Search results for: fault classification
577 Proposal for a Monster Village in Namsan Mountain, Seoul: Significance from a Phenomenological Perspective
Authors: Hyuk-Jin Lee
Abstract:
Korea is a country with thousands of years of history, like its neighbors China and Japan. However, compared to China, which is famous for its ancient fantasy novel "Journey to the West", and Japan, which is famous for its monsters, its “monster culture” is not actively used for tourism. The reason is that the culture closest to the present, from the 17th to 20th centuries, was the Joseon Dynasty, when Neo-Confucianism, which suppressed a monster culture, was the strongest. This trend became stronger after Neo-Confucianism became dogmatic in the mid-17th century. However, Korea, which has a history of Taoism for thousands of years, clearly has many literatures on monsters that can be used as tourism resources. The problem is that these data are buried in texts and are unfamiliar even to Koreans. This study examines the possibility of developing them into attractive tourism resources based on the literary records of the so-called 'monsters densely located in Namsan Mountain, located in the center of Seoul' buried in texts from the 16th to early 17th centuries. In particular, we introduce the surprising consistency in the description of the area north of Namsan Mountain in terms of 'feng shui geography', an oriental philosophy, in a contemporary Korean newspaper. Finally, based on the theoretical foundation through the phenomenological classification table of cultural heritage, we examine phenomenologically how important this ‘visualization of imaginary or text-based entities’ is to changes in the perception of specific cultural resources in a society. In addition, we will deeply analyze related cases, including Japan's ninja culture.Keywords: monster culture, Namsan mountain, neo-confucianism, phenomenology, tourism
Procedia PDF Downloads 32576 Innovation and Employment in Sub-Saharan Africa: Evidence from Uganda Microdata
Authors: Milton Ayoki, Edward Bbaale
Abstract:
This paper analyses the relationship between innovation and employment at firm level with the objective of understanding the contribution of the different innovation strategies in fostering employment growth in Uganda. We use National Innovation Survey (micro-data of 705 Ugandan firms) for the period 2011-2014 and follow closely Harrison et al. (2014) structured approach, and relate employment growth to process innovations and to the growth of sales separately due to innovative and unchanged products. We find positive effects of product innovation on employment at firm level, while process innovation has no discernable impact on employment. Although there is evidence to suggest displacement of labour in some cases where firms only introduce new process, this effect is compensated by growth in employment from new products, which for most firms are introduced simultaneously with new process. Results suggest that source of innovation as well as size of innovating firms or end users of innovation matter for job growth. Innovation that develops from within the firm itself (user) and involving larger firms has greater impact on employment than that developed from outside or coming from within smaller firms. In addition, innovative firms are one and half times more likely to survive in the innovation driven economy environment than those that do not innovate. These results have important implications for policymakers and stakeholders in innovation ecosystem. Supporting policies need to be correctly tailored since the impacts depend on the innovation strategy (type) and characteristics and sector of the innovative firms (small, large, industry, etc.). Policies to spur investment, particularly in innovative sectors and firms with high growth potential would have long lasting effects on job creation. JEL Classification: D24, J0, J20, L20, O30.Keywords: employment, process innovation, product innovation, Sub-Saharan Africa
Procedia PDF Downloads 171575 Artificial Intelligence Based Abnormality Detection System and Real Valuᵀᴹ Product Design
Authors: Junbeom Lee, Jaehyuck Cho, Wookyeong Jeong, Jonghan Won, Jungmin Hwang, Youngseok Song, Taikyeong Jeong
Abstract:
This paper investigates and analyzes meta-learning technologies that use multiple-cameras to monitor and check abnormal behavior in people in real-time in the area of healthcare fields. Advances in artificial intelligence and computer vision technologies have confirmed that cameras can be useful for individual health monitoring and abnormal behavior detection. Through this, it is possible to establish a system that can respond early by automatically detecting abnormal behavior of the elderly, such as patients and the elderly. In this paper, we use a technique called meta-learning to analyze image data collected from cameras and develop a commercial product to determine abnormal behavior. Meta-learning applies machine learning algorithms to help systems learn and adapt quickly to new real data. Through this, the accuracy and reliability of the abnormal behavior discrimination system can be improved. In addition, this study proposes a meta-learning-based abnormal behavior detection system that includes steps such as data collection and preprocessing, feature extraction and selection, and classification model development. Various healthcare scenarios and experiments analyze the performance of the proposed system and demonstrate excellence compared to other existing methods. Through this study, we present the possibility that camera-based meta-learning technology can be useful for monitoring and testing abnormal behavior in the healthcare area.Keywords: artificial intelligence, abnormal behavior, early detection, health monitoring
Procedia PDF Downloads 86574 A Neurofeedback Learning Model Using Time-Frequency Analysis for Volleyball Performance Enhancement
Authors: Hamed Yousefi, Farnaz Mohammadi, Niloufar Mirian, Navid Amini
Abstract:
Investigating possible capacities of visual functions where adapted mechanisms can enhance the capability of sports trainees is a promising area of research, not only from the cognitive viewpoint but also in terms of unlimited applications in sports training. In this paper, the visual evoked potential (VEP) and event-related potential (ERP) signals of amateur and trained volleyball players in a pilot study were processed. Two groups of amateur and trained subjects are asked to imagine themselves in the state of receiving a ball while they are shown a simulated volleyball field. The proposed method is based on a set of time-frequency features using algorithms such as Gabor filter, continuous wavelet transform, and a multi-stage wavelet decomposition that are extracted from VEP signals that can be indicative of being amateur or trained. The linear discriminant classifier achieves the accuracy, sensitivity, and specificity of 100% when the average of the repetitions of the signal corresponding to the task is used. The main purpose of this study is to investigate the feasibility of a fast, robust, and reliable feature/model determination as a neurofeedback parameter to be utilized for improving the volleyball players’ performance. The proposed measure has potential applications in brain-computer interface technology where a real-time biomarker is needed.Keywords: visual evoked potential, time-frequency feature extraction, short-time Fourier transform, event-related spectrum potential classification, linear discriminant analysis
Procedia PDF Downloads 138573 From Colonial Outpost to Cultural India: Folk Epics of India
Authors: Jyoti Brahma
Abstract:
Folk epics of India are found in various Indian languages. The study of folk epics and its importance in folkloristic study in India came into prominence only during the nineteenth century. The British administrators and missionaries collected and documented folk epics from various parts of the country. The paper is an attempt to investigate how colonial outpost appears to penetrate the interiors of Indian land and society and triggered off the Indian Renaissance. It takes into account the compositions of the epics of India and the attention it received during the nineteenth century, which in turn gave, rise to the national consciousness shaping the culture of India. Composed as oral traditions these folk epics are now seen as repositories of historical consciousness whereas in earlier times societies without literacy were said to be without history. So, there is an urgent need to re-examine the British impact on Indian literary traditions. The Bhakti poets through their nuanced responses in their efforts to change the behavior of Indian society gives us the perfect example of deferment in the clear cut distinction between the folk and the classical in the context of India. It evades a pure categorization and classification of the classical and constitutes part of the folk traditions of the cultural heritage of India. Therefore, the ethical question of what is ontologically known as ordinary discourse in the case of the “folk” forms metaphors and folk language gains importance once more. The paper also thus seeks simultaneously to outline the significant factors responsible for shaping the destiny of folklore in South India particularly the four political states of the Indian Union: Andhra Pradesh, Karnataka, Kerala and Tamil Nadu, what could be termed as South Indian “cultural zones”.Keywords: colonial, folk, folklore, tradition
Procedia PDF Downloads 311572 Efficient Human Motion Detection Feature Set by Using Local Phase Quantization Method
Authors: Arwa Alzughaibi
Abstract:
Human Motion detection is a challenging task due to a number of factors including variable appearance, posture and a wide range of illumination conditions and background. So, the first need of such a model is a reliable feature set that can discriminate between a human and a non-human form with a fair amount of confidence even under difficult conditions. By having richer representations, the classification task becomes easier and improved results can be achieved. The Aim of this paper is to investigate the reliable and accurate human motion detection models that are able to detect the human motions accurately under varying illumination levels and backgrounds. Different sets of features are tried and tested including Histogram of Oriented Gradients (HOG), Deformable Parts Model (DPM), Local Decorrelated Channel Feature (LDCF) and Aggregate Channel Feature (ACF). However, we propose an efficient and reliable human motion detection approach by combining Histogram of oriented gradients (HOG) and local phase quantization (LPQ) as the feature set, and implementing search pruning algorithm based on optical flow to reduce the number of false positive. Experimental results show the effectiveness of combining local phase quantization descriptor and the histogram of gradient to perform perfectly well for a large range of illumination conditions and backgrounds than the state-of-the-art human detectors. Areaunder th ROC Curve (AUC) of the proposed method achieved 0.781 for UCF dataset and 0.826 for CDW dataset which indicates that it performs comparably better than HOG, DPM, LDCF and ACF methods.Keywords: human motion detection, histograms of oriented gradient, local phase quantization, local phase quantization
Procedia PDF Downloads 257571 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 80570 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors
Authors: Jacob J. Shila, Xiaoyu O. Wu
Abstract:
As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.Keywords: human factors, incidents and accidents, safety, UAS, UAV
Procedia PDF Downloads 243569 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit
Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana
Abstract:
Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification
Procedia PDF Downloads 155568 Geosynthetic Reinforced Unpaved Road: Literature Study and Design Example
Authors: D. Jayalakshmi, S. S. Bhosale
Abstract:
This paper, in its first part, presents the state-of-the-art literature of design approaches for geosynthetic reinforced unpaved roads. The literature starting since 1970 and the critical appraisal of flexible pavement design by Giroud and Han (2004) and Jonathan Fannin (2006) is presented. The design example is illustrated for Indian conditions. The example emphasizes the results computed by Giroud and Han's (2004) design method with the Indian road congress guidelines by IRC SP 72 -2015. The input data considered are related to the subgrade soil condition of Maharashtra State in India. The unified soil classification of the subgrade soil is inorganic clay with high plasticity (CH), which is expansive with a California bearing ratio (CBR) of 2% to 3%. The example exhibits the unreinforced case and geotextile as reinforcement by varying the rut depth from 25 mm to 100 mm. The present result reveals the base thickness for the unreinforced case from the IRC design catalogs is in good agreement with Giroud and Han (2004) approach for a range of 75 mm to 100 mm rut depth. Since Giroud and Han (2004) method is applicable for both reinforced and unreinforced cases, for the same data with appropriate Nc factor, for the same rut depth, the base thickness for the reinforced case has arrived for the Indian condition. From this trial, for the CBR of 2%, the base thickness reduction due to geotextile inclusion is 35%. For the CBR range of 2% to 5% with different stiffness in geosynthetics, the reduction in base course thickness will be evaluated, and the validation will be executed by the full-scale accelerated pavement testing set up at the College of Engineering Pune (COE), India.Keywords: base thickness, design approach, equation, full scale accelerated pavement set up, Indian condition
Procedia PDF Downloads 193567 Data Augmentation for Early-Stage Lung Nodules Using Deep Image Prior and Pix2pix
Authors: Qasim Munye, Juned Islam, Haseeb Qureshi, Syed Jung
Abstract:
Lung nodules are commonly identified in computed tomography (CT) scans by experienced radiologists at a relatively late stage. Early diagnosis can greatly increase survival. We propose using a pix2pix conditional generative adversarial network to generate realistic images simulating early-stage lung nodule growth. We have applied deep images prior to 2341 slices from 895 computed tomography (CT) scans from the Lung Image Database Consortium (LIDC) dataset to generate pseudo-healthy medical images. From these images, 819 were chosen to train a pix2pix network. We observed that for most of the images, the pix2pix network was able to generate images where the nodule increased in size and intensity across epochs. To evaluate the images, 400 generated images were chosen at random and shown to a medical student beside their corresponding original image. Of these 400 generated images, 384 were defined as satisfactory - meaning they resembled a nodule and were visually similar to the corresponding image. We believe that this generated dataset could be used as training data for neural networks to detect lung nodules at an early stage or to improve the accuracy of such networks. This is particularly significant as datasets containing the growth of early-stage nodules are scarce. This project shows that the combination of deep image prior and generative models could potentially open the door to creating larger datasets than currently possible and has the potential to increase the accuracy of medical classification tasks.Keywords: medical technology, artificial intelligence, radiology, lung cancer
Procedia PDF Downloads 68566 Land Suitability Prediction Modelling for Agricultural Crops Using Machine Learning Approach: A Case Study of Khuzestan Province, Iran
Authors: Saba Gachpaz, Hamid Reza Heidari
Abstract:
The sharp increase in population growth leads to more pressure on agricultural areas to satisfy the food supply. To achieve this, more resources should be consumed and, besides other environmental concerns, highlight sustainable agricultural development. Land-use management is a crucial factor in obtaining optimum productivity. Machine learning is a widely used technique in the agricultural sector, from yield prediction to customer behavior. This method focuses on learning and provides patterns and correlations from our data set. In this study, nine physical control factors, namely, soil classification, electrical conductivity, normalized difference water index (NDWI), groundwater level, elevation, annual precipitation, pH of water, annual mean temperature, and slope in the alluvial plain in Khuzestan (an agricultural hotspot in Iran) are used to decide the best agricultural land use for both rainfed and irrigated agriculture for ten different crops. For this purpose, each variable was imported into Arc GIS, and a raster layer was obtained. In the next level, by using training samples, all layers were imported into the python environment. A random forest model was applied, and the weight of each variable was specified. In the final step, results were visualized using a digital elevation model, and the importance of all factors for each one of the crops was obtained. Our results show that despite 62% of the study area being allocated to agricultural purposes, only 42.9% of these areas can be defined as a suitable class for cultivation purposes.Keywords: land suitability, machine learning, random forest, sustainable agriculture
Procedia PDF Downloads 84565 Systematic Literature Review and Bibliometric Analysis of Interorganizational Employee Mobility Determinants
Authors: Iva Zdrilić, Petra Došenović Bonča, Darija Aleksić
Abstract:
Since the boundaryless career, with its emphasis on cross-employer movements, was introduced as a new paradigm of career development, inter-organizational employee mobility has been increasing. Although this phenomenon may have positive implications for individual careers and destination organizations, the consequences for the source organizations losing workers are less clear. The aim of this paper is thus to develop a comprehensive typology of possible inter-organizational employee mobility determinants. Since the most common classification differentiates between mobility determinants at different levels (i.e., economic, organizational, and individual), this paper focuses on building a comprehensive multi-level typology of inter-organizational mobility determinants across diverse sectors and industries. By using a structured literature review approach and bibliometric analysis, the paper reveals both intricate relationships between different mobility determinants and the complexity of inter-organizational networks and social ties. The latter appears as both a mobility determinant (at the organizational and individual level) and a mobility effect. Indeed, inter-organizational employee mobility leads to the formation of networks between source and destination organizations. These networks are practically based on the social ties between mobile employees and their colleagues and, in this way, they close the "inter-organizational employee mobility - inter-organizational network/ties" circle. The paper contributes to the career development literature by uncovering hitherto underexplored diverse determinants of intra- and inter-sectoral mobility as well as the conflicting results of the existing studies on some factors (e.g., inter-organizational networks and/or social ties) that appear both as a mobility determinant and a mobility effect.Keywords: inter-organizational mobility, social ties, inter-organizational network, knowledge transfer
Procedia PDF Downloads 116564 An Image Processing Scheme for Skin Fungal Disease Identification
Authors: A. A. M. A. S. S. Perera, L. A. Ranasinghe, T. K. H. Nimeshika, D. M. Dhanushka Dissanayake, Namalie Walgampaya
Abstract:
Nowadays, skin fungal diseases are mostly found in people of tropical countries like Sri Lanka. A skin fungal disease is a particular kind of illness caused by fungus. These diseases have various dangerous effects on the skin and keep on spreading over time. It becomes important to identify these diseases at their initial stage to control it from spreading. This paper presents an automated skin fungal disease identification system implemented to speed up the diagnosis process by identifying skin fungal infections in digital images. An image of the diseased skin lesion is acquired and a comprehensive computer vision and image processing scheme is used to process the image for the disease identification. This includes colour analysis using RGB and HSV colour models, texture classification using Grey Level Run Length Matrix, Grey Level Co-Occurrence Matrix and Local Binary Pattern, Object detection, Shape Identification and many more. This paper presents the approach and its outcome for identification of four most common skin fungal infections, namely, Tinea Corporis, Sporotrichosis, Malassezia and Onychomycosis. The main intention of this research is to provide an automated skin fungal disease identification system that increase the diagnostic quality, shorten the time-to-diagnosis and improve the efficiency of detection and successful treatment for skin fungal diseases.Keywords: Circularity Index, Grey Level Run Length Matrix, Grey Level Co-Occurrence Matrix, Local Binary Pattern, Object detection, Ring Detection, Shape Identification
Procedia PDF Downloads 231563 Investigating the Characteristics of Correlated Parking-Charging Behaviors for Electric Vehicles: A Data-Driven Approach
Authors: Xizhen Zhou, Yanjie Ji
Abstract:
In advancing the management of integrated electric vehicle (EV) parking-charging behaviors, this study uses Changshu City in Suzhou as a case study to establish a data association mechanism for parking-charging platforms and to develop a database for EV parking-charging behaviors. Key indicators, such as charging start time, initial state of charge, final state of charge, and parking-charging time difference, are considered. Utilizing the K-S test method, the paper examines the heterogeneity of parking-charging behavior preferences among pure EV and non-pure EV users. The K-means clustering method is employed to analyze the characteristics of parking-charging behaviors for both user groups, thereby enhancing the overall understanding of these behaviors. The findings of this study reveal that using a classification model, the parking-charging behaviors of pure EVs can be classified into five distinct groups, while those of non-pure EVs can be separated into four groups. Among them, both types of EV users exhibit groups with low range anxiety for complete charging with special journeys, complete charging at destination, and partial charging. Additionally, both types have a group with high range anxiety, characterized by pure EV users displaying a preference for complete charging with specific journeys, while non-pure EV users exhibit a preference for complete charging. Notably, pure EV users also display a significant group engaging in nocturnal complete charging. The findings of this study can provide technical support for the scientific and rational layout and management of integrated parking and charging facilities for EVs.Keywords: traffic engineering, potential preferences, cluster analysis, EV, parking-charging behavior
Procedia PDF Downloads 77562 Learning Dynamic Representations of Nodes in Temporally Variant Graphs
Authors: Sandra Mitrovic, Gaurav Singh
Abstract:
In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.Keywords: churn prediction, dynamic networks, node2vec, auto-encoders
Procedia PDF Downloads 314561 Radio-Frequency Technologies for Sensing and Imaging
Authors: Cam Nguyen
Abstract:
Rapid, accurate, and safe sensing and imaging of physical quantities or structures finds many applications and is of significant interest to society. Sensing and imaging using radio-frequency (RF) techniques, particularly, has gone through significant development and subsequently established itself as a unique territory in the sensing world. RF sensing and imaging has played a critical role in providing us many sensing and imaging abilities beyond our human capabilities, benefiting both civilian and military applications - for example, from sensing abnormal conditions underneath some structures’ surfaces to detection and classification of concealed items, hidden activities, and buried objects. We present the developments of several sensing and imaging systems implementing RF technologies like ultra-wide band (UWB), synthetic-pulse, and interferometry. These systems are fabricated completely using RF integrated circuits. The UWB impulse system operates over multiple pulse durations from 450 to 1170 ps with 5.5-GHz RF bandwidth. It performs well through tests of various samples, demonstrating its usefulness for subsurface sensing. The synthetic-pulse system operating from 0.6 to 5.6 GHz can assess accurately subsurface structures. The synthetic-pulse system operating from 29.72-37.7 GHz demonstrates abilities for various surface and near-surface sensing such as profile mapping, liquid-level monitoring, and anti-personnel mine locating. The interferometric system operating at 35.6 GHz demonstrates its multi-functional capability for measurement of displacements and slow velocities. These RF sensors are attractive and useful for various surface and subsurface sensing applications. This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.Keywords: RF sensors, radars, surface sensing, subsurface sensing
Procedia PDF Downloads 316560 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 158559 Retrospective Analysis of Facial Skin Cancer Patients Treated in the Department of Oral and Maxillofacial Surgery Kiel
Authors: Abdullah Saeidi, Aydin Gülses, Christan Flörke
Abstract:
Skin cancer of the face region is the most common type of malignancy and surgical excision is the preferred approach. However, the clinical long term results reported in the literature are still controversial. Objectives: To describe; 1. Demographical characteristics 2. Affected site, distribution and TNM classification regarding tumor type 3. Surgical aspects • Surgical removal: excision principles, safety margins, the need for secondary resection, primary reconstruction/ defect closure, anesthesia protocol, duration of hospital stay (if any) • Secondary intervention for defect closure/reconstruction: Flap technique, anesthesia protocol, duration of hospital stay (if any), postoperative wound management etc. 4. Tumor recurrences 5. Clinical outcomes 6. Studying the possible therapy approach throw Biostatistical relation and correlation between multiple Histological, diagnostics and clinical Faktors. following surgical ablation of the skin cancer of the head and neck region. Methods: Selection and statistical analysis of medical records of patients who had admitted to the Department of Oral and Maxillofacial Surgery, Universitätsklinikum Schleswig Holstein, Campus Kiel during the period of 2015-2019 will be retrospectively evaluated. Data will be collected via ORBIS Information-Management-System (ORBIS AG, Saarbrücken, Germany).Keywords: non melanoma skin cancer, face skin cancer, skin reconstruction, non melanoma skin cancer recurrence, non melanoma skin cancer metastases
Procedia PDF Downloads 106558 Convolution Neural Network Based on Hypnogram of Sleep Stages to Predict Dosages and Types of Hypnotic Drugs for Insomnia
Authors: Chi Wu, Dean Wu, Wen-Te Liu, Cheng-Yu Tsai, Shin-Mei Hsu, Yin-Tzu Lin, Ru-Yin Yang
Abstract:
Background: The results of previous studies compared the benefits and risks of receiving insomnia medication. However, the effects between hypnotic drugs used and enhancement of sleep quality were still unclear. Objective: The aim of this study is to establish a prediction model for hypnotic drugs' dosage used for insomnia subjects and associated the relationship between sleep stage ratio change and drug types. Methodologies: According to American Academy of Sleep Medicine (AASM) guideline, sleep stages were classified and transformed to hypnogram via the polysomnography (PSG) in a hospital in New Taipei City (Taiwan). The subjects with diagnosis for insomnia without receiving hypnotic drugs treatment were be set as the comparison group. Conversely, hypnotic drugs dosage within the past three months was obtained from the clinical registration for each subject. Furthermore, the collecting subjects were divided into two groups for training and testing. After training convolution neuron network (CNN) to predict types of hypnotics used and dosages are taken, the test group was used to evaluate the accuracy of classification. Results: We recruited 76 subjects in this study, who had been done PSG for transforming hypnogram from their sleep stages. The accuracy of dosages obtained from confusion matrix on the test group by CNN is 81.94%, and accuracy of hypnotic drug types used is 74.22%. Moreover, the subjects with high ratio of wake stage were correctly classified as requiring medical treatment. Conclusion: CNN with hypnogram was potentially used for adjusting the dosage of hypnotic drugs and providing subjects to pre-screening the types of hypnotic drugs taken.Keywords: convolution neuron network, hypnotic drugs, insomnia, polysomnography
Procedia PDF Downloads 195557 Cone Beam Computed Tomography: A Useful Diagnostic Tool to Determine Root Canal Morphology in a Sample of Egyptian Population
Authors: H. El-Messiry, M. El-Zainy, D. Abdelkhalek
Abstract:
Cone-beam computed tomography (CBCT) provides high-quality 3-dimensional images of dental structures because of its high spatial resolution. The study of dental morphology is important in research as it provides information about diversities within a population. Many studies have shown different shapes and numbers of roots canals among different races, especially in molars. The aim of this study was to determine the morphology of root canals of mandibular first and third molars in a sample of Egyptian population using CBCT scanning. Fifty mandibular first Molars (M1) and fifty mandibular third (M3) extracted molars were collected. Thick rectangular molds were made using pink wax to hold the samples. Molars were embedded in the wax mold by aligning them in rows leaving arbitrary 0.5cm space between them. The molds with the samples in were submitted for CBCT scan. The number and morphology of root canals were assessed and classified according to Vertucci's classification. The mesial and the distal roots were examined separately. Finally, data was analyzed using Fisher exact test. The most prevalent mesial root canal frequency in M1 was type IV (60%) and type II (40 %), while M3 showed prevalence of type I (40%) and II (40%). Distal root canal morphology showed prevalence of type I in both M1 (66%) and M3 (86%). So, it can be concluded that CBCT scanning provides supplemental information about the root canal configurations of mandibular molars in a sample of Egyptian population. This study may help clinicians in the root canal treatment of mandibular molars.Keywords: cone beam computed tomography, mandibular first molar, mandibular third molar, root canal morphology
Procedia PDF Downloads 318556 Retinal Changes in Patients with Idiopathic Inflammatory Myopathies: A Case-Control Study
Authors: Rachna Agarwal, R. Naveen, Darpan Thakre, Rohit Shahi, Maryam Abbasi, Upendra Rathore, Latika Gupta
Abstract:
Aim: Retinal changes are the window to systemic vasculature. Therefore, we explored retinal changes in patients with idiopathic inflammatory myopathies (IIM) as a surrogate for vascular health. Methods: Adult and juvenile IIM patients visiting a tertiary care centre in 2021 satisfying the International Myositis Classification Criteria were enrolled for detailed ophthalmic examination in comparison with healthy controls (HC). Patients with conditions that precluded thorough posterior chamber examination were excluded. Scale variables are expressed as median (IQR). Multivariate analysis (binary logistic regression-BLR) was conducted, adjusting for age, gender, and comorbidities besides factors significant in univariate analysis. Results: 43 patients with IIM [31 females; age 36 (23-45) years; disease duration 5.5 (2-12) months] were enrolled for participation. DM (44%) was the most common diagnosis. IIM patients exhibited frequent attenuation of retinal vessels (32.6% vs. 4.3%, p <0.001), AV nicking (14% vs. 2.2%, p=0.053), and vascular tortuosity (18.6% vs. 2.2%, p=0.012), besides decreased visual acuity (53.5% vs. 10.9%, p<0.001) and immature cataracts (34.9% vs. 2.2%, p<0.001). Attenuation of vessels [OR 10.9 (1.7-71), p=0.004] emerged as significantly different from HC after adjusting for covariates in BLR. Notably, adults with IIM were more predisposed to retinal abnormalities [21 (57%) vs. 1 (16%), p=0.068], especially attenuation of vessels [14(38%) vs. 0(0), p=0.067] than jIIM. However, no difference was found in retinal features amongst the subtypes of adult IIM, nor did they correlate with MDAAT, MDI, or HAQ-DI. Conclusion: Retinal microvasculopathy and diminution of vision occur in nearly one-third to half of the patients with IIM. Microvasculopathy occurs across subtypes of IIM, and more so in adults, calling for further investigation as a surrogate for damage assessment and potentially even systemic vascular health.Keywords: idiopathic inflammatory myopathies, vascular health, retinal microvasculopathy, arterial attenuation
Procedia PDF Downloads 91555 Extraction and Analysis of Anthocyanins Contents from Different Stage Flowers of the Orchids Dendrobium Hybrid cv. Ear-Sakul
Authors: Orose Rugchati, Khumthong Mahawongwiriya
Abstract:
Dendrobium hybrid cv. Ear-Sakul has become one of the important commercial commodities in Thailand agricultural industry worldwide, either as potted plants or as cut flowers due to the attractive color produced in flower petals. Anthocyanins are the main flower pigments and responsible for the natural attractive display of petal colors. These pigments play an important role in functionality, such as to attract animal pollinators, classification, and grading of these orchids. Dendrobium hybrid cv. Ear-Sakul has been collected from local area farm in different stage flowers (F1, F2-F5, and F6). Anthocyanins pigment were extracted from the fresh flower by solvent extraction (MeOH–TFA 99.5:0.5v/v at 4ºC) and purification with ethyl acetate. The main anthocyanins components are cyanidin, pelargonidin, and delphinidin. Pure anthocyanin contents were analysis by UV-Visible spectroscopy technique at λ max 535, 520 and 546 nm respectively. The anthocyanins contents were converted in term of monomeric anthocyanins pigment (mg/L). The anthocyanins contents of all sample were compared with standard pigments cyanidin, pelargonidin and delphinidin. From this experiment is a simple extraction and analysis anthocyanins content in different stage of flowers results shown that monomeric anthocyanins pigment contents of different stage flowers (F1, F2-F5 and F6 ): cyanidin – 3 – glucoside (mg/l) are 0.85+0.08, 24.22+0.12 and 62.12+0.6; Pelargonidin 3,5-di- glucoside(mg/l) 10.37+0.12, 31.06+0.8 and 81.58+ 0.5; Delphinidin (mg/l) 6.34+0.17, 18.98+0.56 and 49.87+0.7; and the appearance of extraction pure anthocyanins in L(a, b): 2.71(1.38, -0.48), 1.06(0.39,-0.66) and 2.64(2.71,-3.61) respectively. Dendrobium Hybrid cv. Ear-Sakul could be used as a source of anthocyanins by simple solvent extraction and stage of flowers as a guideline for the prediction amount of main anthocyanins components are cyanidin, pelargonidin, and delphinidin could be application and development in quantities, and qualities with the advantage for food pharmaceutical and cosmetic industries.Keywords: analysis, anthocyanins contents, different stage flowers, Dendrobium Hybrid cv. Ear-Sakul
Procedia PDF Downloads 150554 Evaluation of the Effectiveness of Crisis Management Support Bases in Tehran
Authors: Sima Hajiazizi
Abstract:
Tehran is a capital of Iran, with the capitals of the world to natural disasters such as earthquake and flood vulnerable has known. City has stated on three faults, Ray, Mosha, and north according to report of JICA in 2000, the most casualties and destruction was the result of active fault Ray. In 2003, the prevention and management of crisis in Tehran to conduct prevention and rehabilitation of the city, under the Ministry has active. Given the breadth and lack of appropriate access in the city, was considered decentralized management for crisis management support, in each region, in order to position the crisis management headquarters at the time of crises and implementation of programs for prevention and education of the citizens and also to position the bases given in some areas of the neighboring provinces at the time of the accident for help and a number of databases to store food and equipment needed at the time of the disaster. In this study, the bases for one, six, nine and eleven regions of Tehran in the field of management and training are evaluated. Selected areas had local accident and experience of practice for disaster management and local training has been experiencing challenges. The research approach was used qualitative research methods underlying Ground theory. At first, the information obtained through the study of documents and Semi-structured interviews by administrators, officials of training and participant observation in the classroom, line by line, and then it was coded in two stages, by comparing and questioning concepts, categories and extract according to the indicators is obtained from literature studies, subjects were been central. Main articles according to the frequency and importance of the phenomenon were called and they were drawn diagram paradigm and at the end with the intersections phenomena and their causes with indicators extracted from the texts, approach each phenomenon and the effectiveness of the bases was measured. There are two phenomenons in management; 1. The inability to manage the vast and complex crisis events and to resolve minor incidents due to the mismatch between managers. 2. Weaknesses in the implementation of preventive measures and preparedness to manage crisis is causal of situations, fields and intervening. There are five phenomenons in the field of education; 1. In the six-region participation and interest is high. 2. In eleven-region training partnerships for crisis management were to low that next by maneuver in schools and local initiatives such as advertising and use of aid groups have increased. 3. In nine-region, contributions to education in the area of crisis management at the beginning were low that initiatives like maneuver in schools and communities to stimulate and increase participation have increased sensitivity. 4. Managers have been disagreement with the same training in all areas. Finally for the issues that are causing the main issues, with the help of concepts extracted from the literature, recommendations are provided.Keywords: crises management, crisis management support bases, vulnerability, crisis management headquarters, prevention
Procedia PDF Downloads 174553 Self-Organizing Maps for Credit Card Fraud Detection
Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 57552 Taxonomic Analyses of Some Members of Cucurbitoideae Using Phytolith Marker
Authors: J. K. Ebigwai, E. Asuquo
Abstract:
Systematic affinities among Cucurbitaceae members are highly debatable as exemplified by diverging views on their phylogenies. Worst still is the overriding reliance on morphometric marker in the delimitation of cucurbitoideae members. Considerable symplesiomorphic and synapmorphic character states have been observed among some members of same genera than do with some members of other genera. The broad study aims at establishing phylogenies among species of Cucumis (Melothrieae), Momordica, Telfairia (Jolliffieae), Trichosanthes (Trichosantheae), Citrullus, Lagenaria, Luffa (Benincaseae) and Cucurbita (Cucurbita) using anatomical, cytological, Palynological, serological, and phytolith markers. However, this paper shall present preliminary findings on the phytolith character states for Cucumis melo, Momordica charantia, Telfairia occidentales, Trichosanthes dioica, Citrullus vulgaris, Lagenaria siceraria, Luffa cylindrical, Cucurbita pepo and Cucurbita maxima. Heavy liquid floatation method was employed in the extraction of the phytolith matter from the leaf tissues of these species. The result revealed that a bilobate short cell and a trapeziform sinuate form were absent in all the species except in Cucumis melo, Citrullus vulgaris and Lagenaria siceraria. Also a globular granulate form was observed exclusively in Telfairia occidentales, Cucurbita maxima, Momordica charantia and Luffa cylindrical. Other forms of phytolith observed were not diagnostic as they were not species specific. The results tentatively suggests a closer examination of the existing classification system.Keywords: bilobate short cell, cucums, phytolith, telfairia, trapeziform sinuate
Procedia PDF Downloads 344551 Automatic Detection and Filtering of Negative Emotion-Bearing Contents from Social Media in Amharic Using Sentiment Analysis and Deep Learning Methods
Authors: Derejaw Lake Melie, Alemu Kumlachew Tegegne
Abstract:
The increasing prevalence of social media in Ethiopia has exacerbated societal challenges by fostering the proliferation of negative emotional posts and comments. Illicit use of social media has further exacerbated divisions among the population. Addressing these issues through manual identification and aggregation of emotions from millions of users for swift decision-making poses significant challenges, particularly given the rapid growth of Amharic language usage on social platforms. Consequently, there is a critical need to develop an intelligent system capable of automatically detecting and categorizing negative emotional content into social, religious, and political categories while also filtering out toxic online content. This paper aims to leverage sentiment analysis techniques to achieve automatic detection and filtering of negative emotional content from Amharic social media texts, employing a comparative study of deep learning algorithms. The study utilized a dataset comprising 29,962 comments collected from social media platforms using comment exporter software. Data pre-processing techniques were applied to enhance data quality, followed by the implementation of deep learning methods for training, testing, and evaluation. The results showed that CNN, GRU, LSTM, and Bi-LSTM classification models achieved accuracies of 83%, 50%, 84%, and 86%, respectively. Among these models, Bi-LSTM demonstrated the highest accuracy of 86% in the experiment.Keywords: negative emotion, emotion detection, social media filtering sentiment analysis, deep learning.
Procedia PDF Downloads 23550 Breast Cancer Awareness among Female Nurses: Time to Scrub off Assumptions
Authors: Rahy Farooq, Maria Ahmad Khan, Ayesha Isani Majeed
Abstract:
Objective: The main aim of this research is to assess the knowledge, attitude and practices of female nursing staff and nursing students regarding breast cancer, to provide a baseline for monitoring trends of breast cancer awareness in them. Background: Healthcare professionals are a direct source of information for the patients and the general public as a whole. It is, therefore, essential that the information they convey be accurate and helps in building additional awareness. However, clinical experience does not influence the knowledge, attitude and practices regarding breast cancer. Nurses, being the prime part of the healthcare professionals, play a significant role and hence, their awareness regarding this pressing issue is pertinent. Lack of awareness regarding common presenting symptoms or breast cancer risk factors translates to poor breast cancer screening practices and late diagnosis. Methodology: A cross-sectional study of 280 female nurses was conducted at a tertiary care hospital in Islamabad, Pakistan. A pre-tested structured questionnaire with additional variables like cultural barriers to seeking medical help was used. The scores for outcome variables including knowledge, attitude and practices were pre-defined. Data was analyzed using SPSSv23. Results: Of the 280 participants with a mean age of 28.99±9.98 years, 142 (50.7%) were married, and 138 (49.3%) were unmarried. Mean scores were computed to be 6.14±2.93 (out of 12), 0.30±0.7 (out of 3) and 9.53±1.92 (out of 16) for knowledge, attitude and practice respectively. Using independent sample T-test, a statistically significant correlation was found when means for the score of Attitude was compared with age. With a p-value of 0.018, 117 nurses of age more than 30 years, faced more practical, financial, emotional and service barriers as compared to 163 women younger than 30 years of age. Knowledge of age-related lifetime risks was also significantly poor more in single women; with a p-value of 0.006 for identification of correct age as a risk factor and a p-value of 0.005 for correct identification of risk for development of breast cancer in the lifetime of women. By application of Chi-square test, there was a significant correlation between marital status and cultural barriers to seeking medical help, showing that single women (58.7%) shy away from talking about breast cancer considering it a taboo (p-value 0.028) whereas, more married nurses (59.2%) were apprehensive that they might be considered at fault by the society, as compared to 40.8% of single nurses. (p-value 0.038). Conclusion: Owing to the scarcity of awareness among nurses, this study recognizes the need for delivering effective information to the female nurses regarding breast cancer. Educating patients is likely to be effective if the female nurses play their part and have correct attitudes towards breast cancer practices. A better understanding of the knowledge and practices regarding breast cancer among the nursing population will enable high-risk patients to be recognized early. Therefore, we recommend arrangement of special courses and seminars for all healthcare professionals including the nursing staff.Keywords: breast cancer, cultural barriers, kap, nurses
Procedia PDF Downloads 237549 Quantification of E-Waste: A Case Study in Federal University of Espírito Santo, Brazil
Authors: Andressa S. T. Gomes, Luiza A. Souza, Luciana H. Yamane, Renato R. Siman
Abstract:
The segregation of waste of electrical and electronic equipment (WEEE) in the generating source, its characterization (quali-quantitative) and identification of origin, besides being integral parts of classification reports, are crucial steps to the success of its integrated management. The aim of this paper was to count WEEE generation at the Federal University of Espírito Santo (UFES), Brazil, as well as to define sources, temporary storage sites, main transportations routes and destinations, the most generated WEEE and its recycling potential. Quantification of WEEE generated at the University in the years between 2010 and 2015 was performed using data analysis provided by UFES’s sector of assets management. EEE and WEEE flow in the campuses information were obtained through questionnaires applied to the University workers. It was recorded 6028 WEEEs units of data processing equipment disposed by the university between 2010 and 2015. Among these waste, the most generated were CRT screens, desktops, keyboards and printers. Furthermore, it was observed that these WEEEs are temporarily stored in inappropriate places at the University campuses. In general, these WEEE units are donated to NGOs of the city, or sold through auctions (2010 and 2013). As for recycling potential, from the primary processing and further sale of printed circuit boards (PCB) from the computers, the amount collected could reach U$ 27,839.23. The results highlight the importance of a WEEE management policy at the University.Keywords: solid waste, waste of electrical and electronic equipment, waste management, institutional solid waste generation
Procedia PDF Downloads 260548 Invasion of Pectinatella magnifica in Freshwater Resources of the Czech Republic
Authors: J. Pazourek, K. Šmejkal, P. Kollár, J. Rajchard, J. Šinko, Z. Balounová, E. Vlková, H. Salmonová
Abstract:
Pectinatella magnifica (Leidy, 1851) is an invasive freshwater animal that lives in colonies. A colony of Pectinatella magnifica (a gelatinous blob) can be up to several feet in diameter large and under favorable conditions it exhibits an extreme growth rate. Recently European countries around rivers of Elbe, Oder, Danube, Rhine and Vltava have confirmed invasion of Pectinatella magnifica, including freshwater reservoirs in South Bohemia (Czech Republic). Our project (Czech Science Foundation, GAČR P503/12/0337) is focused onto biology and chemistry of Pectinatella magnifica. We monitor the organism occurrence in selected South Bohemia ponds and sandpits during the last years, collecting information about physical properties of surrounding water, and sampling the colonies for various analyses (classification, maps of secondary metabolites, toxicity tests). Because the gelatinous matrix is during the colony lifetime also a host for algae, bacteria and cyanobacteria (co-habitants), in this contribution, we also applied a high performance liquid chromatography (HPLC) method for determination of potentially present cyanobacterial toxins (microcystin-LR, microcystin-RR, nodularin). Results from the last 3-year monitoring show that these toxins are under limit of detection (LOD), so that they do not represent a danger yet. The final goal of our study is to assess toxicity risks related to fresh water resources invaded by Pectinatella magnifica, and to understand the process of invasion, which can enable to control it.Keywords: cyanobacteria, fresh water resources, Pectinatella magnifica invasion, toxicity monitoring
Procedia PDF Downloads 239