Search results for: binary vector quantization (BVQ)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1710

Search results for: binary vector quantization (BVQ)

420 Determining the Effects of Wind-Aided Midge Movement on the Probability of Coexistence of Multiple Bluetongue Virus Serotypes in Patchy Environments

Authors: Francis Mugabi, Kevin Duffy, Joseph J. Y. T Mugisha, Obiora Collins

Abstract:

Bluetongue virus (BTV) has 27 serotypes, with some of them coexisting in patchy (different) environments, which make its control difficult. Wind-aided midge movement is a known mechanism in the spread of BTV. However, its effects on the probability of coexistence of multiple BTV serotypes are not clear. Deterministic and stochastic models for r BTV serotypes in n discrete patches connected by midge and/or cattle movement are formulated and analyzed. For the deterministic model without midge and cattle movement, using the comparison principle, it is shown that if the patch reproduction number R0 < 1, i=1,2,...,n, j=1,2,...,r, all serotypes go extinct. If R^j_i0>1, competitive exclusion takes place. Using numerical simulations, it is shown that when the n patches are connected by midge movement, coexistence takes place. To account for demographic and movement variability, the deterministic model is transformed into a continuous-time Markov chain stochastic model. Utilizing a multitype branching process, it is shown that the midge movement can have a large effect on the probability of coexistence of multiple BTV serotypes. The probability of coexistence can be brought to zero when the control interventions that directly kill the adult midges are applied. These results indicate the significance of wind-aided midge movement and vector control interventions on the coexistence and control of multiple BTV serotypes in patchy environments.

Keywords: bluetongue virus, coexistence, multiple serotypes, midge movement, branching process

Procedia PDF Downloads 118
419 Health Promoting Behaviors among Thai Older Adults: Trend and Association with Health Status

Authors: Alongkorn Pekalee, Rossarin Gray

Abstract:

Various determinants associated with older health include socio-demographic factors and health-promoting behaviors but lack in scholars recommended what factors associated with health status in specific sub-groups of older adults. The current study aims to explore the health-promoting behaviors and to examine and compare the associations of these factors with self-rated health status among three older age cohorts in Thai traditional context. Methods: This study is based on the Survey of Older Persons in Thailand (SOPT), in 2017, conducted by the National Statistical Office (NSO) of Thailand. Participants were classified into three groups by using the Thai contextual recommendation: youngest-old cohort (60-69), old-old cohort (70-79) and oldest old cohort (80 or older). Health promoting behaviors are the behaviors which associated with the health status of older adults include alcohol consumption, smoking, diet, and physical activity. Health status was defined as a subjective measurement by using self-rated health, a simple measure of general health. The socio-demographic factors, health-promoting behaviors, and health status were explained and summarized by descriptive statistics. The binary logistic regression was performed to analyze the data and evaluate the associations between independent and dependent variables. Results: Increase of age contributes to a higher proportion of health-promoting behaviors. All variables were associated with self-reported health status as good health among three older age cohorts statistically significant (p-value = 0.000). However, the influence of income sufficiency on health status is more notable, especially in older adults who aged 60-69 and 70-79. The influence of dietary and physical activity on health status became greater as age increased. Conclusion: the results suggest that income sufficiency should be noted in a plan to promote healthy aging, and co-residence should be more concerned especially in the oldest old cohort. Moreover, the interventions or policies to promote older health behaviors like diet and physical activity should be emphasized in the oldest old cohort more than others.

Keywords: health-promoting behaviors, older adults, self- rated health, Thailand

Procedia PDF Downloads 108
418 Melanoma and Non-Melanoma, Skin Lesion Classification, Using a Deep Learning Model

Authors: Shaira L. Kee, Michael Aaron G. Sy, Myles Joshua T. Tan, Hezerul Abdul Karim, Nouar AlDahoul

Abstract:

Skin diseases are considered the fourth most common disease, with melanoma and non-melanoma skin cancer as the most common type of cancer in Caucasians. The alarming increase in Skin Cancer cases shows an urgent need for further research to improve diagnostic methods, as early diagnosis can significantly improve the 5-year survival rate. Machine Learning algorithms for image pattern analysis in diagnosing skin lesions can dramatically increase the accuracy rate of detection and decrease possible human errors. Several studies have shown the diagnostic performance of computer algorithms outperformed dermatologists. However, existing methods still need improvements to reduce diagnostic errors and generate efficient and accurate results. Our paper proposes an ensemble method to classify dermoscopic images into benign and malignant skin lesions. The experiments were conducted using the International Skin Imaging Collaboration (ISIC) image samples. The dataset contains 3,297 dermoscopic images with benign and malignant categories. The results show improvement in performance with an accuracy of 88% and an F1 score of 87%, outperforming other existing models such as support vector machine (SVM), Residual network (ResNet50), EfficientNetB0, EfficientNetB4, and VGG16.

Keywords: deep learning - VGG16 - efficientNet - CNN – ensemble – dermoscopic images - melanoma

Procedia PDF Downloads 51
417 Understanding the Nexus between Dengue and Climate Variability

Authors: Edilene Mercedes Mauer Machado, Carolina Hadassa Marques Karoly, Amanda Britz, Claudineia Brazil

Abstract:

The El Niño phenomenon, characterized by the anomalous warming of surface waters in the Equatorial Pacific Ocean, can influence weather patterns in various parts of the world, including the occurrence of extreme events such as droughts or heavy rainfall. Studies have suggested a relationship between El Niño and an increase in the incidence of dengue in certain areas. During El Niño periods, there can be changes in climatic conditions, such as increased temperatures and reduced rainfall in certain tropical and subtropical regions. These conditions can favor the reproduction of the Aedes aegypti mosquito, the vector for dengue transmission. Research aims to investigate how climate events like El Niño and La Niña can influence the incidence and transmission of dengue. The results have shown that, on average, there was a significant increase in dengue cases during La Niña years compared to years of climatic neutrality, contradicting the findings of Hopp et al. (2015). The study also highlighted that regions affected by El Niño exhibited greater variability in dengue incidence. However, it is important to emphasize that the effects of El Niño on dengue transmission can vary depending on the region and local factors, such as socioeconomic context and implemented control measures, as described by Johansson et al. (2009). Not all areas affected by El Niño will necessarily experience an increase in dengue incidence, and the interaction between climate and disease transmission is complex.

Keywords: anomalous warming, climatic patterns, dengue incidence, extreme events

Procedia PDF Downloads 66
416 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 45
415 Factors Associated with Skin Injuries Due to the Use of N95 Masks among Brazilian Nursing Professionals

Authors: Elucir Gir, Laelson Rochelle Milanês Sousa, Renata Karina Reis, Soraia Assad Nasbine Rabeh, Mayra Gonçalves Menegueti, Ana Cristina de Oliveira e Silva, Sheila Araújo Teles

Abstract:

Context and significance: Nursing team professionals faced challenges in combating the COVID-19 pandemic around the world. They were subjected to exhausting workloads and prolonged use of Personal Protective Equipment. Using N95 masks for long periods of time can cause skin changes. In this context, health professionals who worked on the front lines of fighting the pandemic were more exposed to possible physical and psychological changes. Objective: The aim of the study was to analyze the factors associated with skin lesions resulting from the use of N95 masks among nursing team professionals. Method: The study was carried out in all regions of Brazil from October to December 2020, with professionals from the nursing team who worked in health care during the COVID-19 pandemic. Participants were recruited via social media, and information was collected electronically and stored on the Survey Monkey platform. Descriptive statistics were used to characterize the sample, association tests (Chi-square), with a statistical significance level of p < 0.05. Factors associated with skin lesions resulting from the use of an N95 mask were determined by Binary Logistic Regression, with a significance level of 5% (α = 0.05). Results: 8,405 nursing professionals participated in the study, 5,492 nurses (65.3%), 2,747 nursing technicians (32.7%), and 7,084 females (84.3%). Female nursing team professionals were 1.4 times more likely to develop skin lesions due to the use of N95 masks when compared to males (OR 1.4 [CI95% 1.22 – 1.59] p < 0.001). The following protective factors were identified: nursing technician (ORA 0.608 [CI95% 0.43 – 0.86] p = 0.005) and not having provided assistance in field hospitals for COVID-19 (0.73 [CI95% 0.65-0.81] p<0.000). Conclusion: It was concluded that female nursing team professionals were more likely to have skin changes related to the use of N95 masks. The need for intervention studies is emphasized in order to explore measures to prevent these types of injuries. Descritores: Nursing professionals; COVID-19; SARS-CoV-2; Brazil.

Keywords: nursing professionals, COVID-19, SARS-CoV-2, Brazil

Procedia PDF Downloads 42
414 Teleconsultations and The Need of Onsite Additional Medical Services

Authors: Cristina Hotoleanu

Abstract:

Introduction: The recent Covid-19 pandemic accelerated the development of e-health, including telemedicine, smartphone applications, and medical wearable devices. Providing remote teleconsultations supposes challenges which may require further face-to-face medical interactions. The aim of this study was to assess the correlation between the types of teleconsultations and the need of onsite medical services (investigations and medical visits) for the diagnosis and treatment. Methods: a retrospective study including all the teleconsultations using the platform offered by a telehealth provider in Romania (Telios Care SA) between May 1, 2021- April 30, 2022, was performed. Binary data were analysed using the chi-square test with a significance level of p < 0.05. Results: out of 7163 consultations, 3961 were phone calls, 1981 were online messages, and 1221 were video calls. Onsite medical services were indicated in 3327 (46.44%) cases; the onsite investigations or the onsite visits were recommended for 2908 patients as follows: 2326 in case of phone calls, 582 in case of online messages, none in case of video calls. Both onsite investigations and visits were indicated for 419 patients. The need for onsite additional medical services was significantly higher in the case of phone calls than in the other 2 types of teleconsultations (Chi square= 1207.06, p= 0.00001). The indication for onsite services was done mainly after teleconsultations covering medical specialties (87.34%), significantly higher than the other specialties (Chi square=914.59, p=0.00001). Teleconsultations in surgical specialties and other fields (pharmacy, dentistry, psychology, wellbeing- nutrition, fitness) resulted in 12.13%, respective less than 1%, indication for onsite investigations or visits, explained by using of video calls in most of the cases. Conclusion: a further onsite medical service was necessary in less than a half of the teleconsultations. This indication was done mainly after phone calls and teleconsultations in medical specialties. Video calls were used mostly in psychology, nutrition, and fitness teleconsultations and did not require a further onsite medical service. Other studies are necessary to assess better the types of teleconsultations and the specialties bringing the biggest benefit for the patients.

Keywords: onsite medical services, phone calls, teleconsultations, telemedicine

Procedia PDF Downloads 75
413 Stem Covers of Leibniz n-Algebras

Authors: Natália Maria Rego

Abstract:

ALeibnizn-algebraGis aK-vector space endowed whit a n-linearbracket operation [-,…-] : GG … G→ Gsatisfying the fundamental identity, which can be expressed saying that the right multiplication map Ry2, …, ᵧₙ: Gn→ G, Rᵧ₂, …, ᵧₙn(ˣ¹, …, ₓₙ) = [[ˣ¹, …, ₓₙ], ᵧ₂, …, ᵧₙ], is a derivation. This structure, together with its skew-symmetric version, named as Lie n-algebra or Filippov algebra, arose in the setting of Nambumechanics, an n-ary generalization of the Hamiltonian mechanics. Thefirst goal of this work is to provide a characterization of various classes of central extensions of Leibniz n-algebras in terms of homological properties. Namely, Commutator extension, Quasi-commutator extension, Stem extension, and Stem cover. These kind of central extensions are characterized by means of the character of the map *(E): nHL1(G) → M provided by the five-term exact sequence in homology with trivial coefficients of Leibniz n-algebras associated to an extension E : 0 → M → K → G → 0. For a free presentation 0 →R→ F →G→ 0of a Leibniz n-algebra G,the term M(G) = (R[F,…n.., F])/[R, F,..n-1..,F] is called the Schur multiplier of G, which is a Baer invariant, i.e., it does not depend on the chosen free presentation, and it is isomorphic to the first Leibniz n-algebras homology with trivial coefficients of G. A central extension of Leibniz n-algebras is a short exact sequenceE : 0 →M→K→G→ 0such that [M, K,.. ⁿ⁻¹.., K]=0. It is said to be a stem extension if M⊆[G, .. n.., G]. Additionally, if the induced map M(K) → M(G) is the zero map, then the stem extension Eis said to be a stem cover. The second aim of this work is to analyze the interplay between stem covers of Leibniz n-algebras and the Schur multiplier. Concretely, in the case of finite-dimensional Leibniz n-algebras, we show the existence of coverings, and we prove that all stem covers with finite-dimensional Schur multiplier are isoclinic. Additionally, we characterize stem covers of perfect Leibniz n-algebras.

Keywords: leibniz n-algebras, central extensions, Schur multiplier, stem cover

Procedia PDF Downloads 139
412 Development of Precise Ephemeris Generation Module for Thaichote Satellite Operations

Authors: Manop Aorpimai, Ponthep Navakitkanok

Abstract:

In this paper, the development of the ephemeris generation module used for the Thaichote satellite operations is presented. It is a vital part of the flight dynamics system, which comprises, the orbit determination, orbit propagation, event prediction and station-keeping maneuver modules. In the generation of the spacecraft ephemeris data, the estimated orbital state vector from the orbit determination module is used as an initial condition. The equations of motion are then integrated forward in time to predict the satellite states. The higher geopotential harmonics, as well as other disturbing forces, are taken into account to resemble the environment in low-earth orbit. Using a highly accurate numerical integrator based on the Burlish-Stoer algorithm the ephemeris data can be generated for long-term predictions, by using a relatively small computation burden and short calculation time. Some events occurring during the prediction course that are related to the mission operations, such as the satellite’s rise/set viewed from the ground station, Earth and Moon eclipses, the drift in ground track as well as the drift in the local solar time of the orbital plane are all detected and reported. When combined with other modules to form a flight dynamics system, this application is aimed to be applied for the Thaichote satellite and successive Thailand’s Earth-observation missions.

Keywords: flight dynamics system, orbit propagation, satellite ephemeris, Thailand’s Earth Observation Satellite

Procedia PDF Downloads 348
411 Risk Assessments of Longest Dry Spells Phenomenon in Northern Tunisia

Authors: Majid Mathlouthi, Fethi Lebdi

Abstract:

Throughout the world, the extent and magnitude of droughts have economic, social and environmental consequences. Today climate change has become more and more felt; most likely they increase the frequency and duration of droughts. An analysis by event of dry event, from series of observations of the daily rainfall is carried out. A daily precipitation threshold value has been set. A catchment localized in Northern Tunisia where the average rainfall is about 600 mm has been studied. Rainfall events are defined as an uninterrupted series of rainfall days understanding at least a day having received a precipitation superior or equal to a fixed threshold. The dry events are constituted of a series of dry days framed by two successive rainfall events. A rainfall event is a vector of coordinates the duration, the rainfall depth per event and the duration of the dry event. The depth and duration are found to be correlated. So we use conditional probabilities to analyse the depth per event. The negative binomial distribution fits well the dry event. The duration of the rainfall event follows a geometric distribution. The length of the climatically cycle adjusts to the Incomplete Gamma. Results of this analysis was used to study of the effects of climate change on water resources and crops and to calibrate precipitation models with little rainfall records. In response to long droughts in the basin, the drought management system is based on three phases during each of the three phases; different measurements are applied and executed. The first is before drought, preparedness and early warning; the second is drought management, mitigation in the event of drought; and the last subsequent drought, when the drought is over.

Keywords: dry spell, precipitation threshold, climate vulnerability, adaptation measures

Procedia PDF Downloads 51
410 Factors Associated with Contraceptive Use and Nonuse, among Currently Married Young (15-24 Years) Women in Nepal

Authors: Bishnu Prasad Dulal, Sushil Chandra Baral, Radheshyam Bhattarai, Meera Tandan

Abstract:

Background: Non-use of contraceptives is a leading cause of unintended pregnancy. This study was done to explore the potential predictors of contraceptive used by young women, and the findings can inform policy makers to design the program to reduce unintended pregnancy for younger women who have a longer time of fecundity. Methodology: A nationally representative cross-sectional household survey was conducted by Health Research and Social Development Forum in 2012. Total 2259 currently married young women (15-24 years) were selected for the analysis out of 8578 women of reproductive age interviewed from the total 10260 households using systematic sampling. Binary logistic regression was used to identify factors associated with the use of modern contraceptive methods. Findings: The prevalence of modern contraceptive methods among young women was 25.2 %. Use of contraceptives was significantly associated with age at first marriage <15 year of age (OR:1.95) and ever delivered (OR: 1.8). Muslim women were significantly less likely to use contraceptives. Development region, wealth quintile, and awareness of abortion site were also statistically associated factors to use of contraceptives. Conclusion: The prevalence of contraceptives uses among young married women (25.2%) was lower than national prevalence (43%) of contraceptives use among married women of reproductive age. Our analysis focused on examining the association between women’s characteristics-related factors and use and nonuse of modern contraceptives. Awareness of safe abortion site is significantly associated while level of education was not. It is an interesting finding but difficult to interpret which needs further analysis on the basis of education. Maybe due to the underlying socio-religious practice of Muslim people, they had lower use of contraceptives. Programmers and policy makers could better help young women by increasing intervention activities to have a regular use of contraceptive-covering poor, Dalit and Muslim, and low aged women in order to reduce unintended pregnancy.

Keywords: unintended pregnancy, contraceptive, young women, Nepal

Procedia PDF Downloads 428
409 A Supervised Approach for Detection of Singleton Spam Reviews

Authors: Atefeh Heydari, Mohammadali Tavakoli, Naomie Salim

Abstract:

In recent years, we have witnessed that online reviews are the most important source of customers’ opinion. They are progressively more used by individuals and organisations to make purchase and business decisions. Unfortunately, for the reason of profit or fame, frauds produce deceptive reviews to hoodwink potential customers. Their activities mislead not only potential customers to make appropriate purchasing decisions and organisations to reshape their business, but also opinion mining techniques by preventing them from reaching accurate results. Spam reviews could be divided into two main groups, i.e. multiple and singleton spam reviews. Detecting a singleton spam review that is the only review written by a user ID is extremely challenging due to lack of clue for detection purposes. Singleton spam reviews are very harmful and various features and proofs used in multiple spam reviews detection are not applicable in this case. Current research aims to propose a novel supervised technique to detect singleton spam reviews. To achieve this, various features are proposed in this study and are to be combined with the most appropriate features extracted from literature and employed in a classifier. In order to compare the performance of different classifiers, SVM and naive Bayes classification algorithms were used for model building. The results revealed that SVM was more accurate than naive Bayes and our proposed technique is capable to detect singleton spam reviews effectively.

Keywords: classification algorithms, Naïve Bayes, opinion review spam detection, singleton review spam detection, support vector machine

Procedia PDF Downloads 279
408 West Nile Virus Outbreaks in Canada under Expected Climate Conditions

Authors: Jalila Jbilou, Salaheddine El Adlouni, Pierre Gosselin

Abstract:

Background: West Nile virus is increasingly an important public health issue in North America. In Canada, WVN was officially reported in Toronto and Montréal for the first time in 2001. During the last decade, several WNV events have been reported in several Canadian provinces. The main objective of the present study is to update the frequency of the climate conditions favorable to WNV outbreaks in Canada. Method: Statistical frequency analysis has been used to estimate the return period for climate conditions associated with WNV outbreaks for the 1961–2050 period. The best fit is selected through the Akaike Information Criterion, and the parameters are estimated using the maximum likelihood approach. Results: Results show that the climate conditions related to the 2002 event, for Montreal and Toronto, are becoming more frequent. For Saskatoon, the highest DD20 events recorded for the last few decades were observed in 2003 and 2007. The estimated return periods are 30 years and 70 years, respectively. Conclusion: The emergence of WNV was related to extremely high DD values in the summer. However, some exceptions may be related to several factors such as virus persistence, vector migration, and also improved diagnosis and reporting levels. It is clear that such climate conditions have become much more common in the last decade and will likely continue to do so over future decades.

Keywords: West Nile virus, climate, North America, statistical frequency analysis, risk estimation, public health, modeling, scenario, temperature, precipitation

Procedia PDF Downloads 320
407 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach

Authors: Rajvir Kaur, Jeewani Anupama Ginige

Abstract:

With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.

Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall

Procedia PDF Downloads 248
406 Catastrophic Burden and Impoverishment Effect of WASH Diseases: A Ground Analysis of Bhadohi District Uttar Pradesh, India

Authors: Jyoti Pandey, Rajiv Kumar Bhatt

Abstract:

In the absence of proper sanitation, people suffered from high levels of infectious diseases leading to high incidences of morbidity and mortality. This directly affected the ability of a country to maintain an efficient economy and implied great personal suffering among infected individuals and their families. This paper aims to estimate the catastrophic expenditure of households in terms of direct and indirect losses which a person has to face due to the illness of WASH diseases; the severity of the scenario is answered by finding out the impoverishment effect. We used the primary data survey for the objective outlined. Descriptive and analytical research types are used. The survey is done with the questionnaire formulated precisely, taking care of the inclusion of all the variables and probable outcomes. A total of 300 households is covered under this study. In order to pursue the objectives outlined, multistage random sampling of households is used. In this study, the cost of illness approach is followed for accessing economic impact. The study brought out the attention that a significant portion of the total consumption expenditure is going lost for the treatment of water and sanitation related diseases. The infectious and water vector-borne disease can be checked by providing sufficient required sanitation facility, and that 2.02% loss in income can be gained if the mechanisms of the pathogen is checked.

Keywords: water, sanitation, impoverishment, catastrophic expenditure

Procedia PDF Downloads 54
405 Single Ion Transport with a Single-Layer Graphene Nanopore

Authors: Vishal V. R. Nandigana, Mohammad Heiranian, Narayana R. Aluru

Abstract:

Graphene material has found tremendous applications in water desalination, DNA sequencing and energy storage. Multiple nanopores are etched to create opening for water desalination and energy storage applications. The nanopores created are of the order of 3-5 nm allowing multiple ions to transport through the pore. In this paper, we present for the first time, molecular dynamics study of single ion transport, where only one ion passes through the graphene nanopore. The diameter of the graphene nanopore is of the same order as the hydration layers formed around each ion. Analogous to single electron transport resulting from ionic transport is observed for the first time. The current-voltage characteristics of such a device are similar to single electron transport in quantum dots. The current is blocked until a critical voltage, as the ions are trapped inside a hydration shell. The trapped ions have a high energy barrier compared to the applied input electrical voltage, preventing the ion to break free from the hydration shell. This region is called “Coulomb blockade region”. In this region, we observe zero transport of ions inside the nanopore. However, when the electrical voltage is beyond the critical voltage, the ion has sufficient energy to break free from the energy barrier created by the hydration shell to enter into the pore. Thus, the input voltage can control the transport of the ion inside the nanopore. The device therefore acts as a binary storage unit, storing 0 when no ion passes through the pore and storing 1 when a single ion passes through the pore. We therefore postulate that the device can be used for fluidic computing applications in chemistry and biology, mimicking a computer. Furthermore, the trapped ion stores a finite charge in the Coulomb blockade region; hence the device also acts a super capacitor.

Keywords: graphene nanomembrane, single ion transport, Coulomb blockade, nanofluidics

Procedia PDF Downloads 297
404 Two-Dimensional Material-Based Negative Differential Resistance Device with High Peak-to- Valley Current Ratio for Multi-Valued Logic Circuits

Authors: Kwan-Ho Kim, Jin-Hong Park

Abstract:

The multi-valued logic (MVL) circuits, which can handle more than two logic states, are one of the promising solutions to overcome the bit density limitations of conventional binary logic systems. Recently, tunneling devices such as Esaki diode and resonant tunneling diode (RTD) have been extensively explored to construct the MVL circuits. These tunneling devices present a negative differential resistance (NDR) phenomenon in which a current decreases as a voltage increases in a specific applied voltage region. Due to this non-monotonic current behavior, the tunneling devices have more than two threshold voltages, consequently enabling construction of MVL circuits. Recently, the emergence of two dimensional (2D) van der Waals (vdW) crystals has opened up the possibility to fabricate such tunneling devices easily. Owing to the defect-free surface of the 2D crystals, a very abrupt junction interface could be formed through a simple stacking process, which subsequently allowed the implementation of a high-performance tunneling device. Here, we report a vdW heterostructure based tunneling device with multiple threshold voltages, which was fabricated with black phosphorus (BP) and hafnium diselenide (HfSe₂). First, we exfoliated BP on the SiO₂ substrate and then transferred HfSe₂ on BP using dry transfer method. The BP and HfSe₂ form type-Ⅲ heterojunction so that the highly doped n+/p+ interface can be easily implemented without additional electrical or chemical doping process. Owing to high natural doping at the junction, record high peak to valley ratio (PVCR) of 16 was observed to the best our knowledge in 2D materials based NDR device. Furthermore, based on this, we first demonstrate the feasibility of the ternary latch by connecting two multi-threshold voltage devices in series.

Keywords: two dimensional van der Waals crystal, multi-valued logic, negative differential resistnace, tunneling device

Procedia PDF Downloads 184
403 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 118
402 Microstructure, Mechanical and Tribological Properties of (TiTaZrNb)Nx Medium Entropy Nitride Coatings: Influence of Nitrogen Content and Bias Voltage

Authors: Mario Alejandro Grisales, M. Daniela Chimá, Gilberto Bejarano Gaitán

Abstract:

High entropy alloys (HEA) and nitride (HEN) are currently very attractive to the automotive, aerospace, metalworking and materials forming manufacturing industry, among others, for exhibiting higher mechanical properties, wear resistance, and thermal stability than binary and ternary alloys. In this work medium-entropy coatings of TiTaZrNb and the nitrides of (TiTaZrNb)Nx were synthesized on to AISI 420 and M2 steel samples by the direct current magnetron sputtering technique. The influence of the bias voltage supplied to the substrate on the microstructure, chemical- and phase composition of the matrix coating was evaluated, and the effect of nitrogen flow on the microstructural, mechanical and tribological properties of the corresponding nitrides was studied. A change in the crystalline structure from BCC for TiTaZrNb coatings to FCC for (TiTaZrNb)Nx was observed, that is associated with the incorporation of nitrogen into the matrix and the consequent formation of a solid solution of (TiTaZrNb)Nx. An increase in hardness and residual stresses was observed with increasing bias voltage for TiTaZrNb, reaching 12.8 GPa for the coating deposited with a bias of -130V. In the case of (TiTaZrNb)Nx nitride, a greater hardness of 23 GPa is achieved for the coating deposited with a N2 flow of 12 sccm, which slightly drops to 21.7 GPa for that deposited with N2 flow of 15 sccm. The slight reduction in hardness could be associated with the precipitation of the TiN and ZrN phases that are formed at higher nitrogen flows. The specific wear rate of the deposited coatings ranged between 0.5xexp13 and 0.6xexp13 N/m2. The steel substrate exhibited an average hardness of 2.0 GPa and a specific wear rate of 203.2exp13 N/m2. Both the hardness and the specific wear rate of the synthesized nitride coatings were higher than that of the steel substrate, showing a protective effect of the steel against wear.

Keywords: medium entropy coatings, hard coatings, magnetron sputtering, tribology, wear resistance

Procedia PDF Downloads 41
401 Design of a Thrust Vectoring System for an Underwater ROV

Authors: Isaac Laryea

Abstract:

Underwater remote-operated vehicles (ROVs) are highly useful in aquatic research and underwater operations. Unfortunately, unsteady and unpredictable conditions underwater make it difficult for underwater vehicles to maintain a steady attitude during motion. Existing underwater vehicles make use of multiple thrusters positioned at specific positions on their frame to maintain a certain pose. This study proposes an alternate way of maintaining a steady attitude during horizontal motion at low speeds by making use of a thrust vector-controlled propulsion system. The study began by carrying out some preliminary calculations to get an idea of a suitable shape and form factor. Flow simulations were carried out to ensure that enough thrust could be generated to move the system. Using the Lagrangian approach, a mathematical system was developed for the ROV, and this model was used to design a control system. A PID controller was selected for the control system. However, after tuning, it was realized that a PD controller satisfied the design specifications. The designed control system produced an overshoot of 6.72%, with a settling time of 0.192s. To achieve the effect of thrust vectoring, an inverse kinematics synthesis was carried out to determine what angle the actuators need to move to. After building the system, intermittent angular displacements of 10°, 15°, and 20° were given during bench testing, and the response of the control system as well as the servo motor angle was plotted. The final design was able to move in water but was not able to handle large angular displacements as a result of the small angle approximation used in the mathematical model.

Keywords: PID control, thrust vectoring, parallel manipulators, ROV, underwater, attitude control

Procedia PDF Downloads 33
400 Group Attachment Based Intervention® Reduces Toddlers' Fearfulness

Authors: Kristin Lewis, Howard Steele, Anne Murphy, Miriam Steele, Karen Bonuck, Paul Meissner

Abstract:

The present study examines data collected during the randomized control trial (RCT) of the Group Attachment-Based Intervention (GABI©), a trauma-informed, attachment-based intervention aimed at promoting healthy parent-child relationships that support child development. Families received treatment at Treatment Center and were randomly assigned to either the GABI condition or the treatment as usual condition, a parenting class called Systematic Training for Effective Parenting (STEP). Significant improvements in the parent-child relationship have been reported for families participating in GABI, but not in the STEP control group relying on Coding Interactive Behavior (CIB) as applied to 5-minute video-films of mothers and their toddlers in a free play context. This report considers five additional attachment-relevant 'clinical codes' that were also applied to the 5-minute free play sessions. Seventy-two parent-child dyads (38 in GABI and 34 in STEP) were compared to one another at intake and end-of-treatment, on these five-point dimensions: two-parent codes—the dissociation and ignoring; two child codes—simultaneous display of contradictory behavior and fear; and one parent-child code, i.e., role reversal. Overall, scores were low for these clinical codes; thus, a binary measure was computed contrasting no evidence with some evidence of each clinical code. Crosstab analyses indicate that child fear at end-of-treatment was significantly lower among children who participated in GABI (7% or 3 children) as compared to those whose mothers participated in STEP (29% or 10 children) Chi Sq= 6.57 (1), p < .01. Discussion focuses on the potential for GABI to reduce childhood fearfulness and so enhance the child's health.

Keywords: coding interactive behavior, clinical codes, group attachment based intervention, GABI, attachment, fear

Procedia PDF Downloads 93
399 Improving Lane Detection for Autonomous Vehicles Using Deep Transfer Learning

Authors: Richard O’Riordan, Saritha Unnikrishnan

Abstract:

Autonomous Vehicles (AVs) are incorporating an increasing number of ADAS features, including automated lane-keeping systems. In recent years, many research papers into lane detection algorithms have been published, varying from computer vision techniques to deep learning methods. The transition from lower levels of autonomy defined in the SAE framework and the progression to higher autonomy levels requires increasingly complex models and algorithms that must be highly reliable in their operation and functionality capacities. Furthermore, these algorithms have no room for error when operating at high levels of autonomy. Although the current research details existing computer vision and deep learning algorithms and their methodologies and individual results, the research also details challenges faced by the algorithms and the resources needed to operate, along with shortcomings experienced during their detection of lanes in certain weather and lighting conditions. This paper will explore these shortcomings and attempt to implement a lane detection algorithm that could be used to achieve improvements in AV lane detection systems. This paper uses a pre-trained LaneNet model to detect lane or non-lane pixels using binary segmentation as the base detection method using an existing dataset BDD100k followed by a custom dataset generated locally. The selected roads will be modern well-laid roads with up-to-date infrastructure and lane markings, while the second road network will be an older road with infrastructure and lane markings reflecting the road network's age. The performance of the proposed method will be evaluated on the custom dataset to compare its performance to the BDD100k dataset. In summary, this paper will use Transfer Learning to provide a fast and robust lane detection algorithm that can handle various road conditions and provide accurate lane detection.

Keywords: ADAS, autonomous vehicles, deep learning, LaneNet, lane detection

Procedia PDF Downloads 60
398 The Alarming Caesarean-Section Delivery Rate in Addis Ababa, Ethiopia

Authors: Yibeltal T. Bayou, Yohana S. Mashalla, Gloria Thupayagale-Tshweneagae

Abstract:

Background: According to the World Health Organization, caesarean section delivery rates of more than 10-15% caesarean section deliveries in any specific geographic region in the world are not justifiable. The aim of the study was to describe the level and analyse determinants of caesarean section delivery in Addis Ababa. Methods: Data was collected in Addis Ababa using a structured questionnaire administered to 901 women aged 15-49 years through a stratified two-stage cluster sampling technique. Binary logistic regression model was employed to identify predictors of caesarean section delivery. Results: Among the 835 women who delivered their last birth at healthcare facilities, 19.2% of them gave birth by caesarean section. About 9.0% of the caesarean section births were due to mother’s request or service provider’s influence without any medical indication. The caesarean section delivery rate was much higher than the recommended rate particularly among the non-slum residents (27.2%); clients of private healthcare facilities (41.1%); currently married women (20.6%); women with secondary (22.2%) and tertiary (33.6%) level of education; and women belonging to the highest wealth quintile household (28.2%). The majority (65.8%) of the caesarean section clients were not informed about the consequences of caesarean section delivery by service providers. The logistic regression model shows that older age (30-49), secondary and above education, non-slum residence, high-risk pregnancy and receiving adequate antenatal care were significantly positively associated with caesarean section delivery. Conclusion: Despite the unreserved effort towards achieving MDG 5 through safe skilled delivery assistance among others, the high caesarean section rate beyond the recommend limit, and the finding that caesarean sections done without medical indications were also alarming. The government and city administration should take appropriate measures before the problems become setbacks in healthcare provision. Further investigations should focus on the effect of caesarean section delivery on maternal and child health outcomes in the study area.

Keywords: Addis Ababa, caesarean section, mode of delivery, slum residence

Procedia PDF Downloads 380
397 Genomic Sequence Representation Learning: An Analysis of K-Mer Vector Embedding Dimensionality

Authors: James Jr. Mashiyane, Risuna Nkolele, Stephanie J. Müller, Gciniwe S. Dlamini, Rebone L. Meraba, Darlington S. Mapiye

Abstract:

When performing language tasks in natural language processing (NLP), the dimensionality of word embeddings is chosen either ad-hoc or is calculated by optimizing the Pairwise Inner Product (PIP) loss. The PIP loss is a metric that measures the dissimilarity between word embeddings, and it is obtained through matrix perturbation theory by utilizing the unitary invariance of word embeddings. Unlike in natural language, in genomics, especially in genome sequence processing, unlike in natural language processing, there is no notion of a “word,” but rather, there are sequence substrings of length k called k-mers. K-mers sizes matter, and they vary depending on the goal of the task at hand. The dimensionality of word embeddings in NLP has been studied using the matrix perturbation theory and the PIP loss. In this paper, the sufficiency and reliability of applying word-embedding algorithms to various genomic sequence datasets are investigated to understand the relationship between the k-mer size and their embedding dimension. This is completed by studying the scaling capability of three embedding algorithms, namely Latent Semantic analysis (LSA), Word2Vec, and Global Vectors (GloVe), with respect to the k-mer size. Utilising the PIP loss as a metric to train embeddings on different datasets, we also show that Word2Vec outperforms LSA and GloVe in accurate computing embeddings as both the k-mer size and vocabulary increase. Finally, the shortcomings of natural language processing embedding algorithms in performing genomic tasks are discussed.

Keywords: word embeddings, k-mer embedding, dimensionality reduction

Procedia PDF Downloads 95
396 A Supervised Learning Data Mining Approach for Object Recognition and Classification in High Resolution Satellite Data

Authors: Mais Nijim, Rama Devi Chennuboyina, Waseem Al Aqqad

Abstract:

Advances in spatial and spectral resolution of satellite images have led to tremendous growth in large image databases. The data we acquire through satellites, radars and sensors consists of important geographical information that can be used for remote sensing applications such as region planning, disaster management. Spatial data classification and object recognition are important tasks for many applications. However, classifying objects and identifying them manually from images is a difficult task. Object recognition is often considered as a classification problem, this task can be performed using machine-learning techniques. Despite of many machine-learning algorithms, the classification is done using supervised classifiers such as Support Vector Machines (SVM) as the area of interest is known. We proposed a classification method, which considers neighboring pixels in a region for feature extraction and it evaluates classifications precisely according to neighboring classes for semantic interpretation of region of interest (ROI). A dataset has been created for training and testing purpose; we generated the attributes by considering pixel intensity values and mean values of reflectance. We demonstrated the benefits of using knowledge discovery and data-mining techniques, which can be on image data for accurate information extraction and classification from high spatial resolution remote sensing imagery.

Keywords: remote sensing, object recognition, classification, data mining, waterbody identification, feature extraction

Procedia PDF Downloads 313
395 Applying Cationic Porphyrin Derivative 5, 10-Dihexyl-15, 20bis Porphyrin, as Transfection Reagent for Gene Delivery into Mammalian Cells

Authors: Hajar Hosseini Khorami

Abstract:

Porphyrins are organic, aromatic compounds found in heme, cytochrome, cobalamin, chlorophyll , and many other natural products with essential roles in biological processes that their cationic forms have been used as groups of favorable non-viral vectors recently. Cationic porphyrins are self-chromogenic reagents with a high capacity for modifications, great interaction with DNA and protection of DNA from nuclease during delivery of it into a cell with low toxicity. In order to have high efficient gene transfection into the cell while causing low toxicity, genetically manipulations of the non-viral vector, cationic porphyrin, would be useful. In this study newly modified cationic porphyrin derivative, 5, 10-dihexyl-15, 20bis (N-methyl-4-pyridyl) porphyrin was applied. Cytotoxicity of synthesized cationic porphyrin on Chinese Hamster Ovarian (CHO) cells was evaluated by using MTT assay. This cationic derivative is dose-dependent, with low cytotoxicity at the ranges from 100 μM to 0.01μM. It was uptake by cells at high concentration. Using direct non-viral gene transfection method and different concentration of cationic porphyrin were tested on transfection of CHO cells by applying derived transfection reagent with X-tremeGENE HP DNA as a positive control. However, no transfection observed by porphyrin derivative and the parameters tested except for positive control. Results of this study suggested that applying different protocol, and also trying other concentration of cationic porphyrins and DNA for forming a strong complex would increase the possibility of efficient gene transfection by using cationic porphyrins.

Keywords: cationic porphyrins, gene delivery, non-viral vectors, transfection reagents

Procedia PDF Downloads 170
394 Functional Characteristics of Chemosensory Proteins in the Sawyer Beetle Monochamus alternatus Hope

Authors: Saqib Ali, Man-Qun Wang

Abstract:

The Japanese pine sawyer, Monochamus alternatus Hope (Coleoptera: Cerambycidae), is a major pest of pines and it is also the key vector of the exotic pinewood nematode in China. In the present study, we cloned, expressed, and purified a chemosensory protein (CSP) in M. alternatus. We surveyed its expression in various developmental stages of male and female adult tissues and determined its binding affinities for different pine volatiles using a competitive binding fluorescence assay. A CSP known as CSP5 in M. alternatus was obtained from an antennal cDNA library and expressed in Escherichia coli. Quantitative reverse transcription polymerase chain reaction results indicated that the CSP5 gene was mainly expressed in male and female antennae. Competitive binding assays were performed to test the binding affinity of recombinant CSP5 to 13 odour molecules of pine volatiles. The results showed that CSP5 showed very strong binding abilities to myrcene, (+)-β-pinene, and (−)-isolongifolene, whereas the volatiles 2-methoxy-4-vinylphenol, p-cymene, and (+)-limonene oxide have relatively weak binding affinity at pH 5.0. Three volatiles myrcene, (+)-β-pinene, and (−)-isolongifolene may play crucial roles in CSP5 binding with ligands, but this needs further study for confirmation. The sensitivity of insect to host plant volatiles can effectively be used to control and monitor the population through mass trapping as part of integrated pest management programs.

Keywords: olfactory-specific protein, volatiles, competitive binding assay, expression characteristics, qPCR

Procedia PDF Downloads 105
393 Characterization of A390 Aluminum Alloy Produced at Different Slow Shot Speeds Using Assisted Vacuum High-Pressure Die Casting

Authors: Wenbo Yu, Zihao Yuan, Zhipeng Guo, Shoumei Xiong

Abstract:

Under different slow shot speeds in vacuum assisted high pressure die casting (VHPDC) process, plate-shaped specimens of hypereutectic A390 aluminum alloy were produced. According to the results, the vacuum pressure inside the die cavity increased linearly with the increasing slow shot speed at the beginning of mold filling. Meanwhile, it was found that the tensile properties of vacuum die castings were deteriorated by the porosity content. In addition, the average primary Si size varies between 14µm to 23µm, which has a binary functional relationship with the slow shot speeds. Due to the vacuum effect, the castings were treated by T6 heat treatment. After heat treatment, microstructural morphologies revealed that needle-shaped and thin-flaked eutectic Si particles became rounded while Al2Cu dissolved into α-Al matrix. For the as-received sample in-situ tensile test, microcracks firstly initiate at the primary Si particles and propagated along Al matrix with a transgranular fracture mode. In contrast, for the treated sample, the crack initiated at the Al2Cu particles and propagated along Al grain boundaries with an intergranular fracture mode. In-situ three bending test, microcracks firstly formed in the primary Si particles for both samples. Subsequently, the cracks between primary Si linked along Al grain boundaries in as received sample. In contrast, the cracks in primary Si linked through the solid lines in Al matrix. Furthermore, the fractography revealed that the fracture mechanism has evolved from brittle transgranular fracture to a fracture mode with many dimples after heat treatment.

Keywords: A390 aluminum, vacuum assisted high pressure die casting, heat treatment, mechanical properties

Procedia PDF Downloads 213
392 Time Parameter Based for the Detection of Catastrophic Faults in Analog Circuits

Authors: Arabi Abderrazak, Bourouba Nacerdine, Ayad Mouloud, Belaout Abdeslam

Abstract:

In this paper, a new test technique of analog circuits using time mode simulation is proposed for the single catastrophic faults detection in analog circuits. This test process is performed to overcome the problem of catastrophic faults being escaped in a DC mode test applied to the inverter amplifier in previous research works. The circuit under test is a second-order low pass filter constructed around this type of amplifier but performing a function that differs from that of the previous test. The test approach performed in this work is based on two key- elements where the first one concerns the unique square pulse signal selected as an input vector test signal to stimulate the fault effect at the circuit output response. The second element is the filter response conversion to a square pulses sequence obtained from an analog comparator. This signal conversion is achieved through a fixed reference threshold voltage of this comparison circuit. The measurement of the three first response signal pulses durations is regarded as fault effect detection parameter on one hand, and as a fault signature helping to hence fully establish an analog circuit fault diagnosis on another hand. The results obtained so far are very promising since the approach has lifted up the fault coverage ratio in both modes to over 90% and has revealed the harmful side of faults that has been masked in a DC mode test.

Keywords: analog circuits, analog faults diagnosis, catastrophic faults, fault detection

Procedia PDF Downloads 414
391 Argumentation Frameworks and Theories of Judging

Authors: Sonia Anand Knowlton

Abstract:

With the rise of artificial intelligence, computer science is becoming increasingly integrated in virtually every area of life. Of course, the law is no exception. Through argumentation frameworks (AFs), computer scientists have used abstract algebra to structure the legal reasoning process in a way that allows conclusions to be drawn from a formalized system of arguments. In AFs, arguments compete against each other for logical success and are related to one another through the binary operation of the attack. The prevailing arguments make up the preferred extension of the given argumentation framework, telling us what set of arguments must be accepted from a logical standpoint. There have been several developments of AFs since its original conception in the early 90’s in efforts to make them more aligned with the human reasoning process. Generally, these developments have sought to add nuance to the factors that influence the logical success of competing arguments (e.g., giving an argument more logical strength based on the underlying value it promotes). The most cogent development was that of the Extended Argumentation Framework (EAF), in which attacks can themselves be attacked by other arguments, and the promotion of different competing values can be formalized within the system. This article applies the logical structure of EAFs to current theoretical understandings of judicial reasoning to contribute to theories of judging and to the evolution of AFs simultaneously. The argument is that the main limitation of EAFs, when applied to judicial reasoning, is that they require judges to themselves assign values to different arguments and then lexically order these values to determine the given framework’s preferred extension. Drawing on John Rawls’ Theory of Justice, the examination that follows is whether values are lexical and commensurable to this extent. The analysis that follows then suggests a potential extension of the EAF system with an approach that formalizes different “planes of attack” for competing arguments that promote lexically ordered values. This article concludes with a summary of how these insights contribute to theories of judging and of legal reasoning more broadly, specifically in indeterminate cases where judges must turn to value-based approaches.

Keywords: computer science, mathematics, law, legal theory, judging

Procedia PDF Downloads 35