Search results for: calendar anomalies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 316

Search results for: calendar anomalies

136 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems

Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano

Abstract:

The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.

Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring

Procedia PDF Downloads 120
135 Investigation of the Litho-Structure of Ilesa Using High Resolution Aeromagnetic Data

Authors: Oladejo Olagoke Peter, Adagunodo T. A., Ogunkoya C. O.

Abstract:

The research investigated the arrangement of some geological features under Ilesa employing aeromagnetic data. The obtained data was subjected to various data filtering and processing techniques, which are Total Horizontal Derivative (THD), Depth Continuation and Analytical Signal Amplitude using Geosoft Oasis Montaj 6.4.2 software. The Reduced to the Equator –Total Magnetic Intensity (TRE-TMI) outcomes reveal significant magnetic anomalies, with high magnitude (55.1 to 155 nT) predominantly at the Northwest half of the area. Intermediate magnetic susceptibility, ranging between 6.0 to 55.1 nT, dominates the eastern part, separated by depressions and uplifts. The southern part of the area exhibits a magnetic field of low intensity, ranging from -76.6 to 6.0 nT. The lineaments exhibit varying lengths ranging from 2.5 and 16.0 km. Analyzing the Rose Diagram and the analytical signal amplitude indicates structural styles mainly of E-W and NE-SW orientations, particularly evident in the western, SW and NE regions with an amplitude of 0.0318nT/m. The identified faults in the area demonstrate orientations of NNW-SSE, NNE-SSW and WNW-ESE, situated at depths ranging from 500 to 750 m. Considering the divergence magnetic susceptibility, structural style or orientation of the lineaments, identified fault and their depth, these lithological features could serve as a valuable foundation for assessing ground motion, particularly in the presence of sufficient seismic energy.

Keywords: lineament, aeromagnetic, anomaly, fault, magnetic

Procedia PDF Downloads 36
134 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 22
133 On the Absence of BLAD, CVM, DUMPS and BC Autosomal Recessive Mutations in Stud Bulls of the Local Alatau Cattle Breed of the Republic of Kazakhstan

Authors: Yessengali Ussenbekov, Valery Terletskiy, Orik Zhanserkenova, Shynar Kasymbekova, Indira Beyshova, Aitkali Imanbayev, Almas Serikov

Abstract:

Currently, there are 46 hereditary diseases afflicting cattle with known molecular genetic diagnostic methods developed for them. Genetic anomalies frequently occur in the Holstein cattle breeds from American and Canadian bloodlines. The data on the incidence of BLAD, CVM, DUMPS and BC autosomal recessive lethal mutations in pedigree animals are discordant, the detrimental allele incidence rates are high for the Holstein cattle breed, whereas the incidence rates of these mutations are low in some breeds or they are completely absent. Data were obtained on the basis of frozen semen of stud bulls. DNA was extracted from the semen with the DNA-Sorb-B extraction kit. The lethal mutation in the genes CD18, SLC35A3, UMP and ASS of Alatau stud bulls (N=124) was detected by polymerase chain reaction and RFLP analysis. It was established that stud bulls of the local Alatau breed were not carriers of the BLAD, CVM, DUMPS, and BC detrimental mutations. However, with a view to preventing the dissemination of hereditary diseases it is recommended to monitor the pedigree stock using molecular genetic methods.

Keywords: PCR, autosomal recessive point mutation, BLAD, CVM, DUMPS, BC, stud bulls

Procedia PDF Downloads 409
132 Financial Performance Model of Local Economic Enterprises in Matalam, Cotabato

Authors: Kristel Faye Tandog

Abstract:

The State Owned Enterprise (SOE) or also called Public Enterprise (PE) has been playing a vital role in a country’s social and economic development. Following this idea, this study focused on the Factor Structures of Financial Performance of the Local Economic Enterprises (LEEs) namely: Food Court, Market, Slaughterhouse, and Terminal in Matalam, Cotabato. It aimed to determine the profile of the LEEs in terms of organizational structure, manner of creation, years in operation, source of initial operating requirements, annual operating budget, geographical location, and size or description of the facility. This study also included the different financial ratios of LEE that covered a five year period from Calendar Year 2009 to 2013. Primary data using survey questionnaire was administered to 468 respondents and secondary data were sourced out from the government archives and financial documents of the said LGU. There were 12 dominant factors identified namely: “management”, “enforcement of laws”, “strategic location”, “existence of non-formal competitors”, “proper maintenance”, “pricing”, “customer service”, “collection process”, “rentals and services”, “efficient use of resources”, “staffing”, and “timeliness and accuracy”. On the other hand, the financial performance of the LEE of Matalam, Cotabato using financial ratios needs reformatting. This denotes that refinement as to the following ratios: Cash Flow Indicator, Activity, Profitability and Growth is necessary. The cash flow indicator ratio showed difficulty in covering its debts in successive years. Likewise, the activity ratios showed that the LEE had not been effective in putting its investment at work. Moreover, profitability ratios revealed that it had operated in minimum capacity and had incurred net losses and thus, it had a weak profit performance. Furthermore, growth ratios showed that LEE had a declining growth trend particularly in net income.

Keywords: factor structures, financial performance, financial ratios, state owned enterprises

Procedia PDF Downloads 228
131 Recommendations Using Online Water Quality Sensors for Chlorinated Drinking Water Monitoring at Drinking Water Distribution Systems Exposed to Glyphosate

Authors: Angela Maria Fasnacht

Abstract:

Detection of anomalies due to contaminants’ presence, also known as early detection systems in water treatment plants, has become a critical point that deserves an in-depth study for their improvement and adaptation to current requirements. The design of these systems requires a detailed analysis and processing of the data in real-time, so it is necessary to apply various statistical methods appropriate to the data generated, such as Spearman’s Correlation, Factor Analysis, Cross-Correlation, and k-fold Cross-validation. Statistical analysis and methods allow the evaluation of large data sets to model the behavior of variables; in this sense, statistical treatment or analysis could be considered a vital step to be able to develop advanced models focused on machine learning that allows optimized data management in real-time, applied to early detection systems in water treatment processes. These techniques facilitate the development of new technologies used in advanced sensors. In this work, these methods were applied to identify the possible correlations between the measured parameters and the presence of the glyphosate contaminant in the single-pass system. The interaction between the initial concentration of glyphosate and the location of the sensors on the reading of the reported parameters was studied.

Keywords: glyphosate, emergent contaminants, machine learning, probes, sensors, predictive

Procedia PDF Downloads 85
130 Geological, Geochronological, Geochemical, and Geophysical Characteristics of the Dalli Porphyry Cu-Au Deposit in Central Iran; Implications for Exploration

Authors: Hooshag Asadi Haroni, Maryam Veiskarami, Yongjun Lu

Abstract:

The Dalli gold-rich porphyry deposit (17 Mt @ 0.5% Cu and 0.65 g/t Au) is located in the Urumieh-Dokhtar Magmatic Arc (UDMA), a small segment of the Tethyan metallogenic belt, hosting several porphyry Cu (Mo-Au) systems in Iran. This research characterizes the Dalli deposit to define exploration criteria in advanced exploration such as the drilling of possible blind porphyry centers. Geological map, trench/drill hole geochemical and ground magnetic data, and age dating and isotope trace element analyses, carried out at the John De Laeter Research Center of Curtin University, were used to characterize the Delli deposit. Mineralization at Dalli is hosted by NE-trending quartz-diorite porphyry stocks (~ 200m in diameter) intruded by a wall-rock andesite porphyry. Disseminated and stockwork Cu-Au mineralization is related to potassic alteration, comprising magnetite, late K-feldspar and biotite, and quartz-sericite-specularite overprint, surrounded by extensive barren argillic and propylitic alterations. In the peripheries of the porphyry centers, there are N-trending vuggy quartz veins, hosting epithermal Au-Ag-As-Sb mineralization. Geochemical analyses of drill core samples showed that the core of the porphyry stocks is low-grade, whereas the high-grade disseminated and stockwork mineralization (~ 1% Cu and ~ 1.2 g/t Au) occurred at the contact of the porphyry stocks and andesite porphyry. Geochemical studies of the drill hole and trench samples showed a strong correlation between Cu and Au and both show a second-order correlation with Fe and As. Magnetic survey revealed two significant magnetic anomalies, associated with intensive potassic alteration, in the reduced-to-the-pole magnetic map of the area. A relatively weaker magnetic anomaly, showing no surface porphyry expressions, is located on a lithocap, consisting of advanced argillic alteration, vuggy quartz veins, and surface expressions of epithermal geochemical signatures. The association of the lithocap and the weak magnetic anomaly could be indicative of a hidden mineralized porphyry center. Litho-geochemical analyses of the least altered Dalli intrusions and volcanic rocks indicated high Sr/Y (49-61) and Eu/Eu* (0.89-0.92), features typical of Cu porphyries. The U-Pb dating of zircons of the mineralized quartz diorite and andesite porphyry, carried out by laser ablation inductively coupled plasma mass spectrometry, yielded magmatic crystallization ages of 15.4-16.0 Ma (Middle Miocene). The zircon trace element concentrations of Dalli are characterized by high Eu/Eu* (0.3-0.8), (Ce/Nd)/Y (0.01-0.3), and 10000*(Eu/Eu*)/Y (2-15) ratios, similar to fertile porphyry suites such as the giant Sar-Cheshmeh and Qulong porphyry Cu deposits along the Tethyan belt. This suggests that the Middle Miocene Dalli intrusions are fertile and require extensive deep drillings to define their potential. Chondrite-normalized rare earth element (REE) patterns show no significant Eu anomalies, and are characterized by light-REE enrichments (La/Sm)n = 2.57–6.40). In normalized multi-element diagrams, analyzed rocks are characterized by enrichments in large ion lithophile elements (LILE) and depletions in high field strength elements (HFSE), and display typical features of subduction-related calc-alkaline magmas. The characteristics of the Dalli deposit provided several recognition criteria for detailed exploration of Cu-Au porphyry deposits and highlighted the importance of the UDMA as a potentially significant, economically important, but relatively underexplored porphyry province.

Keywords: porphyry, gold, geochronology, magnetic, exploration

Procedia PDF Downloads 19
129 Entrepreneurial Leadership in a Startup Context: A Comparative Study on Two Egyptian Startup Businesses

Authors: Nada Basset

Abstract:

Problem Statement: The study examines the important role of leading change inside start-ups and highlights the challenges faced by an entrepreneur during the startup phase of the business. Research Methods/Procedures/Approaches: A qualitative research approach is taken, using the case study analysis method. A comparative study was made between two day care nurseries in Greater Cairo. Non-probability purposive sampling was used and a triangulation of semi-structured interviews, document analysis and participant-observation were applied simultaneously. The in-depth case study analysis took place over a longitudinal study of four calendar months. Results/Findings: Findings demonstrated that leading change in an entrepreneurial setup must be initiated by the entrepreneur, who must also be the owner of the change process. Another important finding showed that the culture of change, although created by the entrepreneur, needs the support and engagement of followers, who should be sharing the same value system and vision of the entrepreneur. Conclusions and Implications: An important implication suggests that during the first year of a start-up lifecycle, special emphasis must be made to the recruitment and selection of personnel, who should play a role into setting the new start-up culture and help it grow or shrink. Another drawn conclusion is that the success of the change must be measured in both quantitative and qualitative terms. Increasing revenues and customer attrition rates -as quantitative KPIs- must be aligned with other qualitative KPIs like customer satisfaction, employee satisfaction, and organizational commitment and business reputation. Originality of Paper: The paper addresses change management in an entrepreneurial concept, with an empirical application on an Egyptian start-up model providing a service to both adults and children. This privileges the research as the constructs measured merged together the level of satisfaction of employees, decision-makers (parents of children), and the users (children).

Keywords: leadership, change management, entrepreneurship, startup business

Procedia PDF Downloads 155
128 Application of Hydrological Engineering Centre – River Analysis System (HEC-RAS) to Estuarine Hydraulics

Authors: Julia Zimmerman, Gaurav Savant

Abstract:

This study aims to evaluate the efficacy of the U.S. Army Corp of Engineers’ River Analysis System (HEC-RAS) application to modeling the hydraulics of estuaries. HEC-RAS has been broadly used for a variety of riverine applications. However, it has not been widely applied to the study of circulation in estuaries. This report details the model development and validation of a combined 1D/2D unsteady flow hydraulic model using HEC-RAS for estuaries and they are associated with tidally influenced rivers. Two estuaries, Galveston Bay and Delaware Bay, were used as case studies. Galveston Bay, a bar-built, vertically mixed estuary, was modeled for the 2005 calendar year. Delaware Bay, a drowned river valley estuary, was modeled from October 22, 2019, to November 5, 2019. Water surface elevation was used to validate both models by comparing simulation results to NOAA’s Center for Operational Oceanographic Products and Services (CO-OPS) gauge data. Simulations were run using the Diffusion Wave Equations (DW), the Shallow Water Equations, Eulerian-Lagrangian Method (SWE-ELM), and the Shallow Water Equations Eulerian Method (SWE-EM) and compared for both accuracy and computational resources required. In general, the Diffusion Wave Equations results were found to be comparable to the two Shallow Water equations sets while requiring less computational power. The 1D/2D combined approach was valid for study areas within the 2D flow area, with the 1D flow serving mainly as an inflow boundary condition. Within the Delaware Bay estuary, the HEC-RAS DW model ran in 22 minutes and had an average R² value of 0.94 within the 2-D mesh. The Galveston Bay HEC-RAS DW ran in 6 hours and 47 minutes and had an average R² value of 0.83 within the 2-D mesh. The longer run time and lower R² for Galveston Bay can be attributed to the increased length of the time frame modeled and the greater complexity of the estuarine system. The models did not accurately capture tidal effects within the 1D flow area.

Keywords: Delaware bay, estuarine hydraulics, Galveston bay, HEC-RAS, one-dimensional modeling, two-dimensional modeling

Procedia PDF Downloads 171
127 Magnetic Investigation and 2½D Gravity Profile Modelling across the Beattie Magnetic Anomaly in the Southeastern Karoo Basin, South Africa

Authors: Christopher Baiyegunhi, Oswald Gwavava

Abstract:

The location/source of the Beattie magnetic anomaly (BMA) and interconnectivity of geologic structures at depth have been a topic of investigation for over 30 years. Up to now, no relationship between geological structures (interconnectivity of dolerite intrusions) at depth has been established. Therefore, the environmental impact of fracking the Karoo for shale gas could not be assessed despite the fact that dolerite dykes are groundwater localizers in the Karoo. In this paper, we shed more light to the unanswered questions concerning the possible location of the source of the BMA, the connectivity of geologic structures like dolerite dykes and sills at depth and this relationship needs to be established before the tectonic evolution of the Karoo basin can be fully understood and related to fracking of the Karoo for shale gas. The result of the magnetic investigation and modelling of four gravity profiles that crosses the BMA in the study area reveals that the anomaly, which is part of the Beattie magnetic anomaly tends to divide into two anomalies and continue to trend in an NE-SW direction, the dominant gravity signatures is of long wavelength that is due to a deep source/interface inland and shallows towards the coast, the average depth to the top of the shallow and deep magnetic sources was estimated to be approximately 0.6 km and 15 km, respectively. The BMA become stronger with depth which could be an indication that the source(s) is deep possibly a buried body in the basement. The bean-shaped anomaly also behaves in a similar manner like the BMA thus it could possibly share the same source(s) with the BMA.

Keywords: Beattie magnetic anomaly, magnetic sources, modelling, Karoo Basin

Procedia PDF Downloads 523
126 Empowering Volunteers at Tawanchai Centre for Patients with Cleft Lip and Palate

Authors: Suteera Pradubwong, Darawan Augsornwan, Pornpen Pathumwiwathana, Benjamas Prathanee, Bowornsilp Chowchuen

Abstract:

Background: Cleft lip and palate (CLP) congenital anomalies have a high prevalence in the Northeast of Thailand. A care team’s understand of treatment plan would help to guide the family of patients with CLP to achieve the treatment. Objectives: To examine the impact of the empowering volunteer project, established in the northeast Thailand. Materials and Methods: The Empowering Volunteer project was conducted in 2008 under the Tawanchai Royal Granted project. The patients and family’s general information, treatment, the group brainstorming, and satisfaction with the project were analyzed. Results: Participants were 12 children with CLP, their families and five volunteers with CLP; the participating patients were predominantly females and the mean, age was 12.2 years. The treatment comprised of speech training, dental hygiene care, bone graft and orthodontic treatment. Four issues were addressed including: problems in taking care of breast feeding; instructions’ needs for care at birth; difficulty in access information and society impact; and needs in having a network of volunteers. Conclusions: Empowering volunteer is important for holistic care of patients with CLP which provides easy access and multiple channels for patients and their families. It should be developed as part of the self-help and family support group, the development of community based team and comprehensive CLP care program.

Keywords: self-help and family support group, community based model, volunteer, cleft lip-cleft palate

Procedia PDF Downloads 257
125 Radiologic Assessment of Orbital Dimensions Among Omani Subjects: Computed Tomography Imaging-Based Study

Authors: Marwa Al-Subhi, Eiman Al-Ajmi, Mallak Al-Maamari, Humood Al-Dhuhli, Srinivasa Rao

Abstract:

The orbit and its contents are affected by various pathologies and craniofacial anomalies. Sound knowledge of the normal orbital dimensions is clinically essential for successful surgical outcomes and also in the field of forensic anthropology. Racial, ethnic, and regional variations in the orbital dimensions have been reported. This study sought to determine the orbital dimensions of Omani subjects who had been referred for computed tomography (CT) images at a tertiary care hospital. A total of 273 patients’ CT images were evaluated retrospectively by using an electronic medical records database. The orbital dimensions were recorded using both axial and sagittal planes of CT images. The mean orbital index (OI) was found to be 83.25±4.83 and the prevalent orbital type was categorized as mesoseme. The mean orbital index was 83.34±5.05 and 83.16±4.57 in males and females, respectively, with their difference being statistically not significant (p=0.76). A statistically significant association was observed between the right and left orbits with regard to horizontal distance (p<0.05) and vertical distance (p<0.01) of orbit and OI (p<0.05). No significant difference between the OI and age groups was observed in both males and females. The mean interorbital distance and interzygomatic distance were found to be 19.45±1.52 mm and 95.59±4.08 mm, respectively. Both of these parameters were significantly higher in males (p<0.05). Results of the present study provide reference values of orbital dimensions in Omani subjects. The prevalent orbital type of Omani subjects is mesoseme, which is a hallmark of the white race.

Keywords: orbit, orbital index, mesoseme, ethnicity, variation

Procedia PDF Downloads 122
124 Bifid Ureters: Arising Directly from the Separate Calyces and Renal Pelvis of the Kidney: A Case Report

Authors: Yuri Seu, Hyun Jin Park, Jin Seo Park, Yong-Suk Moon, HongtaeKim, Mi-Sun Hur

Abstract:

The present case report describes bifid ureters arising directly from the separate calyces and renal pelvis of the kidney. It was a single common ureter leading away from the bladder, which was separated into incompletely duplicated ureters near the level of the anterior superior iliac supine. These two branches then entered the left kidney through their own courses. Each ureter traveled anterior and posterior to the renal vein, respectively. These two ureters formed a Y-shaped pattern. One ureter coursed anterior to the renal vein with shorter length, and it terminated at the renal pelvis that was divided into major calices in approximately lower two thirds of the kidney. The other ureter coursed posterior to the renal vein with longer length, terminating at approximately the upper third of the kidney. The renal calices in the upper third of the kidney were directly connected to the posterior ureter, whereas the other major calices in the lower two thirds of the kidney formed the renal pelvis connecting to the anterior ureter. Thus, convergence of the major calices was separated according to the terminations of two ureters. These anomalous ureters were traced to the calices of the kidney, thereby providing a reference of a rare variation of the ureter. The bifid ureters arising from the separate calyces and renal pelvis should be considered by radiologists when evaluating images and diagnosing possible complications of these anomalies.

Keywords: bifid ureters, kidney, major calices, renal pelvis

Procedia PDF Downloads 55
123 Machine Learning and Deep Learning Approach for People Recognition and Tracking in Crowd for Safety Monitoring

Authors: A. Degale Desta, Cheng Jian

Abstract:

Deep learning application in computer vision is rapidly advancing, giving it the ability to monitor the public and quickly identify potentially anomalous behaviour from crowd scenes. Therefore, the purpose of the current work is to improve the performance of safety of people in crowd events from panic behaviour through introducing the innovative idea of Aggregation of Ensembles (AOE), which makes use of the pre-trained ConvNets and a pool of classifiers to find anomalies in video data with packed scenes. According to the theory of algorithms that applied K-means, KNN, CNN, SVD, and Faster-CNN, YOLOv5 architectures learn different levels of semantic representation from crowd videos; the proposed approach leverages an ensemble of various fine-tuned convolutional neural networks (CNN), allowing for the extraction of enriched feature sets. In addition to the above algorithms, a long short-term memory neural network to forecast future feature values and a handmade feature that takes into consideration the peculiarities of the crowd to understand human behavior. On well-known datasets of panic situations, experiments are run to assess the effectiveness and precision of the suggested method. Results reveal that, compared to state-of-the-art methodologies, the system produces better and more promising results in terms of accuracy and processing speed.

Keywords: action recognition, computer vision, crowd detecting and tracking, deep learning

Procedia PDF Downloads 122
122 Determination of Hydrocarbon Path Migration from Gravity Data Analysis (Ghadames Basin, Southern Tunisia, North Africa)

Authors: Mohamed Dhaoui, Hakim Gabtni

Abstract:

The migration of hydrocarbons is a fairly complicated process that depends on several parameters, both structural and sedimentological. In this study, we will try to determine secondary migration paths which convey hydrocarbon from their main source rock to the largest reservoir of the Paleozoic petroleum system of the Tunisian part of Ghadames basin. In fact, The Silurian source rock is the main source rock of the Paleozoic petroleum system of the Ghadames basin. However, the most solicited reservoir in this area is the Triassic reservoir TAGI (Trias Argilo-Gréseux Inférieur). Several geochemical studies have confirmed that oil products TAGI come mainly from the Tannezuft Silurian source rock. That being said that secondary migration occurs through the fault system which affects the post-Silurian series. Our study is based on analysis and interpretation of gravity data. The gravity modeling was conducted in the northern part of Ghadames basin and the Telemzane uplift. We noted that there is a close relationship between the location of producing oil fields and gravity gradients which separate the positive and negative gravity anomalies. In fact, the analysis and transformation of the Bouguer anomaly map, and the residual gravity map allowed as understanding the architecture of the Precambrian in the study area, thereafter gravimetric models were established allowed to determine the probable migration path.

Keywords: basement, Ghadames, gravity, hydrocarbon, migration path

Procedia PDF Downloads 324
121 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 45
120 Probing Extensive Air Shower Primaries and Their Interactions by Combining Individual Muon Tracks and Shower Depth

Authors: Moon Moon Devi, Ran Budnik

Abstract:

The current large area cosmic ray detector surface arrays typically measure only the net flux and arrival-time of the charged particles produced in an extensive air shower (EAS). Measurement of the individual charged particles at a surface array will provide additional distinguishing parameters to identify the primary and to map the very high energy interactions in the upper layers of the atmosphere. In turn, these may probe anomalies in QCD interactions at energies beyond the reach of current accelerators. The recent attempts of studying the individual muon tracks are limited in their expandability to larger arrays and can only probe primary particles with energy up to about 10^15.5 eV. New developments in detector technology allow for a realistic cost of large area detectors, however with limitations on energy resolutions, directional information, and dynamic range. In this study, we perform a simulation study using CORSIKA to combine the energy spectrum and lateral spread of the muons with the longitudinal depth (Xmax) of an EAS initiated by a primary at ultra high energies (10¹⁶ – 10¹⁹) eV. Using proton and iron as the shower primaries, we show that the muon observables and Xmax together can be used to distinguish the primary. This study can be used to design a future detector for the surface array, which will be able to enhance our knowledge of primaries and QCD interactions.

Keywords: ultra high energy extensive air shower, muon tracking, air shower primaries, QCD interactions

Procedia PDF Downloads 196
119 Avidity and IgE versus IgG and IgM in Diagnosis of Maternal Toxoplasmosis

Authors: Ghada A. Gamea, Nabila A. Yaseen, Ahmed A. Othman, Ahmed S. Tawfik

Abstract:

Infection with Toxoplasma gondii can cause serious complications in pregnant women, leading to abortion, stillbirth, and congenital anomalies in the fetus. Definitive diagnosis of T. gondii acute infection is therefore critical for the clinical management of a mother and her fetus. This study was conducted on 250 pregnant females in the first trimester who were inpatients or outpatients at Obstetrics and Gynaecology Department at Tanta University Hospital. Screening of the selected females was done for the detection of immunoglobulin (IgG and IgM), and all subjects were submitted to history taking through a questionnaire including personal data, risk factors for Toxoplasma, complaint and history of the present illness. Thirty-eight samples, including 18 IgM +ve and 20 IgM-ve cases were further investigated by the avidity and IgE ELISA tests. The seroprevalence of toxoplasmosis in pregnant women was (42.8%) based on the presence of IgG antibodies in their sera. Contact with cats and consumption of raw or undercooked meat are important risk factors that were associated with toxoplasmosis in pregnant women. By serology, it could be observed that in the IgM +ve group, only one case (5.6%) showed an acute pattern by using the avidity test, though 10 (55.6%) cases were found to be acute by the IgE assay. On the other hand, in the IgM –ve group, 3 (15%) showed low avidity, but none of them was positive by using the IgE assay. In conclusion, there is no single serological test that can be used to confirm whether T. gondii infection is recent or was acquired in the distant past. A panel of tests for detection of toxoplasmosis will certainly have higher discriminatory power than any test alone.

Keywords: diagnosis, serology, seroprevalence, toxoplasmosis

Procedia PDF Downloads 125
118 Impact of Drought on Agriculture in the Upper Middle Gangetic Plain in India

Authors: Reshmita Nath

Abstract:

In this study, we investigate the spatiotemporal characteristics of drought in India and its impact on agriculture during the summer season (April to September). For our analysis, we have used Standardized Precipitation Evapotranspiration Index (SPEI) datasets between 1982 and 2012 at six-month timescale. Based on the criteria SPEI<-1 we obtain the vulnerability map and have found that the Humid subtropical Upper Middle Gangetic Plain (UMGP) region is highly drought prone with an occurrence frequency of 40-45%. This UMGP region contributes at least 18-20% of India’s annual cereal production. Not only the probability, but the region becomes more and more drought-prone in the recent decades. Moreover, the cereal production in the UMGP has experienced a gradual declining trend from 2000 onwards and this feature is consistent with the increase in drought affected areas from 20-25% to 50-60%, before and after 2000, respectively. The higher correlation coefficient (-0.69) between the changes in cereal production and drought affected areas confirms that at least 50% of the agricultural (cereal) losses is associated with drought. While analyzing the individual impact of precipitation and surface temperature anomalies on SPEI (6), we have found that in the UMGP region surface temperature plays the primary role in lowering of SPEI. The linkage is further confirmed by the correlation analysis between the SPEI (6) and surface temperature rise, which exhibits strong negative values in the UMGP region. Higher temperature might have caused more evaporation and drying, which therefore increases the area affected by drought in the recent decade.

Keywords: drought, agriculture, SPEI, Indo-Gangetic plain

Procedia PDF Downloads 224
117 Hybrid GNN Based Machine Learning Forecasting Model For Industrial IoT Applications

Authors: Atish Bagchi, Siva Chandrasekaran

Abstract:

Background: According to World Bank national accounts data, the estimated global manufacturing value-added output in 2020 was 13.74 trillion USD. These manufacturing processes are monitored, modelled, and controlled by advanced, real-time, computer-based systems, e.g., Industrial IoT, PLC, SCADA, etc. These systems measure and manipulate a set of physical variables, e.g., temperature, pressure, etc. Despite the use of IoT, SCADA etc., in manufacturing, studies suggest that unplanned downtime leads to economic losses of approximately 864 billion USD each year. Therefore, real-time, accurate detection, classification and prediction of machine behaviour are needed to minimise financial losses. Although vast literature exists on time-series data processing using machine learning, the challenges faced by the industries that lead to unplanned downtimes are: The current algorithms do not efficiently handle the high-volume streaming data from industrial IoTsensors and were tested on static and simulated datasets. While the existing algorithms can detect significant 'point' outliers, most do not handle contextual outliers (e.g., values within normal range but happening at an unexpected time of day) or subtle changes in machine behaviour. Machines are revamped periodically as part of planned maintenance programmes, which change the assumptions on which original AI models were created and trained. Aim: This research study aims to deliver a Graph Neural Network(GNN)based hybrid forecasting model that interfaces with the real-time machine control systemand can detect, predict machine behaviour and behavioural changes (anomalies) in real-time. This research will help manufacturing industries and utilities, e.g., water, electricity etc., reduce unplanned downtimes and consequential financial losses. Method: The data stored within a process control system, e.g., Industrial-IoT, Data Historian, is generally sampled during data acquisition from the sensor (source) and whenpersistingin the Data Historian to optimise storage and query performance. The sampling may inadvertently discard values that might contain subtle aspects of behavioural changes in machines. This research proposed a hybrid forecasting and classification model which combines the expressive and extrapolation capability of GNN enhanced with the estimates of entropy and spectral changes in the sampled data and additional temporal contexts to reconstruct the likely temporal trajectory of machine behavioural changes. The proposed real-time model belongs to the Deep Learning category of machine learning and interfaces with the sensors directly or through 'Process Data Historian', SCADA etc., to perform forecasting and classification tasks. Results: The model was interfaced with a Data Historianholding time-series data from 4flow sensors within a water treatment plantfor45 days. The recorded sampling interval for a sensor varied from 10 sec to 30 min. Approximately 65% of the available data was used for training the model, 20% for validation, and the rest for testing. The model identified the anomalies within the water treatment plant and predicted the plant's performance. These results were compared with the data reported by the plant SCADA-Historian system and the official data reported by the plant authorities. The model's accuracy was much higher (20%) than that reported by the SCADA-Historian system and matched the validated results declared by the plant auditors. Conclusions: The research demonstrates that a hybrid GNN based approach enhanced with entropy calculation and spectral information can effectively detect and predict a machine's behavioural changes. The model can interface with a plant's 'process control system' in real-time to perform forecasting and classification tasks to aid the asset management engineers to operate their machines more efficiently and reduce unplanned downtimes. A series of trialsare planned for this model in the future in other manufacturing industries.

Keywords: GNN, Entropy, anomaly detection, industrial time-series, AI, IoT, Industry 4.0, Machine Learning

Procedia PDF Downloads 116
116 Estimation of Soil Moisture at High Resolution through Integration of Optical and Microwave Remote Sensing and Applications in Drought Analyses

Authors: Donglian Sun, Yu Li, Paul Houser, Xiwu Zhan

Abstract:

California experienced severe drought conditions in the past years. In this study, the drought conditions in California are analyzed using soil moisture anomalies derived from integrated optical and microwave satellite observations along with auxiliary land surface data. Based on the U.S. Drought Monitor (USDM) classifications, three typical drought conditions were selected for the analysis: extreme drought conditions in 2007 and 2013, severe drought conditions in 2004 and 2009, and normal conditions in 2005 and 2006. Drought is defined as negative soil moisture anomaly. To estimate soil moisture at high spatial resolutions, three approaches are explored in this study: the universal triangle model that estimates soil moisture from Normalized Difference Vegetation Index (NDVI) and Land Surface Temperature (LST); the basic model that estimates soil moisture under different conditions with auxiliary data like precipitation, soil texture, topography, and surface types; and the refined model that uses accumulated precipitation and its lagging effects. It is found that the basic model shows better agreements with the USDM classifications than the universal triangle model, while the refined model using precipitation accumulated from the previous summer to current time demonstrated the closest agreements with the USDM patterns.

Keywords: soil moisture, high resolution, regional drought, analysis and monitoring

Procedia PDF Downloads 109
115 Anomaly Detection in Financial Markets Using Tucker Decomposition

Authors: Salma Krafessi

Abstract:

The financial markets have a multifaceted, intricate environment, and enormous volumes of data are produced every day. To find investment possibilities, possible fraudulent activity, and market oddities, accurate anomaly identification in this data is essential. Conventional methods for detecting anomalies frequently fail to capture the complex organization of financial data. In order to improve the identification of abnormalities in financial time series data, this study presents Tucker Decomposition as a reliable multi-way analysis approach. We start by gathering closing prices for the S&P 500 index across a number of decades. The information is converted to a three-dimensional tensor format, which contains internal characteristics and temporal sequences in a sliding window structure. The tensor is then broken down using Tucker Decomposition into a core tensor and matching factor matrices, allowing latent patterns and relationships in the data to be captured. A possible sign of abnormalities is the reconstruction error from Tucker's Decomposition. We are able to identify large deviations that indicate unusual behavior by setting a statistical threshold. A thorough examination that contrasts the Tucker-based method with traditional anomaly detection approaches validates our methodology. The outcomes demonstrate the superiority of Tucker's Decomposition in identifying intricate and subtle abnormalities that are otherwise missed. This work opens the door for more research into multi-way data analysis approaches across a range of disciplines and emphasizes the value of tensor-based methods in financial analysis.

Keywords: tucker decomposition, financial markets, financial engineering, artificial intelligence, decomposition models

Procedia PDF Downloads 21
114 Optimum Design of Hybrid (Metal-Composite) Mechanical Power Transmission System under Uncertainty by Convex Modelling

Authors: Sfiso Radebe

Abstract:

The design models dealing with flawless composite structures are in abundance, where the mechanical properties of composite structures are assumed to be known a priori. However, if the worst case scenario is assumed, where material defects combined with processing anomalies in composite structures are expected, a different solution is attained. Furthermore, if the system being designed combines in series hybrid elements, individually affected by material constant variations, it implies that a different approach needs to be taken. In the body of literature, there is a compendium of research that investigates different modes of failure affecting hybrid metal-composite structures. It covers areas pertaining to the failure of the hybrid joints, structural deformation, transverse displacement, the suppression of vibration and noise. In the present study a system employing a combination of two or more hybrid power transmitting elements will be explored for the least favourable dynamic loads as well as weight minimization, subject to uncertain material properties. Elastic constants are assumed to be uncertain-but-bounded quantities varying slightly around their nominal values where the solution is determined using convex models of uncertainty. Convex analysis of the problem leads to the computation of the least favourable solution and ultimately to a robust design. This approach contrasts with a deterministic analysis where the average values of elastic constants are employed in the calculations, neglecting the variations in the material properties.

Keywords: convex modelling, hybrid, metal-composite, robust design

Procedia PDF Downloads 184
113 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 79
112 Exclusive Value Adding by iCenter Analytics on Transient Condition

Authors: Zhu Weimin, Allegorico Carmine, Ruggiero Gionata

Abstract:

During decades of Baker Hughes (BH) iCenter experience, it is demonstrated that in addition to conventional insights on equipment steady operation conditions, insights on transient conditions can add significant and exclusive value for anomaly detection, downtime saving, and predictive maintenance. Our work shows examples from the BH iCenter experience to introduce the advantages and features of using transient condition analytics: (i) Operation under critical engine conditions: e.g., high level or high change rate of temperature, pressure, flow, vibration, etc., that would not be reachable in normal operation, (ii) Management of dedicated sub-systems or components, many of which are often bottlenecks for reliability and maintenance, (iii) Indirect detection of anomalies in the absence of instrumentation, (iv) Repetitive sequences: if data is properly processed, the engineering features of transients provide not only anomaly detection but also problem characterization and prognostic indicators for predictive maintenance, (v) Engine variables accounting for fatigue analysis. iCenter has been developing and deploying a series of analytics based on transient conditions. They are contributing to exclusive value adding in the following areas: (i) Reliability improvement, (ii) Startup reliability improvement, (iii) Predictive maintenance, (iv) Repair/overhaul cost down. Illustrative examples for each of the above areas are presented in our study, focusing on challenges and adopted techniques ranging from purely statistical approaches to the implementation of machine learning algorithms. The obtained results demonstrate how the value is obtained using transient condition analytics in the BH iCenter experience.

Keywords: analytics, diagnostics, monitoring, turbomachinery

Procedia PDF Downloads 46
111 Opinions and Perceptions of Clinical Staff towards Caring for Obese Patients: A Qualitative Research Study in a Cardiac Centre in Bahrain

Authors: Catherine Mary Abou-Zaid, Sandra Goodwin

Abstract:

This study was conducted in a cardiac center in Bahrain. The rise in the amount of obese patients’ both men and women, being admitted for surgical procedures has become an issue to the nurses and doctors as these patients pose a high risk of major complications arising from their problem. The cessation of obesity in the country is very high and obesity-related diseases has been the cause of concern among men and women, also related individual diseases such as cardiovascular, diabetes and chronic respiratory diseases are rising dramatically within Bahrain in the last 10 years. Rationale for the Study: The ontological approach will help to understand and assess the true nature of the social world and how the world looks at obesity. Obesity has to be looked at as being a realistic ongoing issue. The epistemological approach will look at the theory of the origins of the nature of knowledge, set the rule of validating and learning in the social world of what can be done to curb this concept and how this can help prevent otherwise preventable diseases. Design Methodology: The qualitative design methodology took the form of an ontological/epistemological approach using phenomenology as a framework. The study was based on a social research issue, therefore, ontological ‘realism and idealism’ will feature as the nature of the world from a social and natural context. Epistemological positions of the study will be how we as researchers will find the actual social world and the limiting of that knowledge. The one-to-one interviews will be transcribed and the taped verbatim will be coded and charted giving the thematic analytic results. Recommendations: The significance of the research brought many recommendations. These recommendations were taken from the themes and sub-themes and were presented to the centers management and the necessary arrangements for updating knowledge and attitudes towards obesity in cardiac patients was then presented to the in-service education department. Workshops and training sessions on promoting health education were organized and put into the educational calendar for the next academic year. These sessions would look at patient autonomy, the patients’ rights, healthy eating for patients and families and the risks associated with obesity in cardiac disease processes.

Keywords: cardiac patients, diabetes, education & training, obesity cessation, qualitative

Procedia PDF Downloads 301
110 Integrating Accreditation and Quality Assurance Exercises into the Quranic School System in the South-Western Nigeria

Authors: Popoola Sulaimon Akorede, Muinat A. Agbabiaka-Mustapha

Abstract:

The Quranic / piazza school where the rudiments of Islam are being imparted from the teaching of Arabic/ Quranic alphabets which later metamorphosized to higher fundamental principles of Islam is the major determinant of the existence of Islam in any part of south western Nigeria. In other words, one can successfully say that where there is a few or non-existence of such schools in that part of the country, the practice of the religion of Islam would be either very low or not existing at all. However, it has been discovered in the modern worlds that several challenges are militating against the development of these schools and among these challenges are poor admission policy, inadequate facilities such as learning environment and instructional materials, curriculum inadequacy and the management and the administration of the schools which failed to change in order to meet the modern contemporary Educational challenges. The focus of this paper therefore is to improve the conditions of these basic Islamic schools through the introduction of quality assurance and integrating accreditation Exercise to improve their status in order to enhance economic empowerment and to further their educational career in the future so that they will be able to compete favourably among the graduates of conventional universities. The scope of this study is limited to only seven (7) states of yorubaland and with only three (3) proprietors/ schools from each state which are Lagos, Oyo, Ogun, Osun, Ekiti, Ondo and parts of Kwara State. The study revealed that quality assurance as well as accreditation exercise are lacking in all the local Arabic/Quranic schools. Suggestions are proffered towards correcting the anomalies in these schools so that they can meet the modern Educational standard.

Keywords: accreditation, quality assurance, Quranic schools, South-western Nigeria

Procedia PDF Downloads 348
109 Processing and Modeling of High-Resolution Geophysical Data for Archaeological Prospection, Nuri Area, Northern Sudan

Authors: M. Ibrahim Ali, M. El Dawi, M. A. Mohamed Ali

Abstract:

In this study, the use of magnetic gradient survey, and the geoelectrical ground methods used together to explore archaeological features in Nuri’s pyramids area. Research methods used and the procedures and methodologies have taken full right during the study. The magnetic survey method was used to search for archaeological features using (Geoscan Fluxgate Gradiometer (FM36)). The study area was divided into a number of squares (networks) exactly equal (20 * 20 meters). These squares were collected at the end of the study to give a major network for each region. Networks also divided to take the sample using nets typically equal to (0.25 * 0.50 meter), in order to give a more specific archaeological features with some small bipolar anomalies that caused by buildings built from fired bricks. This definition is important to monitor many of the archaeological features such as rooms and others. This main network gives us an integrated map displayed for easy presentation, and it also allows for all the operations required using (Geoscan Geoplot software). The parallel traverse is the main way to take readings of the magnetic survey, to get out the high-quality data. The study area is very rich in old buildings that vary from small to very large. According to the proportion of the sand dunes and the loose soil, most of these buildings are not visible from the surface. Because of the proportion of the sandy dry soil, there is no connection between the ground surface and the electrodes. We tried to get electrical readings by adding salty water to the soil, but, unfortunately, we failed to confirm the magnetic readings with electrical readings as previously planned.

Keywords: archaeological features, independent grids, magnetic gradient, Nuri pyramid

Procedia PDF Downloads 453
108 The Paradox of Decentralization and Civic Culture: An Exploratory Study Applied to Local Governments in Papua New Guinea

Authors: Francis Wargirai

Abstract:

Since gaining independence in 1975, Papua New Guinea`s core challenge has been the consolidation of democracy against a backdrop of enormous social, political and territorial diversity. Consequently, the government has implemented several political reforms including decentralization. Constitutional planners believed that national unity, would be better achieved by sharing state power over centralization. They anticipated that this would institutionalize a democratic civic culture by providing opportunities to groups and individuals to make political decisions within their jurisdiction. This would then eventually lead to confidence and participation in the larger entity of the state. In retrospect, civil society and community based groups are largely underrated and have had minimal influence on decisions at the local level, consequently contributing to nepotism, patronism and cynicism. By applying an elitist approach to analyze how national political leaders exert their influence and power within the local government system and local communities, this paper argues that decentralization has fragmented local communities. With an absence of political party roots and deeply divided ethnic groups, national political leaders have used divide and rule tactics resulting in mistrust among citizens. Through their influence and power within local governments to dictate projects and services to certain areas, this has resulted in skepticism and divisions among civil society along different cultural cleavages. This has been a contributing factor to anomalies in democratic consolidation and democratic political culture in Papua New Guinea.

Keywords: civic culture, cultural cleavages, decentralization, democratic consolidation

Procedia PDF Downloads 143
107 An Improved Robust Algorithm Based on Cubature Kalman Filter for Single-Frequency Global Navigation Satellite System/Inertial Navigation Tightly Coupled System

Authors: Hao Wang, Shuguo Pan

Abstract:

The Global Navigation Satellite System (GNSS) signal received by the dynamic vehicle in the harsh environment will be frequently interfered with and blocked, which generates gross error affecting the positioning accuracy of the GNSS/Inertial Navigation System (INS) integrated navigation. Therefore, this paper put forward an improved robust Cubature Kalman filter (CKF) algorithm for single-frequency GNSS/INS tightly coupled system ambiguity resolution. Firstly, the dynamic model and measurement model of a single-frequency GNSS/INS tightly coupled system was established, and the method for GNSS integer ambiguity resolution with INS aided is studied. Then, we analyzed the influence of pseudo-range observation with gross error on GNSS/INS integrated positioning accuracy. To reduce the influence of outliers, this paper improved the CKF algorithm and realized an intelligent selection of robust strategies by judging the ill-conditioned matrix. Finally, a field navigation test was performed to demonstrate the effectiveness of the proposed algorithm based on the double-differenced solution mode. The experiment has proved the improved robust algorithm can greatly weaken the influence of separate, continuous, and hybrid observation anomalies for enhancing the reliability and accuracy of GNSS/INS tightly coupled navigation solutions.

Keywords: GNSS/INS integrated navigation, ambiguity resolution, Cubature Kalman filter, Robust algorithm

Procedia PDF Downloads 64