Search results for: binary data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24501

Search results for: binary data

24321 Use of Multistage Transition Regression Models for Credit Card Income Prediction

Authors: Denys Osipenko, Jonathan Crook

Abstract:

Because of the variety of the card holders’ behaviour types and income sources each consumer account can be transferred to a variety of states. Each consumer account can be inactive, transactor, revolver, delinquent, defaulted and requires an individual model for the income prediction. The estimation of transition probabilities between statuses at the account level helps to avoid the memorylessness of the Markov Chains approach. This paper investigates the transition probabilities estimation approaches to credit cards income prediction at the account level. The key question of empirical research is which approach gives more accurate results: multinomial logistic regression or multistage conditional logistic regression with binary target. Both models have shown moderate predictive power. Prediction accuracy for conditional logistic regression depends on the order of stages for the conditional binary logistic regression. On the other hand, multinomial logistic regression is easier for usage and gives integrate estimations for all states without priorities. Thus further investigations can be concentrated on alternative modeling approaches such as discrete choice models.

Keywords: multinomial regression, conditional logistic regression, credit account state, transition probability

Procedia PDF Downloads 456
24320 Investigating the Motion of a Viscous Droplet in Natural Convection Using the Level Set Method

Authors: Isadora Bugarin, Taygoara F. de Oliveira

Abstract:

Binary fluids and emulsions, in general, are present in a vast range of industrial, medical, and scientific applications, showing complex behaviors responsible for defining the flow dynamics and the system operation. However, the literature describing those highlighted fluids in non-isothermal models is currently still limited. The present work brings a detailed investigation on droplet migration due to natural convection in square enclosure, aiming to clarify the effects of drop viscosity on the flow dynamics by showing how distinct viscosity ratios (droplet/ambient fluid) influence the drop motion and the final movement pattern kept on stationary regimes. The analysis was taken by observing distinct combinations of Rayleigh number, drop initial position, and viscosity ratios. The Navier-Stokes and Energy equations were solved considering the Boussinesq approximation in a laminar flow using the finite differences method combined with the Level Set method for binary flow solution. Previous results collected by the authors showed that the Rayleigh number and the drop initial position affect drastically the motion pattern of the droplet. For Ra ≥ 10⁴, two very marked behaviors were observed accordingly with the initial position: the drop can travel either a helical path towards the center or a cyclic circular path resulting in a closed cycle on the stationary regime. The variation of viscosity ratio showed a significant alteration of pattern, exposing a large influence on the droplet path, capable of modifying the flow’s behavior. Analyses on viscosity effects on the flow’s unsteady Nusselt number were also performed. Among the relevant contributions proposed in this work is the potential use of the flow initial conditions as a mechanism to control the droplet migration inside the enclosure.

Keywords: binary fluids, droplet motion, level set method, natural convection, viscosity

Procedia PDF Downloads 89
24319 Spectral Analysis Approaches for Simultaneous Determination of Binary Mixtures with Overlapping Spectra: An Application on Pseudoephedrine Sulphate and Loratadine

Authors: Sara El-Hanboushy, Hayam Lotfy, Yasmin Fayez, Engy Shokry, Mohammed Abdelkawy

Abstract:

Simple, specific, accurate and precise spectrophotometric methods are developed and validated for simultaneous determination of pseudoephedrine sulphate (PSE) and loratadine (LOR) in combined dosage form based on spectral analysis technique. Pseudoephedrine (PSE) in binary mixture could be analyzed either by using its resolved zero order absorption spectrum at its λ max 256.8 nm after subtraction of LOR spectrum or in presence of LOR spectrum by absorption correction method at 256.8 nm, dual wavelength (DWL) method at 254nm and 273nm, induced dual wavelength (IDWL) method at 256nm and 272nm and ratio difference (RD) method at 256nm and 262 nm. Loratadine (LOR) in the mixture could be analyzed directly at 280nm without any interference of PSE spectrum or at 250 nm using its recovered zero order absorption spectrum using constant multiplication(CM).In addition, simultaneous determination for PSE and LOR in their mixture could be applied by induced amplitude modulation method (IAM) coupled with amplitude multiplication (PM).

Keywords: dual wavelength (DW), induced amplitude modulation method (IAM) coupled with amplitude multiplication (PM), loratadine, pseudoephedrine sulphate, ratio difference (RD)

Procedia PDF Downloads 285
24318 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 283
24317 Alkali Activation of Fly Ash, Metakaolin and Slag Blends: Fresh and Hardened Properties

Authors: Weiliang Gong, Lissa Gomes, Lucile Raymond, Hui Xu, Werner Lutze, Ian L. Pegg

Abstract:

Alkali-activated materials, particularly geopolymers, have attracted much interest in academia. Commercial applications are on the rise, as well. Geopolymers are produced typically by a reaction of one or two aluminosilicates with an alkaline solution at room temperature. Fly ash is an important aluminosilicate source. However, using low-Ca fly ash, the byproduct of burning hard or black coal reacts and sets slowly at room temperature. The development of mechanical durability, e.g., compressive strength, is slow as well. The use of fly ashes with relatively high contents ( > 6%) of unburned carbon, i.e., high loss on ignition (LOI), is particularly disadvantageous as well. This paper will show to what extent these impediments can be mitigated by mixing the fly ash with one or two more aluminosilicate sources. The fly ash used here is generated at the Orlando power plant (Florida, USA). It is low in Ca ( < 1.5% CaO) and has a high LOI of > 6%. The additional aluminosilicate sources are metakaolin and blast furnace slag. Binary fly ash-metakaolin and ternary fly ash-metakaolin-slag geopolymers were prepared. Properties of geopolymer pastes before and after setting have been measured. Fresh mixtures of aluminosilicates with an alkaline solution were studied by Vicat needle penetration, rheology, and isothermal calorimetry up to initial setting and beyond. The hardened geopolymers were investigated by SEM/EDS and the compressive strength was measured. Initial setting (fluid to solid transition) was indicated by a rapid increase in yield stress and plastic viscosity. The rheological times of setting were always smaller than the Vicat times of setting. Both times of setting decreased with increasing replacement of fly ash with blast furnace slag in a ternary fly ash-metakaolin-slag geopolymer system. As expected, setting with only Orlando fly ash was the slowest. Replacing 20% fly ash with metakaolin shortened the set time. Replacing increasing fractions of fly ash in the binary system by blast furnace slag (up to 30%) shortened the time of setting even further. The 28-day compressive strength increased drastically from < 20 MPa to 90 MPa. The most interesting finding relates to the calorimetric measurements. The use of two or three aluminosilicates generated significantly more heat (20 to 65%) than the calculated from the weighted sum of the individual aluminosilicates. This synergetic heat contributes or may be responsible for most of the increase of compressive strength of our binary and ternary geopolymers. The synergetic heat effect may be also related to increased incorporation of calcium in sodium aluminosilicate hydrate to form a hybrid (N,C)A-S-H) gel. The time of setting will be correlated with heat release and maximum heat flow.

Keywords: alkali-activated materials, binary and ternary geopolymers, blends of fly ash, metakaolin and blast furnace slag, rheology, synergetic heats

Procedia PDF Downloads 89
24316 Merging and Comparing Ontologies Generically

Authors: Xiuzhan Guo, Arthur Berrill, Ajinkya Kulkarni, Kostya Belezko, Min Luo

Abstract:

Ontology operations, e.g., aligning and merging, were studied and implemented extensively in different settings, such as categorical operations, relation algebras, and typed graph grammars, with different concerns. However, aligning and merging operations in the settings share some generic properties, e.g., idempotence, commutativity, associativity, and representativity, labeled by (I), (C), (A), and (R), respectively, which are defined on an ontology merging system (D~M), where D is a non-empty set of the ontologies concerned, ~ is a binary relation on D modeling ontology aligning and M is a partial binary operation on D modeling ontology merging. Given an ontology repository, a finite set O ⊆ D, its merging closure Ô is the smallest set of ontologies, which contains the repository and is closed with respect to merging. If (I), (C), (A), and (R) are satisfied, then both D and Ô are partially ordered naturally by merging, Ô is finite and can be computed, compared, and sorted efficiently, including sorting, selecting, and querying some specific elements, e.g., maximal ontologies and minimal ontologies. We also show that the ontology merging system, given by ontology V -alignment pairs and pushouts, satisfies the properties: (I), (C), (A), and (R) so that the merging system is partially ordered and the merging closure of a given repository with respect to pushouts can be computed efficiently.

Keywords: ontology aligning, ontology merging, merging system, poset, merging closure, ontology V-alignment pair, ontology homomorphism, ontology V-alignment pair homomorphism, pushout

Procedia PDF Downloads 857
24315 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

Authors: Chiou-Yng Lee, Wen-Yo Lee, Chieh-Tsai Wu, Cheng-Chen Yang

Abstract:

Shifted polynomial basis (SPB) is a variation of polynomial basis representation. SPB has potential for efficient bit-level and digit-level implementations of multiplication over binary extension fields with subquadratic space complexity. For efficient implementation of pairing computation with large finite fields, this paper presents a new SPB multiplication algorithm based on Karatsuba schemes, and used that to derive a novel scalable multiplier architecture. Analytical results show that the proposed multiplier provides a trade-off between space and time complexities. Our proposed multiplier is modular, regular, and suitable for very-large-scale integration (VLSI) implementations. It involves less area complexity compared to the multipliers based on traditional decomposition methods. It is therefore, more suitable for efficient hardware implementation of pairing based cryptography and elliptic curve cryptography (ECC) in constraint driven applications.

Keywords: digit-serial systolic multiplier, elliptic curve cryptography (ECC), Karatsuba algorithm (KA), shifted polynomial basis (SPB), pairing computation

Procedia PDF Downloads 331
24314 Investigating the Steam Generation Potential of Lithium Bromide Based CuO Nanofluid under Simulated Solar Flux

Authors: Tamseela Habib, Muhammad Amjad, Muhammad Edokali, Masome Moeni, Olivia Pickup, Ali Hassanpour

Abstract:

Nanofluid-assisted steam generation is rapidly attracting attention amongst the scientific community since it can be applied in a wide range of industrial processes. Because of its high absorption rate of solar energy, nanoparticle-based solar steam generation could be a major contributor to many applications, including water desalination, sterilization and power generation. Lithium bromide-based iron oxide nanofluids have been previously studied in steam generation, which showed promising results. However, the efficiency of the system could be improved if a more heat-conductive nanofluid system could be utilised. In the current paper, we report on an experimental investigation of the photothermal conversion properties of functionalised Copper oxide (CuO) nanoparticles used in Lithium Bromide salt solutions. CuO binary nanofluid was prepared by chemical functionalization with polyethyleneimine (PEI). Long-term stability evaluation of prepared binary nanofluid was done by a high-speed centrifuge analyser which showed a 0.06 Instability index suggesting low agglomeration and sedimentation tendencies. This stability is also supported by the measurements from dynamic light scattering (DLS), transmission electron microscope (TEM), and ultraviolet-visible (UV-Vis) spectrophotometer. The fluid rheology is also characterised, which suggests the system exhibits a Newtonian fluid behavior. The photothermal conversion efficiency of different concentrations of CuO was experimentally investigated under a solar simulator. Experimental results reveal that the binary nanofluid in this study can remarkably increase the solar energy trapping efficiency and evaporation rate as compared to conventional fluids due to localized solar energy harvesting by the surface of the nanofluid. It was found that 0.1wt% CuO NP is the optimum nanofluid concentration for enhanced sensible and latent heat efficiencies.

Keywords: nanofluids, vapor absorption refrigeration system, steam generation, high salinity

Procedia PDF Downloads 50
24313 Soueif’s 'The Returning' and 'The Nativity': A Portrait of the Other as Others

Authors: Samira Brahimi

Abstract:

Throughout Aisha, her first collection of short stories, Ahdaf Soueif draws a multilayered picture of the Other as others, picturing a series of encounters of her protagonist with this very Other as a set of binary elements. The current essay includes a comparative study between two narratives, namely The Returning and The Nativity. The Other is portrayed as a male/female binary in The Returning and as 'The Foreigner' in an exotic land vs. the local in The Nativity. The analysis is to focus on Aisha, the main female character, who figures as conforming to the portrait of the stereotyped Arab Muslim woman as a sex-subject, submissive, and maudlin character, confining her vision of the Other to the boundaries of her cocooned self, epitomizing a self-centered vision of the world. This reduced vision results in the possibility of viewing the Other as a hindrance to her attaining a clarified and centrifugal representation of the latter, herself, and the outside world. The encounters could also be considered as the character's opportunity for a less stigmatized perception of the elements set forth. The main queries to be probed are: what are the different perceptions of the Other by the author in the narratives set forth? How does the protagonist's encounter with the Other(s) impede her ability to understand the Other, herself, and the world around her? Or how does this encounter allow her an enlightened vision of the aforementioned elements to forge a new start? The possibility of imagining a dialogic relation between different perceptions of the Other opens up new perspectives for adopting magnified representations of the later, oneself, and the world, dilating one's imagination.

Keywords: dialogic, female, foreigner, local, male, other, others

Procedia PDF Downloads 96
24312 Binary Decision Diagram Based Methods to Evaluate the Reliability of Systems Considering Failure Dependencies

Authors: Siqi Qiu, Yijian Zheng, Xin Guo Ming

Abstract:

In many reliability and risk analysis, failures of components are supposed to be independent. However, in reality, the ignorance of failure dependencies among components may render the results of reliability and risk analysis incorrect. There are two principal ways to incorporate failure dependencies in system reliability and risk analysis: implicit and explicit methods. In the implicit method, failure dependencies can be modeled by joint probabilities, correlation values or conditional probabilities. In the explicit method, certain types of dependencies can be modeled in a fault tree as mutually independent basic events for specific component failures. In this paper, explicit and implicit methods based on BDD will be proposed to evaluate the reliability of systems considering failure dependencies. The obtained results prove the equivalence of the proposed implicit and explicit methods. It is found that the consideration of failure dependencies decreases the reliability of systems. This observation is intuitive, because more components fail due to failure dependencies. The consideration of failure dependencies helps designers to reduce the dependencies between components during the design phase to make the system more reliable.

Keywords: reliability assessment, risk assessment, failure dependencies, binary decision diagram

Procedia PDF Downloads 442
24311 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 395
24310 Adaptive Target Detection of High-Range-Resolution Radar in Non-Gaussian Clutter

Authors: Lina Pan

Abstract:

In non-Gaussian clutter of a spherically invariant random vector, in the cases that a certain estimated covariance matrix could become singular, the adaptive target detection of high-range-resolution radar is addressed. Firstly, the restricted maximum likelihood (RML) estimates of unknown covariance matrix and scatterer amplitudes are derived for non-Gaussian clutter. And then the RML estimate of texture is obtained. Finally, a novel detector is devised. It is showed that, without secondary data, the proposed detector outperforms the existing Kelly binary integrator.

Keywords: non-Gaussian clutter, covariance matrix estimation, target detection, maximum likelihood

Procedia PDF Downloads 432
24309 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 454
24308 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 65
24307 Evaluation of Corrosion by Impedance Spectroscopy of Embedded Steel in an Alternative Concrete Exposed a Chloride Ion

Authors: E. Ruíz, W. Aperador

Abstract:

In this article evaluates the protective effect of the concrete alternative obtained from the fly ash and iron and steel slag mixed in binary form and were placed on structural steel ASTM A 706. The study was conducted comparatively with specimens exposed to natural conditions free of chloride ion. The effect of chloride ion on the specimens was generated of form accelerated under controlled conditions (3.5% NaCl and 25 ° C temperature). The Impedance data were acquired over a range of 1 mHz to 100 kHz. At frequencies high is found the response of the interface means of the exposure-concrete and to frequency low the response of the interface corresponding to concrete-steel.

Keywords: alternative concrete, corrosion, alkaline activation, impedance spectroscopy

Procedia PDF Downloads 328
24306 The Importance of Self-Efficacy and Collective Competence Beliefs in Managerial Competence of Sports Managers'

Authors: Şenol Yanar, Sinan Çeli̇kbi̇lek, Mehmet Bayansalduz, Yusuf Can

Abstract:

Managerial competence defines as the skills that managers in managerial positions have in relation to managerial responsibilities and managerial duties. Today's organizations, which are in a competitive environment, have the desire to work with effective managers in order to be more advantageous position than the other organizations they are competing with. In today's organizations, self-efficacy and collective competence belief that determine managerial competencies of managers to assume managerial responsibility are of special importance. In this framework, the aim of this study is to examine the effects of sports managers' perceptions of self-efficacy and collective competence in managerial competence perceptions. In the study, it has also been analyzed if there is a significant difference between self-efficacy, collective competence and managerial competence levels of sports managers in terms of their gender, age, duty status, year of service and level of education. 248 sports managers, who work at the department of sports service’s central and field organization at least as a chief in the manager position, have been chosen with random sampling method and they have voluntarily participated in the study. In the study, the self-efficacy scale which was developed by Schwarzer, R. & Jerusalem, M. (1995), collective competence scale developed by Goddard, Hoy and Woolfolk-Hoy (2000) and managerial competence scale developed by Cetinkaya (2009) have been used as a data collection tool. The questionnaire form used as a data collection tool in the study includes a personal information form consisting of 5 questions; questioning gender, age, duty status, years of service and level of education. In the study, Pearson Correlation Analysis has been used for defining the correlation among self-efficacy, collective competence belief, and managerial competence levels in sports managers and regression analysis have been used to define the affect of self-efficacy and collective competence belief on the perception of managerial competence. T-test for binary grouping and ANOVA analysis have been used for more than binary groups in order to determine if there is any significant difference in the level of self-efficacy, collective and managerial competence in terms of the participants’ duty status, year of service and level of education. According to the research results, it has been found that there is a positive correlation between sports managers' self-efficacy, collective competence beliefs, and managerial competence levels. According to the results of the regression analysis, it is understood that the managers’ perception of self-efficacy and collective competence belief significantly defines the perception of managerial competence. Also, the results show that there is no significant difference in self-efficacy, collective competence, and level of managerial competence of sports managers in terms of duty status, year of service and level of education.

Keywords: sports manager, self-efficacy, collective competence, managerial competence

Procedia PDF Downloads 203
24305 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 419
24304 A Comparison of Methods for Estimating Dichotomous Treatment Effects: A Simulation Study

Authors: Jacqueline Y. Thompson, Sam Watson, Lee Middleton, Karla Hemming

Abstract:

Introduction: The odds ratio (estimated via logistic regression) is a well-established and common approach for estimating covariate-adjusted binary treatment effects when comparing a treatment and control group with dichotomous outcomes. Its popularity is primarily because of its stability and robustness to model misspecification. However, the situation is different for the relative risk and risk difference, which are arguably easier to interpret and better suited to specific designs such as non-inferiority studies. So far, there is no equivalent, widely acceptable approach to estimate an adjusted relative risk and risk difference when conducting clinical trials. This is partly due to the lack of a comprehensive evaluation of available candidate methods. Methods/Approach: A simulation study is designed to evaluate the performance of relevant candidate methods to estimate relative risks to represent conditional and marginal estimation approaches. We consider the log-binomial, generalised linear models (GLM) with iteratively weighted least-squares (IWLS) and model-based standard errors (SE); log-binomial GLM with convex optimisation and model-based SEs; log-binomial GLM with convex optimisation and permutation tests; modified-Poisson GLM IWLS and robust SEs; log-binomial generalised estimation equations (GEE) and robust SEs; marginal standardisation and delta method SEs; and marginal standardisation and permutation test SEs. Independent and identically distributed datasets are simulated from a randomised controlled trial to evaluate these candidate methods. Simulations are replicated 10000 times for each scenario across all possible combinations of sample sizes (200, 1000, and 5000), outcomes (10%, 50%, and 80%), and covariates (ranging from -0.05 to 0.7) representing weak, moderate or strong relationships. Treatment effects (ranging from 0, -0.5, 1; on the log-scale) will consider null (H0) and alternative (H1) hypotheses to evaluate coverage and power in realistic scenarios. Performance measures (bias, mean square error (MSE), relative efficiency, and convergence rates) are evaluated across scenarios covering a range of sample sizes, event rates, covariate prognostic strength, and model misspecifications. Potential Results, Relevance & Impact: There are several methods for estimating unadjusted and adjusted relative risks. However, it is unclear which method(s) is the most efficient, preserves type-I error rate, is robust to model misspecification, or is the most powerful when adjusting for non-prognostic and prognostic covariates. GEE estimations may be biased when the outcome distributions are not from marginal binary data. Also, it seems that marginal standardisation and convex optimisation may perform better than GLM IWLS log-binomial.

Keywords: binary outcomes, statistical methods, clinical trials, simulation study

Procedia PDF Downloads 74
24303 Field-Programmable Gate Arrays Based High-Efficiency Oriented Fast and Rotated Binary Robust Independent Elementary Feature Extraction Method Using Feature Zone Strategy

Authors: Huang Bai-Cheng

Abstract:

When deploying the Oriented Fast and Rotated Binary Robust Independent Elementary Feature (BRIEF) (ORB) extraction algorithm on field-programmable gate arrays (FPGA), the access of global storage for 31×31 pixel patches of the features has become the bottleneck of the system efficiency. Therefore, a feature zone strategy has been proposed. Zones are searched as features are detected. Pixels around the feature zones are extracted from global memory and distributed into patches corresponding to feature coordinates. The proposed FPGA structure is targeted on a Xilinx FPGA development board of Zynq UltraScale+ series, and multiple datasets are tested. Compared with the streaming pixel patch extraction method, the proposed architecture obtains at least two times acceleration consuming extra 3.82% Flip-Flops (FFs) and 7.78% Look-Up Tables (LUTs). Compared with the non-streaming one, the proposed architecture saves 22.3% LUT and 1.82% FF, causing a latency of only 0.2ms and a drop in frame rate for 1. Compared with the related works, the proposed strategy and hardware architecture have the superiority of keeping a balance between FPGA resources and performance.

Keywords: feature extraction, real-time, ORB, FPGA implementation

Procedia PDF Downloads 82
24302 The Impact of the Parking Spot’ Surroundings on Charging Decision: A Data-Driven Approach

Authors: Xizhen Zhou, Yanjie Ji

Abstract:

The charging behavior of drivers provides a reference for the planning and management of charging facilities. Based on the real trajectory data of electric vehicles, this study explored the influence of the surrounding environments of the parking spot on charging decisions. The built environment, the condition of vehicles, and the nearest charging station were all considered. And the mixed binary logit model was used to capture the impact of unobserved heterogeneity. The results show that the number of fast chargers in the charging station, parking price, dwell time, and shopping services all significantly impact the charging decision, while the leisure services, scenic spots, and mileage since the last charging are opposite. Besides, factors related to unobserved heterogeneity include the number of fast chargers, parking and charging prices, residential areas, etc. The interaction effects of random parameters further illustrate the complexity of charging choice behavior. The results provide insights for planning and managing charging facilities.

Keywords: charging decision, trajectory, electric vehicle, infrastructure, mixed logit

Procedia PDF Downloads 38
24301 Effect of the Binary and Ternary Exchanges on Crystallinity and Textural Properties of X Zeolites

Authors: H. Hammoudi, S. Bendenia, K. Marouf-Khelifa, R. Marouf, J. Schott, A. Khelifa

Abstract:

The ionic exchange of the NaX zeolite by Cu2+ and/or Zn2+ cations is progressively driven while following the development of some of its characteristic: crystallinity by XR diffraction, profile of isotherms, RI criterion, isosteric adsorption heat and microporous volume using both the Dubinin–Radushkevich (DR) equation and the t-plot through the Lippens–de Boer method which also makes it possible to determine the external surface area. Results show that the cationic exchange process, in the case of Cu2+ introduced at higher degree, is accompanied by crystalline degradation for Cu(x)X, in contrast to Zn2+-exchanged zeolite X. This degradation occurs without significant presence of mesopores, because the RI criterion values were found to be much lower than 2.2. A comparison between the binary and ternary exchanges shows that the curves of CuZn(x)X are clearly below those of Zn(x)X and Cu(x)X, whatever the examined parameter. On the other hand, the curves relating to CuZn(x)X tend towards those of Cu(x)X. This would again confirm the sensitivity of the crystalline structure of CuZn(x)X with respect to the introduction of Cu2+ cations. An original result is the distortion of the zeolitic framework of X zeolites at middle exchange degree, when Cu2+ competes with another divalent cation, such as Zn2+, for the occupancy of sites distributed within zeolitic cavities. In other words, the ternary exchange accentuates the crystalline degradation of X zeolites. An unexpected result also is the no correlation between crystal damage and the external surface area.

Keywords: adsorption, crystallinity, ion exchange, zeolite

Procedia PDF Downloads 225
24300 Coronavirus Academic Paper Sorting Application

Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh

Abstract:

The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.

Keywords: COVID-19, literature summary, information retrieval, Snorkel

Procedia PDF Downloads 121
24299 Multi-Layer Multi-Feature Background Subtraction Using Codebook Model Framework

Authors: Yun-Tao Zhang, Jong-Yeop Bae, Whoi-Yul Kim

Abstract:

Background modeling and subtraction in video analysis has been widely proved to be an effective method for moving objects detection in many computer vision applications. Over the past years, a large number of approaches have been developed to tackle different types of challenges in this field. However, the dynamic background and illumination variations are two of the most frequently occurring issues in the practical situation. This paper presents a new two-layer model based on codebook algorithm incorporated with local binary pattern (LBP) texture measure, targeted for handling dynamic background and illumination variation problems. More specifically, the first layer is designed by block-based codebook combining with LBP histogram and mean values of RGB color channels. Because of the invariance of the LBP features with respect to monotonic gray-scale changes, this layer can produce block-wise detection results with considerable tolerance of illumination variations. The pixel-based codebook is employed to reinforce the precision from the outputs of the first layer which is to eliminate false positives further. As a result, the proposed approach can greatly promote the accuracy under the circumstances of dynamic background and illumination changes. Experimental results on several popular background subtraction datasets demonstrate a very competitive performance compared to previous models.

Keywords: background subtraction, codebook model, local binary pattern, dynamic background, illumination change

Procedia PDF Downloads 185
24298 Processing Big Data: An Approach Using Feature Selection

Authors: Nikat Parveen, M. Ananthi

Abstract:

Big data is one of the emerging technology, which collects the data from various sensors and those data will be used in many fields. Data retrieval is one of the major issue where there is a need to extract the exact data as per the need. In this paper, large amount of data set is processed by using the feature selection. Feature selection helps to choose the data which are actually needed to process and execute the task. The key value is the one which helps to point out exact data available in the storage space. Here the available data is streamed and R-Center is proposed to achieve this task.

Keywords: big data, key value, feature selection, retrieval, performance

Procedia PDF Downloads 303
24297 Religiosity and Social Factors on Alcohol Use among South African University Students

Authors: Godswill Nwabuisi Osuafor, Sonto Maria Maputle

Abstract:

Background: Abounding studies found that religiosity and social factors modulate alcohol use among university students. However, there is a scarcity of empirical studies examining the protective effects of religiosity and other social factors on alcohol use and abuse in South African universities. The aim of this study was therefore to assess the protective effects of religiosity and roles of social factors on alcohol use among university students. Methodology: A survey on the use of alcohol among 416 university students was conducted using structured questionnaire in 2014. Data were sourced on religiosity and contextual variables. Students were classified as practicing intrinsic religiosity or extrinsic religiosity based on the response to the measures of religiosity. Descriptive, chi square and binary logistic analyses were used in processing the data. Result: Results revealed that alcohol use was associated with religiosity, religion, sex, family history of alcohol use and experimenting with alcohol. Reporting alcohol abuse was significantly predicted by sex, family history of alcohol use and experimenting with alcohol. Religiosity mediated lower alcohol use whereas family history of alcohol use and experimenting with alcohol promoted alcohol use and abuse. Conclusion: Families, religious groups and societal factors may be the specific niches for intervention on alcohol use among university students.

Keywords: religiosity, alcohol use, protective factors, university students

Procedia PDF Downloads 365
24296 Choice of Sleeper and Rail Fastening Using Linear Programming Technique

Authors: Luciano Oliveira, Elsa Vásquez-Alvarez

Abstract:

The increase in rail freight transport in Brazil in recent years requires new railway lines and the maintenance of existing ones, which generates high costs for concessionaires. It is in this context that this work is inserted, whose objective is to propose a method that uses Binary Linear Programming for the choice of sleeper and rail fastening, from various options, including the way to apply these materials, with focus to minimize costs. Unit value information, the life cycle each of material type, and service expenses are considered. The model was implemented in commercial software using real data for its validation. The formulated model can be replicated to support decision-making for other railway projects in the choice of sleepers and rail fastening with lowest cost.

Keywords: linear programming, rail fastening, rail sleeper, railway

Procedia PDF Downloads 169
24295 The Impact of Sports Employees' of Perceptions of Organizational Climate and Organizational Trust on Work Motivation

Authors: Bilal Okudan, Omur F. Karakullukcu, Yusuf Can

Abstract:

Work motivation is one of the fundamental elements that determine the attitudes and performance of employees towards work. In this sense, work motivation depends not only on individual and occupational factors but also on employees' perception of organizational climate and organizational trust. Organizations that are aware of this have begun to do more research on work motivation in recent years to ensure that employees have the highest possible performance. In this framework of the purpose of this study is to examine the effect of sports employees' perceptions of organizational climate and organizational trust on work motivation. In the study, it has also been analyzed if there is any significant difference in the department of sports services’ employees’ organizational climate and organizational trust perception, and work motivation levels in terms of gender, age, duty status, year of service and level of education. 278 sports managers, who work in the department of sports service’s central and field organization at least as a chief in the manager position, have been chosen with random sampling method and they have voluntarily participated in the study. In the study, the organizational climate scale which was developed by Bilir (2005), organizational trusts scale developed by koksal (2012) and work motivation scale developed by Mottaz J. Clifford (1985) have been used as a data collection tool. The questionnaire form used as a data collection tool in the study includes a personal information form consisting of 5 questions; questioning gender, age, duty status, years of service and level of education. In the study, Pearson Correlation Analysis has been used for defining the correlation among organizational climate, organizational trust perceptions and work motivation levels in sports managers and regression analysis has been used to identify the effect of organizational climate and organizational trust on work motivation. T-test for binary grouping and ANOVA analysis have been used for more than binary groups in order to determine if there is any significant difference in the level of organizational climate, organizational trust perceptions and work motivations in terms of the participants’ duty status, year of service and level of education. According to the research results, it has been found that there is a positive correlation between the department of sports services’ employees’ organizational climate, organizational trust perceptions and work motivation levels. According to the results of the regression analysis; it is understood that the sports employees’ perception of organizational climate and organizational trust are two main factors which affects the perception of work motivation. Also, the results show that there is a significant difference in the level of organizational climate and organizational trust perceptions and work motivations of the department of sports services’ employees in terms of duty status, year of service, and level of education; however, the results reveal that there is no significant difference in terms of age groups and gender.

Keywords: sports manager, organizational climate, organizational trust, work motivation

Procedia PDF Downloads 209
24294 An Approach for Reducing Morphological Operator Dataset and Recognize Optical Character Based on Significant Features

Authors: Ashis Pradhan, Mohan P. Pradhan

Abstract:

Pattern Matching is useful for recognizing character in a digital image. OCR is one such technique which reads character from a digital image and recognizes them. Line segmentation is initially used for identifying character in an image and later refined by morphological operations like binarization, erosion, thinning, etc. The work discusses a recognition technique that defines a set of morphological operators based on its orientation in a character. These operators are further categorized into groups having similar shape but different orientation for efficient utilization of memory. Finally the characters are recognized in accordance with the occurrence of frequency in hierarchy of significant pattern of those morphological operators and by comparing them with the existing database of each character.

Keywords: binary image, morphological patterns, frequency count, priority, reduction data set and recognition

Procedia PDF Downloads 385
24293 A Combination of Anisotropic Diffusion and Sobel Operator to Enhance the Performance of the Morphological Component Analysis for Automatic Crack Detection

Authors: Ankur Dixit, Hiroaki Wagatsuma

Abstract:

The crack detection on a concrete bridge is an important and constant task in civil engineering. Chronically, humans are checking the bridge for inspection of cracks to maintain the quality and reliability of bridge. But this process is very long and costly. To overcome such limitations, we have used a drone with a digital camera, which took some images of bridge deck and these images are processed by morphological component analysis (MCA). MCA technique is a very strong application of sparse coding and it explores the possibility of separation of images. In this paper, MCA has been used to decompose the image into coarse and fine components with the effectiveness of two dictionaries namely anisotropic diffusion and wavelet transform. An anisotropic diffusion is an adaptive smoothing process used to adjust diffusion coefficient by finding gray level and gradient as features. These cracks in image are enhanced by subtracting the diffused coarse image into the original image and the results are treated by Sobel edge detector and binary filtering to exhibit the cracks in a fine way. Our results demonstrated that proposed MCA framework using anisotropic diffusion followed by Sobel operator and binary filtering may contribute to an automation of crack detection even in open field sever conditions such as bridge decks.

Keywords: anisotropic diffusion, coarse component, fine component, MCA, Sobel edge detector and wavelet transform

Procedia PDF Downloads 146
24292 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 373