Search results for: text classification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3230

Search results for: text classification

740 Investigating the Characteristics of Correlated Parking-Charging Behaviors for Electric Vehicles: A Data-Driven Approach

Authors: Xizhen Zhou, Yanjie Ji

Abstract:

In advancing the management of integrated electric vehicle (EV) parking-charging behaviors, this study uses Changshu City in Suzhou as a case study to establish a data association mechanism for parking-charging platforms and to develop a database for EV parking-charging behaviors. Key indicators, such as charging start time, initial state of charge, final state of charge, and parking-charging time difference, are considered. Utilizing the K-S test method, the paper examines the heterogeneity of parking-charging behavior preferences among pure EV and non-pure EV users. The K-means clustering method is employed to analyze the characteristics of parking-charging behaviors for both user groups, thereby enhancing the overall understanding of these behaviors. The findings of this study reveal that using a classification model, the parking-charging behaviors of pure EVs can be classified into five distinct groups, while those of non-pure EVs can be separated into four groups. Among them, both types of EV users exhibit groups with low range anxiety for complete charging with special journeys, complete charging at destination, and partial charging. Additionally, both types have a group with high range anxiety, characterized by pure EV users displaying a preference for complete charging with specific journeys, while non-pure EV users exhibit a preference for complete charging. Notably, pure EV users also display a significant group engaging in nocturnal complete charging. The findings of this study can provide technical support for the scientific and rational layout and management of integrated parking and charging facilities for EVs.

Keywords: traffic engineering, potential preferences, cluster analysis, EV, parking-charging behavior

Procedia PDF Downloads 53
739 Learning Dynamic Representations of Nodes in Temporally Variant Graphs

Authors: Sandra Mitrovic, Gaurav Singh

Abstract:

In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.

Keywords: churn prediction, dynamic networks, node2vec, auto-encoders

Procedia PDF Downloads 292
738 A Multi-criteria Decision Method For The Recruitment Of Academic Personnel Based On The Analytical Hierarchy Process And The Delphi Method In A Neutrosophic Environment (Full Text)

Authors: Antonios Paraskevas, Michael Madas

Abstract:

For a university to maintain its international competitiveness in education, it is essential to recruit qualitative academic staff as it constitutes its most valuable asset. This selection demonstrates a significant role in achieving strategic objectives, particularly by emphasizing a firm commitment to exceptional student experience and innovative teaching and learning practices of high quality. In this vein, the appropriate selection of academic staff establishes a very important factor of competitiveness, efficiency and reputation of an academic institute. Within this framework, our work demonstrates a comprehensive methodological concept that emphasizes on the multi-criteria nature of the problem and on how decision makers could utilize our approach in order to proceed to the appropriate judgment. The conceptual framework introduced in this paper is built upon a hybrid neutrosophic method based on the Neutrosophic Analytical Hierarchy Process (N-AHP), which uses the theory of neutrosophy sets and is considered suitable in terms of significant degree of ambiguity and indeterminacy observed in decision-making process. To this end, our framework extends the N-AHP by incorporating the Neutrosophic Delphi Method (N-DM). By applying the N-DM, we can take into consideration the importance of each decision-maker and their preferences per evaluation criterion. To the best of our knowledge, the proposed model is the first which applies Neutrosophic Delphi Method in the selection of academic staff. As a case study, it was decided to use our method to a real problem of academic personnel selection, having as main goal to enhance the algorithm proposed in previous scholars’ work, and thus taking care of the inherit ineffectiveness which becomes apparent in traditional multi-criteria decision-making methods when dealing with situations alike. As a further result, we prove that our method demonstrates greater applicability and reliability when compared to other decision models.

Keywords: analytical hierarchy process, delphi method, multi-criteria decision maiking method, neutrosophic set theory, personnel recruitment

Procedia PDF Downloads 157
737 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 54
736 Radio-Frequency Technologies for Sensing and Imaging

Authors: Cam Nguyen

Abstract:

Rapid, accurate, and safe sensing and imaging of physical quantities or structures finds many applications and is of significant interest to society. Sensing and imaging using radio-frequency (RF) techniques, particularly, has gone through significant development and subsequently established itself as a unique territory in the sensing world. RF sensing and imaging has played a critical role in providing us many sensing and imaging abilities beyond our human capabilities, benefiting both civilian and military applications - for example, from sensing abnormal conditions underneath some structures’ surfaces to detection and classification of concealed items, hidden activities, and buried objects. We present the developments of several sensing and imaging systems implementing RF technologies like ultra-wide band (UWB), synthetic-pulse, and interferometry. These systems are fabricated completely using RF integrated circuits. The UWB impulse system operates over multiple pulse durations from 450 to 1170 ps with 5.5-GHz RF bandwidth. It performs well through tests of various samples, demonstrating its usefulness for subsurface sensing. The synthetic-pulse system operating from 0.6 to 5.6 GHz can assess accurately subsurface structures. The synthetic-pulse system operating from 29.72-37.7 GHz demonstrates abilities for various surface and near-surface sensing such as profile mapping, liquid-level monitoring, and anti-personnel mine locating. The interferometric system operating at 35.6 GHz demonstrates its multi-functional capability for measurement of displacements and slow velocities. These RF sensors are attractive and useful for various surface and subsurface sensing applications. This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Keywords: RF sensors, radars, surface sensing, subsurface sensing

Procedia PDF Downloads 291
735 The Portrayal of Violence Against Women in Bangladesh News Media: Seeing It Through Rumana Manzur’s Case

Authors: Zerrin Akter Anni

Abstract:

The media's role in shaping perceptions of violence against women (VAW) and their portrayal in news reporting significantly influences our understanding of this critical issue. My research delves into the portrayal of violence against women in mainstream media, using the prominent case of Dr. Rumana Manzur, a former UBC Fulbright Scholar from Bangladesh who suffered a brutal assault by her ex-husband in June 2011. Employing a qualitative research approach, this study uses an ethnographic media analysis method to scrutinize news reports of the aforementioned case from selected newspapers in Bangladesh. The primary objectives are to investigate how the popular news media in Bangladesh addresses the issue of violence against women and frames the victims of such violence. The findings of this research highlight that news media can perpetuate gender stereotypes and subtly shift blame onto the victim through various techniques, creating intricate interactions between the reader and the text. These techniques include sensationalized headlines, textual content, and graphic images. This victim-blaming process not only retraumatizes the survivor but also distorts the actual facts when presenting the case to a larger audience. Consequently, the representation of violence against women cases in media, particularly the portrayal of women as victims during reporting, significantly impacts our collective comprehension of this issue. In conclusion, this paper asserts that the Bangladeshi media, particularly news outlets, in conjunction with society, continue to follow a pattern of depicting gender-based violence in ways that devalue the image of women. This research underscores the need for critical analysis of media representations of violence against women cases, as they can perpetuate harmful stereotypes and hinder efforts to combat this pervasive problem. Therefore, the outcome of this research is to comprehend the complex dynamics between media and violence against women, which is essential for fostering a more empathetic and informed society that actively works towards eradicating this problem from our society.

Keywords: media representation, violence against women (vaw), ethnographic media analysis, victim-blaming, sensationalized headline

Procedia PDF Downloads 46
734 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 131
733 Retrospective Analysis of Facial Skin Cancer Patients Treated in the Department of Oral and Maxillofacial Surgery Kiel

Authors: Abdullah Saeidi, Aydin Gülses, Christan Flörke

Abstract:

Skin cancer of the face region is the most common type of malignancy and surgical excision is the preferred approach. However, the clinical long term results reported in the literature are still controversial. Objectives: To describe; 1. Demographical characteristics 2. Affected site, distribution and TNM classification regarding tumor type 3. Surgical aspects • Surgical removal: excision principles, safety margins, the need for secondary resection, primary reconstruction/ defect closure, anesthesia protocol, duration of hospital stay (if any) • Secondary intervention for defect closure/reconstruction: Flap technique, anesthesia protocol, duration of hospital stay (if any), postoperative wound management etc. 4. Tumor recurrences 5. Clinical outcomes 6. Studying the possible therapy approach throw Biostatistical relation and correlation between multiple Histological, diagnostics and clinical Faktors. following surgical ablation of the skin cancer of the head and neck region. Methods: Selection and statistical analysis of medical records of patients who had admitted to the Department of Oral and Maxillofacial Surgery, Universitätsklinikum Schleswig Holstein, Campus Kiel during the period of 2015-2019 will be retrospectively evaluated. Data will be collected via ORBIS Information-Management-System (ORBIS AG, Saarbrücken, Germany).

Keywords: non melanoma skin cancer, face skin cancer, skin reconstruction, non melanoma skin cancer recurrence, non melanoma skin cancer metastases

Procedia PDF Downloads 88
732 Convolution Neural Network Based on Hypnogram of Sleep Stages to Predict Dosages and Types of Hypnotic Drugs for Insomnia

Authors: Chi Wu, Dean Wu, Wen-Te Liu, Cheng-Yu Tsai, Shin-Mei Hsu, Yin-Tzu Lin, Ru-Yin Yang

Abstract:

Background: The results of previous studies compared the benefits and risks of receiving insomnia medication. However, the effects between hypnotic drugs used and enhancement of sleep quality were still unclear. Objective: The aim of this study is to establish a prediction model for hypnotic drugs' dosage used for insomnia subjects and associated the relationship between sleep stage ratio change and drug types. Methodologies: According to American Academy of Sleep Medicine (AASM) guideline, sleep stages were classified and transformed to hypnogram via the polysomnography (PSG) in a hospital in New Taipei City (Taiwan). The subjects with diagnosis for insomnia without receiving hypnotic drugs treatment were be set as the comparison group. Conversely, hypnotic drugs dosage within the past three months was obtained from the clinical registration for each subject. Furthermore, the collecting subjects were divided into two groups for training and testing. After training convolution neuron network (CNN) to predict types of hypnotics used and dosages are taken, the test group was used to evaluate the accuracy of classification. Results: We recruited 76 subjects in this study, who had been done PSG for transforming hypnogram from their sleep stages. The accuracy of dosages obtained from confusion matrix on the test group by CNN is 81.94%, and accuracy of hypnotic drug types used is 74.22%. Moreover, the subjects with high ratio of wake stage were correctly classified as requiring medical treatment. Conclusion: CNN with hypnogram was potentially used for adjusting the dosage of hypnotic drugs and providing subjects to pre-screening the types of hypnotic drugs taken.

Keywords: convolution neuron network, hypnotic drugs, insomnia, polysomnography

Procedia PDF Downloads 163
731 Cone Beam Computed Tomography: A Useful Diagnostic Tool to Determine Root Canal Morphology in a Sample of Egyptian Population

Authors: H. El-Messiry, M. El-Zainy, D. Abdelkhalek

Abstract:

Cone-beam computed tomography (CBCT) provides high-quality 3-dimensional images of dental structures because of its high spatial resolution. The study of dental morphology is important in research as it provides information about diversities within a population. Many studies have shown different shapes and numbers of roots canals among different races, especially in molars. The aim of this study was to determine the morphology of root canals of mandibular first and third molars in a sample of Egyptian population using CBCT scanning. Fifty mandibular first Molars (M1) and fifty mandibular third (M3) extracted molars were collected. Thick rectangular molds were made using pink wax to hold the samples. Molars were embedded in the wax mold by aligning them in rows leaving arbitrary 0.5cm space between them. The molds with the samples in were submitted for CBCT scan. The number and morphology of root canals were assessed and classified according to Vertucci's classification. The mesial and the distal roots were examined separately. Finally, data was analyzed using Fisher exact test. The most prevalent mesial root canal frequency in M1 was type IV (60%) and type II (40 %), while M3 showed prevalence of type I (40%) and II (40%). Distal root canal morphology showed prevalence of type I in both M1 (66%) and M3 (86%). So, it can be concluded that CBCT scanning provides supplemental information about the root canal configurations of mandibular molars in a sample of Egyptian population. This study may help clinicians in the root canal treatment of mandibular molars.

Keywords: cone beam computed tomography, mandibular first molar, mandibular third molar, root canal morphology

Procedia PDF Downloads 292
730 Retinal Changes in Patients with Idiopathic Inflammatory Myopathies: A Case-Control Study

Authors: Rachna Agarwal, R. Naveen, Darpan Thakre, Rohit Shahi, Maryam Abbasi, Upendra Rathore, Latika Gupta

Abstract:

Aim: Retinal changes are the window to systemic vasculature. Therefore, we explored retinal changes in patients with idiopathic inflammatory myopathies (IIM) as a surrogate for vascular health. Methods: Adult and juvenile IIM patients visiting a tertiary care centre in 2021 satisfying the International Myositis Classification Criteria were enrolled for detailed ophthalmic examination in comparison with healthy controls (HC). Patients with conditions that precluded thorough posterior chamber examination were excluded. Scale variables are expressed as median (IQR). Multivariate analysis (binary logistic regression-BLR) was conducted, adjusting for age, gender, and comorbidities besides factors significant in univariate analysis. Results: 43 patients with IIM [31 females; age 36 (23-45) years; disease duration 5.5 (2-12) months] were enrolled for participation. DM (44%) was the most common diagnosis. IIM patients exhibited frequent attenuation of retinal vessels (32.6% vs. 4.3%, p <0.001), AV nicking (14% vs. 2.2%, p=0.053), and vascular tortuosity (18.6% vs. 2.2%, p=0.012), besides decreased visual acuity (53.5% vs. 10.9%, p<0.001) and immature cataracts (34.9% vs. 2.2%, p<0.001). Attenuation of vessels [OR 10.9 (1.7-71), p=0.004] emerged as significantly different from HC after adjusting for covariates in BLR. Notably, adults with IIM were more predisposed to retinal abnormalities [21 (57%) vs. 1 (16%), p=0.068], especially attenuation of vessels [14(38%) vs. 0(0), p=0.067] than jIIM. However, no difference was found in retinal features amongst the subtypes of adult IIM, nor did they correlate with MDAAT, MDI, or HAQ-DI. Conclusion: Retinal microvasculopathy and diminution of vision occur in nearly one-third to half of the patients with IIM. Microvasculopathy occurs across subtypes of IIM, and more so in adults, calling for further investigation as a surrogate for damage assessment and potentially even systemic vascular health.

Keywords: idiopathic inflammatory myopathies, vascular health, retinal microvasculopathy, arterial attenuation

Procedia PDF Downloads 63
729 Extraction and Analysis of Anthocyanins Contents from Different Stage Flowers of the Orchids Dendrobium Hybrid cv. Ear-Sakul

Authors: Orose Rugchati, Khumthong Mahawongwiriya

Abstract:

Dendrobium hybrid cv. Ear-Sakul has become one of the important commercial commodities in Thailand agricultural industry worldwide, either as potted plants or as cut flowers due to the attractive color produced in flower petals. Anthocyanins are the main flower pigments and responsible for the natural attractive display of petal colors. These pigments play an important role in functionality, such as to attract animal pollinators, classification, and grading of these orchids. Dendrobium hybrid cv. Ear-Sakul has been collected from local area farm in different stage flowers (F1, F2-F5, and F6). Anthocyanins pigment were extracted from the fresh flower by solvent extraction (MeOH–TFA 99.5:0.5v/v at 4ºC) and purification with ethyl acetate. The main anthocyanins components are cyanidin, pelargonidin, and delphinidin. Pure anthocyanin contents were analysis by UV-Visible spectroscopy technique at λ max 535, 520 and 546 nm respectively. The anthocyanins contents were converted in term of monomeric anthocyanins pigment (mg/L). The anthocyanins contents of all sample were compared with standard pigments cyanidin, pelargonidin and delphinidin. From this experiment is a simple extraction and analysis anthocyanins content in different stage of flowers results shown that monomeric anthocyanins pigment contents of different stage flowers (F1, F2-F5 and F6 ): cyanidin – 3 – glucoside (mg/l) are 0.85+0.08, 24.22+0.12 and 62.12+0.6; Pelargonidin 3,5-di- glucoside(mg/l) 10.37+0.12, 31.06+0.8 and 81.58+ 0.5; Delphinidin (mg/l) 6.34+0.17, 18.98+0.56 and 49.87+0.7; and the appearance of extraction pure anthocyanins in L(a, b): 2.71(1.38, -0.48), 1.06(0.39,-0.66) and 2.64(2.71,-3.61) respectively. Dendrobium Hybrid cv. Ear-Sakul could be used as a source of anthocyanins by simple solvent extraction and stage of flowers as a guideline for the prediction amount of main anthocyanins components are cyanidin, pelargonidin, and delphinidin could be application and development in quantities, and qualities with the advantage for food pharmaceutical and cosmetic industries.

Keywords: analysis, anthocyanins contents, different stage flowers, Dendrobium Hybrid cv. Ear-Sakul

Procedia PDF Downloads 124
728 3D-Shape-Perception Studied Exemplarily with Tetrahedron and Icosahedron as Prototypes of the Polarities Sharp versus Round

Authors: Iris Sauerbrei, Jörg Trojan, Erich Lehner

Abstract:

Introduction and significance of the study: This study examines if three-dimensional shapes elicit distinct patterns of perceptions. If so, it is relevant for all fields of design, especially for the design of the built environment. Description of basic methodologies: The five platonic solids are the geometrical base for all other three-dimensional shapes, among which tetrahedron and icosahedron provide the clearest representation of the qualities sharp and round. The component pair of attributes ‘sharp versus round’ has already been examined in various surveys in a psychology of perception and in neuroscience by means of graphics, images of products of daily use, as well as by photographs and walk-through-videos of landscapes and architecture. To verify a transfer of outcomes of the existing surveys to the perception of three-dimensional shapes, walk-in models (total height 2.2m) of tetrahedron and icosahedron were set up in a public park in Frankfurt am Main, Germany. Preferences of park visitors were tested by questionnaire; also they were asked to write down associations in a free text. In summer 2015, the tetrahedron was assembled eight times, the icosahedron seven times. In total 288 participants took part in the study; 116 rated the tetrahedron, 172 rated the icosahedron. Findings: Preliminary analyses of the collected data using Wilcoxon Rank-Sum tests show that the perceptions of the two solids differ in respect to several attributes and that each of the tested model show significance for specific attributes. Conclusion: These findings confirm the assumptions and provide first evidence that the perception of three-dimensional shapes are associated to characteristic attributes and to which. In order to enable conscious choices for spatial arrangements in design processes for the built environment, future studies should examine attributes for the other three basic bodies - Octahedron, Cube, and Dodecahedron. Additionally, similarities and differences between the perceptions of two- and three-dimensional shapes as well as shapes that are more complex need further research.

Keywords: 3D shapes, architecture, geometrical features, space perception, walk-in models

Procedia PDF Downloads 208
727 Self-Organizing Maps for Credit Card Fraud Detection

Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 23
726 Taxonomic Analyses of Some Members of Cucurbitoideae Using Phytolith Marker

Authors: J. K. Ebigwai, E. Asuquo

Abstract:

Systematic affinities among Cucurbitaceae members are highly debatable as exemplified by diverging views on their phylogenies. Worst still is the overriding reliance on morphometric marker in the delimitation of cucurbitoideae members. Considerable symplesiomorphic and synapmorphic character states have been observed among some members of same genera than do with some members of other genera. The broad study aims at establishing phylogenies among species of Cucumis (Melothrieae), Momordica, Telfairia (Jolliffieae), Trichosanthes (Trichosantheae), Citrullus, Lagenaria, Luffa (Benincaseae) and Cucurbita (Cucurbita) using anatomical, cytological, Palynological, serological, and phytolith markers. However, this paper shall present preliminary findings on the phytolith character states for Cucumis melo, Momordica charantia, Telfairia occidentales, Trichosanthes dioica, Citrullus vulgaris, Lagenaria siceraria, Luffa cylindrical, Cucurbita pepo and Cucurbita maxima. Heavy liquid floatation method was employed in the extraction of the phytolith matter from the leaf tissues of these species. The result revealed that a bilobate short cell and a trapeziform sinuate form were absent in all the species except in Cucumis melo, Citrullus vulgaris and Lagenaria siceraria. Also a globular granulate form was observed exclusively in Telfairia occidentales, Cucurbita maxima, Momordica charantia and Luffa cylindrical. Other forms of phytolith observed were not diagnostic as they were not species specific. The results tentatively suggests a closer examination of the existing classification system.

Keywords: bilobate short cell, cucums, phytolith, telfairia, trapeziform sinuate

Procedia PDF Downloads 316
725 Quantification of E-Waste: A Case Study in Federal University of Espírito Santo, Brazil

Authors: Andressa S. T. Gomes, Luiza A. Souza, Luciana H. Yamane, Renato R. Siman

Abstract:

The segregation of waste of electrical and electronic equipment (WEEE) in the generating source, its characterization (quali-quantitative) and identification of origin, besides being integral parts of classification reports, are crucial steps to the success of its integrated management. The aim of this paper was to count WEEE generation at the Federal University of Espírito Santo (UFES), Brazil, as well as to define sources, temporary storage sites, main transportations routes and destinations, the most generated WEEE and its recycling potential. Quantification of WEEE generated at the University in the years between 2010 and 2015 was performed using data analysis provided by UFES’s sector of assets management. EEE and WEEE flow in the campuses information were obtained through questionnaires applied to the University workers. It was recorded 6028 WEEEs units of data processing equipment disposed by the university between 2010 and 2015. Among these waste, the most generated were CRT screens, desktops, keyboards and printers. Furthermore, it was observed that these WEEEs are temporarily stored in inappropriate places at the University campuses. In general, these WEEE units are donated to NGOs of the city, or sold through auctions (2010 and 2013). As for recycling potential, from the primary processing and further sale of printed circuit boards (PCB) from the computers, the amount collected could reach U$ 27,839.23. The results highlight the importance of a WEEE management policy at the University.

Keywords: solid waste, waste of electrical and electronic equipment, waste management, institutional solid waste generation

Procedia PDF Downloads 236
724 Effectiveness of the Model in the Development of Teaching Materials for Malay Language in Primary Schools in Singapore

Authors: Salha Mohamed Hussain

Abstract:

As part of the review on the Malay Language curriculum and pedagogy in Singapore conducted in 2010, some recommendations were made to nurture active learners who are able to use the Malay Language efficiently in their daily lives. In response to the review, a new Malay Language teaching and learning package for primary school, called CEKAP (Cungkil – Elicit; Eksplorasi – Exploration; Komunikasi – Communication; Aplikasi – Application; Penilaian – Assessment), was developed from 2012 and implemented for Primary 1 in all primary schools from 2015. Resources developed in this package include the text book, activity book, teacher’s guide, big books, small readers, picture cards, flash cards, a game kit and Information and Communication Technology (ICT) resources. The development of the CEKAP package is continuous until 2020. This paper will look at a model incorporated in the development of the teaching materials in the new Malay Language Curriculum for Primary Schools and the rationale for each phase of development to ensure that the resources meet the needs of every pupil in the teaching and learning of Malay Language in the primary schools. This paper will also focus on the preliminary findings of the effectiveness of the model based on the feedback given by members of the working and steering committees. These members are academicians and educators who were appointed by the Ministry of Education to provide professional input on the soundness of pedagogical approach proposed in the revised syllabus and to make recommendations on the content of the new instructional materials. Quantitative data is derived from the interviews held with these members to gather their input on the model. Preliminary findings showed that the members provided positive feedback on the model and that the comprehensive process has helped to develop good and effective instructional materials for the schools. Some recommendations were also gathered from the interview sessions. This research hopes to provide useful information to those involved in the planning of materials development for teaching and learning.

Keywords: Malay language, materials development, model, primary school

Procedia PDF Downloads 91
723 Invasion of Pectinatella magnifica in Freshwater Resources of the Czech Republic

Authors: J. Pazourek, K. Šmejkal, P. Kollár, J. Rajchard, J. Šinko, Z. Balounová, E. Vlková, H. Salmonová

Abstract:

Pectinatella magnifica (Leidy, 1851) is an invasive freshwater animal that lives in colonies. A colony of Pectinatella magnifica (a gelatinous blob) can be up to several feet in diameter large and under favorable conditions it exhibits an extreme growth rate. Recently European countries around rivers of Elbe, Oder, Danube, Rhine and Vltava have confirmed invasion of Pectinatella magnifica, including freshwater reservoirs in South Bohemia (Czech Republic). Our project (Czech Science Foundation, GAČR P503/12/0337) is focused onto biology and chemistry of Pectinatella magnifica. We monitor the organism occurrence in selected South Bohemia ponds and sandpits during the last years, collecting information about physical properties of surrounding water, and sampling the colonies for various analyses (classification, maps of secondary metabolites, toxicity tests). Because the gelatinous matrix is during the colony lifetime also a host for algae, bacteria and cyanobacteria (co-habitants), in this contribution, we also applied a high performance liquid chromatography (HPLC) method for determination of potentially present cyanobacterial toxins (microcystin-LR, microcystin-RR, nodularin). Results from the last 3-year monitoring show that these toxins are under limit of detection (LOD), so that they do not represent a danger yet. The final goal of our study is to assess toxicity risks related to fresh water resources invaded by Pectinatella magnifica, and to understand the process of invasion, which can enable to control it.

Keywords: cyanobacteria, fresh water resources, Pectinatella magnifica invasion, toxicity monitoring

Procedia PDF Downloads 213
722 Component Level Flood Vulnerability Framework for the United Kingdom

Authors: Mohammad Shoraka, Francesco Preti, Karen Angeles, Raulina Wojtkiewicz, Karthik Ramanathan

Abstract:

Catastrophe modeling has evolved significantly over the last four decades. Verisk introduced its pioneering comprehensive inland flood model tailored for the U.K. in 2008. Over the course of the last 15 years, Verisk has built a suite of physically driven flood models for several countries and regions across the globe. This paper aims to spotlight a selection of these advancements tailored to the development of vulnerability estimation, which forms an integral part of a forthcoming update to Verisk’s U.K. inland flood model. Vulnerability functions are critical to evaluating and robust modeling flood-induced damage to buildings and contents. The subsequent damage assessments then allow for direct quantification of losses for entire building portfolios. Notably, today’s flood loss models more often prioritize enhanced development of hazard characterization, while vulnerability functions often lack sufficient granularity for a robust assessment. This study proposes a novel, engineering-driven, physically based component-level flood vulnerability framework for the U.K. Various aspects of the framework, including component classification and comprehensive cost analysis, meticulously tailored to capture the distinct building characteristics unique to the U.K., will be discussed. This analysis will elucidate how the cost distribution across individual components contributes to translating component-level damage functions into building-level damage functions. Furthermore, a succinct overview of essential datasets employed to gauge building regional vulnerability will be highlighted.

Keywords: catastrophe modeling, inland flood, vulnerability, cost analysis

Procedia PDF Downloads 42
721 The Technophobia among Older Adults in China

Authors: Erhong Sun, Xuchun Ye

Abstract:

Technophobia, namely the fear or dislike of modern advanced technologies, plays a central role in age-related digital divides and is considered a new risk factor for older adults, which can affect the daily lives of people through low adherence to digital living. Indeed, there is considerable heterogeneity in the group of older adults who feel technophobia. Therefore, the aim of this study was to identify different technophobia typologies of older people and to examine their associations with the subjective age factor. A sample of 704 retired elderly over the age of 55 was recruited in China. Technophobia and subjective age were assessed with a questionnaire, respectively. Latent profile analysis was used to identify technophobia subgroups, using three dimensions including techno-anxiety, techno-paranoia, and privacy concerns as indicators. The association between the identified technophobia subgroups and subjective age was explored. In summary, four different technophobia typologies were identified among older adults in China. Combined with an investigation of personal background characteristics and subjective age, it draws a more nuanced image of the technophobia phenome among older adults in China. First, not all older adults suffer from technophobia, with about half of the elderly subjects belonging to the profiles of “Low-technophobia” and “Medium-technophobia.” Second, privacy concern plays an important role in the classification of technophobia among older adults. Third, subjective age might be a protective factor for technophobia in older adults. Although the causal direction between identified technophobia typologies and subjective age remains uncertain, our suggests that future interventions should better focus on subjective age by breaking the age stereotype of technology to reduce the negative effect of technophobia on older. Future development of this research will involve extensive investigation of the detailed impact of technophobia in senior populations, measurement of the negative outcomes, as well as formulation of innovative educational and clinical pathways.

Keywords: technophobia, older adults, latent profile analysis, subjective age

Procedia PDF Downloads 48
720 Comparison of Mini-BESTest versus Berg Balance Scale to Evaluate Balance Disorders in Parkinson's Disease

Authors: R. Harihara Prakash, Shweta R. Parikh, Sangna S. Sheth

Abstract:

The purpose of this study was to explore the usefulness of the Mini-BESTest compared to the Berg Balance Scale in evaluating balance in people with Parkinson's Disease (PD) of varying severity. Evaluation were done to obtain (1) the distribution of patients scores to look for ceiling effects, (2) concurrent validity with severity of disease, and (3) the sensitivity & specificity of separating people with or without postural response deficits. Methods and Material: Seventy-seven(77) people with Parkinson's Disease were tested for balance deficits using the Berg Balance Scale, Mini-BESTest. Unified Parkinson’s Disease Rating Scale (UPDRS) III and the Hoehn & Yahr (H&Y) disease severity scales were used for classification. Materials used in this study were case record sheet, chair without arm rests or wheels, Incline ramp, stopwatch, a box, 3 meter distance measured out and marked on the floor with tape [from chair]. Statistical analysis used: Multiple Linear regression was carried out of UPDRS jointly on the two scores for the Berg and Mini-BESTest. Receiver operating characteristic curves for classifying people into two groups based on a threshold for the H&Y score, to discriminate between mild PD versus more severe PD.Correlation co-efficient to find relativeness between the two variables. Results: The Mini-BESTest is highly correlated with the Berg (r = 0.732,P < 0.001), but avoids the ceiling compression effect of the Berg for mild PD (skewness −0.714 Berg, −0.512 Mini-BESTest). Consequently, the Mini-BESTest is more effective than the Berg for predicting UPDRS Motor score (P < 0.001 Mini-BESTest versus P = 0.72 Berg), and for discriminating between those with and without postural response deficits as measured by the H&Y (ROC).

Keywords: balance, berg balance scale, MINI BESTest, parkinson's disease

Procedia PDF Downloads 367
719 Visual, Zoological Metaphors and 'Urtiin Duu' (Long Song) in Alshaa, Inner Mongolia

Authors: Oyuna Weina

Abstract:

This study examines how musicians use visual and zoological metaphors for singing technique and voice quality in a genre of traditional music called urtiin duu (‘long song’) in Alshaa, Inner Mongolia, China. Previous studies have discussed melodic contour in Mongol music, but little study of the intersection of singing technique, visual and zoological metaphors has yet been undertaken. The purpose of this study is to address this lack by analysing urtiin duu itself, traditional pedagogy and performances, all of which have been inspired and are assessed by reference to nature and mobile pastoral herding practices. This study investigates the visual and zoological metaphors related to urtiin duu especially colour, the shape of the circle and animals in the Mongol community. Urtiin duu singing is associated with certain colours in song texts, in selection of repertoire and in the status of singers. Musicians also use colour to describe timbre. These colours in turn reference worship of nature, religions, and daily practices of most Mongols in Alshaa. Moreover, voice quality and singing technique are often related to the animals not only in song text but also in the approach to breathing and to melodic contour. Additionally, the concept of boronhoi (‘the shape of circle’), not only is applied to the melodic contour but also to the voice quality and singing technique. These three factors illustrate the connections among nature, spiritual world and everyday herding life of Mongols. These different connections provide evidence of multi-layered meanings. In contemporary Alshaa, urtiin duu singers received Western musical training from the city and returned to their homelands to perform urtiin duu. In doing so, they are also trying to reconnect with the history, nature and spiritual world in order to achieve their ideal sound. Within a multicultural society, singers negotiate amongst themselves, and with ethnic groups, audiences and government officials. The power of the metaphor therefore assists and reconnects the strength of regional identity and ethnic identity in Alshaa.

Keywords: Alshaa, urtiin duu, visual, zoological metaphors

Procedia PDF Downloads 334
718 Justice and the Juvenile: Changing Trends and Developments

Authors: Shikhar Shrivastava, Varun Khare

Abstract:

Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.

Keywords: juvenile, justice system, retributive, rehabilitative, delinquency

Procedia PDF Downloads 436
717 Analysis of Vibration of Thin-Walled Parts During Milling Made of EN AW-7075 Alloy

Authors: Jakub Czyżycki, Paweł Twardowski

Abstract:

Thin-walled components made of aluminum alloys are increasingly found in many fields of industry, and they dominate the aerospace industry. The machining of thinwalled structures encounters many difficulties related to the high susceptibility of the workpiece, which causes vibrations including the most unfavorable ones called chatter. The effect of these phenomena is the difficulty in obtaining the required geometric dimensions and surface quality. The purpose of this study is to analyze vibrations arising during machining of thin-walled workpieces made of aluminum alloy EN AW-7075. Samples representing actual thin-walled workpieces were examined in a different range of dimensions characterizing thin-walled workpieces. The tests were carried out in HSM high-speed machining (cutting speed vc = 1400 m/min) using a monolithic solid carbide endmill. Measurement of vibration was realized using a singlecomponent piezoelectric accelerometer 4508C from Brüel&Kjær which was mounted directly on the sample before machining, the measurement was made in the normal feed direction AfN. In addition, the natural frequency of the tested thin-walled components was investigated using a laser vibrometer for an broader analysis of the tested samples. The effect of vibrations on machining accuracy was presented in the form of surface images taken with an optical measuring device from Alicona. A classification of the vibrations produced during the test was carried out, and were analyzed in both the time and frequency domains. Observed significant influence of the thickness of the thin-walled component on the course of vibrations during machining.

Keywords: high-speed machining, thin-walled elements, thin-walled components, milling, vibrations

Procedia PDF Downloads 19
716 Self-Organizing Maps for Credit Card Fraud Detection and Visualization

Authors: Peng, Chun-Yi, Chen, Wei-Hsuan, Ueng, Shyh-Kuang

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 25
715 Robustness of the Deep Chroma Extractor and Locally-Normalized Quarter Tone Filters in Automatic Chord Estimation under Reverberant Conditions

Authors: Luis Alvarado, Victor Poblete, Isaac Gonzalez, Yetzabeth Gonzalez

Abstract:

In MIREX 2016 (http://www.music-ir.org/mirex), the deep neural network (DNN)-Deep Chroma Extractor, proposed by Korzeniowski and Wiedmer, reached the highest score in an audio chord recognition task. In the present paper, this tool is assessed under acoustic reverberant environments and distinct source-microphone distances. The evaluation dataset comprises The Beatles and Queen datasets. These datasets are sequentially re-recorded with a single microphone in a real reverberant chamber at four reverberation times (0 -anechoic-, 1, 2, and 3 s, approximately), as well as four source-microphone distances (32, 64, 128, and 256 cm). It is expected that the performance of the trained DNN will dramatically decrease under these acoustic conditions with signals degraded by room reverberation and distance to the source. Recently, the effect of the bio-inspired Locally-Normalized Cepstral Coefficients (LNCC), has been assessed in a text independent speaker verification task using speech signals degraded by additive noise at different signal-to-noise ratios with variations of recording distance, and it has also been assessed under reverberant conditions with variations of recording distance. LNCC showed a performance so high as the state-of-the-art Mel Frequency Cepstral Coefficient filters. Based on these results, this paper proposes a variation of locally-normalized triangular filters called Locally-Normalized Quarter Tone (LNQT) filters. By using the LNQT spectrogram, robustness improvements of the trained Deep Chroma Extractor are expected, compared with classical triangular filters, and thus compensating the music signal degradation improving the accuracy of the chord recognition system.

Keywords: chord recognition, deep neural networks, feature extraction, music information retrieval

Procedia PDF Downloads 201
714 Monitoring Urban Green Space Cover Change Using GIS and Remote Sensing in Two Rapidly Urbanizing Cities, Debre Berhan and Debre Markos, Ethiopia

Authors: Alemaw Kefale, Aramde Fetene, Hayal Desta

Abstract:

Monitoring the amount of green space in urban areas is important for ensuring sustainable development and proper management. The study analyzed changes in urban green space coverage over the past 20 years in two rapidly urbanizing cities in Ethiopia, Debre Berhan and Debre Markos, using GIS and remote sensing. The researchers used Landsat 5 and 8 data with a spatial resolution of 30 m to determine different land use and land cover classes, including urban green spaces, barren and croplands, built-up areas, and water bodies. The classification accuracy ranged between 90% and 91.4%, with a Kappa Statistic of 0.85 to 0.88. The results showed that both cities experienced significant decreases in vegetation cover in their urban cores between 2000 and 2020, with radical changes observed from green spaces and croplands to built-up areas. In Debre Berhan, barren and croplands decreased by 32.96%, while built-up and green spaces increased by 357.9% and 37.4%, respectively, in 2020. In Debre Markos, built-up areas increased by 224.2%, while green spaces and barren and croplands decreased by 41% and 5.71%, respectively. The spatial structure of cities and planning policies were noticed as the major factors for big green cover change. Thus it has an implication for other rapidly urbanized cities in Africa and Asia. Overall, rapid urbanization threatens green spaces and agricultural areas, highlighting the need for ecological-based spatial planning in rapidly urbanizing cities.

Keywords: green space coverage, GIS and remote sensing, Landsat, LULC, Ethiopia

Procedia PDF Downloads 36
713 The Intersection of Disability, Race and Gender in Keah Brown's 'The Pretty One: A Discrit and Black Feminist Disability Perspective

Authors: Mehena Fedoul

Abstract:

This paper examines the intersection of race, gender, and disability through a Critical disability race theory and black feminist disability perspective in Keah Brown's memoir, "The Pretty One." The background of the study highlights the significance of intersectionality in understanding the multifaceted experiences of individuals who navigate multiple marginalized identities. The study contributes to the underrepresented field of disability studies from Critical race and black feminist perspectives, shedding light on the unique challenges and resilience of black disabled women. The study employs a qualitative analysis of Keah Brown's memoir as a primary text. Drawing on intersectionality theory and black feminist disability scholarship, the analysis focuses on how Brown's memoir illuminates the ways in which her race, gender, and disability intersect and shape her lived experiences. The analysis reveals how Brown's memoir challenges traditional notions of disability, beauty, and empowerment through the unapologetic celebration of her blackness, femaleness, and disability. The major findings of the study indicate that Brown's memoir provides a powerful narrative of the complexity, uniqueness and richness of the lived experiences of black disabled women. It demonstrates how the intersectionality of race, gender, and disability shapes Brown's identity, body image, relationships, and societal interactions. The paper also highlights how Brown's memoir emphasizes the importance of inclusivity and intersectionality in understanding and addressing the challenges faced by black disabled women. In conclusion, this study offers a critical analysis of the intersection of race, gender, and disability in Keah Brown's memoir, "The Pretty One," from a black feminist disability perspective. It contributes to the growing body of literature that recognizes the significance of intersectionality in understanding the experiences of marginalized individuals in the disability community. The study underscores the need for more inclusive and intersectional perspectives in disability studies and advocates for greater recognition of the voices and experiences of black disabled women in academic and societal discourse.

Keywords: disability studies, intersectionality, black feminism, Keah Brown

Procedia PDF Downloads 73
712 Contextual SenSe Model: Word Sense Disambiguation using Sense and Sense Value of Context Surrounding the Target

Authors: Vishal Raj, Noorhan Abbas

Abstract:

Ambiguity in NLP (Natural language processing) refers to the ability of a word, phrase, sentence, or text to have multiple meanings. This results in various kinds of ambiguities such as lexical, syntactic, semantic, anaphoric and referential am-biguities. This study is focused mainly on solving the issue of Lexical ambiguity. Word Sense Disambiguation (WSD) is an NLP technique that aims to resolve lexical ambiguity by determining the correct meaning of a word within a given context. Most WSD solutions rely on words for training and testing, but we have used lemma and Part of Speech (POS) tokens of words for training and testing. Lemma adds generality and POS adds properties of word into token. We have designed a novel method to create an affinity matrix to calculate the affinity be-tween any pair of lemma_POS (a token where lemma and POS of word are joined by underscore) of given training set. Additionally, we have devised an al-gorithm to create the sense clusters of tokens using affinity matrix under hierar-chy of POS of lemma. Furthermore, three different mechanisms to predict the sense of target word using the affinity/similarity value are devised. Each contex-tual token contributes to the sense of target word with some value and whichever sense gets higher value becomes the sense of target word. So, contextual tokens play a key role in creating sense clusters and predicting the sense of target word, hence, the model is named Contextual SenSe Model (CSM). CSM exhibits a noteworthy simplicity and explication lucidity in contrast to contemporary deep learning models characterized by intricacy, time-intensive processes, and chal-lenging explication. CSM is trained on SemCor training data and evaluated on SemEval test dataset. The results indicate that despite the naivety of the method, it achieves promising results when compared to the Most Frequent Sense (MFS) model.

Keywords: word sense disambiguation (wsd), contextual sense model (csm), most frequent sense (mfs), part of speech (pos), natural language processing (nlp), oov (out of vocabulary), lemma_pos (a token where lemma and pos of word are joined by underscore), information retrieval (ir), machine translation (mt)

Procedia PDF Downloads 72
711 Contribution of Spatial Teledetection to the Geological Mapping of the Imiter Buttonhole: Application to the Mineralized Structures of the Principal Corps B3 (CPB3) of the Imiter Mine (Anti-atlas, Morocco)

Authors: Bouayachi Ali, Alikouss Saida, Baroudi Zouhir, Zerhouni Youssef, Zouhair Mohammed, El Idrissi Assia, Essalhi Mourad

Abstract:

The world-class Imiter silver deposit is located on the northern flank of the Precambrian Imiter buttonhole. This deposit is formed by epithermal veins hosted in the sandstone-pelite formations of the lower complex and in the basic conglomerates of the upper complex, these veins are controlled by a regional scale fault cluster, oriented N70°E to N90°E. The present work on the contribution of remote sensing on the geological mapping of the Imiter buttonhole and application to the mineralized structures of the Principal Corps B3. Mapping on satellite images is a very important tool in mineral prospecting. It allows the localization of the zones of interest in order to orientate the field missions by helping the localization of the major structures which facilitates the interpretation, the programming and the orientation of the mining works. The predictive map also allows for the correction of field mapping work, especially the direction and dimensions of structures such as dykes, corridors or scrapings. The use of a series of processing such as SAM, PCA, MNF and unsupervised and supervised classification on a Landsat 8 satellite image of the study area allowed us to highlight the main facies of the Imite area. To improve the exploration research, we used another processing that allows to realize a spatial distribution of the alteration mineral indices, and the application of several filters on the different bands to have lineament maps.

Keywords: principal corps B3, teledetection, Landsat 8, Imiter II, silver mineralization, lineaments

Procedia PDF Downloads 71