Search results for: offline social network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13361

Search results for: offline social network

11021 Traffic Congestions Modeling and Predictions by Social Networks

Authors: Bojan Najdenov, Danco Davcev

Abstract:

Reduction of traffic congestions and the effects of pollution and waste of resources that come with them has been a big challenge in the past decades. Having reliable systems to facilitate the process of modeling and prediction of traffic conditions would not only reduce the environmental pollution, but will also save people time and money. Social networks play big role of people’s lives nowadays providing them means of communicating and sharing thoughts and ideas, that way generating huge knowledge bases by crowdsourcing. In addition to that, crowdsourcing as a concept provides mechanisms for fast and relatively reliable data generation and also many services are being used on regular basis because they are mainly powered by the public as main content providers. In this paper we present the Social-NETS-Traffic-Control System (SNTCS) that should serve as a facilitator in the process of modeling and prediction of traffic congestions. The main contribution of our system is to integrate data from social networks as Twitter and also implements a custom created crowdsourcing subsystem with which users report traffic conditions using an android application. Our first experience of the usage of the system confirms that the integrated approach allows easy extension of the system with other social networks and represents a very useful tool for traffic control.

Keywords: traffic, congestion reduction, crowdsource, social networks, twitter, android

Procedia PDF Downloads 464
11020 Coal Mining Safety Monitoring Using Wsn

Authors: Somdatta Saha

Abstract:

The main purpose was to provide an implementable design scenario for underground coal mines using wireless sensor networks (WSNs). The main reason being that given the intricacies in the physical structure of a coal mine, only low power WSN nodes can produce accurate surveillance and accident detection data. The work mainly concentrated on designing and simulating various alternate scenarios for a typical mine and comparing them based on the obtained results to arrive at a final design. In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of coal mine. The underground system collects temperature, humidity and methane values of coal mine through sensor nodes in the mine; it also collects the number of personnel inside the mine with the help of an IR sensor, and then transmits the data to information processing terminal based on ARM.

Keywords: ARM, embedded board, wireless sensor network (Zigbee)

Procedia PDF Downloads 330
11019 A Study of Adult Lifelong Learning Consulting and Service System in Taiwan

Authors: Wan Jen Chang

Abstract:

Back ground: Taiwan's current adult lifelong learning services have expanded from vocational training to universal lifelong learning. However, both the professional knowledge training of learning guidance and consulting services and the provision of adult online learning consulting service systems still need to be established. Purpose: The purposes of this study are as follows: 1. Analyze the professional training mechanism for cultivating adult lifelong learning consultation and coaching; 2. Explore the feasibility of constructing a system that uses network technology to provide adult learning consultation services. Research design: This study conducts a literature analysis of counseling and coaching policy reports on lifelong learning in European countries and the United States. There are two focus discussions were conducted with 15 lifelong learning scholars, experts and practitioners as research subjects. The following two topics were discussed and suggested: 1. The current situation, needs and professional ability training mechanism of "Adult Lifelong Learning Consulting and Services"; 2. Strategies for establishing an "Adult Lifelong Learning Consulting and Service internet System". Conclusion: 1.Based on adult lifelong learning consulting and service needs, plan a professional knowledge training and certification system.2.Adult lifelong learning consulting and service professional knowledge and skills training should include the use of network technology to provide consulting service skills.3.To establish an adult lifelong learning consultation and service system, the Ministry of Education should promulgate policies and measures at the central level and entrust local governments or private organizations to implement them.4.The adult lifelong learning consulting and service system can combine the national qualifications framework, private sector and NPO to expand learning consulting service partners.

Keywords: adult lifelong learning, profesional knowledge, consulting and service, network system

Procedia PDF Downloads 54
11018 Presenting a Job Scheduling Algorithm Based on Learning Automata in Computational Grid

Authors: Roshanak Khodabakhsh Jolfaei, Javad Akbari Torkestani

Abstract:

As a cooperative environment for problem-solving, it is necessary that grids develop efficient job scheduling patterns with regard to their goals, domains and structure. Since the Grid environments facilitate distributed calculations, job scheduling appears in the form of a critical problem for the management of Grid sources that influences severely on the efficiency for the whole Grid environment. Due to the existence of some specifications such as sources dynamicity and conditions of the network in Grid, some algorithm should be presented to be adjustable and scalable with increasing the network growth. For this purpose, in this paper a job scheduling algorithm has been presented on the basis of learning automata in computational Grid which the performance of its results were compared with FPSO algorithm (Fuzzy Particle Swarm Optimization algorithm) and GJS algorithm (Grid Job Scheduling algorithm). The obtained numerical results indicated the superiority of suggested algorithm in comparison with FPSO and GJS. In addition, the obtained results classified FPSO and GJS in the second and third position respectively after the mentioned algorithm.

Keywords: computational grid, job scheduling, learning automata, dynamic scheduling

Procedia PDF Downloads 324
11017 Evaluation the Financial and Social Efficiency of Microfinance Institutions Using Data Envelope Analysis - A Sample Study of Active Microfinance Institutions in India

Authors: Hiba Mezaache

Abstract:

The study aims to assess the financial and social efficiency of microfinance institutions in india for the period 2015-2019 by using two models of economies of scale and choosing the output direction of the data envelope analysis (DEA) method and using the MIX MARKET database. The study concluded that microfinance institutions focus on achieving financial efficiency beyond their focus on achieving social efficiency to ensure their continuity in the market. Convergence in the efficiency ratios that have been achieved, but the optimum ratios have been achieved under the changing economies of scale; Efficiency is affected by the depth of reaching low-income groups, as serving this group raises costs and risks. The importance of lending to women in rural areas and raising their awareness to ensure their financial and social empowerment; Make improvements in operating expenses, asset management, and loan personnel control in order to maximize output.

Keywords: microfinance, financial efficiency, social efficiency, mix market, microfinance institutions

Procedia PDF Downloads 139
11016 Cascaded Neural Network for Internal Temperature Forecasting in Induction Motor

Authors: Hidir S. Nogay

Abstract:

In this study, two systems were created to predict interior temperature in induction motor. One of them consisted of a simple ANN model which has two layers, ten input parameters and one output parameter. The other one consisted of eight ANN models connected each other as cascaded. Cascaded ANN system has 17 inputs. Main reason of cascaded system being used in this study is to accomplish more accurate estimation by increasing inputs in the ANN system. Cascaded ANN system is compared with simple conventional ANN model to prove mentioned advantages. Dataset was obtained from experimental applications. Small part of the dataset was used to obtain more understandable graphs. Number of data is 329. 30% of the data was used for testing and validation. Test data and validation data were determined for each ANN model separately and reliability of each model was tested. As a result of this study, it has been understood that the cascaded ANN system produced more accurate estimates than conventional ANN model.

Keywords: cascaded neural network, internal temperature, inverter, three-phase induction motor

Procedia PDF Downloads 332
11015 Genome-Wide Expression Profiling of Cicer arietinum Heavy Metal Toxicity

Authors: B. S. Yadav, A. Mani, S. Srivastava

Abstract:

Chickpea (Cicer arietinum L.) is an annual, self-pollinating, diploid (2n = 2x = 16) pulse crop that ranks second in world legume production after common bean (Phaseolus vulgaris). ICC 4958 flowers approximately 39 days after sowing under peninsular Indian conditions and the crop matures in less than 90 days in rained environments. The estimated collective yield losses due to abiotic stresses (6.4 million t) have been significantly higher than for biotic stresses (4.8 million t). Most legumes are known to be salt sensitive, and therefore, it is becoming increasingly important to produce cultivars tolerant to high-salinity in addition to other abiotic and biotic stresses for sustainable chickpea production. Our aim was to identify the genes that are involved in the defence mechanism against heavy metal toxicity in chickpea and establish the biological network of heavy metal toxicity in chickpea. ICC4958 variety of chick pea was taken and grown in normal condition and 150µM concentration of different heavy metal salt like CdCl₂, K₂Cr2O₇, NaAsO₂. At 15th day leave samples were collected and stored in RNA Later solution microarray was performed for checking out differential gene expression pattern. Our studies revealed that 111 common genes that involved in defense mechanism were up regulated and 41 genes were commonly down regulated during treatment of 150µM concentration of CdCl₂, K₂Cr₂O₇, and NaAsO₂. Biological network study shows that the genes which are differentially expressed are highly connected and having high betweenness and centrality.

Keywords: abiotic stress, biological network, chickpea, microarray

Procedia PDF Downloads 180
11014 An Algorithm for Determining the Arrival Behavior of a Secondary User to a Base Station in Cognitive Radio Networks

Authors: Danilo López, Edwin Rivas, Leyla López

Abstract:

This paper presents the development of an algorithm that predicts the arrival of a secondary user (SU) to a base station (BS) in a cognitive network based on infrastructure, requesting a Best Effort (BE) or Real Time (RT) type of service with a determined bandwidth (BW) implementing neural networks. The algorithm dynamically uses a neural network construction technique using the geometric pyramid topology and trains a Multilayer Perceptron Neural Networks (MLPNN) based on the historical arrival of an SU to estimate future applications. This will allow efficiently managing the information in the BS, since it precedes the arrival of the SUs in the stage of selection of the best channel in CRN. As a result, the software application determines the probability of arrival at a future time point and calculates the performance metrics to measure the effectiveness of the predictions made.

Keywords: cognitive radio, base station, best effort, MLPNN, prediction, real time

Procedia PDF Downloads 308
11013 HIV/AIDS Knowledge and Social Integration among Street Children: A Systematic Review

Authors: Dewi Indah Irianti

Abstract:

Introduction: Street children include one of the populations at risk of HIV infection. Their vulnerability to these situations is increased by their lack of understanding of the changes associated with adolescence, the lack of knowledge and skills which could help them to make healthy choices. Social integration increased AIDS knowledge among migrant workers in Thailand. Although social integration has been incorporated into health research in other areas, it has received less attention in AIDS prevention research. This factor has not been integrated into models for HIV prevention. Objectives: The goal of this review is to summarize available knowledge about factors related to HIV/AIDS knowledge and to examine whether social integration was reviewed among street children. Methodology: This study performed a systematic search for English language articles published between January 2006 and March 2016 using the following keywords in various combination: street children, HIV/AIDS knowledge and social integration from the following bibliographic databases: Scopus, ProQuest, JSTOR, ScienceDirect, SpringerLink, EBSCOhost, Sage Publication, Clinical Key, Google Web, and Google Scholar . Results: A total of 10 articles met the inclusion criteria were systematically reviewed. This study reviews the existing quantitative and qualitative literature regarding the HIV/AIDS knowledge of street children in many countries. The study locations were Asia, the Americas, Europe, and Africa. The most determinants associated with HIV/AIDS knowledge among street children are age and sex. In this review, social integration that may be associated with HIV/AIDS knowledge among street children has not been investigated. Conclusion: To the best of the author’s knowledge, this study found that there is no research examining the relationship of social integration with the HIV knowledge among street children. This information may assist in the development of relevant strategies and HIV prevention programs to improve HIV knowledge and decrease risk behaviors among street children.

Keywords: HIV/AIDS knowledge, review, social integration, street children

Procedia PDF Downloads 306
11012 Turkish University Level EFL Learners’ Collocational Knowledge at Receptive and Productive Levels

Authors: Nazife Duygu Bagci

Abstract:

Collocations are an important part of vocabulary knowledge, and it is a subject that has recently attracted attention, while still in need of more research. The aim of this study is to answer three research questions related to the collocational knowledge of Turkish university level EFL learners at different proficiency levels of English. The first research question aims to compare the pre-intermediate (PIN) and the advanced (ADV) level learners’ collocational knowledge at receptive and productive levels. The second one is to analyze the performance of the PIN and the ADV students in two main collocation categories; lexical and grammatical. Lastly, the performance of both groups are focused on to find the collocation type (among verb-noun, adjective- noun, adjective-preposition, noun-preposition collocation types) they show the best performance in. Two offline tests were used to answer these questions. The results show that there is a significant difference between the PIN and the ADV groups at both receptive and productive levels. It can be concluded that proficiency is an important criterion in collocational knowledge, and learners do not necessarily know the collocates of the vocabulary items that they know. Although there is no significant difference between the PIN group’s performance in lexical and grammatical collocations, the ADV group showed a better performance in lexical collocations. Lastly, the PIN group at receptive and the ADV group at both receptive and productive levels showed the best performance in verb-noun collocations, which is in line with the previous research focusing on different collocation types.

Keywords: collocational knowledge, EFL, language proficiency, testing

Procedia PDF Downloads 375
11011 Development and Validation of the Dimensional Social Anxiety Scale: Assessment for the Offensive Type of Social Anxiety

Authors: Ryotaro Ishikawa

Abstract:

Social Anxiety Disorder (SAD) is marked by the persistent fear of social or performance situations in which embarrassment may occur. In contrast, SA in Japan and in China is understood differently. Taijin Kyofusho (TKS) is a culture-bound subtype of SAD which has been the focus of recent research. TKS refers to a unique form of SAD found in Japanese and East Asian cultures characterized by a fear of offending others, in contrast to prototypical SAD in which the source of fear is typically concerned about one’s own embarrassment, humiliation, or rejection by others. Criteria for TKS partially overlap with but are distinct from SAD; a primary factor distinguishing TKS from SAD appears to be individualistic versus interdependent or collectivistic self-construals. The aim of this study was to develop a scale to assess the typical SAD and offensive type of SAD (TKS). This study aimed to test the internal consistency and validity of the scale (Dimensional Social Anxiety Scale: DSAS) using university students sample. For this, 148 university students were enrolled (male=90, female=58, age=19.77, Standard Deviation=1.04). As a result of confirmatory factor analysis, three-factor models of DSAS were verified (χ2(74) =128.36). These three factors were named ‘general’, ‘perfomance’, and ‘offensive’. DSAS were significantly correlated with the Liebowitz Social Anxiety Scale (r = .538, p < .001). Good internal consistencies were indicated on the three subscales (α = .76 to 89). In conclusion, this study indicated DSAS has adequate internal consistency and validity for assessing of multi-type of SADs.

Keywords: social anxiety, cognitive theory, assessment, anxiety disorder

Procedia PDF Downloads 102
11010 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 261
11009 Attention-based Adaptive Convolution with Progressive Learning in Speech Enhancement

Authors: Tian Lan, Yixiang Wang, Wenxin Tai, Yilan Lyu, Zufeng Wu

Abstract:

The monaural speech enhancement task in the time-frequencydomain has a myriad of approaches, with the stacked con-volutional neural network (CNN) demonstrating superiorability in feature extraction and selection. However, usingstacked single convolutions method limits feature represen-tation capability and generalization ability. In order to solvethe aforementioned problem, we propose an attention-basedadaptive convolutional network that integrates the multi-scale convolutional operations into a operation-specific blockvia input dependent attention to adapt to complex auditoryscenes. In addition, we introduce a two-stage progressivelearning method to enlarge the receptive field without a dra-matic increase in computation burden. We conduct a series ofexperiments based on the TIMIT corpus, and the experimen-tal results prove that our proposed model is better than thestate-of-art models on all metrics.

Keywords: speech enhancement, adaptive convolu-tion, progressive learning, time-frequency domain

Procedia PDF Downloads 105
11008 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 60
11007 Estimation of Endogenous Brain Noise from Brain Response to Flickering Visual Stimulation Magnetoencephalography Visual Perception Speed

Authors: Alexander N. Pisarchik, Parth Chholak

Abstract:

Intrinsic brain noise was estimated via magneto-encephalograms (MEG) recorded during perception of flickering visual stimuli with frequencies of 6.67 and 8.57 Hz. First, we measured the mean phase difference between the flicker signal and steady-state event-related field (SSERF) in the occipital area where the brain response at the flicker frequencies and their harmonics appeared in the power spectrum. Then, we calculated the probability distribution of the phase fluctuations in the regions of frequency locking and computed its kurtosis. Since kurtosis is a measure of the distribution’s sharpness, we suppose that inverse kurtosis is related to intrinsic brain noise. In our experiments, the kurtosis value varied among subjects from K = 3 to K = 5 for 6.67 Hz and from 2.6 to 4 for 8.57 Hz. The majority of subjects demonstrated leptokurtic kurtosis (K < 3), i.e., the distribution tails approached zero more slowly than Gaussian. In addition, we found a strong correlation between kurtosis and brain complexity measured as the correlation dimension, so that the MEGs of subjects with higher kurtosis exhibited lower complexity. The obtained results are discussed in the framework of nonlinear dynamics and complex network theories. Specifically, in a network of coupled oscillators, phase synchronization is mainly determined by two antagonistic factors, noise, and the coupling strength. While noise worsens phase synchronization, the coupling improves it. If we assume that each neuron and each synapse contribute to brain noise, the larger neuronal network should have stronger noise, and therefore phase synchronization should be worse, that results in smaller kurtosis. The described method for brain noise estimation can be useful for diagnostics of some brain pathologies associated with abnormal brain noise.

Keywords: brain, flickering, magnetoencephalography, MEG, visual perception, perception time

Procedia PDF Downloads 131
11006 The influence of Personality Traits on Appearance Evaluation among Chinese Teenagers

Authors: Yichen Liu, Gexing Ding

Abstract:

Past research seeking to understand our ability to update social impressions in light of behavioral inconsistencies has shown that morality is more dominant in impression formation and updating than ability (e.g. friendly vs. efficient). In this study, we aim to test whether this pattern holds among the teenage population in an eastern society. Our findings revealed that competency and moral judgments go beyond impression formation in social cognition by influencing physical attractiveness evaluation. Moreover, our results confirmed that moral description has a leading role over the other basic dimensions of human social cognition (i.e., competency) in driving the impression formation process in an eastern society. However, competency information was generally perceived as more favorable than moral information, regardless of valence. Further investigation is needed to understand the mechanism of such effects.

Keywords: impression formation, social cognition, moral judgment, cross-cultural

Procedia PDF Downloads 195
11005 Participatory Democracy to the Contemporary Problems of Polish Social Policy

Authors: Agnieszka Szczudlińska-Kanoś

Abstract:

Nowadays the participation of citizens in public life increasingly effect on management at all levels of public authority. Today, however, democratic systems in many countries, also in Poland, based on the first - on the institutions of representative democracy, which is mainly on elections, party activity, on the other hand - on the basic instruments of direct democracy, which, in particular, we can include a referendum or initiative of citizenship - although these are often rather complementary. Other forms of participatory democracy, such as deliberative democracy, participatory budgeting, public consultation in practice in many countries are still rare. Appropriate use of the potential invested in participatory democracy can bring enormous and multilateral benefits. On the one hand, local and regional communities taking an active part in public life express their needs, point out problems and thus affect the decisions of public authorities. Authorities using knowledge acquired from the citizens also implement the policy tailored to their needs, thus obtaining support in the next election. The purpose of this study is to show how the Polish citizens affect to resolve issues of social policy pursued at different levels of government. This problem is very important because today the observed changes seen in virtually all fields of life create new social problems, which nowadays are no longer only the problems of the region, the country but they are international, global issues. From such this perspective we should talk about them, discuss, try to solve at all levels. Article will be useful not only theorists involved in the management of the public, local government, or social but also practitioners - local government acting as their functions at different levels of government. Conclusions drawn from the publication will also be useful to politicians and those directly affecting for: functioning social security systems, the scope and quality of public services and the overall shape of the contemporary social policy in different countries.

Keywords: social policy, local government, social participation, social services

Procedia PDF Downloads 266
11004 Scheduling in a Single-Stage, Multi-Item Compatible Process Using Multiple Arc Network Model

Authors: Bokkasam Sasidhar, Ibrahim Aljasser

Abstract:

The problem of finding optimal schedules for each equipment in a production process is considered, which consists of a single stage of manufacturing and which can handle different types of products, where changeover for handling one type of product to the other type incurs certain costs. The machine capacity is determined by the upper limit for the quantity that can be processed for each of the products in a set up. The changeover costs increase with the number of set ups and hence to minimize the costs associated with the product changeover, the planning should be such that similar types of products should be processed successively so that the total number of changeovers and in turn the associated set up costs are minimized. The problem of cost minimization is equivalent to the problem of minimizing the number of set ups or equivalently maximizing the capacity utilization in between every set up or maximizing the total capacity utilization. Further, the production is usually planned against customers’ orders, and generally different customers’ orders are assigned one of the two priorities – “normal” or “priority” order. The problem of production planning in such a situation can be formulated into a Multiple Arc Network (MAN) model and can be solved sequentially using the algorithm for maximizing flow along a MAN and the algorithm for maximizing flow along a MAN with priority arcs. The model aims to provide optimal production schedule with an objective of maximizing capacity utilization, so that the customer-wise delivery schedules are fulfilled, keeping in view the customer priorities. Algorithms have been presented for solving the MAN formulation of the production planning with customer priorities. The application of the model is demonstrated through numerical examples.

Keywords: scheduling, maximal flow problem, multiple arc network model, optimization

Procedia PDF Downloads 390
11003 Incorporating Lexical-Semantic Knowledge into Convolutional Neural Network Framework for Pediatric Disease Diagnosis

Authors: Xiaocong Liu, Huazhen Wang, Ting He, Xiaozheng Li, Weihan Zhang, Jian Chen

Abstract:

The utilization of electronic medical record (EMR) data to establish the disease diagnosis model has become an important research content of biomedical informatics. Deep learning can automatically extract features from the massive data, which brings about breakthroughs in the study of EMR data. The challenge is that deep learning lacks semantic knowledge, which leads to impracticability in medical science. This research proposes a method of incorporating lexical-semantic knowledge from abundant entities into a convolutional neural network (CNN) framework for pediatric disease diagnosis. Firstly, medical terms are vectorized into Lexical Semantic Vectors (LSV), which are concatenated with the embedded word vectors of word2vec to enrich the feature representation. Secondly, the semantic distribution of medical terms serves as Semantic Decision Guide (SDG) for the optimization of deep learning models. The study evaluate the performance of LSV-SDG-CNN model on four kinds of Chinese EMR datasets. Additionally, CNN, LSV-CNN, and SDG-CNN are designed as baseline models for comparison. The experimental results show that LSV-SDG-CNN model outperforms baseline models on four kinds of Chinese EMR datasets. The best configuration of the model yielded an F1 score of 86.20%. The results clearly demonstrate that CNN has been effectively guided and optimized by lexical-semantic knowledge, and LSV-SDG-CNN model improves the disease classification accuracy with a clear margin.

Keywords: convolutional neural network, electronic medical record, feature representation, lexical semantics, semantic decision

Procedia PDF Downloads 118
11002 Network Conditioning and Transfer Learning for Peripheral Nerve Segmentation in Ultrasound Images

Authors: Harold Mauricio Díaz-Vargas, Cristian Alfonso Jimenez-Castaño, David Augusto Cárdenas-Peña, Guillermo Alberto Ortiz-Gómez, Alvaro Angel Orozco-Gutierrez

Abstract:

Precise identification of the nerves is a crucial task performed by anesthesiologists for an effective Peripheral Nerve Blocking (PNB). Now, anesthesiologists use ultrasound imaging equipment to guide the PNB and detect nervous structures. However, visual identification of the nerves from ultrasound images is difficult, even for trained specialists, due to artifacts and low contrast. The recent advances in deep learning make neural networks a potential tool for accurate nerve segmentation systems, so addressing the above issues from raw data. The most widely spread U-Net network yields pixel-by-pixel segmentation by encoding the input image and decoding the attained feature vector into a semantic image. This work proposes a conditioning approach and encoder pre-training to enhance the nerve segmentation of traditional U-Nets. Conditioning is achieved by the one-hot encoding of the kind of target nerve a the network input, while the pre-training considers five well-known deep networks for image classification. The proposed approach is tested in a collection of 619 US images, where the best C-UNet architecture yields an 81% Dice coefficient, outperforming the 74% of the best traditional U-Net. Results prove that pre-trained models with the conditional approach outperform their equivalent baseline by supporting learning new features and enriching the discriminant capability of the tested networks.

Keywords: nerve segmentation, U-Net, deep learning, ultrasound imaging, peripheral nerve blocking

Procedia PDF Downloads 86
11001 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules

Authors: Gagandeep Singh, Navdeep Singh

Abstract:

Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.

Keywords: WSN, I-Leach, MATLAB, sensor

Procedia PDF Downloads 259
11000 Microbiological Analysis, Cytotoxic and Genotoxic Effects from Material Captured in PM2.5 and PM10 Filters Used in the Aburrá Valley Air Quality Monitoring Network (Colombia)

Authors: Carmen E. Zapata, Juan Bautista, Olga Montoya, Claudia Moreno, Marisol Suarez, Alejandra Betancur, Duvan Nanclares, Natalia A. Cano

Abstract:

This study aims to evaluate the diversity of microorganisms in filters PM2.5 and PM10; and determine the genotoxic and cytotoxic activity of the complex mixture present in PM2.5 filters used in the Aburrá Valley Air Quality Monitoring Network (Colombia). The research results indicate that particulate matter PM2.5 of different monitoring stations are bacteria; however, this study of detection of bacteria and their phylogenetic relationship is not complete evidence to connect the microorganisms with pathogenic or degrading activities of compounds present in the air. Additionally, it was demonstrated the damage induced by the particulate material in the cell membrane, lysosomal and endosomal membrane and in the mitochondrial metabolism; this damage was independent of the PM2.5 concentrations in almost all the cases.

Keywords: cytotoxic, genotoxic, microbiological analysis, PM10, PM2.5

Procedia PDF Downloads 329
10999 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 209
10998 Improving the Performance of Back-Propagation Training Algorithm by Using ANN

Authors: Vishnu Pratap Singh Kirar

Abstract:

Artificial Neural Network (ANN) can be trained using backpropagation (BP). It is the most widely used algorithm for supervised learning with multi-layered feed-forward networks. Efficient learning by the BP algorithm is required for many practical applications. The BP algorithm calculates the weight changes of artificial neural networks, and a common approach is to use a two-term algorithm consisting of a learning rate (LR) and a momentum factor (MF). The major drawbacks of the two-term BP learning algorithm are the problems of local minima and slow convergence speeds, which limit the scope for real-time applications. Recently the addition of an extra term, called a proportional factor (PF), to the two-term BP algorithm was proposed. The third increases the speed of the BP algorithm. However, the PF term also reduces the convergence of the BP algorithm, and criteria for evaluating convergence are required to facilitate the application of the three terms BP algorithm. Although these two seem to be closely related, as described later, we summarize various improvements to overcome the drawbacks. Here we compare the different methods of convergence of the new three-term BP algorithm.

Keywords: neural network, backpropagation, local minima, fast convergence rate

Procedia PDF Downloads 482
10997 Self-Efficacy in Online Vocal Learning: Current Situation, Influencing Factors and Optimization Strategies

Authors: Tianyou Wang

Abstract:

Students' own intrinsic motivation is the main source of energy for learning activities, and their self-efficacy becomes a key factor affecting the learning effect. In today's increasingly common situation of online vocal music teaching, virtualized teaching scenarios have brought a considerable impact on students' personal efficacy. Since personal efficacy is the result of the interaction between environmental factors and subject characteristics, an empirical study was conducted to investigate the changes in students' self-efficacy, influencing factors, and characteristics in online vocal teaching scenarios based on the three dimensions of teachers, students, and technology. One hundred valid questionnaires were studied through a quantitative survey. The results showed that students' personal efficacy was significantly lower in online learning environments compared to offline vocal teaching and showed significant differences due to factors such as gender and class type; students' self-efficacy in online vocal teaching was significantly affected by factors such as technological environment, teaching style, and information technology ability. Based on the results of the study, it is recommended to pay attention to inquiry and practice in the teaching design, use singing projects as the teaching organization, grasp the learning process with the orientation of problem-solving, push the applicable vocal music teaching resources in time, lead students to explore and refine the problems and push students to learn independently according to the goals and plans.

Keywords: vocal pedagogy, self-efficacy, online learning, intrinsic motivation, information technology

Procedia PDF Downloads 38
10996 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 317
10995 The Relationship between the Social Entrepreneur and the Social Dimension of Sustainability: A Bibliometric Survey of the Last Twelve Years

Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp, Lucia Regina Da Rosa Gama Madruga

Abstract:

The way social entrepreneurs act and can positively impact on our society engages the interest of academics, companies and governments, who seek solutions to solve or alleviate issues related to the abuse of natural resources, as well as the increase of poverty (social aspects). Studies on social entrepreneurship have been characterized by diverse ramifications and their transdisciplinary character, permeating various disciplines and approaches. Different bibliometric studies were conducted within the theme of social entrepreneurship. In this context, because it is a topic in development and multifaceted, the aim of this article is to present the main interfaces of the studies on the Social Entrepreneur figure in relation to the social concern of sustainability, highlighting the relevant researches and their trends, as well as their relationship with the organizations. Aiming to achieve this purpose, the specific goals are: to identify the most cited authors and articles, to verify the authors and journals with the greatest number of publications and their approaches and to point out their affiliations, countries, and languages of publications. It is still a secondary objective to identify the emerging trends in relation to the social entrepreneur and his social concern stemming from the discussions on sustainability. This way, we analyzed articles from two international databases (Scopus and Web of Science), from 2004 to 2016. The main results were the increase in the number of publications, with most of them in English language, coming mainly from the United States institutions (such as Indiana University and Harvard University) and the United Kingdom (whose main institutions are University of London and Robert Gordon University). Although publications in Spanish and Portuguese are the least expressive in quantity, some tendencies point to publications that discuss the social entrepreneur in terms of gender (that relates to female entrepreneurship) and social class (that relates to the need of building communities that contemplate the Social entrepreneur at the base of the pyramid). It should be noted that the trends of the themes emerged from the analysis of the publication titles only in Portuguese, since this is the native language of the authors who carry out their studies mainly in Brazil. When considering articles in Portuguese (57 indicated by WOS and 9 by Scopus), a previous analysis of the titles was carried out to identify how researchers were approaching the theme social entrepreneur in a joint way to the social dimension of sustainability. However, the analysis of the titles themselves brought a limitation to our study, since it was felt a need to carry out a qualitative study, in which it could be possible to consider the abstracts of the available articles.

Keywords: base of pyramid, social dimension, social entrepreneur, sustainability

Procedia PDF Downloads 374
10994 Multilayer Neural Network and Fuzzy Logic Based Software Quality Prediction

Authors: Sadaf Sahar, Usman Qamar, Sadaf Ayaz

Abstract:

In the software development lifecycle, the quality prediction techniques hold a prime importance in order to minimize future design errors and expensive maintenance. There are many techniques proposed by various researchers, but with the increasing complexity of the software lifecycle model, it is crucial to develop a flexible system which can cater for the factors which in result have an impact on the quality of the end product. These factors include properties of the software development process and the product along with its operation conditions. In this paper, a neural network (perceptron) based software quality prediction technique is proposed. Using this technique, the stakeholders can predict the quality of the resulting software during the early phases of the lifecycle saving time and resources on future elimination of design errors and costly maintenance. This technique can be brought into practical use using successful training.

Keywords: software quality, fuzzy logic, perception, prediction

Procedia PDF Downloads 303
10993 Distribution Planning with Renewable Energy Units Based on Improved Honey Bee Mating Optimization

Authors: Noradin Ghadimi, Nima Amjady, Oveis Abedinia, Roza Poursoleiman

Abstract:

This paper proposed an Improved Honey Bee Mating Optimization (IHBMO) for a planning paradigm for network upgrade. The proposed technique is a new meta-heuristic algorithm which inspired by mating of the honey bee. The paradigm is able to select amongst several choices equi-cost one assuring the optimum in terms of voltage profile, considering various scenarios of DG penetration and load demand. The distributed generation (DG) has created a challenge and an opportunity for developing various novel technologies in power generation. DG prepares a multitude of services to utilities and consumers, containing standby generation, peaks chopping sufficiency, base load generation. The proposed algorithm is applied over the 30 lines, 28 buses power system. The achieved results demonstrate the good efficiency of the DG using the proposed technique in different scenarios.

Keywords: distributed generation, IHBMO, renewable energy units, network upgrade

Procedia PDF Downloads 474
10992 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 98