Search results for: computer virus classification
2663 Frequent Itemset Mining Using Rough-Sets
Authors: Usman Qamar, Younus Javed
Abstract:
Frequent pattern mining is the process of finding a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set. It was proposed in the context of frequent itemsets and association rule mining. Frequent pattern mining is used to find inherent regularities in data. What products were often purchased together? Its applications include basket data analysis, cross-marketing, catalog design, sale campaign analysis, Web log (click stream) analysis, and DNA sequence analysis. However, one of the bottlenecks of frequent itemset mining is that as the data increase the amount of time and resources required to mining the data increases at an exponential rate. In this investigation a new algorithm is proposed which can be uses as a pre-processor for frequent itemset mining. FASTER (FeAture SelecTion using Entropy and Rough sets) is a hybrid pre-processor algorithm which utilizes entropy and rough-sets to carry out record reduction and feature (attribute) selection respectively. FASTER for frequent itemset mining can produce a speed up of 3.1 times when compared to original algorithm while maintaining an accuracy of 71%.Keywords: rough-sets, classification, feature selection, entropy, outliers, frequent itemset mining
Procedia PDF Downloads 4352662 The Effectiveness of Intervention Methods for Repetitive Behaviors in Preschool Children with Autism Spectrum Disorder: A Systematic Review
Authors: Akane Uda, Ami Tabata, Mi An, Misa Komaki, Ryotaro Ito, Mayumi Inoue, Takehiro Sasai, Yusuke Kusano, Toshihiro Kato
Abstract:
Early intervention is recommended for children with autism spectrum disorder (ASD), and an increasing number of children have received support and intervention before school age in recent years. In this study, we systematically reviewed preschool interventions focused on repetitive behaviors observed in children with ASD, which are often observed at younger ages. Inclusion criteria were as follows : (1) Child of preschool status (age ≤ 7 years) with a diagnosis of ASD (including autism, Asperger's, and pervasive developmental disorder) or a parent (caregiver) with a preschool child with ASD, (2) Physician-confirmed diagnosis of ASD (autism, Asperger's, and pervasive developmental disorder), (3) Interventional studies for repetitive behaviors, (4) Original articles published within the past 10 years (2012 or later), (5) Written in English and Japanese. Exclusion criteria were as follows: (1) Systematic reviews or meta-analyses, (2) Conference reports or books. We carefully scrutinized databases to remove duplicate references and used a two-step screening process to select papers. The primary screening included close scrutiny of titles and abstracts to exclude articles that did not meet the eligibility criteria. During the secondary screening, we carefully read the complete text to assess eligibility, which was double-checked by six members at the laboratory. Disagreements were resolved through consensus-based discussion. Our search yielded 304 papers, of which nine were included in the study. The level of evidence was as follows: three randomized controlled trials (level 2), four pre-post studies (level 4b), and two case reports (level 5). Seven articles selected for this study described the effectiveness of interventions. Interventions for repetitive behaviors in preschool children with ASD were categorized as five interventions that directly involved the child and four educational programs for caregivers and parents. Studies that directly intervened with children used early intensive intervention based on applied behavior analysis (Early Start Denver Model, Early Intensive Behavioral Intervention, and the Picture Exchange Communication System) and individualized education based on sensory integration. Educational interventions for caregivers included two methods; (a) education regarding combined methods and practices of applied behavior analysis in addition to classification and coping methods for repetitive behaviors, and (b) education regarding evaluation methods and practices based on children’s developmental milestones in play. With regard to the neurophysiological basis of repetitive behaviors, environmental factors are implicated as possible contributors. We assumed that applied behavior analysis was shown to be effective in reducing repetitive behaviors because analysis focused on the interaction between the individual and the environment. Additionally, with regard to educational interventions for caregivers, the intervention was shown to promote behavioral change in children based on the caregivers' understanding of the classification of repetitive behaviors and the children’s developmental milestones in play and adjustment of the person-environment context led to a reduction in repetitive behaviors.Keywords: autism spectrum disorder, early intervention, repetitive behaviors, systematic review
Procedia PDF Downloads 1382661 Keypoint Detection Method Based on Multi-Scale Feature Fusion of Attention Mechanism
Authors: Xiaoxiao Li, Shuangcheng Jia, Qian Li
Abstract:
Keypoint detection has always been a challenge in the field of image recognition. This paper proposes a novelty keypoint detection method which is called Multi-Scale Feature Fusion Convolutional Network with Attention (MFFCNA). We verified that the multi-scale features with the attention mechanism module have better feature expression capability. The feature fusion between different scales makes the information that the network model can express more abundant, and the network is easier to converge. On our self-made street sign corner dataset, we validate the MFFCNA model with an accuracy of 97.8% and a recall of 81%, which are 5 and 8 percentage points higher than the HRNet network, respectively. On the COCO dataset, the AP is 71.9%, and the AR is 75.3%, which are 3 points and 2 points higher than HRNet, respectively. Extensive experiments show that our method has a remarkable improvement in the keypoint recognition tasks, and the recognition effect is better than the existing methods. Moreover, our method can be applied not only to keypoint detection but also to image classification and semantic segmentation with good generality.Keywords: keypoint detection, feature fusion, attention, semantic segmentation
Procedia PDF Downloads 1172660 Transmission Dynamics of Lumpy Skin Disease in Ethiopia
Authors: Wassie Molla, Klaas Frankena, Mart De Jong
Abstract:
Lumpy skin disease (LSD) is a severe viral disease of cattle, which often occurs in epidemic form. It is caused by lumpy skin disease virus of the genus capripoxvirus of family poxviridae. Mathematical models play important role in the study of infectious diseases epidemiology. They help to explain the dynamics and understand the transmission of an infectious disease within a population. Understanding the transmission dynamics of lumpy skin disease between animals is important for the implementation of effective prevention and control measures against the disease. This study was carried out in central and north-western part of Ethiopia with the objectives to understand LSD outbreak dynamics, quantify the transmission between animals and herds, and estimate the disease reproduction ratio in dominantly crop-livestock mixed and commercial herd types. Field observation and follow-up study were undertaken, and the transmission parameters were estimated based on a SIR epidemic model in which individuals are susceptible (S), infected and infectious (I), and recovered and immune or dead (R) using the final size and generalized linear model methods. The result showed that a higher morbidity was recorded in infected crop-livestock (24.1%) mixed production system herds than infected commercial production (17.5%) system herds whereas mortality was higher in intensive (4.0%) than crop-livestock (1.5%) system and the differences were statistically significant. The transmission rate among animals and between herds were 0.75 and 0.68 per week, respectively in dominantly crop-livestock production system. The transmission study undertaken in dominantly crop-livestock production system highlighted the presence of statistically significant seasonal difference in LSD transmission among animals. The reproduction numbers of LSD in dominantly crop-livestock production system were 1.06 among animals and 1.28 between herds whereas it varies from 1.03 to 1.31 among animals in commercial production system. Though the R estimated for LSD in different production systems at different localities is greater than 1, its magnitude is low implying that the disease can be easily controlled by implementing the appropriate control measures.Keywords: commercial, crop-livestock, Ethiopia, LSD, reproduction number, transmission
Procedia PDF Downloads 2962659 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1912658 Defects Classification of Stator Coil Generators by Phase Resolve Partial Discharge
Authors: Chun-Yao Lee, Nando Purba, Benny Iskandar
Abstract:
This paper proposed a phase resolve partial discharge (PRPD) shape method to classify types of defect stator coil generator by using off-line PD measurement instrument. The recorded PRPD, by using the instruments MPD600, can illustrate the PRPD patterns of partial discharge of unit’s defects. In the paper, two of large units, No.2 and No.3, in Inalum hydropower plant, North Sumatera, Indonesia is adopted in the experimental measurement. The proposed PRPD shape method is to mark auxiliary lines on the PRPD patterns. The shapes of PRPD from two units are marked with the proposed method. Then, four types of defects in IEC 60034-27 standard is adopted to classify the defect types of the two units, which types are microvoids (S1), delamination tape layer (S2), slot defect (S3) and internal delamination (S4). Finally, the two units are actually inspected to validate the availability of the proposed PRPD shape method.Keywords: partial discharge (PD), stator coil, defect, phase resolve pd (PRPD)
Procedia PDF Downloads 2562657 Pedagogical Variation with Computers in Mathematics Classrooms: A Cultural Historical Activity Theory Analysis
Authors: Joanne Hardman
Abstract:
South Africa’s crisis in mathematics attainment is well documented. To meet the need to develop students’ mathematical performance in schools the government has launched various initiatives using computers to impact on mathematical attainment. While it is clear that computers can change pedagogical practices, there is a dearth of qualitative studies indicating exactly how pedagogy is transformed with Information Communication Technologies (ICTs) in a teaching activity. Consequently, this paper addresses the following question: how, along which dimensions in an activity, does pedagogy alter with the use of computer drill and practice software in four disadvantaged grade 6 mathematics classrooms in the Western Cape province of South Africa? The paper draws on Cultural Historical Activity Theory (CHAT) to develop a view of pedagogy as socially situated. Four ideal pedagogical types are identified: Reinforcement pedagogy, which has the reinforcement of specialised knowledge as its object; Collaborative pedagogy, which has the development of metacognitive engagement with specialised knowledge as its object; Directive pedagogy, which has the development of technical task skills as its object, and finally, Defensive pedagogy, which has student regulation as its object. Face-to-face lessons were characterised as predominantly Reinforcement and Collaborative pedagogy and most computer lessons were characterised as mainly either Defensive or Directive.Keywords: computers, cultural historical activity theory, mathematics, pedagogy
Procedia PDF Downloads 2792656 Derivation of Human NK Cells from T Cell-Derived Induced Pluripotent Stem Cells Using Xenogeneic Serum-Free and Feeder Cell-Free Culture System
Authors: Aliya Sekenova, Vyacheslav Ogay
Abstract:
The derivation of human induced pluripotent stem cells (iPSCs) from somatic cells by direct reprogramming opens wide perspectives in the regenerative medicine. It means the possibility to develop the personal and, consequently, any immunologically compatible cells for applications in cell-based therapy. The purpose of our study was to develop the technology for the production of NK cells from T cell-derived induced pluripotent stem cells (TiPSCs) for subsequent application in adoptive cancer immunotherapy. Methods: In this study iPSCs were derived from peripheral blood T cells using Sendai virus vectors expressing Oct4, Sox2, Klf4 and c-Myc. Pluripotent characteristics of TiPSCs were examined and confirmed with alkaline phosphatase staining, immunocytochemistry and RT-PCR analysis. For NK cell differentiation, embryoid bodies (EB) formed from (TiPSCs) were cultured in xenogeneic serum-free medium containing human serum, IL-3, IL-7, IL-15, SCF, FLT3L without using M210-B4 and AFT-024 stromal feeder cells. After differentiation, NK cells were characterized with immunofluorescence analysis, flow cytometry and cytotoxicity assay. Results: Here, we for the first time demonstrate that TiPSCs can effectively differentiate into functionally active NK cells without M210-B4 and AFT-024 xenogeneic stroma cells. Immunofluorescence and flow cytometry analysis showed that EB-derived cells can differentiate into a homogeneous population of NK cell expressing high levels of CD56, CD45 and CD16 specific markers. Moreover, these cells significantly express killing activation receptors such as NKp44 and NKp46. In the comparative analysis, we observed that NK cells derived using feeder-free culture system have more high killing activity against K-562 tumor cells, than NK cells derived by feeder-dependent method. Thus, we think that our obtained data will be useful for the development of large-scale production of NK cells for translation into cancer immunotherapy.Keywords: induced pluripotent stem cells, NK cells, T cells, cell diffentiation, feeder cell-free culture system
Procedia PDF Downloads 3252655 Review and Evaluation of Trending Canonical Correlation Analyses-Based Brain Computer Interface Methods
Authors: Bayar Shahab
Abstract:
The fast development of technology that has advanced neuroscience and human interaction with computers has enabled solutions to various problems, and issues of this new era have been found and are being found like no other time in history. Brain-computer interface so-called BCI has opened the door to several new research areas and have been able to provide solutions to critical and important issues such as supporting a paralyzed patient to interact with the outside world, controlling a robot arm, playing games in VR with the brain, driving a wheelchair or even a car and neurotechnology enabled the rehabilitation of the lost memory, etc. This review work presents state-of-the-art methods and improvements of canonical correlation analyses (CCA), which is an SSVEP-based BCI method. These are the methods used to extract EEG signal features or, to be said in a different way, the features of interest that we are looking for in the EEG analyses. Each of the methods from oldest to newest has been discussed while comparing their advantages and disadvantages. This would create a great context and help researchers to understand the most state-of-the-art methods available in this field with their pros and cons, along with their mathematical representations and usage. This work makes a vital contribution to the existing field of study. It differs from other similar recently published works by providing the following: (1) stating most of the prominent methods used in this field in a hierarchical way (2) explaining pros and cons of each method and their performance (3) presenting the gaps that exist at the end of each method that can open the understanding and doors to new research and/or improvements.Keywords: BCI, CCA, SSVEP, EEG
Procedia PDF Downloads 1432654 Thread Lift: Classification, Technique, and How to Approach to the Patient
Authors: Panprapa Yongtrakul, Punyaphat Sirithanabadeekul, Pakjira Siriphan
Abstract:
Background: The thread lift technique has become popular because it is less invasive, requires a shorter operation, less downtime, and results in fewer postoperative complications. The advantage of the technique is that the thread can be inserted under the skin without the need for long incisions. Currently, there are a lot of thread lift techniques with respect to the specific types of thread used on specific areas, such as the mid-face, lower face, or neck area. Objective: To review the thread lift technique for specific areas according to type of thread, patient selection, and how to match the most appropriate to the patient. Materials and Methods: A literature review technique was conducted by searching PubMed and MEDLINE, then compiled and summarized. Result: We have divided our protocols into two sections: Protocols for short suture, and protocols for long suture techniques. We also created 3D pictures for each technique to enhance understanding and application in a clinical setting. Conclusion: There are advantages and disadvantages to short suture and long suture techniques. The best outcome for each patient depends on appropriate patient selection and determining the most suitable technique for the defect and area of patient concern.Keywords: thread lift, thread lift method, thread lift technique, thread lift procedure, threading
Procedia PDF Downloads 2622653 Serosurveillance of Measles Virus amongst Vaccinated Children of a Rural Population of Sindh
Authors: Zeb Hussain, Muhammad Asif Qureshi, Shaheen Sharafat
Abstract:
Background: Measles is a contagious viral infection common in childhood. Vaccination against measles is included in the expanded program of immunization (EPI). However, and alarmingly, a high mortality rate is observed due to measles infection in Pakistan. Moreover a recent outbreak of measles in various areas of Pakistan further highlights the problem. It is therefore important to investigate measles specific IgG (antibody) levels in our population. Objective: To quantify measles specific IgG antibodies amongst vaccinated children in district Qamber Shahdadkot, Sindh. Methodology: This cross-sectional study was conducted at the Microbiology section of the Dow-Diagnostic-Research-and-Reference-Laboratory (DDRRL), DUHS after Institutional Review Board approval (IRB-516/DUHS/-14) during August-December-2014. A total of 173 participants (residents of district Qamber Shahdadkot, Sindh) aged between 1-5 years were recruited in the study. Blood samples were collected as per standard phlebotomy guidelines. Blood was stored at 4 °C overnight. Samples were subsequently spun at a speed of 10000rpm to separate sera, which were divided into small aliquots to be frozen at -20 °C. Frozen sera were transported to the DDRRL on dry ice. Measles specific IgG (antibody) titers were quantified using enzyme linked immunosorbant assay (ELISA). Results: Blood was collected from a total of 173 individuals ranging between 1-5 years of age. Of these, a total of 88 participants were males and 85 were females. Of the 173 investigated samples, only 53 (30.6%) showed protective IgG titers against measles while 120 (69%) were sero-negative. Measles specific IgG antibodies titers were higher in female participants compared to the males. Conclusion: Our data demonstrate that a substantial percentage of vaccinated children in district Qamber-Shahdadkot did not have protective antibody titres against measles. It is therefore extremely important to investigate measles specific IgG levels in various parts of Pakistan in order to implement appropriate protective measures.Keywords: sero-surveillance, measles, vaccinated children, Pakistan
Procedia PDF Downloads 3292652 Mobile Wireless Investigation Platform
Authors: Dimitar Karastoyanov, Todor Penchev
Abstract:
The paper presents the research of a kind of autonomous mobile robots, intended for work and adaptive perception in unknown and unstructured environment. The objective are robots, dedicated for multi-sensory environment perception and exploration, like measurements and samples taking, discovering and putting a mark on the objects as well as environment interactions–transportation, carrying in and out of equipment and objects. At that ground classification of the different types mobile robots in accordance with the way of locomotion (wheel- or chain-driven, walking, etc.), used drive mechanisms, kind of sensors, end effectors, area of application, etc. is made. Modular system for the mechanical construction of the mobile robots is proposed. Special PLC on the base of AtMega128 processor for robot control is developed. Electronic modules for the wireless communication on the base of Jennic processor as well as the specific software are developed. The methods, means and algorithms for adaptive environment behaviour and tasks realization are examined. The methods of group control of mobile robots and for suspicious objects detecting and handling are discussed too.Keywords: mobile robots, wireless communications, environment investigations, group control, suspicious objects
Procedia PDF Downloads 3562651 Surface Flattening Assisted with 3D Mannequin Based on Minimum Energy
Authors: Shih-Wen Hsiao, Rong-Qi Chen, Chien-Yu Lin
Abstract:
The topic of surface flattening plays a vital role in the field of computer aided design and manufacture. Surface flattening enables the production of 2D patterns and it can be used in design and manufacturing for developing a 3D surface to a 2D platform, especially in fashion design. This study describes surface flattening based on minimum energy methods according to the property of different fabrics. Firstly, through the geometric feature of a 3D surface, the less transformed area can be flattened on a 2D platform by geodesic. Then, strain energy that has accumulated in mesh can be stably released by an approximate implicit method and revised error function. In some cases, cutting mesh to further release the energy is a common way to fix the situation and enhance the accuracy of the surface flattening, and this makes the obtained 2D pattern naturally generate significant cracks. When this methodology is applied to a 3D mannequin constructed with feature lines, it enhances the level of computer-aided fashion design. Besides, when different fabrics are applied to fashion design, it is necessary to revise the shape of a 2D pattern according to the properties of the fabric. With this model, the outline of 2D patterns can be revised by distributing the strain energy with different results according to different fabric properties. Finally, this research uses some common design cases to illustrate and verify the feasibility of this methodology.Keywords: surface flattening, strain energy, minimum energy, approximate implicit method, fashion design
Procedia PDF Downloads 3342650 Agglomerative Hierarchical Clustering Based on Morphmetric Parameters of the Populations of Labeo rohita
Authors: Fayyaz Rasool, Naureen Aziz Qureshi, Shakeela Parveen
Abstract:
Labeo rohita populations from five geographical locations from the hatchery and riverine system of Punjab-Pakistan were studied for the clustering on the basis of similarities and differences based on morphometric parameters within the species. Agglomerative Hierarchical Clustering (AHC) was done by using Pearson Correlation Coefficient and Unweighted Pair Group Method with Arithmetic Mean (UPGMA) as Agglomeration method by XLSTAT 2012 version 1.02. A dendrogram with the data on the morphometrics of the representative samples of each site divided the populations of Labeo rohita in to five major clusters or classes. The variance decomposition for the optimal classification values remained as 19.24% for within class variation, while 80.76% for the between class differences. The representative central objects of the each class, the distances between the class centroids and also the distance between the central objects of the classes were generated by the analysis. A measurable distinction between the classes of the populations of the Labeo rohita was indicated in this study which determined the impacts of changing environment and other possible factors influencing the variation level among the populations of the same species.Keywords: AHC, Labeo rohita, hatchery, riverine, morphometric
Procedia PDF Downloads 4542649 Sentiment Analysis of Ensemble-Based Classifiers for E-Mail Data
Authors: Muthukumarasamy Govindarajan
Abstract:
Detection of unwanted, unsolicited mails called spam from email is an interesting area of research. It is necessary to evaluate the performance of any new spam classifier using standard data sets. Recently, ensemble-based classifiers have gained popularity in this domain. In this research work, an efficient email filtering approach based on ensemble methods is addressed for developing an accurate and sensitive spam classifier. The proposed approach employs Naive Bayes (NB), Support Vector Machine (SVM) and Genetic Algorithm (GA) as base classifiers along with different ensemble methods. The experimental results show that the ensemble classifier was performing with accuracy greater than individual classifiers, and also hybrid model results are found to be better than the combined models for the e-mail dataset. The proposed ensemble-based classifiers turn out to be good in terms of classification accuracy, which is considered to be an important criterion for building a robust spam classifier.Keywords: accuracy, arcing, bagging, genetic algorithm, Naive Bayes, sentiment mining, support vector machine
Procedia PDF Downloads 1402648 An International Curriculum Development for Languages and Technology
Authors: Miguel Nino
Abstract:
When considering the challenges of a changing and demanding globalizing world, it is important to reflect on how university students will be prepared for the realities of internationalization, marketization and intercultural conversation. The present study is an interdisciplinary program designed to respond to the needs of the global community. The proposal bridges the humanities and science through three different fields: Languages, graphic design and computer science, specifically, fundamentals of programming such as python, java script and software animation. Therefore, the goal of the four year program is twofold: First, enable students for intercultural communication between English and other languages such as Spanish, Mandarin, French or German. Second, students will acquire knowledge in practical software and relevant employable skills to collaborate in assisted computer projects that most probable will require essential programing background in interpreted or compiled languages. In order to become inclusive and constructivist, the cognitive linguistics approach is suggested for the three different fields, particularly for languages that rely on the traditional method of repetition. This methodology will help students develop their creativity and encourage them to become independent problem solving individuals, as languages enhance their common ground of interaction for culture and technology. Participants in this course of study will be evaluated in their second language acquisition at the Intermediate-High level. For graphic design and computer science students will apply their creative digital skills, as well as their critical thinking skills learned from the cognitive linguistics approach, to collaborate on a group project design to find solutions for media web design problems or marketing experimentation for a company or the community. It is understood that it will be necessary to apply programming knowledge and skills to deliver the final product. In conclusion, the program equips students with linguistics knowledge and skills to be competent in intercultural communication, where English, the lingua franca, remains the medium for marketing and product delivery. In addition to their employability, students can expand their knowledge and skills in digital humanities, computational linguistics, or increase their portfolio in advertising and marketing. These students will be the global human capital for the competitive globalizing community.Keywords: curriculum, international, languages, technology
Procedia PDF Downloads 4422647 An Integral Sustainable Design Evaluation of the 15-Minute City and the Processes of Transferability to Cities of the Global South
Authors: Chitsanzo Isaac
Abstract:
Across the world, the ongoing Covid-19 pandemic has challenged urban systems and policy frameworks, highlighting societal vulnerabilities and systemic inequities among many communities. Measures of confinement and social distancing to contain the Covid-19 virus have fragmented the physical and social fabric of cities. This has caused urban dwellers to reassess how they engage with their urban surroundings and maintain social ties. Urbanists have presented strategies that would allow communities to survive and even thrive, in extraordinary times of crisis like the pandemic. Tactical Urbanism, particularly the 15-Minute City, has gained popularity. It is considered a resilient approach in the global north, however, it’s transferability to the global south has been called into question. To this end, this paper poses the question: to what extent is the 15-Minute City framework integral sustainable design, and are there processes that make it adoptable by cities in the global south? This paper explores four issues using secondary quantitative data analysis and convergence analysis in the Paris and Blantyre urban regions. First, it questions how the 15-Minute City has been defined and measured, and how it impacts urban dwellers. Second, it examines the extent to which the 15-minute city performs under the lens of frameworks such as Wilber’s integral theory and Fleming’s integral sustainable design theory. Thirdly this work examines the processes that can be transferred to developing cities which foster community resilience through the perspectives of experience, behaviors, cultures, and systems. Finally, it reviews the principal ways in which a multi-perspective reality can be the basis for resilient community design and sustainable urban development. This work will shed a light on the importance of a multi-perspective reality as a means of achieving sustainable urban design goals in developing urban areas.Keywords: 15-minute city, developing cities, global south, community resilience, integral sustainable design, systems thinking, complexity, tactical urbanism
Procedia PDF Downloads 1472646 Automatic Identification and Monitoring of Wildlife via Computer Vision and IoT
Authors: Bilal Arshad, Johan Barthelemy, Elliott Pilton, Pascal Perez
Abstract:
Getting reliable, informative, and up-to-date information about the location, mobility, and behavioural patterns of animals will enhance our ability to research and preserve biodiversity. The fusion of infra-red sensors and camera traps offers an inexpensive way to collect wildlife data in the form of images. However, extracting useful data from these images, such as the identification and counting of animals remains a manual, time-consuming, and costly process. In this paper, we demonstrate that such information can be automatically retrieved by using state-of-the-art deep learning methods. Another major challenge that ecologists are facing is the recounting of one single animal multiple times due to that animal reappearing in other images taken by the same or other camera traps. Nonetheless, such information can be extremely useful for tracking wildlife and understanding its behaviour. To tackle the multiple count problem, we have designed a meshed network of camera traps, so they can share the captured images along with timestamps, cumulative counts, and dimensions of the animal. The proposed method takes leverage of edge computing to support real-time tracking and monitoring of wildlife. This method has been validated in the field and can be easily extended to other applications focusing on wildlife monitoring and management, where the traditional way of monitoring is expensive and time-consuming.Keywords: computer vision, ecology, internet of things, invasive species management, wildlife management
Procedia PDF Downloads 1372645 Analysis of Patient No-Shows According to Health Conditions
Authors: Sangbok Lee
Abstract:
There has been much effort on process improvement for outpatient clinics to provide quality and acute care to patients. One of the efforts is no-show analysis or prediction. This work analyzes patient no-shows along with patient health conditions. The health conditions refer to clinical symptoms that each patient has, out of the followings; hyperlipidemia, diabetes, metastatic solid tumor, dementia, chronic obstructive pulmonary disease, hypertension, coronary artery disease, myocardial infraction, congestive heart failure, atrial fibrillation, stroke, drug dependence abuse, schizophrenia, major depression, and pain. A dataset from a regional hospital is used to find the relationship between the number of the symptoms and no-show probabilities. Additional analysis reveals how each symptom or combination of symptoms affects no-shows. In the above analyses, cross-classification of patients by age and gender is carried out. The findings from the analysis will be used to take extra care to patients with particular health conditions. They will be forced to visit clinics by being informed about their health conditions and possible consequences more clearly. Moreover, this work will be used in the preparation of making institutional guidelines for patient reminder systems.Keywords: healthcare system, no show analysis, process improvment, statistical data analysis
Procedia PDF Downloads 2322644 Covid-19 Pandemic: Another Lesson Learned by a Military Hospital
Authors: Mariana Floria, Elena-Diana Năfureanu, Diana-Mihaela Gălăţanu, Anca-Ecaterina Grumeza, Cristina Gorea-Bocîncă, Diana-Elena Iov, Aurelian-Corneliu Moraru, Dragoș-Marian Popescu
Abstract:
SARS-CoV-2 is the most deadly and devastating virus of the last one hundred years, being more highly contagious than EBOLA, HIV, Swine Influenza, Severe Acute Respiratory Syndrome, or Middle Eastern Respiratory Syndrome. After two years of pandemic, planning and budgeting for use of healthcare resources and services is very important. The aim of this study was to analyze the costs for hospital stay in patients with predominantly moderate forms of COVID-19 in a support military hospital located in Nord-East of Romania. Inpatient COVID-19 hospitalizations costs, regardless of ICD-10 procedure codes (DRG payment), in a Covid-19 support military hospital were analyzed. From August 2020 through June 2021, 241 patientswere hospitalized. Our national protocol for the treatment of Covid-19 infection was applied. The main COVID-19 manifestations were: 69% respiratory (18% with severe pneumonia, 2.9% with pulmonary embolism, diagnosed by angio-computed tomography), 3.3% cardiac, 28% digestive, and 33% psychiatric (most common anxiety) manifestations. According to COVID-19 severity, most of the patients had moderate (104 patients – 43%) and severe (50 patients - 21%) forms. Seven patients with severe form died because of multiple comorbidities, and 30 patients were transferred in hospitals with COVID-19 intensive care units.Only two patients have had procalcitonin>10 ng/mL (high probability of severe sepsis or septic shock), and 1 patient had moderate risk for septic shock (0.5 - 2 ng/mL). The average estimated costs were about 3000€/patient, without significantly differences depending on disease severity. Equipment costs were 2 times higher than for drugs and 4 times than for laboratory tests. In a Covid-19 support military hospital that took care for predominantly moderate forms of COVID-19, the costs for equipment were much higher than that for treatment. Therefore, new criteria for hospitalization of these forms of COVID-19 deserve to be analyzed to avoid useless costs.Keywords: Covid-19, costs, hospital stay, military hospital
Procedia PDF Downloads 1762643 Review of Research on Waste Plastic Modified Asphalt
Authors: Song Xinze, Cai Kejian
Abstract:
To further explore the application of waste plastics in asphalt pavement, this paper begins with the classification and characteristics of waste plastics. It then provides a state-of-the-art review of the preparation methods and processes of waste plastic modifiers, waste plastic-modified asphalt, and waste plastic-modified asphalt mixtures. The paper also analyzes the factors influencing the compatibility between waste plastics and asphalt and summarizes the performance evaluation indicators for waste plastic-modified asphalt and its mixtures. It explores the research approaches and findings of domestic and international scholars and presents examples of waste plastics applications in pavement engineering. The author believes that there is a basic consensus that waste plastics can improve the high-temperature performance of asphalt. The use of cracking processes to solve the storage stability of waste plastic polymer-modified asphalt is the key to promoting its application. Additionally, the author anticipates that future research will concentrate on optimizing the recycling, processing, screening, and preparation of waste plastics, along with developing composite plastic modifiers to improve their compatibility and long-term performance in asphalt pavements.Keywords: waste plastics, asphalt pavement, asphalt performance, asphalt modification
Procedia PDF Downloads 342642 The Effects of Xiang Sha Liu Jun Zi Tang to Diarrhea and Growth Performance of Piglets
Authors: Siao-Wei Jiang, Boy-Young Hsieh, Ching-Liang Hsieh, Cheng-Yung Lin
Abstract:
The problems of multiple drug resistance in the pig farming industry have been emphasized in recent years. Diarrhea syndrome is common in weaning piglets and often treated with antibiotics as a feed additive, leading to the rapid spread of antibiotic resistance and posing high health risks to humans. The study aimed to alleviate diarrhea syndrome with traditional herbal medicine, Xiang Sha Liu Jun Zi Tang, whose effects enhanced digestive function. Piglets at 4 weeks old with stool classified to Bristol stool classification type 6 or type 7 were randomly divided into the control group, group A (1% of Xiang Sha Liu Jun Zi Tang) and group B (0.1% Colistin). The piglets were administrated for 7 days, and their weight, feed intake, and stool score were recorded daily before and after the trial. The results showed that the diarrhea index score in group A and group B improved significantly compared to the control group, indicating that Xiang Sha Liu Jun Zi Tang may have the same effect on alleviating diarrhea syndrome as Colistin, and it may be another replacement for antibiotics.Keywords: pig, diarrhea, herbal medicine, Xiang Sha Liu Jun Zi Tang
Procedia PDF Downloads 502641 Classify Land Use/Cover Change and Its Impact on Soil Erosion Using GIS from 2005 to 2015 in Nzhelele Valley Limpopo Province, South Africa
Authors: Blessing Mavhuru, Nthaduleni Nethengwe, Hector Chikoore, Onyango Beneah Daniel Odhiambo
Abstract:
The main objective of this study was to classify land use/cover and how it has changed in Nzhelele Valley Limpopo Province, South Africa. The study aimed to identify and analyse the types of land use/cover in the years 2005, 2010, and 2015 with a view to assess the impact on soil erosion over time. Using GIS, the changes within land use/cover were assessed through the classification of satellite images. The study area was classified into four major land cover/use classes, which are vegetation, gravel road, built up land and agricultural fields. Over the period 2005-2015 the resultant land use/cover demonstrated (i) a significant increase (12%) for vegetation cover, (ii) a significant decrease in agriculture (16%) land use/cover, (iii) increase in built-up land (1%), as well as (iv) an increase in gravel roads (3%). This study envisages assisting policy makers in decision making on land use management for Nzhelele Valley.Keywords: land use, land cover, change, soil erosion
Procedia PDF Downloads 2492640 Historical Studies on Gilt Decorations on Glazed Surfaces
Authors: Sabra Saeidi
Abstract:
This research focuses on the historical techniques associated with the lajevardina and Haft-Rangi production methods in creating tiles, with emphasis on the identification of the techniques of inserting gold sheets on the surface of such historical glazed tiles. In this regard, firstly, the history of the production of enamel, gold plated, and Lajevardina glazed pottery work made during the Khwarizmanshahid and Mongol era (eleventh to the thirteenth century) have been assessed to reach a better understanding of the background and the history associated with historical glazing methods. After the historical overview of the production technique of glazed pottery work and introductions of the civilizations using those techniques, we focused on the niches production methods of enamel and Lajevardina glazing, which are two categories of decorations usually found in tiles. Next, a general classification method for various types of gilt tiles has been introduced, which is applicable to the tile works up to Safavid period (Sixteenth to the seventeenth century). Gilded lajevardina glazed tiles, gilt Haft-Rangi tiles, monolithic glazed gilt tiles, and gilt mosaic tiles are included in the categories.Keywords: gilt tiles, Islamic art, Iranian art, historical studies, gilding
Procedia PDF Downloads 1222639 Using Audio-Visual Aids and Computer-Assisted Language Instruction to Overcome Learning Difficulties of Vocabulary in Students of Special Needs
Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaar
Abstract:
Objectives: To assess the effect of using audio-visual aids and computer-assisted/ aided language instruction (CALI) in the performance of students of special needs studying vocabulary course. Methods: The performance of forty students of special needs (males and females) who used audiovisual aids and CALI in their vocabulary course at al-Malādh school for students of special needs was compared to that of another group (control group) of the same number and age (8-18). Again, subjects in the experimental group were given lessons using audio-visual aids and CALI, while those in the control group were given lessons using ordinary educational aids only, although both groups almost shared the same features (class environment, speech language therapist (SLT), etc.). Pre-andposttest was given at the beginning and end of the semester and a qualitative and quantitative analysis followed. Results & conclusions: Results of the present experimental study's pre-and-posttests indicated that the performance of the students in the first group was higher than that of those of the second group (34.27%, 73.82% vs. 33.57%, 34.92%, respectively). Compared with females, males’ performance was higher (1515 scores vs. 1438 scores). Such findings suggest that the presence of these audiovisual aids and CALI in the classes of students of special needs, especially if they are studying vocabulary building course is very important due to their usefulness in the improvement of performance of the students of special needs.Keywords: language components, vocabulary, audio-visual aids, CALI, special needs, students, SLTs
Procedia PDF Downloads 492638 Sentinel-2 Based Burn Area Severity Assessment Tool in Google Earth Engine
Authors: D. Madhushanka, Y. Liu, H. C. Fernando
Abstract:
Fires are one of the foremost factors of land surface disturbance in diverse ecosystems, causing soil erosion and land-cover changes and atmospheric effects affecting people's lives and properties. Generally, the severity of the fire is calculated as the Normalized Burn Ratio (NBR) index. This is performed manually by comparing two images obtained afterward. Then by using the bitemporal difference of the preprocessed satellite images, the dNBR is calculated. The burnt area is then classified as either unburnt (dNBR<0.1) or burnt (dNBR>= 0.1). Furthermore, Wildfire Severity Assessment (WSA) classifies burnt areas and unburnt areas using classification levels proposed by USGS and comprises seven classes. This procedure generates a burn severity report for the area chosen by the user manually. This study is carried out with the objective of producing an automated tool for the above-mentioned process, namely the World Wildfire Severity Assessment Tool (WWSAT). It is implemented in Google Earth Engine (GEE), which is a free cloud-computing platform for satellite data processing, with several data catalogs at different resolutions (notably Landsat, Sentinel-2, and MODIS) and planetary-scale analysis capabilities. Sentinel-2 MSI is chosen to obtain regular processes related to burnt area severity mapping using a medium spatial resolution sensor (15m). This tool uses machine learning classification techniques to identify burnt areas using NBR and to classify their severity over the user-selected extent and period automatically. Cloud coverage is one of the biggest concerns when fire severity mapping is performed. In WWSAT based on GEE, we present a fully automatic workflow to aggregate cloud-free Sentinel-2 images for both pre-fire and post-fire image compositing. The parallel processing capabilities and preloaded geospatial datasets of GEE facilitated the production of this tool. This tool consists of a Graphical User Interface (GUI) to make it user-friendly. The advantage of this tool is the ability to obtain burn area severity over a large extent and more extended temporal periods. Two case studies were carried out to demonstrate the performance of this tool. The Blue Mountain national park forest affected by the Australian fire season between 2019 and 2020 is used to describe the workflow of the WWSAT. This site detected more than 7809 km2, using Sentinel-2 data, giving an error below 6.5% when compared with the area detected on the field. Furthermore, 86.77% of the detected area was recognized as fully burnt out, of which high severity (17.29%), moderate-high severity (19.63%), moderate-low severity (22.35%), and low severity (27.51%). The Arapaho and Roosevelt National Forest Park, California, the USA, which is affected by the Cameron peak fire in 2020, is chosen for the second case study. It was found that around 983 km2 had burned out, of which high severity (2.73%), moderate-high severity (1.57%), moderate-low severity (1.18%), and low severity (5.45%). These spots also can be detected through the visual inspection made possible by cloud-free images generated by WWSAT. This tool is cost-effective in calculating the burnt area since satellite images are free and the cost of field surveys is avoided.Keywords: burnt area, burnt severity, fires, google earth engine (GEE), sentinel-2
Procedia PDF Downloads 2332637 Automated Tracking and Statistics of Vehicles at the Signalized Intersection
Authors: Qiang Zhang, Xiaojian Hu1
Abstract:
Intersection is the place where vehicles and pedestrians must pass through, turn and evacuate. Obtaining the motion data of vehicles near the intersection is of great significance for transportation research. Since there are usually many targets and there are more conflicts between targets, this makes it difficult to obtain vehicle motion parameters in traffic videos of intersections. According to the characteristics of traffic videos, this paper applies video technology to realize the automated track, count and trajectory extraction of vehicles to collect traffic data by roadside surveillance cameras installed near the intersections. Based on the video recognition method, the vehicles in each lane near the intersection are tracked with extracting trajectory and counted respectively in various degrees of occlusion and visibility. The performances are compared with current recognized CPU-based algorithms of real-time tracking-by-detection. The speed of the presented system is higher than the others and the system has a better real-time performance. The accuracy of direction has reached about 94.99% on average, and the accuracy of classification and statistics has reached about 75.12% on average.Keywords: tracking and statistics, vehicle, signalized intersection, motion parameter, trajectory
Procedia PDF Downloads 2202636 Application of Lean Manufacturing Tools in Hot Asphalt Production
Authors: S. Bayona, J. Nunez, D. Paez, C. Diaz
Abstract:
The application of Lean manufacturing tools continues to be an effective solution for increasing productivity, reducing costs and eliminating waste in the manufacture of goods and services. This article analyzes the production process of a hot asphalt manufacturing company from an administrative and technical perspective. Three main phases were analyzed, the first phase was related to the determination of the risk priority number of the main operations in asphalt mix production process by an FMEA (Failure Mode Effects Analysis), in the second phase the Value Stream Mapping (VSM) of the production line was performed and in the third phase a SWOT (Strengths, Weaknesses Opportunities, Threats) matrix was constructed. Among the most valued failure modes were the lack training of workers in occupational safety and health issues, the lack of signaling and classification of granulated material, and the overweight of vehicles loaded. The analysis of the results in the three phases agree on the importance of training operational workers, improve communication with external actors in order to minimize delays in material orders and strengthen control suppliers.Keywords: asphalt, lean manufacturing, productivity, process
Procedia PDF Downloads 1142635 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 1362634 Numerical Regularization of Ill-Posed Problems via Hybrid Feedback Controls
Authors: Eugene Stepanov, Arkadi Ponossov
Abstract:
Many mathematical models used in biological and other applications are ill-posed. The reason for that is the nature of differential equations, where the nonlinearities are assumed to be step functions, which is done to simplify the analysis. Prominent examples are switched systems arising from gene regulatory networks and neural field equations. This simplification leads, however, to theoretical and numerical complications. In the presentation, it is proposed to apply the theory of hybrid feedback controls to regularize the problem. Roughly speaking, one attaches a finite state control (‘automaton’), which follows the trajectories of the original system and governs its dynamics at the points of ill-posedness. The construction of the automaton is based on the classification of the attractors of the specially designed adjoint dynamical system. This ‘hybridization’ is shown to regularize the original switched system and gives rise to efficient hybrid numerical schemes. Several examples are provided in the presentation, which supports the suggested analysis. The method can be of interest in other applied fields, where differential equations contain step-like nonlinearities.Keywords: hybrid feedback control, ill-posed problems, singular perturbation analysis, step-like nonlinearities
Procedia PDF Downloads 243