Search results for: confusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 171

Search results for: confusion

141 Working Without a Safety Net: Exploring Struggles and Dilemmas Faced by Greek Orthodox Married Clergy Through a Mental Health Lens, in the Australian Context

Authors: Catherine Constantinidis (Nee Tsacalos)

Abstract:

This paper presents one aspect of the larger Masters qualitative study exploring the roles of married Greek Orthodox clergy, the Priest and Presbytera, under the wing of the Greek Orthodox Archdiocese of Australia. This ground breaking research necessitated the creation of primary data within a phenomenological paradigm drawing from lived experiences of the Priests and Presbyteres in contemporary society. As a Social Worker, a bilingual (Greek/English) Mental Health practitioner and a Presbytera, the questions constantly raised and pondered are: Who do the Priest and Presbytera turn to when they experience difficulties or problems? Where do they go for support? What is in place for their emotional and psychological health and well-being? Who cares for the spiritual carer? Who is there to catch our falling clergy and their wives? What is their 'safety net'? Identified phenomena of angst, stress, frustration and confusion experienced by the Priest and (by extension) the Presbytera, within their position, coupled with basic assumptions, perceptions and expectations about their roles, the role of the organisation (the Church), and their role as spouse often caused confusion and in some cases conflict. Unpacking this complex and multi-dimensional relationship highlighted not only the roller coaster of emotions, potentially affecting their physical and mental health, but also the impact on the interwoven relationships of marriage and ministry. The author considers these phenomena in the light of bilingual cultural and religious organisational practice frameworks, specifically the Greek Orthodox Church, whilst filtering these findings through a mental health lens. One could argue that it is an expectation that clergy (and by default their wives) take on the responsibility to be kind, nurturing and supportive to others. However, when it comes to taking care of self, they are not nearly as kind. This research looks at a recurrent theme throughout the interviews where all participants talked about limited support systems and poor self care strategies and the impact this has on their ministry, mental, emotional, and physical health and ultimately on their relationships with self and others. The struggle all participants encountered at some point in their ministry was physical, spiritual and psychological burn out. The overall aim of the researcher is to provide a voice for the Priest and the Presbytera painting a clearer picture of these roles and facilitating an awareness of struggles and dilemmas faced in their ministry. It is hoped these identified gaps in self care strategies and support systems will provide solid foundations for building a culturally sensitive, empathetic and effective support system framework, incorporating the spiritual and psychological well-being of the Priest and Presbytera, a ‘safety net’. A supplementary aim is to inform and guide ministry practice frameworks for clergy, spouses, the church hierarchy and religious organisations on a local and global platform incorporating some sort of self-care system.

Keywords: care for the carer, mental health, Priest, Presbytera, religion, support system

Procedia PDF Downloads 365
140 Syndromic Surveillance Framework Using Tweets Data Analytics

Authors: David Ming Liu, Benjamin Hirsch, Bashir Aden

Abstract:

Syndromic surveillance is to detect or predict disease outbreaks through the analysis of medical sources of data. Using social media data like tweets to do syndromic surveillance becomes more and more popular with the aid of open platform to collect data and the advantage of microblogging text and mobile geographic location features. In this paper, a Syndromic Surveillance Framework is presented with machine learning kernel using tweets data analytics. Influenza and the three cities Abu Dhabi, Al Ain and Dubai of United Arabic Emirates are used as the test disease and trial areas. Hospital cases data provided by the Health Authority of Abu Dhabi (HAAD) are used for the correlation purpose. In our model, Latent Dirichlet allocation (LDA) engine is adapted to do supervised learning classification and N-Fold cross validation confusion matrix are given as the simulation results with overall system recall 85.595% performance achieved.

Keywords: Syndromic surveillance, Tweets, Machine Learning, data mining, Latent Dirichlet allocation (LDA), Influenza

Procedia PDF Downloads 87
139 Application of Metroxylon Sagu Waste in Textile Process

Authors: Nazlina Shaari

Abstract:

Sustainability is economic, social and environmental systems that make up the community in providing a healthy, productive, meaningful life for all community residents, present and future. The environmental profile of goods and services that satisfy our individual and societal needs were shaped by design activities. The integration of environmental aspect of product design, especially in textiles present much confusion surrounds the incorporation of environmental objectives into the design process. This paper explores the effective use of waste materials that can contribute to the development of more environmentally responsible practice in textile sector. It introduces key elements of the ecological approach and innovative ideas from waste to wealth. The paper focuses on the potential methods of utilizing sago residue as a natural colour enhancer in natural dyeing process. It will discover the potential of waste materials to be fully utilized to attempt to make the production of that textile more environmentally friendly.

Keywords: sustainability, textiles, waste materials, environmentally friendly

Procedia PDF Downloads 277
138 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 659
137 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 204
136 Application First and Second Digits Number in the Benford Law

Authors: Teguh Sugiarto

Abstract:

Background: This study aims to explore the fraud that occurred in the financial statements using the Benford distribution law of 1st and 2nd case study of PT AKR Corporindo Tbk. Research Methods: In this study the authors use the first digit of the analysis and the analysis of the second digit of Bedford’s law. Having obtained the results of the analysis of the first and second digits, authors will make the difference between implementations using the scale above and below 5%. The number that has the level of difference in the range of 5% above or below, then a financial report in may, to analyse in the followup to the direction of the audit investigation, and authors assume happens a confusion in the financial statements. Findings: From research done, we found that there was a difference in the results of the appearance of the first digit of the number with the proper use of Benford's law, according to PT AKR Corporindo financial reports Tbk for the fiscal year 2006-2010, above and below the level the difference in set 5%. Conclusions: From the research that has been done, it can be concluded that on PT AKR Corporindo financial report 2006, 2007, 2008, 2009 and 2010, there is a level difference of appearance of numbers according to Benford's law is significant, as presented in the table analysis.

Keywords: Benford law, first digits, second digits, Indonesian company

Procedia PDF Downloads 406
135 Clothes Identification Using Inception ResNet V2 and MobileNet V2

Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari

Abstract:

To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.

Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing

Procedia PDF Downloads 153
134 Genetic Algorithms for Feature Generation in the Context of Audio Classification

Authors: José A. Menezes, Giordano Cabral, Bruno T. Gomes

Abstract:

Choosing good features is an essential part of machine learning. Recent techniques aim to automate this process. For instance, feature learning intends to learn the transformation of raw data into a useful representation to machine learning tasks. In automatic audio classification tasks, this is interesting since the audio, usually complex information, needs to be transformed into a computationally convenient input to process. Another technique tries to generate features by searching a feature space. Genetic algorithms, for instance, have being used to generate audio features by combining or modifying them. We find this approach particularly interesting and, despite the undeniable advances of feature learning approaches, we wanted to take a step forward in the use of genetic algorithms to find audio features, combining them with more conventional methods, like PCA, and inserting search control mechanisms, such as constraints over a confusion matrix. This work presents the results obtained on particular audio classification problems.

Keywords: feature generation, feature learning, genetic algorithm, music information retrieval

Procedia PDF Downloads 401
133 Using Greywolf Optimized Machine Learning Algorithms to Improve Accuracy for Predicting Hospital Readmission for Diabetes

Authors: Vincent Liu

Abstract:

Machine learning algorithms (ML) can achieve high accuracy in predicting outcomes compared to classical models. Metaheuristic, nature-inspired algorithms can enhance traditional ML algorithms by optimizing them such as by performing feature selection. We compare ten ML algorithms to predict 30-day hospital readmission rates for diabetes patients in the US using a dataset from UCI Machine Learning Repository with feature selection performed by Greywolf nature-inspired algorithm. The baseline accuracy for the initial random forest model was 65%. After performing feature engineering, SMOTE for class balancing, and Greywolf optimization, the machine learning algorithms showed better metrics, including F1 scores, accuracy, and confusion matrix with improvements ranging in 10%-30%, and a best model of XGBoost with an accuracy of 95%. Applying machine learning this way can improve patient outcomes as unnecessary rehospitalizations can be prevented by focusing on patients that are at a higher risk of readmission.

Keywords: diabetes, machine learning, 30-day readmission, metaheuristic

Procedia PDF Downloads 24
132 Ontology-Driven Generation of Radiation Protection Procedures

Authors: Chamseddine Barki, Salam Labidi, Hanen Boussi Rahmouni

Abstract:

In this article, we present the principle and suitable methodology for the design of a medical ontology that highlights the radiological and dosimetric knowledge, applied in diagnostic radiology and radiation-therapy. Our ontology, which we named «Onto.Rap», is the subject of radiation protection in medical and radiology centers by providing a standardized regulatory oversight. Thanks to its added values of knowledge-sharing, reuse and the ease of maintenance, this ontology tends to solve many problems. Of which we name the confusion between radiological procedures a practitioner might face while performing a patient radiological exam. Adding to it, the difficulties they might have in interpreting applicable patient radioprotection standards. Here, the ontology, thanks to its concepts simplification and expressiveness capabilities, can ensure an efficient classification of radiological procedures. It also provides an explicit representation of the relations between the different components of the studied concept. In fact, an ontology based-radioprotection expert system, when used in radiological center, could implement systematic radioprotection best practices during patient exam and a regulatory compliance service auditing afterwards.

Keywords: knowledge, ontology, radiation protection, radiology

Procedia PDF Downloads 285
131 Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks

Authors: Ladaporn Pithuk

Abstract:

This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services.

Keywords: commercial transactions expectations, marketing mixed factors, social networks, consumer behavior

Procedia PDF Downloads 211
130 Classification of Echo Signals Based on Deep Learning

Authors: Aisulu Tileukulova, Zhexebay Dauren

Abstract:

Radar plays an important role because it is widely used in civil and military fields. Target detection is one of the most important radar applications. The accuracy of detecting inconspicuous aerial objects in radar facilities is lower against the background of noise. Convolutional neural networks can be used to improve the recognition of this type of aerial object. The purpose of this work is to develop an algorithm for recognizing aerial objects using convolutional neural networks, as well as training a neural network. In this paper, the structure of a convolutional neural network (CNN) consists of different types of layers: 8 convolutional layers and 3 layers of a fully connected perceptron. ReLU is used as an activation function in convolutional layers, while the last layer uses softmax. It is necessary to form a data set for training a neural network in order to detect a target. We built a Confusion Matrix of the CNN model to measure the effectiveness of our model. The results showed that the accuracy when testing the model was 95.7%. Classification of echo signals using CNN shows high accuracy and significantly speeds up the process of predicting the target.

Keywords: radar, neural network, convolutional neural network, echo signals

Procedia PDF Downloads 315
129 A Comparative Study of k-NN and MLP-NN Classifiers Using GA-kNN Based Feature Selection Method for Wood Recognition System

Authors: Uswah Khairuddin, Rubiyah Yusof, Nenny Ruthfalydia Rosli

Abstract:

This paper presents a comparative study between k-Nearest Neighbour (k-NN) and Multi-Layer Perceptron Neural Network (MLP-NN) classifier using Genetic Algorithm (GA) as feature selector for wood recognition system. The features have been extracted from the images using Grey Level Co-Occurrence Matrix (GLCM). The use of GA based feature selection is mainly to ensure that the database used for training the features for the wood species pattern classifier consists of only optimized features. The feature selection process is aimed at selecting only the most discriminating features of the wood species to reduce the confusion for the pattern classifier. This feature selection approach maintains the ‘good’ features that minimizes the inter-class distance and maximizes the intra-class distance. Wrapper GA is used with k-NN classifier as fitness evaluator (GA-kNN). The results shows that k-NN is the best choice of classifier because it uses a very simple distance calculation algorithm and classification tasks can be done in a short time with good classification accuracy.

Keywords: feature selection, genetic algorithm, optimization, wood recognition system

Procedia PDF Downloads 511
128 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 237
127 Using Automated Agents to Facilitate Instructions in a Large Online Course

Authors: David M Gilstrap

Abstract:

In an online course with a large enrollment, the potential exists for the instructor to become overburdened with having to respond to students’ emails, which consequently decreases the instructor’s efficiency in teaching the course. Repetition of instructions is an effective way of reducing confusion among students, which in turn increases their efficiencies, as well. World of Turf is the largest online course at Michigan State University, which employs Brightspace as its management system (LMS) software. Recently, the LMS upgraded its capabilities to utilize agents, which are auto generated email notifications to students based on certain criteria. Agents are additional tools that can enhance course design. They can be run on-demand or according to a schedule. Agents can be timed to effectively remind students of approaching deadlines. The content of these generated emails can also include reinforced instructions. With a large online course, even a small percentage of students that either do not read or do not comprehend the course syllabus or do not notice instructions on course pages can result in numerous emails to the instructor, often near the deadlines for assignments. Utilizing agents to decrease the number of emails from students has enabled the instructor to efficiently instruct more than one thousand students per semester without any graduate student teaching assistants.

Keywords: agents, Brightspace, large enrollment, learning management system, repetition of instructions

Procedia PDF Downloads 179
126 Expansive-Restrictive Style: Conceptualizing Knowledge Workers

Authors: Ram Manohar Singh, Meenakshi Gupta

Abstract:

Various terms such as ‘learning style’, ‘cognitive style’, ‘conceptual style’, ‘thinking style’, ‘intellectual style’ are used in literature to refer to an individual’s characteristic and consistent approach to organizing and processing information. However, style concepts are criticized for mutually overlapping definitions and confusing classification. This confusion should be addressed at the conceptual as well as empirical level. This paper is an attempt to bridge this gap in literature by proposing a new concept: expansive-restrictive intellectual style based on phenomenological analysis of an auto-ethnography and interview of 26 information technology (IT) professionals working in knowledge intensive organizations (KIOs) in India. Expansive style is an individual’s preference to expand his/her horizon of knowledge and understanding by gaining real meaning and structure of his/her work. On the contrary restrictive style is characterized by an individual’s preference to take minimalist approach at work reflected in executing a job efficiently without an attempt to understand the real meaning and structure of the work. The analysis suggests that expansive-restrictive style has three dimensions: (1) field dependence-independence (2) cognitive involvement and (3) epistemological beliefs.

Keywords: expansive, knowledge workers, restrictive, style

Procedia PDF Downloads 398
125 SEM Image Classification Using CNN Architectures

Authors: Güzi̇n Ti̇rkeş, Özge Teki̇n, Kerem Kurtuluş, Y. Yekta Yurtseven, Murat Baran

Abstract:

A scanning electron microscope (SEM) is a type of electron microscope mainly used in nanoscience and nanotechnology areas. Automatic image recognition and classification are among the general areas of application concerning SEM. In line with these usages, the present paper proposes a deep learning algorithm that classifies SEM images into nine categories by means of an online application to simplify the process. The NFFA-EUROPE - 100% SEM data set, containing approximately 21,000 images, was used to train and test the algorithm at 80% and 20%, respectively. Validation was carried out using a separate data set obtained from the Middle East Technical University (METU) in Turkey. To increase the accuracy in the results, the Inception ResNet-V2 model was used in view of the Fine-Tuning approach. By using a confusion matrix, it was observed that the coated-surface category has a negative effect on the accuracy of the results since it contains other categories in the data set, thereby confusing the model when detecting category-specific patterns. For this reason, the coated-surface category was removed from the train data set, hence increasing accuracy by up to 96.5%.

Keywords: convolutional neural networks, deep learning, image classification, scanning electron microscope

Procedia PDF Downloads 86
124 Systematic Review of Functional Analysis in Brazil

Authors: Felipe Magalhaes Lemos

Abstract:

Functional behavior analysis is a procedure that has been studied for several decades by behavior analysts. In Brazil, we still have few studies in the area, so it was decided to carry out a systematic review of the articles published in the area by Brazilians. A search was done on the following scientific article registration sites: PsycINFO, ERIC, ISI Web of Science, Virtual Health Library. The research includes (a) peer-reviewed studies that (b) have been carried out in Brazil containing (c) functional assessment as a pre-treatment through (d) experimental procedures, direct or indirect observation and measurement of behavior problems (e) demonstrating a relationship between environmental events and behavior. During the review, 234 papers were found; however, only 9 were included in the final analysis. Of the 9 articles extracted, only 2 presented functional analysis procedures with manipulation of environmental variables, while the other 7 presented different procedures for a descriptive behavior assessment. Only the two studies using "functional analysis" used graphs to demonstrate the prevalent function of the behavior. Other studies described procedures and did not make clear the causal relationship between environment and behavior. There is still confusion in Brazil regarding the terms "functional analysis", "descriptive assessment" and "contingency analysis," which are generally treated in the same way. This study shows that few articles are published with a focus on functional analysis in Brazil.

Keywords: behavior, contingency, descriptive assessment, functional analysis

Procedia PDF Downloads 116
123 Framework for Detecting External Plagiarism from Monolingual Documents: Use of Shallow NLP and N-Gram Frequency Comparison

Authors: Saugata Bose, Ritambhra Korpal

Abstract:

The internet has increased the copy-paste scenarios amongst students as well as amongst researchers leading to different levels of plagiarized documents. For this reason, much of research is focused on for detecting plagiarism automatically. In this paper, an initiative is discussed where Natural Language Processing (NLP) techniques as well as supervised machine learning algorithms have been combined to detect plagiarized texts. Here, the major emphasis is on to construct a framework which detects external plagiarism from monolingual texts successfully. For successfully detecting the plagiarism, n-gram frequency comparison approach has been implemented to construct the model framework. The framework is based on 120 characteristics which have been extracted during pre-processing the documents using NLP approach. Afterwards, filter metrics has been applied to select most relevant characteristics and then supervised classification learning algorithm has been used to classify the documents in four levels of plagiarism. Confusion matrix was built to estimate the false positives and false negatives. Our plagiarism framework achieved a very high the accuracy score.

Keywords: lexical matching, shallow NLP, supervised machine learning algorithm, word n-gram

Procedia PDF Downloads 333
122 Engagement Analysis Using DAiSEE Dataset

Authors: Naman Solanki, Souraj Mondal

Abstract:

With the world moving towards online communication, the video datastore has exploded in the past few years. Consequently, it has become crucial to analyse participant’s engagement levels in online communication videos. Engagement prediction of people in videos can be useful in many domains, like education, client meetings, dating, etc. Video-level or frame-level prediction of engagement for a user involves the development of robust models that can capture facial micro-emotions efficiently. For the development of an engagement prediction model, it is necessary to have a widely-accepted standard dataset for engagement analysis. DAiSEE is one of the datasets which consist of in-the-wild data and has a gold standard annotation for engagement prediction. Earlier research done using the DAiSEE dataset involved training and testing standard models like CNN-based models, but the results were not satisfactory according to industry standards. In this paper, a multi-level classification approach has been introduced to create a more robust model for engagement analysis using the DAiSEE dataset. This approach has recorded testing accuracies of 0.638, 0.7728, 0.8195, and 0.866 for predicting boredom level, engagement level, confusion level, and frustration level, respectively.

Keywords: computer vision, engagement prediction, deep learning, multi-level classification

Procedia PDF Downloads 93
121 Identification of Landslide Features Using Back-Propagation Neural Network on LiDAR Digital Elevation Model

Authors: Chia-Hao Chang, Geng-Gui Wang, Jee-Cheng Wu

Abstract:

The prediction of a landslide is a difficult task because it requires a detailed study of past activities using a complete range of investigative methods to determine the changing condition. In this research, first step, LiDAR 1-meter by 1-meter resolution of digital elevation model (DEM) was used to generate six environmental factors of landslide. Then, back-propagation neural networks (BPNN) was adopted to identify scarp, landslide areas and non-landslide areas. The BPNN uses 6 environmental factors in input layer and 1 output layer. Moreover, 6 landslide areas are used as training areas and 4 landslide areas as test areas in the BPNN. The hidden layer is set to be 1 and 2; the hidden layer neurons are set to be 4, 5, 6, 7 and 8; the learning rates are set to be 0.01, 0.1 and 0.5. When using 1 hidden layer with 7 neurons and the learning rate sets to be 0.5, the result of Network training root mean square error is 0.001388. Finally, evaluation of BPNN classification accuracy by the confusion matrix shows that the overall accuracy can reach 94.4%, and the Kappa value is 0.7464.

Keywords: digital elevation model, DEM, environmental factors, back-propagation neural network, BPNN, LiDAR

Procedia PDF Downloads 110
120 Isolation and Classification of Red Blood Cells in Anemic Microscopic Images

Authors: Jameela Ali Alkrimi, Abdul Rahim Ahmad, Azizah Suliman, Loay E. George

Abstract:

Red blood cells (RBCs) are among the most commonly and intensively studied type of blood cells in cell biology. The lack of RBCs is a condition characterized by lower than normal hemoglobin level; this condition is referred to as 'anemia'. In this study, a software was developed to isolate RBCs by using a machine learning approach to classify anemic RBCs in microscopic images. Several features of RBCs were extracted using image processing algorithms, including principal component analysis (PCA). With the proposed method, RBCs were isolated in 34 second from an image containing 18 to 27 cells. We also proposed that PCA could be performed to increase the speed and efficiency of classification. Our classifier algorithm yielded accuracy rates of 100%, 99.99%, and 96.50% for K-nearest neighbor (K-NN) algorithm, support vector machine (SVM), and neural network ANN, respectively. Classification was evaluated in highly sensitivity, specificity, and kappa statistical parameters. In conclusion, the classification results were obtained for a short time period with more efficient when PCA was used.

Keywords: red blood cells, pre-processing image algorithms, classification algorithms, principal component analysis PCA, confusion matrix, kappa statistical parameters, ROC

Procedia PDF Downloads 379
119 Heterotopic Ossification: DISH and Myositis Ossificans in Human Remains Identification

Authors: Patricia Shirley Almeida Prado, Liz Brito, Selma Paixão Argollo, Gracie Moreira, Leticia Matos Sobrinho

Abstract:

Diffuse idiopathic skeletal hyperostosis (DISH) is a degenerative bone disease also known as Forestier´s disease and ankylosing hyperostosis of the spine is characterized by a tendency toward ossification of half the anterior longitudinal spinal ligament without intervertebral disc disease. DISH is not considered to be osteoarthritis, although the two conditions commonly occur together. Diagnostic criteria include fusion of at least four vertebrae by bony bridges arising from the anterolateral aspect of the vertebral bodies. These vertebral bodies have a 'dripping candle wax' appearance, also can be seen periosteal new bone formation on the anterior surface of the vertebral bodies and there is no ankylosis at zygoapophyseal facet joint. Clinically, patients with DISH tend to be asymptomatic some patients mention moderate pain and stiffness in upper back. This disease is more common in man, uncommon in patients younger than 50 years and rare in patients under 40 years old. In modern populations, DISH is found in association with obesity, (type II) diabetes; abnormal vitamin A metabolism and also associated with higher levels of serum uric acid. There is also some association between the increase of risk of stroke or other cerebrovascular disease. The DISH condition can be confused with Heterotopic Ossification, what is the bone formation in the soft tissues as the result of trauma, wounding, surgery, burnings, prolonged immobility and some central nervous system disorder. All these conditions have been described extensively as myositis ossificans which can be confused with the fibrodysplasia (myositis) ossificans progressive. As in the DISH symptomatology it can be asymptomatic or extensive enough to impair joint function. A third confusion osteoarthritis disease that can bring confusion are the enthesopathies that occur in the entire skeleton being common on the ischial tuberosities, iliac crests, patellae, and calcaneus. Ankylosis of the sacroiliac joint by bony bridges may also be found. CASE 1: this case is skeletal remains presenting skull, some vertebrae and scapulae. This case remains unidentified and due to lack of bone remains. Sex, age and ancestry profile was compromised, however the DISH pathognomonic findings and diagnostic helps to estimate sex and age characteristics. Moreover to presenting DISH these skeletal remains also showed some bone alterations and non-metrics as fusion of the first vertebrae with occipital bone, maxillae and palatine torus and scapular foramen on the right scapulae. CASE 2: this skeleton remains shows an extensive bone heterotopic ossification on the great trochanter area of left femur, right fibula showed a healed fracture in its body however in its inteosseous crest there is an extensive bone growth, also in the Ilium at the region of inferior gluteal line can be observed some pronounced bone growth and the skull presented a pronounced mandibular, maxillary and palatine torus. Despite all these pronounced heterotopic ossification the whole skeleton presents moderate bone overgrowth that is not linked with aging, since the skeleton belongs to a young unidentified individual. The appropriate osteopathological diagnosis support the human identification process through medical reports and also assist with epidemiological data that can strengthen vulnerable anthropological estimates.

Keywords: bone disease, DISH, human identification, human remains

Procedia PDF Downloads 303
118 Least-Square Support Vector Machine for Characterization of Clusters of Microcalcifications

Authors: Baljit Singh Khehra, Amar Partap Singh Pharwaha

Abstract:

Clusters of Microcalcifications (MCCs) are most frequent symptoms of Ductal Carcinoma in Situ (DCIS) recognized by mammography. Least-Square Support Vector Machine (LS-SVM) is a variant of the standard SVM. In the paper, LS-SVM is proposed as a classifier for classifying MCCs as benign or malignant based on relevant extracted features from enhanced mammogram. To establish the credibility of LS-SVM classifier for classifying MCCs, a comparative evaluation of the relative performance of LS-SVM classifier for different kernel functions is made. For comparative evaluation, confusion matrix and ROC analysis are used. Experiments are performed on data extracted from mammogram images of DDSM database. A total of 380 suspicious areas are collected, which contain 235 malignant and 145 benign samples, from mammogram images of DDSM database. A set of 50 features is calculated for each suspicious area. After this, an optimal subset of 23 most suitable features is selected from 50 features by Particle Swarm Optimization (PSO). The results of proposed study are quite promising.

Keywords: clusters of microcalcifications, ductal carcinoma in situ, least-square support vector machine, particle swarm optimization

Procedia PDF Downloads 335
117 Discovering Groundbreaking Geopolymer-Based Materials with Versatile Designs, Ideal for the Construction and Infrastructure Industry

Authors: Maryam Kiani

Abstract:

Geopolymer has gained significant prominence worldwide and is now widely regarded as a potential alternative to conventional Portland cement. Nevertheless, for it to be widely accepted and incorporated into national and international standards, it is crucial to establish precise definitions and dependable mix design methodologies for geopolymer materials. The lack of a common definition and methodology has led to inconsistencies and perplexity across various areas of research. Addressing this concern is imperative for several reasons. To overcome the existing inconsistencies and confusion, concerted efforts should be made to establish clear definitions and robust mix design methodologies for geopolymer materials. This can be achieved through collaborative research, knowledge sharing, and engagement with industry experts. By doing so, we can pave the way for the widespread acceptance and utilization of geopolymer materials, revolutionizing the construction and infrastructure industry in a sustainable and environmentally friendly manner. The primary goal of this article is to offer clear explanations regarding the different meanings of geopolymer and the various methodologies used in geopolymer processes. Its main aim is to improve comprehension of both unary and binary geopolymer systems. By thoroughly exploring existing research, this article strives to illuminate the diverse methods and techniques utilized in the exciting field of geopolymer science.

Keywords: geopolymer, nanomaterials, structural materials, mechanical properties

Procedia PDF Downloads 72
116 Trademarks and Non-Fungible Tokens: New Frontiers for Trademark Law

Authors: Dima Basma

Abstract:

The unprecedented expansion in the use of Non-Fungible Tokens (NFTS) has prompted luxury brand owners to file their trademark applications for the use of their marks in the metaverse world. While NFTs provide a favorable tool for product traceability and anti-counterfeiting endeavors, the legal ramifications of such abrupt shift are complex, diverse, and yet to be understood. Practically, a sizable number of NFT creators are minting digital tokens associated with existing trademarks, selling them at strikingly high rates, thus disadvantaging trademark owners who joined and are yet to join the meta-verse world. As a result, multiple luxury brands are filing confusion and dilution lawsuits against alleged artists offering for sale NFTs depicting reputable marks labeling their use as “parody” and “social commentary.” Given the already muddled state of trademark law in relation to both traditional and modern infringement criteria, this paper aims to explore the feasibility of the current system in dealing with the emerging NFT trends. The paper firstly delves into the intersection between trademarks and NFTs. Furthermore, in light of the striking increase in NFT use, the paper sheds critical light on the shortcoming of the current system. Finally, the paper provides recommendations for overcoming current and prospective challenges in this area.

Keywords: trademarks, NFTs, dilution, social commentary

Procedia PDF Downloads 89
115 Did Nature of Job Matters - Impact of Perceived Job Autonomy on Turnover Intention in Sales and Marketing Managers: Moderating Effect of Procedural and Distributive Justice

Authors: Muhammad Babar Shahzad

Abstract:

The purpose of our study is to investigate the relationship between perceived job autonomy and turnover intention in sales & marketing staff. Perceived job autonomy is considered one of most studied dimension of Job Characteristic Model. But still there is a confusion in scholars about predictive role of perceived job autonomy in turnover intention. In line of more complex research on this relation, we investigated the relationship between perceived job autonomy and turnover intention. Did nature of job have any impact on this relationship. On the call of different authors we take interactive effect of perceived job autonomy and procedural justice on turnover intention. Predictive role of distributive justice to employee outcomes is not deniable. But predictive role of distributive justice will be prone in different contextual influences. Interactive role of distributive justice and perceived job autonomy is also not tested before. We collected date from 279 marketing and sales managers working in financial institution, FMCG industries, Pharamesutical Industry & Bank. Strong and direct negative relation was found in perceived job autonomy, distributive justice & procedural justice on turnover intention. Distributive and procedural justice is also amplifying the negative relationship of perceived job autonomy and turnover intention. Limitation and future direction for research is also discussed.

Keywords: perceived job autonomy, turnover intention, procedural justice, distributive job

Procedia PDF Downloads 483
114 Mobile Phones in Saudi Arabian EFL Classrooms

Authors: Srinivasa Rao Idapalapati, Manssour Habbash

Abstract:

As mobile connectedness continues to sweep across the landscape, the value of deploying mobile technology to the service of learning and teaching appears to be both self-evident and unavoidable. To this end, this study explores the reasons for the reluctance of teachers in Saudi Arabia to use mobiles in EFL (English as a Foreign Language) classes for teaching and learning purposes. The main objective of this study is a qualitative analysis of the responses of the views of the teachers at a university in Saudi Arabia about the use of mobile phones in classrooms for educational purposes. Driven by the hypothesis that the teachers in Saudi Arabian universities aren’t prepared well enough to use mobile phones in classrooms for educational purposes, this study examines the data obtained through a questionnaire provided to about hundred teachers working at a university in Saudi Arabia through convenient sampling method. The responses are analyzed by qualitative interpretive method and found that teachers and the students are in confusion whether to use mobiles, and need some training sessions on the use of mobile phones in classrooms for educational purposes. The outcome of the analysis is discussed in light of the concerns bases adoption model and the inferences are provided in a descriptive mode.

Keywords: mobile assisted language learning, technology adoption, classroom instruction, concerns based adoption model

Procedia PDF Downloads 338
113 A Comparative Analysis about the Effects of a Courtyard in Indoor Thermal Environment of a Room with and without Transitional Space Adjacent to Courtyard of a House in Old Dhaka, Bangladesh

Authors: Fatema Tasmia, Brishti Majumder, Atiqur Rahman

Abstract:

Attaining appropriate comfort conditions in a place where the climate is hot and humid can be perplexing. Especially, when it is resided at a congested place like old Dhaka Bangladesh, the provision of giving cross ventilation and building with proper orientation is quite difficult. Courtyards are the part of buildings which are used as space for outdoor household activities, social gathering and it is also proved to have indoor thermal comfort as an effect of courtyard. This paper aims to investigate the effect of courtyard in indoor thermal environment of a room adjacent to the courtyard and a room next to transitional space after a courtyard through field measurements of a case study house. The field measurement was conducted in a two-storey house. Among different aspects of thermal environment, the study of this paper is based on the analysis of temperature in both situations. Ventilation or air movement was considered to have no impact because of the rooms’ layout and location. Other aspects and their variables were considered as constant (especially material) for accuracy and avoidance of confusion. This study focuses on the outcome that can ultimately contribute to the configuration of courtyards and in its relation to indoor space while achieving thermal comfort.

Keywords: courtyard, old Dhaka, temperature, thermal comfort, transitional space

Procedia PDF Downloads 194
112 The Potential of Sentiment Analysis to Categorize Social Media Comments Using German Libraries

Authors: Felix Boehnisch, Alexander Lutz

Abstract:

Based on the number of users and the amount of content posted daily, Facebook is considered the largest social network in the world. This content includes images or text posts from companies but also private persons, which are also commented on by other users. However, it can sometimes be difficult for companies to keep track of all the posts and the reactions to them, especially when there are several posts a day that contain hundreds to thousands of comments. To facilitate this, the following paper deals with the possible applications of sentiment analysis to social media comments in order to be able to support the work in social media marketing. In a first step, post comments were divided into positive and negative by a subjective rating, then the same comments were checked for their polarity value by the two german python libraries TextBlobDE and SentiWS and also grouped into positive, negative, or even neutral. As a control, the subjective classifications were compared with the machine-generated ones by a confusion matrix, and relevant quality criteria were determined. The accuracy of both libraries was not really meaningful, with 60% to 66%. However, many words or sentences were not evaluated at all, so there seems to be room for optimization to possibly get more accurate results. In future studies, the use of these specific German libraries can be optimized to gain better insights by either applying them to stricter cleaned data or by adding a sentiment value to emojis, which have been removed from the comments in advance, as they are not contained in the libraries.

Keywords: Facebook, German libraries, polarity, sentiment analysis, social media comments

Procedia PDF Downloads 155