning for Hierarchical Classification and Applications in Bioinformatics
Authors: Fabio Fabris, Alex A. Freitas
Abstract:
Hierarchical classification is a special type of classification task where the class labels are organised into a hierarchy, with more generic class labels being ancestors of more specific ones. Meta-learning for classification-algorithm recommendation consists of recommending to the user a classification algorithm, from a pool of candidate algorithms, for a dataset, based on the past performance of the candidate algorithms in other datasets. Meta-learning is normally used in conventional, non-hierarchical classification. By contrast, this paper proposes a meta-learning approach for more challenging task of hierarchical classification, and evaluates it in a large number of bioinformatics datasets. Hierarchical classification is especially relevant for bioinformatics problems, as protein and gene functions tend to be organised into a hierarchy of class labels. This work proposes meta-learning approach for recommending the best hierarchical classification algorithm to a hierarchical classification dataset. This work’s contributions are: 1) proposing an algorithm for splitting hierarchical datasets into new datasets to increase the number of meta-instances, 2) proposing meta-features for hierarchical classification, and 3) interpreting decision-tree meta-models for hierarchical classification algorithm recommendation.Keywords: algorithm recommendation, meta-learning, bioinformatics, hierarchical classification
Procedia PDF Downloads 3142017 Design and Construction of a Maize Dehusking Machine for Small and Medium-Scale Farmers
Authors: Francis Ojo Ologunagba, Monday Olatunbosun Ale, Lewis A. Olutayo
Abstract:
The economic successes of commercial development of agricultural product processing depend upon the adaptability of each processing stage to mechanization. In maize processing, one of its post-harvest operations that is still facing a major challenge is dehusking. Therefore, a maize dehusking machine that could replace the prevalent traditional method of dehusking maize in developing countries, especially Nigeria was designed, constructed and tested at the Department of Agricultural and Bio-Environmental Engineering Technology, Rufus Giwa Polytechnic, Owo. The basic features of the machine are feeding unit (hopper), housing frame, dehusking unit, drive mechanism and discharge outlets. The machine was tested with maize of 50mm average diameter at 13% moisture content and 2.5mm machine roller clearance. Test results showed appreciable performance with the dehusking efficiency of 92% and throughput capacity of 200 Kg/hr at a machine speed of 400rpm. The estimated production cost of the machine at the time of construction is forty-five thousand, one hundred and eighty nairas (₦45,180) excluding the cost of the electric motor. It is therefore recommended for small and medium-scale maize farmers and processors in Nigeria.Keywords: construction, dehusking, design, efficiency, maize
Procedia PDF Downloads 3242016 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1912015 Ambidentate Ligands as Platforms for Efficient Synthesis of Pd-based Metallosupramolecular Cages
Authors: Wojcieh Drożdż, Artur R. Stefankiewicz
Abstract:
Ambidentate ligands can be described as organic structures possessing two different types of coordination units within a single molecule. These features enable the coordination of two different metal ions, which can directly affect the properties of obtained complexes as well as further application. In the current research, we focused on a β-diketone ligand containing terminally located pyridine units in order to assemble cage-like architectures. This will be possible due to the peculiar geometry of the proposed ligands, called "banana-shape", widely used in the synthesis of sophisticated metallosupramolecular architectures. Each of the coordination units plays an important role in cage assembly. Pyridine units enable the coordination of square-planar metal ions (Pd²⁺, Pt²⁺), forming a positively charged cage. On the other hand, the β-diketone group provides the possibility of post-modification, including the introduction of additional functional groups with specific properties (sensing, catalytic, etc.). Such obtained cages are of great interest due to their application potential, including storage or transport of guest molecules, selective detection/separation of analytes as well as efficient catalytic processes.Keywords: metalloligands, coordination cages, nanoreactors, β-diketonate complexes
Procedia PDF Downloads 732014 Non-Monogamy as Rebellion against Tradition in Jhumpa Lahiri’s The Namesake
Authors: Jingya Huang
Abstract:
This paper argues that Moushumi Mazoomdar has non-monogamous relationships with different men before and after her marriage as a form of rebellion against the traditional Indian culture deeply ingrained in her. Written by Jhumpa Lahiri, The Namesake (2004) features an Indian couple migrating to America who gives birth to two children, including the main character Gogol. Moushumi, like Gogol, is also a second-generation Indian American. Because of the influence of American culture, Moushumi prefers to marry for love, disdaining any thought of an arranged marriage. This paper is divided into two parts: before and after marriage which can also be seen in the light of polyamory and infidelity. First, according to Anapol (2010), polyamory is a newly created word from Greek and Latin which means “loving more than one person at a time when it comes to romantic or erotic love.” The discussion of polyamory mainly focuses on the most basic heterosexual relationship without mentioning of homosexual and bisexual love relationships. By adopting Anapol’s concept of polyamory, this paper examines the nature of the relationships between Moushumi and other men before her marriage. Afterwards, the concept of infidelity is discussed to analyze the interaction between Moushumi and Dimitri. How Moushumi rebels against tradition is shown through these two main discussions.Keywords: Indian American, non-monogamous relationship, rebellion, polyamory, infidelity
Procedia PDF Downloads 3392013 Brief Guide to Cloud-Based AI Prototyping: Key Insights from Selected Case Studies Using Google Cloud Platform
Authors: Kamellia Reshadi, Pranav Ragji, Theodoros Soldatos
Abstract:
Recent advancements in cloud computing and storage, along with rapid progress in artificial intelligence (AI), have transformed approaches to developing efficient, scalable applications. However, integrating AI with cloud computing poses challenges as these fields are often disjointed, and many advancements remain difficult to access, obscured in complex documentation or scattered across research reports. For this reason, we share experiences from prototype projects combining these technologies. Specifically, we focus on Google Cloud Platform (GCP) functionalities and describe vision and speech activities applied to labeling, subtitling, and urban traffic flow tasks. We describe challenges, pricing, architecture, and other key features, considering the goal of real-time performance. We hope our demonstrations provide not only essential guidelines for using these functionalities but also enable more similar approaches.Keywords: artificial intelligence, cloud computing, real-time applications, case studies, knowledge management, research and development, text labeling, video annotation, urban traffic analysis, public safety, prototyping, Google Cloud Platform
Procedia PDF Downloads 122012 An Analysis of the Contemporary Western Academic Works in the Genre of Quranic Studies: a Case Study of Encyclopaedia of the Quran
Authors: Iffat Batool
Abstract:
An extensive body of literature produced by the contemporary Western academia is an indication of their grave interest in the field of Qur’ānic studies. What increases its significance is the writings of the western scholars that underscore the element of objectivity and impartiality in the recent western academic works on the Qur’ān. Moreover, the participation of some Muslim scholars in the western academia is also highlighted by western thinkers to ensure the objectivity of western Qur’ānic scholarship. More specifically, with the publication of ‘Encyclopaedia of the Qur’ān by Brill’ the western academia seems to assign these elements to this work vigorously. Being the foremost work of its nature, ‘Encyclopaedia of the Qur’ān’ has attracted the academicians from across the world yet, with multiple receptions. The present study aims at locating the status of this work in the recent Western scholarship and its contribution towards the subject of Qur’ānic Studies. Through a critical analysis of articles, various features of this work are highlighted. This work concludes that although Encyclopaedia of the Qur’ān presents wide-ranging and extensive study, yet, it lacks a perfect, rigorous and thorough scholarship of the Qur’ān. Besides, this work argues that because of the marginal contribution of Muslim researchers, the majority conclusions of this anthology are in contrast to the traditional Muslim standpointKeywords: academic, encyclopeadia, objectivity, quran
Procedia PDF Downloads 1942011 Pseudo Modal Operating Deflection Shape Based Estimation Technique of Mode Shape Using Time History Modal Assurance Criterion
Authors: Doyoung Kim, Hyo Seon Park
Abstract:
Studies of System Identification(SI) based on Structural Health Monitoring(SHM) have actively conducted for structural safety. Recently SI techniques have been rapidly developed with output-only SI paradigm for estimating modal parameters. The features of these output-only SI methods consist of Frequency Domain Decomposition(FDD) and Stochastic Subspace Identification(SSI) are using the algorithms based on orthogonal decomposition such as singular value decomposition(SVD). But the SVD leads to high level of computational complexity to estimate modal parameters. This paper proposes the technique to estimate mode shape with lower computational cost. This technique shows pseudo modal Operating Deflections Shape(ODS) through bandpass filter and suggests time history Modal Assurance Criterion(MAC). Finally, mode shape could be estimated from pseudo modal ODS and time history MAC. Analytical simulations of vibration measurement were performed and the results with mode shape and computation time between representative SI method and proposed method were compared.Keywords: modal assurance criterion, mode shape, operating deflection shape, system identification
Procedia PDF Downloads 4102010 The Internal View of the Mu'min: Natural Law Theories in Islam
Authors: Gianni Izzo
Abstract:
The relation of Islam to its legal precepts, reflected in the various jurisprudential 'schools of thought' (madhahib), is one expressed in a version of 'positivism' (fiqh) providing the primary theory for deducing Qurʾan rulings and those from the narrations (hadith) of the Prophet Muhammad. Scholars of Islam, including Patricia Crone (2004) and others chronicled by Anver Emon (2005), deny the influence of natural law theories as extra-scriptural indices of revelation’s content. This paper seeks to dispute these claims by reference to historical and canonical examples within Shiʿa legal thought that emphasize the salient roles of ‘aql (reason), fitrah (primordial human nature), and lutf (divine grace). These three holistic features, congenital to every human, and theophanically reflected in nature make up a mode of moral intelligibility antecedent to prophetic revelation. The debate between the 'traditionalist' Akhbaris and 'rationalist' Usulis over the nature of deriving legal edicts in Islam is well-covered academic ground. Instead, an attempt is made to define and detail the built-in assumptions of natural law revealed in the jurisprudential summa of Imami Shiʿism, whether of either dominant school, that undergird its legal prescriptions and methods of deduction.Keywords: Islam, fiqh, natural law, legal positivism, aql
Procedia PDF Downloads 1472009 Design and Implementation of Remote Application Virtualization in Cloud Environments
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang
Abstract:
Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.Keywords: cloud computing, IaaS, virtualization, application delivery
Procedia PDF Downloads 2812008 Synthetic Aperture Radar Remote Sensing Classification Using the Bag of Visual Words Model to Land Cover Studies
Authors: Reza Mohammadi, Mahmod R. Sahebi, Mehrnoosh Omati, Milad Vahidi
Abstract:
Classification of high resolution polarimetric Synthetic Aperture Radar (PolSAR) images plays an important role in land cover and land use management. Recently, classification algorithms based on Bag of Visual Words (BOVW) model have attracted significant interest among scholars and researchers in and out of the field of remote sensing. In this paper, BOVW model with pixel based low-level features has been implemented to classify a subset of San Francisco bay PolSAR image, acquired by RADARSAR 2 in C-band. We have used segment-based decision-making strategy and compared the result with the result of traditional Support Vector Machine (SVM) classifier. 90.95% overall accuracy of the classification with the proposed algorithm has shown that the proposed algorithm is comparable with the state-of-the-art methods. In addition to increase in the classification accuracy, the proposed method has decreased undesirable speckle effect of SAR images.Keywords: Bag of Visual Words (BOVW), classification, feature extraction, land cover management, Polarimetric Synthetic Aperture Radar (PolSAR)
Procedia PDF Downloads 2102007 Design and Fabrication of Optical Nanobiosensors for Detection of MicroRNAs Involved in Neurodegenerative Diseases
Authors: Mahdi Rahaie
Abstract:
MicroRNAs are a novel class of small RNAs which regulate gene expression by translational repression or degradation of messenger RNAs. To produce sensitive, simple and cost-effective assays for microRNAs, detection is in urgent demand due to important role of these biomolecules in progression of human disease such as Alzheimer’s, Multiple sclerosis, and some other neurodegenerative diseases. Herein, we report several novel, sensitive and specific microRNA nanobiosensors which were designed based on colorimetric and fluorescence detection of nanoparticles and hybridization chain reaction amplification as an enzyme-free amplification. These new strategies eliminate the need for enzymatic reactions, chemical changes, separation processes and sophisticated equipment whereas less limit of detection with most specify are acceptable. The important features of these methods are high sensitivity and specificity to differentiate between perfectly matched, mismatched and non-complementary target microRNAs and also decent response in the real sample analysis with blood plasma. These nanobiosensors can clinically be used not only for the early detection of neuro diseases but also for every sickness related to miRNAs by direct detection of the plasma microRNAs in real clinical samples, without a need for sample preparation, RNA extraction and/or amplification.Keywords: hybridization chain reaction, microRNA, nanobiosensor, neurodegenerative diseases
Procedia PDF Downloads 1512006 The Effect Study of Meditation Music in the Elderly
Authors: Metee Pigultong
Abstract:
The research aims at 1) composition of meditation music, 2) study of the meditation time reliability. The population is the older adults who meditated practitioners in the Thepnimitra Temple, Don Mueang District, Bangkok. The sample group was the older persons who meditated practitioners from the age of 60 with five volunteers. The research methodology was time-series to conduct the research progression. The research instruments included: 1) meditation music, 2) brain wave recording form. The research results found that 1) the music combines the binaural beats suitable for the meditation of the older persons, consisting of the following features: a) The tempo rate of the meditation music is no more than 60 beats per minute. b) The musical instruments for the meditation music arrangement include only 4-5 pieces. c) The meditation music arrangement needs to consider the nature of the right instrument. d) Digital music instruments are suitable for composition. e) The pure-tone sound combined in music must generate a brain frequency at the level of 10 Hz. 2) After the researcher conducted a 3-weeks brain training procedure, the researcher performed three tests for the reliability level using Cronbach's Alpha method. The result showed that the meditation reliability had the level = .475 as a moderate concentration.Keywords: binaural beats, music therapy, meditation, older person, the Buddhist meditated practitioners
Procedia PDF Downloads 1912005 Effect of a Chatbot-Assisted Adoption of Self-Regulated Spaced Practice on Students' Vocabulary Acquisition and Cognitive Load
Authors: Ngoc-Nguyen Nguyen, Hsiu-Ling Chen, Thanh-Truc Lai Huynh
Abstract:
In foreign language learning, vocabulary acquisition has consistently posed challenges to learners, especially for those at lower levels. Conventional approaches often fail to promote vocabulary learning and ensure engaging experiences alike. The emergence of mobile learning, particularly the integration of chatbot systems, has offered alternative ways to facilitate this practice. Chatbots have proven effective in educational contexts by offering interactive learning experiences in a constructivist manner. These tools have caught attention in the field of mobile-assisted language learning (MALL) in recent years. This research is conducted in an English for Specific Purposes (ESP) course at the A2 level of the CEFR, designed for non-English majors. Participants are first-year Vietnamese students aged 18 to 20 at a university. This quasi-experimental study follows a pretest-posttest control group design over five weeks, with two classes randomly assigned as the experimental and control groups. The experimental group engages in chatbot-assisted spaced practice with SRL components, while the control group uses the same spaced practice without SRL. The two classes are taught by the same lecturer. Data are collected through pre- and post-tests, cognitive load surveys, and semi-structured interviews. The combination of self-regulated learning (SRL) and distributed practice, grounded in the spacing effect, forms the basis of the present study. SRL elements, which concern goal setting and strategy planning, are integrated into the system. The spaced practice method, similar to those used in widely recognized learning platforms like Duolingo and Anki flashcards, spreads out learning over multiple sessions. This study’s design features quizzes progressively increasing in difficulty. These quizzes are aimed at targeting both the Recognition-Recall and Comprehension-Use dimensions for a comprehensive acquisition of vocabulary. The mobile-based chatbot system is built using Golang, an open-source programming language developed by Google. It follows a structured flow that guides learners through a series of 4 quizzes in each week of teacher-led learning. The quizzes start with less cognitively demanding tasks, such as multiple-choice questions, before moving on to more complex exercises. The integration of SRL elements allows students to self-evaluate the difficulty level of vocabulary items, predict scores achieved, and choose appropriate strategy. This research is part one of a two-part project. The initial findings will determine the development of an upgraded chatbot system in part two, where adaptive features in response to the integration of SRL components will be introduced. The research objectives are to assess the effectiveness of the chatbot-assisted approach, based on the combination of spaced practice and SRL, in improving vocabulary acquisition and managing cognitive load, as well as to understand students' perceptions of this learning tool. The insights from this study will contribute to the growing body of research on mobile-assisted language learning and offer practical implications for integrating chatbot systems with spaced practice into educational settings to enhance vocabulary learning.Keywords: mobile learning, mobile-assisted language learning, MALL, chatbots, vocabulary learning, spaced practice, spacing effect, self-regulated learning, SRL, self-regulation, EFL, cognitive load
Procedia PDF Downloads 192004 Ensemble of Deep CNN Architecture for Classifying the Source and Quality of Teff Cereal
Authors: Belayneh Matebie, Michael Melese
Abstract:
The study focuses on addressing the challenges in classifying and ensuring the quality of Eragrostis Teff, a small and round grain that is the smallest cereal grain. Employing a traditional classification method is challenging because of its small size and the similarity of its environmental characteristics. To overcome this, this study employs a machine learning approach to develop a source and quality classification system for Teff cereal. Data is collected from various production areas in the Amhara regions, considering two types of cereal (high and low quality) across eight classes. A total of 5,920 images are collected, with 740 images for each class. Image enhancement techniques, including scaling, data augmentation, histogram equalization, and noise removal, are applied to preprocess the data. Convolutional Neural Network (CNN) is then used to extract relevant features and reduce dimensionality. The dataset is split into 80% for training and 20% for testing. Different classifiers, including FVGG16, FINCV3, QSCTC, EMQSCTC, SVM, and RF, are employed for classification, achieving accuracy rates ranging from 86.91% to 97.72%. The ensemble of FVGG16, FINCV3, and QSCTC using the Max-Voting approach outperforms individual algorithms.Keywords: Teff, ensemble learning, max-voting, CNN, SVM, RF
Procedia PDF Downloads 532003 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2112002 Formulation and Evaluation of Silver Nanoparticles as Drug Carrier for Cancer Therapy
Authors: Abdelhadi Adam Salih Denei
Abstract:
Silver nanoparticles (AgNPs) have been used in cancer therapy, and the area of nanomedicine has made unheard-of strides in recent years. A thorough summary of the development and assessment of AgNPs for their possible use in the fight against cancer is the goal of this review. Targeted delivery methods have been designed to optimise therapeutic efficacy by using AgNPs' distinct physicochemical features, such as their size, shape, and surface chemistry. Firstly, the study provides an overview of the several synthesis routes—both chemical and green—that are used to create AgNPs. Natural extracts and biomolecules are used in green synthesis techniques, which are becoming more and more popular since they are biocompatible and environmentally benign. It is next described how synthesis factors affect the physicochemical properties of AgNPs, emphasising how crucial it is to modify these parameters for particular therapeutic uses. An extensive analysis is conducted on the anticancer potential of AgNPs, emphasising their capacity to trigger apoptosis, impede angiogenesis, and alter cellular signalling pathways. The analysis also investigates the potential benefits of combining AgNPs with currently used cancer treatment techniques, including radiation and chemotherapy. AgNPs' safety profile for use in clinical settings is clarified by a comprehensive evaluation of their cytotoxicity and biocompatibility.Keywords: silver nanoparticles, cancer, nanocarrier system, targeted delivery
Procedia PDF Downloads 662001 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport
Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos
Abstract:
Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform
Procedia PDF Downloads 1772000 Data Integrity: Challenges in Health Information Systems in South Africa
Authors: T. Thulare, M. Herselman, A. Botha
Abstract:
Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical records. System features like pop-up reminders, complex menus, and poor user interfaces can make medical records far more time consuming than paper cards as well as affect decision-making processes. Although errors associated with health information and their real and likely effect on the quality of care and patient safety have been documented for many years, more research is needed to measure the occurrence of these errors and determine the causes to implement solutions. Therefore, the purpose of this paper is to identify data integrity challenges in hospital information systems through a scoping review and based on the results provide recommendations on how to manage these. Only 34 papers were found to be most suitable out of 297 publications initially identified in the field. The results indicated that human and computerized systems are the most common challenges associated with data integrity and factors such as policy, environment, health workforce, and lack of awareness attribute to these challenges but if measures are taken the data integrity challenges can be managed.Keywords: data integrity, data integrity challenges, hospital information systems, South Africa
Procedia PDF Downloads 1811999 Detection of Keypoint in Press-Fit Curve Based on Convolutional Neural Network
Authors: Shoujia Fang, Guoqing Ding, Xin Chen
Abstract:
The quality of press-fit assembly is closely related to reliability and safety of product. The paper proposed a keypoint detection method based on convolutional neural network to improve the accuracy of keypoint detection in press-fit curve. It would provide an auxiliary basis for judging quality of press-fit assembly. The press-fit curve is a curve of press-fit force and displacement. Both force data and distance data are time-series data. Therefore, one-dimensional convolutional neural network is used to process the press-fit curve. After the obtained press-fit data is filtered, the multi-layer one-dimensional convolutional neural network is used to perform the automatic learning of press-fit curve features, and then sent to the multi-layer perceptron to finally output keypoint of the curve. We used the data of press-fit assembly equipment in the actual production process to train CNN model, and we used different data from the same equipment to evaluate the performance of detection. Compared with the existing research result, the performance of detection was significantly improved. This method can provide a reliable basis for the judgment of press-fit quality.Keywords: keypoint detection, curve feature, convolutional neural network, press-fit assembly
Procedia PDF Downloads 2301998 Accuracy Improvement of Traffic Participant Classification Using Millimeter-Wave Radar by Leveraging Simulator Based on Domain Adaptation
Authors: Tokihiko Akita, Seiichi Mita
Abstract:
A millimeter-wave radar is the most robust against adverse environments, making it an essential environment recognition sensor for automated driving. However, the reflection signal is sparse and unstable, so it is difficult to obtain the high recognition accuracy. Deep learning provides high accuracy even for them in recognition, but requires large scale datasets with ground truth. Specially, it takes a lot of cost to annotate for a millimeter-wave radar. For the solution, utilizing a simulator that can generate an annotated huge dataset is effective. Simulation of the radar is more difficult to match with real world data than camera image, and recognition by deep learning with higher-order features using the simulator causes further deviation. We have challenged to improve the accuracy of traffic participant classification by fusing simulator and real-world data with domain adaptation technique. Experimental results with the domain adaptation network created by us show that classification accuracy can be improved even with a few real-world data.Keywords: millimeter-wave radar, object classification, deep learning, simulation, domain adaptation
Procedia PDF Downloads 931997 Tribological Behavior of Warm Rolled Spray Formed Al-6Si-1Mg-1Graphite Composite
Authors: Surendra Kumar Chourasiya, Sandeep Kumar, Devendra Singh
Abstract:
In the present investigation tribological behavior of Al-6Si-1Mg-1Graphite composite has been explained. The composite was developed through the unique spray forming route in the spray forming chamber by using N₂ gas at 7kg/cm² and the flight distance was 400 mm. Spray formed composite having a certain amount of porosity which was reduced by the deformations. The composite was subjected to the warm rolling (WR) at 250ºC up to 40% reduction. Spray forming composite shows the considerable microstructure refinement, equiaxed grains, distribution of silicon and graphite particles in the primary matrix of the composite. Graphite (Gr) was incorporated externally during the process that works as a solid lubricant. Porosity decreased after reduction and hardness increases. Pin on disc test has been performed to analyze the wear behavior which is the function of sliding distance for all percent reduction of the composite. 30% WR composite shows the better result of wear rate and coefficient of friction. The improved wear properties of the composite containing Gr are discussed in light of the microstructural features of spray formed the composite and the nature of the debris particles. Scanning electron microscope and optical microscope analysis of the present material supported the prediction of aforementioned changes.Keywords: Al-6Si-1Mg-1Graphite, spray forming, warm rolling, wear
Procedia PDF Downloads 5651996 Anatomical Features of Internal Pudendal Artery
Authors: Adel Yasky, Waseem Al-Talalwah, Shorok Al Dorazi, Roger Soames
Abstract:
The internal pudendal artery is a standard branch of the anterior division of the internal iliac artery. The current study includes 41 cadavers to investigate the origin and branches of the internal pudendal artery and its clinical significances. The internal pudendal artery arose directly from the anterior division of the internal iliac artery in 48.3% while it arose indirectly in 48.5%. However, the internal pudendal artery arose from the posterior division of internal iliac artery in 1.6%. Moreover, it arose internal iliac artery bifurcation site in 1.6%. Further, the internal pudendal artery supplied the urinary bladder in 17.1%. Also, the internal pudendal artery supplied the rectum 33.5% respectively. It gave uterine and vaginal arteries in 9.4% and 7.8% respectively. Finally, it supplied the sciatic nerve via giving lateral sacral branch in 1.6%. Internists, surgeons and radiologists have to be aware of the variability to decrease iatrogenic injury. Therefore, unnecessary proximal ligation should be avoided at the site of indirect origin of the internal pudendal artery to prevent sciatic neuropathy. Further, intrapelvic bleeding as result of laceration of internal pudendal branches during hysterectomy, prostatectomy or proctectomy should be expected. Therefore, this study increases the awareness of surgeons leading to minimize iatrogenic faults,Keywords: internal pudendal artery, inferior gluteal artery, superior gluteal artery, internal iliac artery, impotence, decreased libido
Procedia PDF Downloads 356