Search results for: distributed algorithms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3850

Search results for: distributed algorithms

1330 Vision-Based Daily Routine Recognition for Healthcare with Transfer Learning

Authors: Bruce X. B. Yu, Yan Liu, Keith C. C. Chan

Abstract:

We propose to record Activities of Daily Living (ADLs) of elderly people using a vision-based system so as to provide better assistive and personalization technologies. Current ADL-related research is based on data collected with help from non-elderly subjects in laboratory environments and the activities performed are predetermined for the sole purpose of data collection. To obtain more realistic datasets for the application, we recorded ADLs for the elderly with data collected from real-world environment involving real elderly subjects. Motivated by the need to collect data for more effective research related to elderly care, we chose to collect data in the room of an elderly person. Specifically, we installed Kinect, a vision-based sensor on the ceiling, to capture the activities that the elderly subject performs in the morning every day. Based on the data, we identified 12 morning activities that the elderly person performs daily. To recognize these activities, we created a HARELCARE framework to investigate into the effectiveness of existing Human Activity Recognition (HAR) algorithms and propose the use of a transfer learning algorithm for HAR. We compared the performance, in terms of accuracy, and training progress. Although the collected dataset is relatively small, the proposed algorithm has a good potential to be applied to all daily routine activities for healthcare purposes such as evidence-based diagnosis and treatment.

Keywords: daily activity recognition, healthcare, IoT sensors, transfer learning

Procedia PDF Downloads 113
1329 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 96
1328 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 196
1327 Notions of Social Justice and Educational Globalization: Evaluations of Israeli Teachers and Students across Sectors

Authors: Clara Sabbagh, Nura Resh

Abstract:

The study delves into students’ and teachers’ notions of social justice (social justice judgments or SJJ), examining how they are shaped by both educational globalization and local (nation-state) conditions. Using the Israeli school setting as a case study, we discuss the status of hegemonic Zionism and two influential perspectives of educational globalization – world culture and the post-colonial critique of neo-liberalism – and derive competing hypotheses about the notions of social justice embedded in them. Against this background, we investigate how SJJ are affected by generation – Israeli teachers and students – and by educational sectors that mirror the society’s major divide: Jewish and Israeli Arab. In order to examine these issues, we used a representative sample of 2000 Israeli students, as well as a sample of 800 social studies teachers. We applied MANOVA repeated-measure for examining to what extent SSJ are dependent upon the type of resource that is distributed (repeated measures) and generational (teachers vs students) and sectorial (Jewish vs. Arab) group variables. As expected, findings revealed that the local context does matter. In other words, rather than being consistent with any of the three perspectives above, findings suggest that respondents elaborate the intersection between global and local traditions by creating various forms of mingled notions of social justice. In other words, Israeli (Jewish and Arab) teachers and students can be conceived as agents who play an important role in recreating national heritages and who differently interpret the ways educational globalization impacts their lives.

Keywords: educational globalization, social justice, teachers, Israel, Arab

Procedia PDF Downloads 208
1326 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 29
1325 Impact of Television on the Coverage of Lassa Fever Disease in Nigeria

Authors: H. Shola Adeosun, F. Ajoke Adebiyi

Abstract:

This study appraises the impact of television on the coverage of Lassa Fever disease. The objectives of the study are to find out whether television is an effective tool for raising awareness about Lassa fever shapes the perception of members of the public. The research work was based on the theoretical foundation of Agenda – setting and reinforcement theory. Survey research method was adopted in the study to elicit data from the residents of Obafemi Owode Local Government, area of Ogun state. Questionnaire and oral interview were adopted as a tool for data gathering. Simple random sampling techniques were used to draw a sample for this study. Out of filled 400 questionnaires distributed to the respondents. 37 of them were incorrectly filled and returned at the stipulated time. This is about (92.5% Tables, percentages, and figures were used to analyse and interpret the data and hypothesis formulation for this study revealed that Lassa fever diseases with higher media coverage were considered more serious and more representative of a disease and estimated to have lower incidents, than diseases less frequently found in the media. Thus, 92% of the respondents agree that they have access to television coverage of Lassa fever disease led to exaggerated perceptions of personal vulnerability. It, therefore, concludes that there is a need for relevant stakeholders to ensure better community health education and improved housing conditions in southwestern Nigeria, with an emphasis on slum areas and that Nigeria need to focus on the immediate response, while preparing for the future because a society or community is all about the people who inhabit. Therefore every effort must be geared towards their society and survival.

Keywords: impact, television, coverage, Lassa fever disease

Procedia PDF Downloads 195
1324 Using Interval Type-2 Fuzzy Controller for Diabetes Mellitus

Authors: Nafiseh Mollaei, Reihaneh Kardehi Moghaddam

Abstract:

In case of Diabetes Mellitus the controlling of insulin is very difficult. This illness is an incurable disease affecting millions of people worldwide. Glucose is a sugar which provides energy to the cells. Insulin is a hormone which supports the absorption of glucose. Fuzzy control strategy is attractive for glucose control because it mimics the first and second phase responses that the pancreas beta cells use to control glucose. We propose two control algorithms a type-1 fuzzy controller and an interval type-2 fuzzy method for the insulin infusion. The closed loop system has been simulated for different patients with different parameters, in present of the food intake disturbance and it has been shown that the blood glucose concentrations at a normoglycemic level of 110 mg/dl in the reasonable amount of time. This paper deals with type 1 diabetes as a nonlinear model, which has been simulated in MATLAB-SIMULINK environment. The novel model, termed the Augmented Minimal Model is used in the simulations. There are some uncertainties in this model due to factors such as blood glucose, daily meals or sudden stress. In addition to eliminate the effects of uncertainty, different control methods may be utilized. In this article, fuzzy controller performance were assessed in terms of its ability to track a normoglycemic set point (110 mg/dl) in response to a [0-10] g meal disturbance. Finally, the development reported in this paper is supposed to simplify the insulin delivery, so increasing the quality of life of the patient.

Keywords: interval type-2, fuzzy controller, minimal augmented model, uncertainty

Procedia PDF Downloads 407
1323 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications

Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna

Abstract:

A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.

Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band

Procedia PDF Downloads 112
1322 Phenotypic Characterization of Listeria Spp Isolated from Chicken Carcasses Marketed in Northeast of Iran

Authors: Abdollah Jamshidi, Tayebeh Zeinali, Mehrnaz Rad, Jamshid Razmyar

Abstract:

Listeria infections occur worldwide in variety of animals and man. Listeriae are widely distributed in nature. The organism has been isolated from the feces of humans and several animals, different soils, plants, aquatic environments and food of animal and vegetable origin. Listeria monocytogenes is recognized as important food-borne pathogens due to its high mortality rate. This organism is able to growth at refrigeration temperature, and high osmotic pressure. Poultry can become contaminated environmentally or through healthy carrier birds. In recent decades, prophylactic use of antimicrobial agents may be lead to emergence of antibiotic resistant organisms, which can be transmitted to human through consumption of contaminated foods. In this study, from 200 fresh chicken carcasses samples which were collected randomly from different supermarkets and butcheries, 80 samples were detected as contaminate with Listeria spp. and 19% of the isolates identified as Listeria monocytogene using multiplex PCR assay. Conventional methods were used to differentiate other species of the listeria genus. The results showed the most prevalent isolates as L. monocytogenes (48.75%). Other isolates were detected as Listeria innocua (28.75%), Listeria murrayi (20%), Listeria grayi (3.75%) and Listeria welshimeri (2.5%).The Majority of the isolates had multidrug resistance to commonly used antibiotics. Most of them were resistant to erythromycin (50%), followed by Tetracycline (44.44%), Clindamycin (41.66%), and Trimethoprim (25%). Some of them showed resistance to chloramphenicol (17.65%). The results indicate the resistance of the isolates to antimicrobials commonly used to treat human listeriosis, which could be a potential health hazard for consumers.

Keywords: listeria species, L. monocytogenes, antibiotic resistance, chicken carcass

Procedia PDF Downloads 359
1321 A Palmprint Identification System Based Multi-Layer Perceptron

Authors: David P. Tantua, Abdulkader Helwan

Abstract:

Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.

Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator

Procedia PDF Downloads 345
1320 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 207
1319 Grey Wolf Optimization Technique for Predictive Analysis of Products in E-Commerce: An Adaptive Approach

Authors: Shital Suresh Borse, Vijayalaxmi Kadroli

Abstract:

E-commerce industries nowadays implement the latest AI, ML Techniques to improve their own performance and prediction accuracy. This helps to gain a huge profit from the online market. Ant Colony Optimization, Genetic algorithm, Particle Swarm Optimization, Neural Network & GWO help many e-commerce industries for up-gradation of their predictive performance. These algorithms are providing optimum results in various applications, such as stock price prediction, prediction of drug-target interaction & user ratings of similar products in e-commerce sites, etc. In this study, customer reviews will play an important role in prediction analysis. People showing much interest in buying a lot of services& products suggested by other customers. This ultimately increases net profit. In this work, a convolution neural network (CNN) is proposed which further is useful to optimize the prediction accuracy of an e-commerce website. This method shows that CNN is used to optimize hyperparameters of GWO algorithm using an appropriate coding scheme. Accurate model results are verified by comparing them to PSO results whose hyperparameters have been optimized by CNN in Amazon's customer review dataset. Here, experimental outcome proves that this proposed system using the GWO algorithm achieves superior execution in terms of accuracy, precision, recovery, etc. in prediction analysis compared to the existing systems.

Keywords: prediction analysis, e-commerce, machine learning, grey wolf optimization, particle swarm optimization, CNN

Procedia PDF Downloads 90
1318 Foreign Investment, Technological Diffusion and Competiveness of Exports: A Case for Textile Industry in Pakistan

Authors: Syed Toqueer Akhter, Muhammad Awais

Abstract:

Pakistan is a country which is gifted by naturally abundant resources these resources are a pioneer towards a prospect and developed country. Pakistan is the fourth largest exporter of the textile in the world and with the passage of time the competitiveness of these exports is subject to a decline. With a lot of International players in the textile world like China, Bangladesh, India, and Sri Lanka, Pakistan needs to put up a lot of effort to compete with these countries. This research paper would determine the impact of Foreign Direct Investment upon technological diffusion and that how significantly it may be affecting on export performance of the country. It would also demonstrate that with the increase in Foreign Direct Investment, technological diffusion, strong property rights, and using different policy tools, export competitiveness of the country could be improved. The research has been carried out using time series data from 1995 to 2013 and the results have been estimated by using competing Econometrics modes such as Robust regression and Generalized least squares so that to consolidate the impact of the Foreign Investments and Technological diffusion upon export competitiveness comprehensively. Distributed Lag model has also been used to encompass the lagged effect of policy tools variables used by the government. Model estimates entail that 'FDI' and 'Technological Diffusion' do have a significant impact on the competitiveness of the exports of Pakistan. It may also be inferred that competitiveness of Textile Sector requires integrated policy framework, primarily including the reduction in interest rates, providing subsides, and manufacturing of value added products.

Keywords: high technology export, robust regression, patents, technological diffusion, export competitiveness

Procedia PDF Downloads 479
1317 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 185
1316 The Perceptions of Students in Tourism and Hospitality in Relation to the Pursuit of Higher Degrees: A Case of Walter Sisulu University

Authors: Adelaide Rethabile Motshabi Pitso-Mbili

Abstract:

Higher education institutions (HEIs) are under pressure in producing PhD graduates so that they can position themselves higher in terms of rankings. However, hospitality and tourism higher degree enrolment numbers are very low within South African universities. Furthermore, hospitality and tourism students choose these fields of study because they want to travel, be social, and have fun. Students in higher education are anxious about their future after studies as they are particularly worried about the job conditions in the hospitality and tourism sector, the remuneration, and the status perceptions of many jobs in the sector. Hence, there is a need for a continuous increase in the level of education with the formation of professional aptitudes and personnel quality. In order to understand the reasons for low enrolments, this study aims to explore the perceptions of the final year in tourism and hospitality diploma students towards enrolling for higher degree qualifications after their graduation. This paper utilised a quantitative research method, and data was gathered through questionnaires. In addition, the Linkert scale design was used for questionnaires. The questionnaires were distributed to 137 hospitality and tourism students who are on their exit level at Walter Sisulu University. SPSS was used to analyse data. The findings revealed that students do not wish to continue studying for higher degrees as they believe higher degrees are not important for the industry. Furthermore, families already have financial expectations as they think one qualification is enough. In addition, some students mentioned that they would love to study further, but lack of funding is a problem since NSFAS only funds the first qualification. Thus, it is recommended that students are made aware of the benefits and opportunities available after obtaining higher degrees.

Keywords: hospitality and tourism education, higher degrees, higher education, student’s perceptions, hospitality and tourism sector

Procedia PDF Downloads 91
1315 Modelling Exchange-Rate Pass-Through: A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries

Authors: Fajana Sola Isaac

Abstract:

In the last two decades, we have witnessed an increased interest in exchange rate pass-through (ERPT) in developing economies and emerging markets. This is perhaps due to the acknowledged significance of the pattern of exchange rate pass-through as a key instrument in monetary policy design, principally in retort to a shock in exchange rate in literature. This paper analyzed Exchange Rate Pass-Through by A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries. The study adopted A Non-Linear Autoregressive Distributed Lag approach using yearly data on Algeria, Burundi, Nigeria and South Africa from 1986 to 2022. The paper found asymmetry in exchange rate pass-through in net oil-importing and net oil-exporting countries in the short run during the period under review. An ERPT exhibited a complete pass-through in the short run in the case of net oil-importing countries but an incomplete pass-through in the case of the net oil-exporting countries that were examined. An extended result revealed a significant impact of oil price shock on exchange rate pass-through to domestic price in the long run only for net oil importing countries. The Wald restriction test also confirms the evidence of asymmetric with the role of oil price acting as an accelerator to exchange rate pass-through to domestic price in the countries examined. The study found the outcome to be very useful for gaining expansive knowledge on the external shock impact on ERPT and could be of critical value for national monetary policy decisions on inflation targeting, especially for countries examined and other developing net oil importers and exporters.

Keywords: pass through, exchange rate, ARDL, monetary policy

Procedia PDF Downloads 50
1314 Self-Determination among Individuals with Intellectual Disability: An Experiment

Authors: Wasim Ahmad, Bir Singh Chavan, Nazli Ahmad

Abstract:

Objectives: The present investigation is an attempt to find out the efficacy of training the special educators on promoting self-determination among individuals with intellectual disability. Methods: The study equipped the special educators with necessary skills and knowledge to train individuals with the intellectual disability for practicing self-determination. Subjects: Special educators (N=25) were selected for training on self-determination among individuals with intellectual disability. After receiving the training, (N=50) individuals with an intellectual disability were selected and intervened by the trained special educators. Tool: Self-Determination Scale for Adults with Mild Mental Retardation (SDSAMR) developed by Keshwal and Thressiakutty (2010) has been used. It’s a reliable and valid tool used by many researchers. It has 36 items distributed in five domains namely: personal management, community participation, recreation and leisure time, choice making and problem solving. Analysis: The collected data was analyzed using the statistical techniques such as t-test, ANCOVA, and Posthoc Tuckey test. Results: The findings of the study reveal that there is a significant difference at 1% level in the pre and post tests mean scores (t-15.56) of self-determination concepts among the special educators. This indicates that the training enhanced the performance of special educators on the concept of self-determination among individuals with intellectual disability. The study also reveals that the training received on transition planning by the special educators found to be effective because they were able to practice the concept by imparting and training the individuals with intellectual disability to if determined. The results show that there was a significant difference at 1% level in the pre and post tests mean scores (t-16.61) of self-determination among individuals with intellectual disability. Conclusion: To conclude it can be said that the training has a remarkable impact on the performance of the individuals with intellectual disability on self-determination.

Keywords: experiment, individuals with intellectual disability, self-determination, special educators

Procedia PDF Downloads 309
1313 Augmentation of Conventional Medicine for Post-concussion Syndrome with Cognitive Behavioral Therapy Accelerates Symptomatic Relief in Affected Individuals

Authors: Waqas Mehdi, Muhammad Umar Hassan, Khadeeja Mustafa

Abstract:

Objective: Post-concussion syndrome (PCS) is a medical term used to point out the complicated combination of physical, emotional, cognitive and behavioral signs and symptoms associated with Mild Traumatic Brain Injury(mTBI). This study was conducted to assess the improvement or debilitating effect of behavioral therapy in addition to the conventional treatment and to document these results for increasing the efficiency of treatment provided to such cases. Method: This was primarily an interventional prospective cohort study which was conducted in the Department of Neurosurgery, Mayo Hospital Lahore. The sample size was 200 patients who were randomly distributed into two groups. The interventional group with Cognitive behavioral therapy was added in addition to the conventional treatment regimen and the Control group receiving only conventional treatment. Results were noted initially as well as after two weeks of the follow-up period. Data were subsequently analyzed by Statistical Package for Social Sciences (SPSS) software and associations worked out. Result and conclusion: Among the patients that were given therapy sessions along with conventional medicine, there was a significant improvement in the symptoms and their overall quality of life. It is also important to notice that the time period taken for these effects to wane is cut down by psychiatric solutions too. So we can conclude that CBT sessions not only speed up recovery in patients with post-concussion syndrome they also aid in the efficiency improvement in functional capability and quality of life.

Keywords: neurosurgery, CBT, PCS, mTBI

Procedia PDF Downloads 139
1312 Magneto-Thermo-Mechanical Analysis of Electromagnetic Devices Using the Finite Element Method

Authors: Michael G. Pantelyat

Abstract:

Fundamental basics of pure and applied research in the area of magneto-thermo-mechanical numerical analysis and design of innovative electromagnetic devices (modern induction heaters, novel thermoelastic actuators, rotating electrical machines, induction cookers, electrophysical devices) are elaborated. Thus, mathematical models of magneto-thermo-mechanical processes in electromagnetic devices taking into account main interactions of interrelated phenomena are developed. In addition, graphical representation of coupled (multiphysics) phenomena under consideration is proposed. Besides, numerical techniques for nonlinear problems solution are developed. On this base, effective numerical algorithms for solution of actual problems of practical interest are proposed, validated and implemented in applied 2D and 3D computer codes developed. Many applied problems of practical interest regarding modern electrical engineering devices are numerically solved. Investigations of the influences of various interrelated physical phenomena (temperature dependences of material properties, thermal radiation, conditions of convective heat transfer, contact phenomena, etc.) on the accuracy of the electromagnetic, thermal and structural analyses are conducted. Important practical recommendations on the choice of rational structures, materials and operation modes of electromagnetic devices under consideration are proposed and implemented in industry.

Keywords: electromagnetic devices, multiphysics, numerical analysis, simulation and design

Procedia PDF Downloads 366
1311 Mapping Environmental Complexity: A Strategic Tool for Sustainable Development of Road Infrastructure in Santa Catarina, Brazil

Authors: Edinei Coser, Cátia Regina Silva de Carvalho Pinto, Kleber Isaac Silva de Souza

Abstract:

The road transportation system is an integral part of the Brazilian economy, so investing in this sector is paramount. Despite being a significant contributor to national and regional development, implementing road infrastructures brings about significant environmental changes, resulting in negative impacts that need to be mitigated through environmental licensing. However, by considering potential environmental impacts from a strategic perspective earlier, we can ensure that the sustainable development resulting from investments in this sector is more efficient. Therefore, this work aims to incorporate strategic environmental assessment into the road transportation system in the state of Santa Catarina using a tool that evaluates the entire territory. This tool analyzes 15 qualitative socio-environmental factors that may complicate environmental licensing and project implementation, with the help of multi-criteria analysis based on AHP and geographic information systems with Python, which presents a surface map of environmental cost for Santa Catarina state in Brazil. This map represents how environmental restrictions are spatially distributed in the territory and can be used for governments and decision-makers to assess potential areas for road implementation or paving, evaluate and propose road corridors, propose, promote, and evaluate risks for governmental programs and investments, set environmental management guidelines and enhance contracting and environmental assessment processes.

Keywords: environmental impact assessment., GIS, highways, multi-criteria analysis, strategic environmental assessment

Procedia PDF Downloads 32
1310 Mobile Augmented Reality for Collaboration in Operation

Authors: Chong-Yang Qiao

Abstract:

Mobile augmented reality (MAR) tracking targets from the surroundings and aids operators for interactive data and procedures visualization, potential equipment and system understandably. Operators remotely communicate and coordinate with each other for the continuous tasks, information and data exchange between control room and work-site. In the routine work, distributed control system (DCS) monitoring and work-site manipulation require operators interact in real-time manners. The critical question is the improvement of user experience in cooperative works through applying Augmented Reality in the traditional industrial field. The purpose of this exploratory study is to find the cognitive model for the multiple task performance by MAR. In particular, the focus will be on the comparison between different tasks and environment factors which influence information processing. Three experiments use interface and interaction design, the content of start-up, maintenance and stop embedded in the mobile application. With the evaluation criteria of time demands and human errors, and analysis of the mental process and the behavior action during the multiple tasks, heuristic evaluation was used to find the operators performance with different situation factors, and record the information processing in recognition, interpretation, judgment and reasoning. The research will find the functional properties of MAR and constrain the development of the cognitive model. Conclusions can be drawn that suggest MAR is easy to use and useful for operators in the remote collaborative works.

Keywords: mobile augmented reality, remote collaboration, user experience, cognition model

Procedia PDF Downloads 177
1309 Symbolic Partial Differential Equations Analysis Using Mathematica

Authors: Davit Shahnazaryan, Diogo Gomes, Mher Safaryan

Abstract:

Many symbolic computations and manipulations required in the analysis of partial differential equations (PDE) or systems of PDEs are tedious and error-prone. These computations arise when determining conservation laws, entropies or integral identities, which are essential tools for the study of PDEs. Here, we discuss a new Mathematica package for the symbolic analysis of PDEs that automate multiple tasks, saving time and effort. Methodologies: During the research, we have used concepts of linear algebra and partial differential equations. We have been working on creating algorithms based on theoretical mathematics to find results mentioned below. Major Findings: Our package provides the following functionalities; finding symmetry group of different PDE systems, generation of polynomials invariant with respect to different symmetry groups; simplification of integral quantities by integration by parts and null Lagrangian cleaning, computing general forms of expressions by integration by parts; finding equivalent forms of an integral expression that are simpler or more symmetric form; determining necessary and sufficient conditions on the coefficients for the positivity of a given symbolic expression. Conclusion: Using this package, we can simplify integral identities, find conserved and dissipated quantities of time-dependent PDE or system of PDEs. Some examples in the theory of mean-field games and semiconductor equations are discussed.

Keywords: partial differential equations, symbolic computation, conserved and dissipated quantities, mathematica

Procedia PDF Downloads 139
1308 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J

Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa

Abstract:

A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.

Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index

Procedia PDF Downloads 109
1307 Studying of Relation between Agency Cost and Institutional Shareholders with Distributed Income

Authors: Ehsan Ghahramani Aghdam

Abstract:

The policy of dividends has been an interesting topic for a long time in financial literature. There are some studies about the policy of dividends, but a lot of them are in developed markets. It’s possible that there were differences between new and developed markets in some aspects. According to theoretical literature, agency costs and institutional stockholders affect on dividend payout ratio. In this research, free cash flow, collateralizable assets and dispersion of ownership are considered as agency cost factors that cause an interesting contrast between managers-stockholders and stockholders-credit makers. Generally, agency costs for managing the firm by manager or managers are created, and they appear when management is separated from ownership. The purpose of this research is to study the effect of free cash flow, collateralizable assets, dispersion of ownership and institutional stockholders on the dividend payout ratio of accepted firms in the Tehran Stock Exchange. 64 nonfinancial firms in the Tehran Stock Exchange were considered as samples of our experiment for the period of 2017-2022. Correlation and regression tests have been used to identify the relationship of dividend payout ratio with variables of agency costs and institutional stockholders. The results show that free cash flow and institutional stockholders in a positive way and dispersion of ownership in a negative way are related to the dividend payout ratio. But book value and cost of collateralizable assets have no influence on the dividend payout ratio.

Keywords: agency costs, institutional stockholders, free cash flow, dispersion of ownership, collateralizable assets, dividend payout ratio

Procedia PDF Downloads 7
1306 Seismic Activity and Groundwater Behavior at Kalabsha Area, Aswan, Egypt

Authors: S. M. Moustafa, A. Ezzat, Y. S. Taha, G. H. Hassib, S. Hamada

Abstract:

After the occurrence of 14, Nov, 1981 earthquake (M = 5.3), on Kalabska fault, south of Egypt, seismic stations distributed in and around the Kalabsha area, in order to monitoring, recording and studying the seismic activity in the area. In addition of that, from 1989 a number of piezometer wells drilled in the same area, distribed on at the both side of the active faults area and in different water bearing formations, in order to measuring the groundwater parameters (level, temperature, ph, and conductivity) to monitoring the relationship between those parameters and the seismic activity at Kalabsha area. The behavior of groundwater due to seismic activity over the world studied by several scientists i.e. H. Wakita (1979) on Izu-Oshima earthquake (M= 7.0) at Japan, M. E. Contadakis & G.asteriadis (1972), and Evans (1966), they found an anomalies on groundwater measurements prior, co, and post the occurrence of bigger earthquakes, referring to the probability of precursory evidence of impending earthquakes. In Kalabsha area south of Egypt, this study has been done using recorded seismic data, and the measurements of underground water parameters. same phenomena of anomalies founded on groundwater measurements pre, co. and post the occurrence of earthquakes with magnitude bigger than 3, and no systematic regularity exists for epicenter distance, duration of anomalies or time lag between anomalies appear and occurrence of events. Also the results found present strong relation between the groundwater in the upper unconfined aquifer Nubian Sandstone formation, and Kalabsha seismic activity, otherwise no relation between the seismic activities in the area with the deep groundwater in the lower confined aquifer Sandstone.

Keywords: seismicity, groundwater, Aswan, Egypt

Procedia PDF Downloads 356
1305 Optimal Design of Linear Generator to Recharge the Smartphone Battery

Authors: Jin Ho Kim, Yujeong Shin, Seong-Jin Cho, Dong-Jin Kim, U-Syn Ha

Abstract:

Due to the development of the information industry and technologies, cellular phones have must not only function to communicate, but also have functions such as the Internet, e-banking, entertainment, etc. These phones are called smartphones. The performance of smartphones has improved, because of the various functions of smartphones, and the capacity of the battery has been increased gradually. Recently, linear generators have been embedded in smartphones in order to recharge the smartphone's battery. In this study, optimization is performed and an array change of permanent magnets is examined in order to increase efficiency. We propose an optimal design using design of experiments (DOE) to maximize the generated induced voltage. The thickness of the poleshoe and permanent magnet (PM), the height of the poleshoe and PM, and the thickness of the coil are determined to be design variables. We made 25 sampling points using an orthogonal array according to four design variables. We performed electromagnetic finite element analysis to predict the generated induced voltage using the commercial electromagnetic analysis software ANSYS Maxwell. Then, we made an approximate model using the Kriging algorithm, and derived optimal values of the design variables using an evolutionary algorithm. The commercial optimization software PIAnO (Process Integration, Automation, and Optimization) was used with these algorithms. The result of the optimization shows that the generated induced voltage is improved.

Keywords: smartphone, linear generator, design of experiment, approximate model, optimal design

Procedia PDF Downloads 327
1304 Effect of Noise Reduction Algorithms on Temporal Splitting of Speech Signal to Improve Speech Perception for Binaural Hearing Aids

Authors: Rajani S. Pujar, Pandurangarao N. Kulkarni

Abstract:

Increased temporal masking affects the speech perception in persons with sensorineural hearing impairment especially under adverse listening conditions. This paper presents a cascaded scheme, which employs a noise reduction algorithm as well as temporal splitting of the speech signal. Earlier investigations have shown that by splitting the speech temporally and presenting alternate segments to the two ears help in reducing the effect of temporal masking. In this technique, the speech signal is processed by two fading functions, complementary to each other, and presented to left and right ears for binaural dichotic presentation. In the present study, half cosine signal is used as a fading function with crossover gain of 6 dB for the perceptual balance of loudness. Temporal splitting is combined with noise reduction algorithm to improve speech perception in the background noise. Two noise reduction schemes, namely spectral subtraction and Wiener filter are used. Listening tests were conducted on six normal-hearing subjects, with sensorineural loss simulated by adding broadband noise to the speech signal at different signal-to-noise ratios (∞, 3, 0, and -3 dB). Objective evaluation using PESQ was also carried out. The MOS score for VCV syllable /asha/ for SNR values of ∞, 3, 0, and -3 dB were 5, 4.46, 4.4 and 4.05 respectively, while the corresponding MOS scores for unprocessed speech were 5, 1.2, 0.9 and 0.65, indicating significant improvement in the perceived speech quality for the proposed scheme compared to the unprocessed speech.

Keywords: MOS, PESQ, spectral subtraction, temporal splitting, wiener filter

Procedia PDF Downloads 306
1303 Knowledge and Perceptions of Final-year Students towards Pharmacovigilance and Adverse Drug Reaction Reporting at the Faculty of Medical Sciences, Al-Razi University - Sana`a - Yemen

Authors: Nabil A. Albaser

Abstract:

Background: There is a serious problem with adverse drug reactions (ADRs) everywhere, including Yemen. Since it helps with the detection, assessment, reporting and prevention of ADRs, pharmacovigilance (PV) is an essential part of the healthcare system. The unbiased reporting of ADRs remains the foundation of PV. Students majoring in healthcare should acquire the knowledge and skills necessary to conduct PV in a range of clinical settings. The primary objective of this study was to evaluate the understanding and attitudes of final-year Pharmacy, Nursing, and Midwifery students at Al-Razi University in Sana'a, Yemen, regarding PV and ADRs reporting. Methods: The study followed descriptive cross-sectional approach. A validated, self-administered questionnaire with three parts—demographic information, knowledge, and perceptions of Pharmacovigilance was online distributed to final-year Pharmacy, Nursing, and Midwifery students. The questionnaire was given to 175 students; 122 of them responded with a percentage (69.7%). Results: The majority of respondents were male (79.5%). More than the tow-third of the students, 68.9%, were beyond the age of 23. Although the majority of students, 80%, heard about the terms of ADRs and PV, but only 50% and 57.4% of the respondents, respectively, could define the both terms correctly. However, only 11.48 % of them, nevertheless, took a PV course. More than a half of them (56.6%) had a positive perceptions towards pharmacovigilance and ADR reporting and had a moderate degree of knowledge (68.9%). Conclusion: The study demonstrated that the participants lacked sufficient knowledge of pharmacovigilance and ADR reporting. They showed a moderate level of understanding of reporting ADRs as well as a favorable opinion of dealing with and reporting ADRs. Yemen's health care curriculum should include lessons on pharmacovigilance.

Keywords: adverse drug reaction reporting, pharmacovigilance, yemen, knowlegde

Procedia PDF Downloads 88
1302 Undergraduates Learning Preferences: A Comparison of Science, Technology and Social Science Academic Disciplines in Relations to Teaching Designs and Strategies

Authors: Salina Budin, Shaira Ismail

Abstract:

Students learn effectively in a learning environment with a suitable teaching approach that matches their learning preferences. The main objective of the study is to examine the learning preferences amongst the students in the Science and Technology (S&T), and Social Science (SS) fields of study at the Universiti Teknologi Mara (UiTM), Pulau Pinang. The measurement instrument is based on the Dunn and Dunn Learning Styles which measure five elements of learning styles; environmental, sociological, emotional, physiological and psychological. Questionnaires are distributed amongst undergraduates in the Faculty of Mechanical Engineering and Faculty of Business Management. The respondents comprise of 131 diploma students of the Faculty of Mechanical Engineering and 111 degree students of the Faculty of Business Management. The results indicate that, both S&T and SS students share a similar learning preferences on the environmental aspect, emotional preferences, motivational level, learning responsibility, persistent level in learning and learning structure. Most of the S&T students are concluded as analytical learners and the majority of SS students are global learners. Both S&T and SS students are concluded as visual learners, preferred to be in an active mobility in a relaxing and enjoying mode with some light of refreshments during the learning process and exhibited reflective characteristics in learning. Obviously, the S&T students are considered as left brain dominant, whereas the SS students are right brain dominant. The findings highlighted that both categories of students exhibited similar learning preferences except on psychological preferences.

Keywords: learning preferences, Dunn and Dunn learning style, teaching approach, science and technology, social science

Procedia PDF Downloads 222
1301 Speech Enhancement Using Wavelet Coefficients Masking with Local Binary Patterns

Authors: Christian Arcos, Marley Vellasco, Abraham Alcaim

Abstract:

In this paper, we present a wavelet coefficients masking based on Local Binary Patterns (WLBP) approach to enhance the temporal spectra of the wavelet coefficients for speech enhancement. This technique exploits the wavelet denoising scheme, which splits the degraded speech into pyramidal subband components and extracts frequency information without losing temporal information. Speech enhancement in each high-frequency subband is performed by binary labels through the local binary pattern masking that encodes the ratio between the original value of each coefficient and the values of the neighbour coefficients. This approach enhances the high-frequency spectra of the wavelet transform instead of eliminating them through a threshold. A comparative analysis is carried out with conventional speech enhancement algorithms, demonstrating that the proposed technique achieves significant improvements in terms of PESQ, an international recommendation of objective measure for estimating subjective speech quality. Informal listening tests also show that the proposed method in an acoustic context improves the quality of speech, avoiding the annoying musical noise present in other speech enhancement techniques. Experimental results obtained with a DNN based speech recognizer in noisy environments corroborate the superiority of the proposed scheme in the robust speech recognition scenario.

Keywords: binary labels, local binary patterns, mask, wavelet coefficients, speech enhancement, speech recognition

Procedia PDF Downloads 202