Search results for: tensor deep stacking neural networks
3203 A Multidimensional Exploration of Narcissistic Personality Disorder Through Psycholinguistic Analysis and Neuroscientific Correlates
Authors: Dalia Elleuch
Abstract:
Narcissistic Personality Disorder (NPD) manifests as a personality disorder marked by inflated self-importance, heightened sensitivity to criticism, a lack of empathy, a preoccupation with appearance over substance, and features such as arrogance, grandiosity, a constant need for admiration, a tendency to exploit others, and an inclination towards demanding special treatment due to a sense of excessive entitlement (APA, 2013). This interdisciplinary study delves into NPD through the systematic synthesis of psycholinguistic analysis and neuroscientific correlates. The cognitive and emotional dimensions of NPD reveal linguistic patterns, including grandiosity, entitlement, and manipulative communication. Neuroscientific investigations reveal structural brain differences and alterations in functional connectivity, further explaining the neural underpinnings of social cognition deficits observed in individuals with NPD. Genetic predispositions and neurotransmitter imbalances add a layer of complexity to the understanding of NPD. The necessity for linguistic intervention in diagnosing and treating Narcissistic Personality Disorder is underscored by an interdisciplinary study that intricately synthesizes psycholinguistic analysis and neuroscientific correlates, offering a comprehensive understanding of NPD’s cognitive, emotional, and neural dimensions and paving the way for future practical, theoretical, and pedagogical approaches to address the complexities of this personality disorder.Keywords: Narcissistic Personality Disorder (NPD), psycholinguistic analysis, neuroscientific correlates, interpersonal dysfunction, cognitive empathy
Procedia PDF Downloads 653202 Stabilizing Effects of Deep Eutectic Solvents on Alcohol Dehydrogenase Mediated Systems
Authors: Fatima Zohra Ibn Majdoub Hassani, Ivan Lavandera, Joseph Kreit
Abstract:
This study explored the effects of different organic solvents, temperature, and the amount of glycerol on the alcohol dehydrogenase (ADH)-catalysed stereoselective reduction of different ketones. These conversions were then analyzed by gas chromatography. It was found that when the amount of deep eutectic solvents (DES) increases, it can improve the stereoselectivity of the enzyme although reducing its ability to convert the substrate into the corresponding alcohol. Moreover, glycerol was found to have a strong stabilizing effect on the ADH from Ralstonia sp. (E. coli/ RasADH). In the case of organic solvents, it was observed that the best conversions into the alcohols were achieved with DMSO and hexane. It was also observed that temperature decreased the ability of the enzyme to convert the substrates into the products and also affected the selectivity. In addition to that, the recycling of DES up to three times gave good conversions and enantiomeric excess results and glycerol showed a positive effect in the stability of various ADHs. Using RasADH, a good conversion and enantiomeric excess into the S-alcohol were obtained. It was found that an enhancement of the temperature disabled the stabilizing effect of glycerol and decreased the stereoselectivity of the enzyme. However, for other ADHs a temperature increase had an opposite positive effect, especially with ADH-T from Thermoanaerobium sp. One of the objectives of this study was to see the effect of cofactors such as NAD(P) on the biocatlysis activities of ADHs.Keywords: alcohol dehydrogenases, DES, gas chromatography, RasADH
Procedia PDF Downloads 1933201 Preserving Urban Cultural Heritage with Deep Learning: Color Planning for Japanese Merchant Towns
Authors: Dongqi Li, Yunjia Huang, Tomo Inoue, Kohei Inoue
Abstract:
With urbanization, urban cultural heritage is facing the impact and destruction of modernization and urbanization. Many historical areas are losing their historical information and regional cultural characteristics, so it is necessary to carry out systematic color planning for historical areas in conservation. As an early focus on urban color planning, Japan has a systematic approach to urban color planning. Hence, this paper selects five merchant towns from the category of important traditional building preservation areas in Japan as the subject of this study to explore the color structure and emotion of this type of historic area. First, the image semantic segmentation method identifies the buildings, roads, and landscape environments. Their color data were extracted for color composition and emotion analysis to summarize their common features. Second, the obtained Internet evaluations were extracted by natural language processing for keyword extraction. The correlation analysis of the color structure and keywords provides a valuable reference for conservation decisions for this historic area in the town. This paper also combines the color structure and Internet evaluation results with generative adversarial networks to generate predicted images of color structure improvements and color improvement schemes. The methods and conclusions of this paper can provide new ideas for the digital management of environmental colors in historic districts and provide a valuable reference for the inheritance of local traditional culture.Keywords: historic districts, color planning, semantic segmentation, natural language processing
Procedia PDF Downloads 883200 Development of a Congestion Controller of Computer Network Using Artificial Intelligence Algorithm
Authors: Mary Anne Roa
Abstract:
Congestion in network occurs due to exceed in aggregate demand as compared to the accessible capacity of the resources. Network congestion will increase as network speed increases and new effective congestion control methods are needed, especially for today’s very high speed networks. To address this undeniably global issue, the study focuses on the development of a fuzzy-based congestion control model concerned with allocating the resources of a computer network such that the system can operate at an adequate performance level when the demand exceeds or is near the capacity of the resources. Fuzzy logic based models have proven capable of accurately representing a wide variety of processes. The model built is based on bandwidth, the aggregate incoming traffic and the waiting time. The theoretical analysis and simulation results show that the proposed algorithm provides not only good utilization but also low packet loss.Keywords: congestion control, queue management, computer networks, fuzzy logic
Procedia PDF Downloads 3973199 Real Time Classification of Political Tendency of Twitter Spanish Users based on Sentiment Analysis
Authors: Marc Solé, Francesc Giné, Magda Valls, Nina Bijedic
Abstract:
What people say on social media has turned into a rich source of information to understand social behavior. Specifically, the growing use of Twitter social media for political communication has arisen high opportunities to know the opinion of large numbers of politically active individuals in real time and predict the global political tendencies of a specific country. It has led to an increasing body of research on this topic. The majority of these studies have been focused on polarized political contexts characterized by only two alternatives. Unlike them, this paper tackles the challenge of forecasting Spanish political trends, characterized by multiple political parties, by means of analyzing the Twitters Users political tendency. According to this, a new strategy, named Tweets Analysis Strategy (TAS), is proposed. This is based on analyzing the users tweets by means of discovering its sentiment (positive, negative or neutral) and classifying them according to the political party they support. From this individual political tendency, the global political prediction for each political party is calculated. In order to do this, two different strategies for analyzing the sentiment analysis are proposed: one is based on Positive and Negative words Matching (PNM) and the second one is based on a Neural Networks Strategy (NNS). The complete TAS strategy has been performed in a Big-Data environment. The experimental results presented in this paper reveal that NNS strategy performs much better than PNM strategy to analyze the tweet sentiment. In addition, this research analyzes the viability of the TAS strategy to obtain the global trend in a political context make up by multiple parties with an error lower than 23%.Keywords: political tendency, prediction, sentiment analysis, Twitter
Procedia PDF Downloads 2383198 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method
Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson
Abstract:
Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 1933197 Building Social Capital for Social Inclusion: The Use of Social Networks in Government
Authors: Suha Alawadhi, Malak Alrasheed
Abstract:
In the recent past, public participation in governments has been declined to a great extent, as citizens have been isolated from community life and their ability to articulate demands for good government has been noticeably decreased. However, the Internet has introduced new forms of interaction that could enhance different types of relationships, including government-public relationship. In fact, technology-enabled government has become a catalyst for enabling social inclusion. This exploratory study seeks to investigate public perceptions in Kuwait regarding the use of social media networks in government where social capital is built to achieve social inclusion. Social capital has been defined as social networks and connections amongst individuals, that are based on shared trust, ideas and norms, enable participants of a network to act effectively to pursue a shared objective. The quantitative method was used to generate empirical evidence. A questionnaire was designed to address the research objective and reflect the identified constructs: social capital dimensions (bridging, bonding and maintaining social capital), social inclusion, and social equality. In this pilot study, data was collected from a random sample of 61 subjects. The results indicate that all participants have a positive attitude towards the dimensions of social capital (bridging, bonding and maintaining), social inclusion and social equality constructs. Tests of identified constructs against demographic characteristics indicate that there are significant differences between male and female as they perceived bonding and maintaining social capital, social inclusion and social equality whereas no difference was identified in their perceptions of bridging social capital. Also, those who are aged 26-30 perceived bonding and maintaining social capital, social inclusion and social equality negatively compared to those aged 20-25, 31-35, and 40-above whose perceptions were positive. With regard to education, the results also show that those holding high school, university degree and diploma perceived maintaining social capital positively higher than with those who hold graduate degrees. Moreover, a regression model is proposed to study the effect of bridging, bonding, and maintaining social capital on social inclusion via social equality as a mediator. This exploratory study is necessary for testing the validity and reliability of the questionnaire which will be used in the main study that aims to investigate the perceptions of individuals towards building social capital to achieve social inclusion.Keywords: government, social capital, social inclusion, social networks
Procedia PDF Downloads 3263196 Reliable Line-of-Sight and Non-Line-of-Sight Propagation Channel Identification in Ultra-Wideband Wireless Networks
Authors: Mohamed Adnan Landolsi, Ali F. Almutairi
Abstract:
The paper addresses the problem of line-of-sight (LOS) vs. non-line-of-sight (NLOS) propagation link identification in ultra-wideband (UWB) wireless networks, which is necessary for improving the accuracy of radiolocation and positioning applications. A LOS/NLOS likelihood hypothesis testing approach is applied based on exploiting distinctive statistical features of the channel impulse response (CIR) using parameters related to the “skewness” of the CIR and its root mean square (RMS) delay spread. A log-normal fit is presented for the probability densities of the CIR parameters. Simulation results show that different environments (residential, office, outdoor, etc.) have measurable differences in their CIR parameters’ statistics, which is then exploited in determining the nature of the propagation channels. Correct LOS/NLOS channel identification rates exceeding 90% are shown to be achievable for most types of environments. Additional improvement is also obtained by combining both CIR skewness and RMS delay statistics.Keywords: UWB, propagation, LOS, NLOS, identification
Procedia PDF Downloads 2503195 Acoustic Analysis of Ball Bearings to Identify Localised Race Defect
Authors: M. Solairaju, Nithin J. Thomas, S. Ganesan
Abstract:
Each and every rotating part of a machine element consists of bearings within its structure. In particular, the rolling element bearings such as cylindrical roller bearing and deep groove ball bearings are frequently used. Improper handling, excessive loading, improper lubrication and sealing cause bearing damage. Hence health monitoring of bearings is an important aspect for radiation pattern of bearing vibration is computed using the dipole model. Sound pressure level for defect-free and race defect the prolonged life of machinery and auto motives. This paper presents modeling and analysis of Acoustic response of deep groove ball bearing with localized race defects. Most of the ball bearings, especially in machine tool spindles and high-speed applications are pre-loaded along an axial direction. The present study is carried out with axial preload. Based on the vibration response, the orbit motion of the inner race is studied, and it was found that the oscillation takes place predominantly in the axial direction. Simplified acoustic is estimated. Acoustic response shows a better indication in identifying the defective bearing. The computed sound signal is visualized in diagrammatic representation using Symmetrised Dot Pattern (SDP). SDP gives better visual distinction between the defective and defect-free bearingKeywords: bearing, dipole, noise, sound
Procedia PDF Downloads 2943194 Neural Network Modelling for Turkey Railway Load Carrying Demand
Authors: Humeyra Bolakar Tosun
Abstract:
The transport sector has an undisputed place in human life. People need transport access to continuous increase day by day with growing population. The number of rail network, urban transport planning, infrastructure improvements, transportation management and other related areas is a key factor affecting our country made it quite necessary to improve the work of transportation. In this context, it plays an important role in domestic rail freight demand planning. Alternatives that the increase in the transportation field and has made it mandatory requirements such as the demand for improving transport quality. In this study generally is known and used in studies by the definition, rail freight transport, railway line length, population, energy consumption. In this study, Iron Road Load Net Demand was modeled by multiple regression and ANN methods. In this study, model dependent variable (Output) is Iron Road Load Net demand and 6 entries variable was determined. These outcome values extracted from the model using ANN and regression model results. In the regression model, some parameters are considered as determinative parameters, and the coefficients of the determinants give meaningful results. As a result, ANN model has been shown to be more successful than traditional regression model.Keywords: railway load carrying, neural network, modelling transport, transportation
Procedia PDF Downloads 1433193 Stimuli-Responsive Zwitterionic Dressings for Chronic Wounds Management
Authors: Konstans Ruseva, Kristina Ivanova, Katerina Todorova, Margarita Gabrashanska, Tzanko Tzanov, Elena Vassileva
Abstract:
Zwitterionic polymers (ZP) are well-known with their ultralow biofouling. They are successfully competing with poly(ethylene glycols) (PEG), which are considered as the “golden standard” in this respect. These unique properties are attributed to their strong hydration capacity, defined by the dipole-dipole interactions, arising between the ZP pendant groups as well as to the dipoles interaction with water molecules. Beside, ZP are highly resistant to bacterial adhesion thus ensuring an excellent anti-biofilm formation ability. Moreover, ZP are able to respond upon external stimuli such as temperature, pH, salt concentration changes which in combination with their anti-biofouling effect render this type of polymers as materials with a high potential in biomedical applications. The present work is focused on the development of zwitterionic hydrogels for efficient treatment of highly exudating and hard-to-heal chronic wounds. To this purpose, two types of ZP networks with different crosslinking degree were synthesized - polysulfobetaine (PSB) and polycarboxybetaine (PCB) ones. They were characterized in terms of their physico-mechanical properties, e.g. microhardness, swelling ability, smart behaviour. Furthermore, the potential of ZP networks to resist biofilm formation towards Staphylococcus aureus and Escherichia coli was studied. Their ability to reduce the high levels of myeloperoxidase and metalloproteinase, two enzymes that are part of the chronic wounds enviroenment, was revealed. Moreover, the in vitro cytotoxic assessment of PSB and PCB networks along with their in vivo performance in rats was also studied to reveal their high biocompatibility.Keywords: absorption properties, biocompatibility, enzymatic inhibition activity, wound healing, zwitterionic polymers
Procedia PDF Downloads 1973192 A Study on Game Theory Approaches for Wireless Sensor Networks
Authors: M. Shoukath Ali, Rajendra Prasad Singh
Abstract:
Game Theory approaches and their application in improving the performance of Wireless Sensor Networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality, etc. However, Game Theory is a field, which can efficiently use to analyze the WSNs. Game Theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of complex interactions among rational entities can be predicted by a set of analytical tools. However, the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing, etc.Keywords: wireless sensor network, game theory, cooperative game theory, non-cooperative game theory
Procedia PDF Downloads 4333191 Teaching Neuroscience from Neuroscience: an Approach Based on the Allosteric Learning Model, Pathfinder Associative Networks and Teacher Professional Knowledge
Authors: Freddy Rodriguez Saza, Erika Sanabria, Jair Tibana
Abstract:
Currently, the important role of neurosciences in the professional training of the physical educator is known, highlighting in the teaching-learning process aspects such as the nervous structures involved in the adjustment of posture and movement, the neurophysiology of locomotion, the process of nerve impulse transmission, and the relationship between physical activity, learning, and cognition. The teaching-learning process of neurosciences is complex, due to the breadth of the contents, the diversity of teaching contexts required, and the demanding ability to relate concepts from different disciplines, necessary for the correct understanding of the function of the nervous system. This text presents the results of the application of a didactic environment based on the Allosteric Learning Model in morphophysiology students of the Faculty of Military Physical Education, Military School of Cadets of the Colombian Army (Bogotá, Colombia). The research focused then, on analyzing the change in the cognitive structure of the students on neurosciences. Methodology. [1] The predominant learning styles were identified. [2] Students' cognitive structure, core concepts, and threshold concepts were analyzed through the construction of Pathfinder Associative Networks. [3] Didactic Units in Neuroscience were designed to favor metacognition, the development of Executive Functions (working memory, cognitive flexibility, and inhibitory control) that led students to recognize their errors and conceptual distortions and to overcome them. [4] The Teacher's Professional Knowledge and the role of the assessment strategies applied were taken into account, taking into account the perspective of the Dynamizer, Obstacle, and Questioning axes. In conclusion, the study found that physical education students achieved significant learning in neuroscience, favored by the development of executive functions and by didactic environments oriented with the predominant learning styles and focused on increasing cognitive networks and overcoming difficulties, neuromyths and neurophobia.Keywords: allosteric learning model, military physical education, neurosciences, pathfinder associative networks, teacher professional knowledge
Procedia PDF Downloads 2363190 Advances in the Design of Wireless Sensor Networks for Environmental Monitoring
Authors: Shathya Duobiene, Gediminas Račiukaitis
Abstract:
Wireless Sensor Networks (WSNs) are an emerging technology that opens up a new field of research. The significant advance in WSN leads to an increasing prevalence of various monitoring applications and real-time assistance in labs and factories. Selective surface activation induced by laser (SSAIL) is a promising technology that adapts to the WSN design freedom of shape, dimensions, and material. This article proposes and implements a WSN-based temperature and humidity monitoring system, and its deployed architectures made for the monitoring task are discussed. Experimental results of newly developed sensor nodes implemented in university campus laboratories are shown. Then, the simulation and the implementation results obtained through monitoring scenarios are displayed. At last, a convenient solution to keep the WSN alive and functional as long as possible is proposed. Unlike other existing models, on success, the node is self-powered and can utilise minimal power consumption for sensing and data transmission to the base station.Keywords: IoT, network formation, sensor nodes, SSAIL technology
Procedia PDF Downloads 883189 Disarmament and Rehabilitation of Women Maoists: A Case Study of Chhattisgarh, India
Authors: Pinal Patel
Abstract:
The study defines the problems and issues of women in Maoist groups, also referred as ‘Naxalites’, in Chhattisgarh, India. It analyses the causes and consequences of increasing number of women joining Maoists groups and measures taken by the central and state government to retreat them. The main aspect of the study is, how to counter the challenges to resolve the issues and restore normalcy in the life of women Maoists to resettle them in mainstream once they become physically inactive and wish to become part of the society. The rationale behind this study is that women Maoists once inactive, has no place either with Maoist camps/rebel groups or particularly in society. The problems faced by the women Maoists, in society as well as in Maoists camps, can be studied through social, economic, cultural, political and humanitarian aspects. The methodology of the study is dependent on primary sources of information which includes a research survey in majorly affected areas, statistical analysis. Secondary sources of information are helpful for understanding the background of the problem. Government’s strategy of rewarding with cash and providing resettlement and rehabilitation benefits including houses and jobs to ex-women Maoists and their families is a well formulated and feasible policy and effectively implemented by the concerned authorities. But, the survey results show that the policy has not been able to have impacts as it was intended. Because inactive and physically disabled women are still left deserted in deep forests to die and police or authorities are not able to reach them and bring them back. The difficult terrain and dense forest areas are major hurdles to reach to Maoists camps. Moreover, to make people aware of government’s surrendering and rehabilitation schemes and policies as communication networks are very poor due to the lack of development in the state.Keywords: maoists, women, government, policy
Procedia PDF Downloads 1213188 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2213187 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network
Authors: Amit Verma, Pardeep Kaur
Abstract:
In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval
Procedia PDF Downloads 3783186 Amniotic Fluid Mesenchymal Stem Cells Selected for Neural Specificity Ameliorates Chemotherapy Induced Hearing Loss and Pain Perception
Authors: Jan F. Talts, Amit Saxena, Kåre Engkilde
Abstract:
Chemotherapy-induced peripheral neuropathy (CIPN) is one of the most frequent side effects caused by anti-neoplastic agents, with a prevalence from 19 % to 85 %. Clinically, CIPN is a mostly sensory neuropathy leading to pain and to motor and autonomic changes. Due to its high prevalence among cancer patients, CIPN constitutes a major problem for both cancer patients and survivors, especially because currently, there is no single effective method of preventing CIPN. Hearing loss is the most common form of sensory impairment in humans and can be caused by ototoxic chemical compounds such as chemotherapy (platinum-based antineoplastic agents).In rodents, single or repeated cisplatin injections induce peripheral neuropathy and hearing impairment mimicking human disorder, allowing studying the efficacy of new pharmacological candidates in chemotherapy-induced hearing loss and peripheral neuropathy. RNA sequencing data from full term amniotic fluid (TAF) mesenchymal stemcell (MSC) clones was used to identify neural-specific markers present on TAF-MSC. Several prospective neural markers were tested by flow cytometry on cultured TAF-MSC. One of these markers was used for cell-sorting using Tyto MACSQuant cell sorter, and the neural marker positive cell population was expanded for several passages to the final therapeutic product stage. Peripheral neuropathy and hearing loss was induced in mice by administration of cisplatin in three week-long cycles. The efficacy of neural-specific TAF-MSC in treating hearing loss and pain perception was evaluated by administration of three injections of 3 million cells/kg by intravenous route or three injections of 3 million cells/kg by intra-arterial route after each cisplatin cycle treatment. Auditory brainstem responses (ABR) are electric potentials recorded from scalp electrodes, and the first ABR wave represents the summed activity of the auditory nerve fibers contacting the inner hair cells. For ABR studies, mice were anesthetized, then earphones were placed in the left ear of each mouse, an active electrode was placed in the vertex of the skull, a reference electrode under the skin of the mastoid bone, and a ground electrode in the neck skin. The stimuli consisted of tone pips of five frequencies (2, 4, 6, 12, 16, and 24 kHz) at various sound levels (from 0 to 90 dB) ranging to cover the mouse auditory frequency range. The von Frey test was used to assess the onset and maintenance of mechanical allodynia over time. Mice were placed in clear plexiglass cages on an elevated mesh floor and tested after 30 min of habituation. Mechanical paw withdrawal threshold was examined using an electronic von Frey anesthesiometer. Cisplatin groups treated with three injections of 3 million cells/kg by intravenous route and three injections of 3 million cells/kg by intra-arterial route after each cisplatin cycle treatment presented, a significant increase of hearing acuity characterized by a decrease of ABR threshold and a decrease of neuropathic pain characterized by an increase of von Frey paw withdrawal threshold compared to controls only receiving cisplatin. This study shows that treatment with MSCselected for neural specificity presents significant positive efficacy on the chemotherapy-induced neuropathic pain and the chemotherapy-induced hearing loss.Keywords: mesenchymal stem cell, peripheral neuropathy, amniotic fluid, regenerative medicine
Procedia PDF Downloads 1663185 MCDM Spectrum Handover Models for Cognitive Wireless Networks
Authors: Cesar Hernández, Diego Giral, Fernando Santa
Abstract:
The spectral handoff is important in cognitive wireless networks to ensure an adequate quality of service and performance for secondary user communications. This work proposes a benchmarking of performance of the three spectrum handoff models: VIKOR, SAW and MEW. Four evaluation metrics are used. These metrics are, accumulative average of failed handoffs, accumulative average of handoffs performed, accumulative average of transmission bandwidth and, accumulative average of the transmission delay. As a difference with related work, the performance of the three spectrum handoff models was validated with captured data of spectral occupancy in experiments realized at the GSM frequency band (824 MHz-849 MHz). These data represent the actual behavior of the licensed users for this wireless frequency band. The results of the comparative show that VIKOR Algorithm provides 15.8% performance improvement compared to a SAW Algorithm and, 12.1% better than the MEW Algorithm.Keywords: cognitive radio, decision making, MEW, SAW, spectrum handoff, VIKOR
Procedia PDF Downloads 4383184 Hybrid Antenna Array with the Bowtie Elements for Super-Resolution and 3D Scanning Radars
Authors: Somayeh Komeylian
Abstract:
The antenna arrays for the entire 3D spherical coverage have been developed for their potential use in variety of applications such as radars and body-worn devices of the body area networks. In this study, we have rigorously revamped the hybrid antenna array using the optimum geometry of bowtie elements for achieving a significant improvement in the angular discrimination capability as well as in separating two adjacent targets. In this scenario, we have analogously investigated the effectiveness of increasing the virtual array length in fostering and enhancing the directivity and angular resolution in the 10 GHz frequency. The simulation results have extensively verified that the proposed antenna array represents a drastic enhancement in terms of size, directivity, side lobe level (SLL) and, especially resolution compared with the other available geometries. We have also verified that the maximum directivities of the proposed hybrid antenna array represent the robustness to the all variations, which is accompanied by the uniform 3D scanning characteristic.Keywords: bowtie antenna, hybrid antenna array, array signal processing, body area networks
Procedia PDF Downloads 1533183 Mapping Iron Content in the Brain with Magnetic Resonance Imaging and Machine Learning
Authors: Gabrielle Robertson, Matthew Downs, Joseph Dagher
Abstract:
Iron deposition in the brain has been linked with a host of neurological disorders such as Alzheimer’s, Parkinson’s, and Multiple Sclerosis. While some treatment options exist, there are no objective measurement tools that allow for the monitoring of iron levels in the brain in vivo. An emerging Magnetic Resonance Imaging (MRI) method has been recently proposed to deduce iron concentration through quantitative measurement of magnetic susceptibility. This is a multi-step process that involves repeated modeling of physical processes via approximate numerical solutions. For example, the last two steps of this Quantitative Susceptibility Mapping (QSM) method involve I) mapping magnetic field into magnetic susceptibility and II) mapping magnetic susceptibility into iron concentration. Process I involves solving an ill-posed inverse problem by using regularization via injection of prior belief. The end result from Process II highly depends on the model used to describe the molecular content of each voxel (type of iron, water fraction, etc.) Due to these factors, the accuracy and repeatability of QSM have been an active area of research in the MRI and medical imaging community. This work aims to estimate iron concentration in the brain via a single step. A synthetic numerical model of the human head was created by automatically and manually segmenting the human head on a high-resolution grid (640x640x640, 0.4mm³) yielding detailed structures such as microvasculature and subcortical regions as well as bone, soft tissue, Cerebral Spinal Fluid, sinuses, arteries, and eyes. Each segmented region was then assigned tissue properties such as relaxation rates, proton density, electromagnetic tissue properties and iron concentration. These tissue property values were randomly selected from a Probability Distribution Function derived from a thorough literature review. In addition to having unique tissue property values, different synthetic head realizations also possess unique structural geometry created by morphing the boundary regions of different areas within normal physical constraints. This model of the human brain is then used to create synthetic MRI measurements. This is repeated thousands of times, for different head shapes, volume, tissue properties and noise realizations. Collectively, this constitutes a training-set that is similar to in vivo data, but larger than datasets available from clinical measurements. This 3D convolutional U-Net neural network architecture was used to train data-driven Deep Learning models to solve for iron concentrations from raw MRI measurements. The performance was then tested on both synthetic data not used in training as well as real in vivo data. Results showed that the model trained on synthetic MRI measurements is able to directly learn iron concentrations in areas of interest more effectively than other existing QSM reconstruction methods. For comparison, models trained on random geometric shapes (as proposed in the Deep QSM method) are less effective than models trained on realistic synthetic head models. Such an accurate method for the quantitative measurement of iron deposits in the brain would be of important value in clinical studies aiming to understand the role of iron in neurological disease.Keywords: magnetic resonance imaging, MRI, iron deposition, machine learning, quantitative susceptibility mapping
Procedia PDF Downloads 1373182 Voting Representation in Social Networks Using Rough Set Techniques
Authors: Yasser F. Hassan
Abstract:
Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior.Keywords: voting system, rough sets, multi-agent, social networks, emergence, power indices
Procedia PDF Downloads 3943181 Introduction of Integrated Image Deep Learning Solution and How It Brought Laboratorial Level Heart Rate and Blood Oxygen Results to Everyone
Authors: Zhuang Hou, Xiaolei Cao
Abstract:
The general public and medical professionals recognized the importance of accurately measuring and storing blood oxygen levels and heart rate during the COVID-19 pandemic. The demand for accurate contactless devices was motivated by the need for cross-infection reduction and the shortage of conventional oximeters, partially due to the global supply chain issue. This paper evaluated a contactless mini program HealthyPai’s heart rate (HR) and oxygen saturation (SpO2) measurements compared with other wearable devices. In the HR study of 185 samples (81 in the laboratory environment, 104 in the real-life environment), the mean absolute error (MAE) ± standard deviation was 1.4827 ± 1.7452 in the lab, 6.9231 ± 5.6426 in the real-life setting. In the SpO2 study of 24 samples, the MAE ± standard deviation of the measurement was 1.0375 ± 0.7745. Our results validated that HealthyPai utilizing the Integrated Image Deep Learning Solution (IIDLS) framework, can accurately measure HR and SpO2, providing the test quality at least comparable to other FDA-approved wearable devices in the market and surpassing the consumer-grade and research-grade wearable standards.Keywords: remote photoplethysmography, heart rate, oxygen saturation, contactless measurement, mini program
Procedia PDF Downloads 1353180 Using Computer Vision to Detect and Localize Fractures in Wrist X-ray Images
Authors: John Paul Q. Tomas, Mark Wilson L. de los Reyes, Kirsten Joyce P. Vasquez
Abstract:
The most frequent type of fracture is a wrist fracture, which often makes it difficult for medical professionals to find and locate. In this study, fractures in wrist x-ray pictures were located and identified using deep learning and computer vision. The researchers used image filtering, masking, morphological operations, and data augmentation for the image preprocessing and trained the RetinaNet and Faster R-CNN models with ResNet50 backbones and Adam optimizers separately for each image filtering technique and projection. The RetinaNet model with Anisotropic Diffusion Smoothing filter trained with 50 epochs has obtained the greatest accuracy of 99.14%, precision of 100%, sensitivity/recall of 98.41%, specificity of 100%, and an IoU score of 56.44% for the Posteroanterior projection utilizing augmented data. For the Lateral projection using augmented data, the RetinaNet model with an Anisotropic Diffusion filter trained with 50 epochs has produced the highest accuracy of 98.40%, precision of 98.36%, sensitivity/recall of 98.36%, specificity of 98.43%, and an IoU score of 58.69%. When comparing the test results of the different individual projections, models, and image filtering techniques, the Anisotropic Diffusion filter trained with 50 epochs has produced the best classification and regression scores for both projections.Keywords: Artificial Intelligence, Computer Vision, Wrist Fracture, Deep Learning
Procedia PDF Downloads 733179 A Soft Computing Approach Monitoring of Heavy Metals in Soil and Vegetables in the Republic of Macedonia
Authors: Vesna Karapetkovska Hristova, M. Ayaz Ahmad, Julijana Tomovska, Biljana Bogdanova Popov, Blagojce Najdovski
Abstract:
The average total concentrations of heavy metals; (cadmium [Cd], copper [Cu], nickel [Ni], lead [Pb], and zinc [Zn]) were analyzed in soil and vegetables samples collected from the different region of Macedonia during the years 2010-2012. Basic soil properties such as pH, organic matter and clay content were also included in the study. The average concentrations of Cd, Cu, Ni, Pb, Zn in the A horizon (0-30 cm) of agricultural soils were as follows, respectively: 0.25, 5.3, 6.9, 15.2, 26.3 mg kg-1 of soil. We have found that neural networking model can be considered as a tool for prediction and spatial analysis of the processes controlling the metal transfer within the soil-and vegetables. The predictive ability of such models is well over 80% as compared to 20% for typical regression models. A radial basic function network reflects good predicting accuracy and correlation coefficients between soil properties and metal content in vegetables much better than the back-propagation method. Neural Networking / soft computing can support the decision-making processes at different levels, including agro ecology, to improve crop management based on monitoring data and risk assessment of metal transfer from soils to vegetables.Keywords: soft computing approach, total concentrations, heavy metals, agricultural soils
Procedia PDF Downloads 3683178 Nitrogen Uptake of Different Safflower (Carthamus tinctorius L.) Genotypes at Different Growth Stages in Semi-Arid Conditions
Authors: Zehra Aytac, Nurdilek Gulmezoglu
Abstract:
Safflower has been grown for centuries for many purposes worldwide. Especially it is important for the orange-red dye from its petal and for its high-quality oil obtained from the seeds. The crop is high adaptable to areas with insufficient rainfall and poor soil conditions. The plant has a deep taproot that can draw moisture and plant nutrients from deep to the subsoil. The research was carried out to study the nitrogen (N) uptake of different safflower cultivars and lines at different stages of growth and different plant parts in the experimental field of Faculty of Agriculture, Eskişehir Osmangazi University under semi-arid conditions. Different safflower cultivars and lines of varied origins were used as the material. The cultivars and lines were planted in a Randomized Complete Block Design with three replications. Two different growth stages (flowering and harvest) and three different plant parts (head, stem+leaf and seed) were determined. The nitrogen concentration of different plant parts was determined by the Kjeldahl method. Statistical analysis were performed by analysis of variance for each growth stage and plant parts taking a level of p < 0.05 and p < 0.01 as significant according to the LSD test. As a result, N concentration showed significant differences among different plant parts and different growth stages for different safflower genotypes of varied origins.Keywords: Carthamus tinctorius L., growth stages, head N, leaf N, N uptake, seed N, Safflower
Procedia PDF Downloads 2243177 Moving Target Defense against Various Attack Models in Time Sensitive Networks
Authors: Johannes Günther
Abstract:
Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.Keywords: network security, time sensitive networking, moving target defense, cyber security
Procedia PDF Downloads 733176 Relations of Progression in Cognitive Decline with Initial EEG Resting-State Functional Network in Mild Cognitive Impairment
Authors: Chia-Feng Lu, Yuh-Jen Wang, Yu-Te Wu, Sui-Hing Yan
Abstract:
This study aimed at investigating whether the functional brain networks constructed using the initial EEG (obtained when patients first visited hospital) can be correlated with the progression of cognitive decline calculated as the changes of mini-mental state examination (MMSE) scores between the latest and initial examinations. We integrated the time–frequency cross mutual information (TFCMI) method to estimate the EEG functional connectivity between cortical regions, and the network analysis based on graph theory to investigate the organization of functional networks in aMCI. Our finding suggested that higher integrated functional network with sufficient connection strengths, dense connection between local regions, and high network efficiency in processing information at the initial stage may result in a better prognosis of the subsequent cognitive functions for aMCI. In conclusion, the functional connectivity can be a useful biomarker to assist in prediction of cognitive declines in aMCI.Keywords: cognitive decline, functional connectivity, MCI, MMSE
Procedia PDF Downloads 3833175 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 3543174 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40