Search results for: generative adversary nets
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 275

Search results for: generative adversary nets

155 Restricted Boltzmann Machines and Deep Belief Nets for Market Basket Analysis: Statistical Performance and Managerial Implications

Authors: H. Hruschka

Abstract:

This paper presents the first comparison of the performance of the restricted Boltzmann machine and the deep belief net on binary market basket data relative to binary factor analysis and the two best-known topic models, namely Dirichlet allocation and the correlated topic model. This comparison shows that the restricted Boltzmann machine and the deep belief net are superior to both binary factor analysis and topic models. Managerial implications that differ between the investigated models are treated as well. The restricted Boltzmann machine is defined as joint Boltzmann distribution of hidden variables and observed variables (purchases). It comprises one layer of observed variables and one layer of hidden variables. Note that variables of the same layer are not connected. The comparison also includes deep belief nets with three layers. The first layer is a restricted Boltzmann machine based on category purchases. Hidden variables of the first layer are used as input variables by the second-layer restricted Boltzmann machine which then generates second-layer hidden variables. Finally, in the third layer hidden variables are related to purchases. A public data set is analyzed which contains one month of real-world point-of-sale transactions in a typical local grocery outlet. It consists of 9,835 market baskets referring to 169 product categories. This data set is randomly split into two halves. One half is used for estimation, the other serves as holdout data. Each model is evaluated by the log likelihood for the holdout data. Performance of the topic models is disappointing as the holdout log likelihood of the correlated topic model – which is better than Dirichlet allocation - is lower by more than 25,000 compared to the best binary factor analysis model. On the other hand, binary factor analysis on its own is clearly surpassed by both the restricted Boltzmann machine and the deep belief net whose holdout log likelihoods are higher by more than 23,000. Overall, the deep belief net performs best. We also interpret hidden variables discovered by binary factor analysis, the restricted Boltzmann machine and the deep belief net. Hidden variables characterized by the product categories to which they are related differ strongly between these three models. To derive managerial implications we assess the effect of promoting each category on total basket size, i.e., the number of purchased product categories, due to each category's interdependence with all the other categories. The investigated models lead to very different implications as they disagree about which categories are associated with higher basket size increases due to a promotion. Of course, recommendations based on better performing models should be preferred. The impressive performance advantages of the restricted Boltzmann machine and the deep belief net suggest continuing research by appropriate extensions. To include predictors, especially marketing variables such as price, seems to be an obvious next step. It might also be feasible to take a more detailed perspective by considering purchases of brands instead of purchases of product categories.

Keywords: binary factor analysis, deep belief net, market basket analysis, restricted Boltzmann machine, topic models

Procedia PDF Downloads 167
154 Behavior Consistency Analysis for Workflow Nets Based on Branching Processes

Authors: Wang Mimi, Jiang Changjun, Liu Guanjun, Fang Xianwen

Abstract:

Loop structure often appears in the business process modeling, analyzing the consistency of corresponding workflow net models containing loop structure is a problem, the existing behavior consistency methods cannot analyze effectively the process models with the loop structure. In the paper, by analyzing five kinds of behavior relations of transitions, a three-dimensional figure and two-dimensional behavior relation matrix are proposed. Based on this, analysis method of behavior consistency of business process based on Petri net branching processes is proposed. Finally, an example is given out, which shows the method is effective.

Keywords: workflow net, behavior consistency measures, loop, branching process

Procedia PDF Downloads 359
153 Reproductive Biology of Chirruh Snowtrout (Schizothorax Esocinus) from River Swat, Pakistan

Authors: Waheed Akhtar

Abstract:

In the current study, we aim to access the different month-wise reproductive biology of S. esocinus. Samples were collected from Rive Swat in the period of March 2022 to March 2023. Samples were collected using different gills nets of different sizes. Gonado Somatic Index and fecundity were studied using gravimetric to identify the breeding season and reproductive potential. The highest GSI was recorded in the month of April and November. Male to female ratio was in balance. The weight of the fish, size of the fish and ovary were parallel to the fecundity. This is the baseline study for the breeding biology of S. esocinus and further molecular study is required to identify the internal and external factors associated with the breeding biology of S. esocinus.

Keywords: snow trout, length and weight relationship, fecundity, river Swat

Procedia PDF Downloads 47
152 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 53
151 Countering Violent Extremism: Challenges and Possibilities for Muslim Ummah

Authors: Altaf Ahmed

Abstract:

Unhindered progress and advancement of life are directly associated with peace and development. Unfortunately, many modern states are prone to the perilous of social challenges; Violent Extremism is the most ubiquitous adversary among all. Islam in its origin fully supports peace and security; the charter of Madina, the treaty of Hudabia and conquer of Mecca are the biggest examples in this reference. The holy Prophet Muhammad ﷺ always gave priority to peace in these cases. Today, the majority of the Muslim World faces VE and terrorism due to multiple reasons ranging from religious interpretations to political, social and economic conditions. This research will try to explore challenges for Muslim Ummah in maintaining peace and what steps have been taken by it to resolve conflicts among states. In this context, Sustainable development goals (SDGs) will be particularly analysed. SDGs were adopted by all United Nations Member States in 2015. It is an undeniable fact that these are the best peace-building tools. Although there are 17 SDGs, the paper will mainly focus on quality education, zero hunger, end of poverty (social protection), women empowerment, reduced inequalities and economic growth as the best peace-building approaches for eradication of violent extremism.

Keywords: violent extremism, Muslim Ummah, peace, modern world, education

Procedia PDF Downloads 91
150 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 499
149 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net

Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie

Abstract:

A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.

Keywords: reliability, colored Petri net, assessment, payment models, m-commerce

Procedia PDF Downloads 510
148 VR/AR Applications in Personalized Learning

Authors: Andy Wang

Abstract:

Personalized learning refers to an educational approach that tailors instruction to meet the unique needs, interests, and abilities of each learner. This method of learning aims at providing students with a customized learning experience that is more engaging, interactive, and relevant to their personal lives. With generative AI technology, the author has developed a Personal Tutoring Bot (PTB) that supports personalized learning. The author is currently testing PTB in his EE 499 – Microelectronics Metrology course. Virtual Reality (VR) and Augmented Reality (AR) provide interactive and immersive learning environments that can engage student in online learning. This paper presents the rationale of integrating VR/AR tools in PTB and discusses challenges and solutions of incorporating VA/AR into the Personal Tutoring Bot (PTB).

Keywords: personalized learning, online education, hands-on practice, VR/AR tools

Procedia PDF Downloads 37
147 Generative Pre-Trained Transformers (GPT-3) and Their Impact on Higher Education

Authors: Sheelagh Heugh, Michael Upton, Kriya Kalidas, Stephen Breen

Abstract:

This article aims to create awareness of the opportunities and issues the artificial intelligence (AI) tool GPT-3 (Generative Pre-trained Transformer-3) brings to higher education. Technological disruptors have featured in higher education (HE) since Konrad Klaus developed the first functional programmable automatic digital computer. The flurry of technological advances, such as personal computers, smartphones, the world wide web, search engines, and artificial intelligence (AI), have regularly caused disruption and discourse across the educational landscape around harnessing the change for the good. Accepting AI influences are inevitable; we took mixed methods through participatory action research and evaluation approach. Joining HE communities, reviewing the literature, and conducting our own research around Chat GPT-3, we reviewed our institutional approach to changing our current practices and developing policy linked to assessments and the use of Chat GPT-3. We review the impact of GPT-3, a high-powered natural language processing (NLP) system first seen in 2020 on HE. Historically HE has flexed and adapted with each technological advancement, and the latest debates for educationalists are focusing on the issues around this version of AI which creates natural human language text from prompts and other forms that can generate code and images. This paper explores how Chat GPT-3 affects the current educational landscape: we debate current views around plagiarism, research misconduct, and the credibility of assessment and determine the tool's value in developing skills for the workplace and enhancing critical analysis skills. These questions led us to review our institutional policy and explore the effects on our current assessments and the development of new assessments. Conclusions: After exploring the pros and cons of Chat GTP-3, it is evident that this form of AI cannot be un-invented. Technology needs to be harnessed for positive outcomes in higher education. We have observed that materials developed through AI and potential effects on our development of future assessments and teaching methods. Materials developed through Chat GPT-3 can still aid student learning but lead to redeveloping our institutional policy around plagiarism and academic integrity.

Keywords: artificial intelligence, Chat GPT-3, intellectual property, plagiarism, research misconduct

Procedia PDF Downloads 62
146 Aerobic Bioprocess Control Using Artificial Intelligence Techniques

Authors: M. Caramihai, Irina Severin

Abstract:

This paper deals with the design of an intelligent control structure for a bioprocess of Hansenula polymorpha yeast cultivation. The objective of the process control is to produce biomass in a desired physiological state. The work demonstrates that the designed Hybrid Control Techniques (HCT) are able to recognize specific evolution bioprocess trajectories using neural networks trained specifically for this purpose, in order to estimate the model parameters and to adjust the overall bioprocess evolution through an expert system and a fuzzy structure. The design of the control algorithm as well as its tuning through realistic simulations is presented. Taking into consideration the synergism of different paradigms like fuzzy logic, neural network, and symbolic artificial intelligence (AI), in this paper we present a real and fulfilled intelligent control architecture with application in bioprocess control.

Keywords: bioprocess, intelligent control, neural nets, fuzzy structure, hybrid techniques

Procedia PDF Downloads 378
145 The Effects of English Contractions on the Application of Syntactic Theories

Authors: Wakkai Hosanna Hussaini

Abstract:

A formal structure of the English clause is composed of at least two elements – subject and verb, in structural grammar and at least one element – predicate, in systemic (functional) and generative grammars. Each of the elements can be represented by a word or group (of words). In modern English structure, very often speakers merge two words as one with the use of an apostrophe. Each of the two words can come from different elements or belong to the same element. In either case, result of the merger is called contraction. Although contractions constitute a part of modern English structure, they are considered informal in nature (more frequently used in spoken than written English) that is why they were initially viewed as constituting an evidence of language deterioration. To our knowledge, no formal syntactic theory yet has been particular on the contractions because of its deviation from the formal rules of syntax that seek to identify the elements that form a clause in English. The inconsistency between the formal rules and a contraction is established when two words representing two elements in a non-contraction are merged as one element to form a contraction. Thus the paper presents the various syntactic issues as effects arising from converting non-contracted to contracted forms. It categorizes English contractions and describes each category according to its syntactic relations (position and relationship) and morphological formation (form and content) as integral part of modern structure of English. This is a position paper as such the methodology is observational, descriptive and explanatory/analytical based on existing related literature. The inventory of English contractions contained in books on syntax forms the data from where specific examples are drawn. It is noted as conclusion that the existing syntactic theories were not originally established to account for English contractions. The paper, when published, will further expose the inadequacies of the existing syntactic theories by giving more reasons for the establishment of a more comprehensive syntactic theory for analyzing English clause/sentence structure involving contractions. The method used reveals the extent of the inadequacies in applying the three major syntactic theories: structural, systemic (functional) and generative, on the English contractions. Although no theory is without scope, shying away from the three major theories from recognizing the English contractions need to be broken because of the increasing popularity of its use in modern English structure. The paper, therefore, recommends that as use of contraction gains more popular even in formal speeches today, there is need to establish a syntactic theory to handle its patterns of syntactic relations and morphological formation.

Keywords: application, effects, English contractions, syntactic theories

Procedia PDF Downloads 228
144 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 423
143 Efficient Neural and Fuzzy Models for the Identification of Dynamical Systems

Authors: Aouiche Abdelaziz, Soudani Mouhamed Salah, Aouiche El Moundhe

Abstract:

The present paper addresses the utilization of Artificial Neural Networks (ANNs) and Fuzzy Inference Systems (FISs) for the identification and control of dynamical systems with some degree of uncertainty. Because ANNs and FISs have an inherent ability to approximate functions and to adapt to changes in input and parameters, they can be used to control systems too complex for linear controllers. In this work, we show how ANNs and FISs can be put in order to form nets that can learn from external data. In sequence, it is presented structures of inputs that can be used along with ANNs and FISs to model non-linear systems. Four systems were used to test the identification and control of the structures proposed. The results show the ANNs and FISs (Back Propagation Algorithm) used were efficient in modeling and controlling the non-linear plants.

Keywords: non-linear systems, fuzzy set Models, neural network, control law

Procedia PDF Downloads 180
142 A Petri Net Model to Obtain the Throughput of Unreliable Production Lines in the Buffer Allocation Problem

Authors: Joselito Medina-Marin, Alexandr Karelin, Ana Tarasenko, Juan Carlos Seck-Tuoh-Mora, Norberto Hernandez-Romero, Eva Selene Hernandez-Gress

Abstract:

A production line designer faces with several challenges in manufacturing system design. One of them is the assignment of buffer slots in between every machine of the production line in order to maximize the throughput of the whole line, which is known as the Buffer Allocation Problem (BAP). The BAP is a combinatorial problem that depends on the number of machines and the total number of slots to be distributed on the production line. In this paper, we are proposing a Petri Net (PN) Model to obtain the throughput in unreliable production lines, based on PN mathematical tools and the decomposition method. The results obtained by this methodology are similar to those presented in previous works, and the number of machines is not a hard restriction.

Keywords: buffer allocation problem, Petri Nets, throughput, production lines

Procedia PDF Downloads 280
141 Restless Leg Syndrome as the Presenting Symptom of Neuroendocrine Tumor

Authors: Mustafa Cam, Nedim Ongun, Ufuk Kutluana

Abstract:

Introduction: Restless LegsSyndrome (RLS) is a common, under-recognized disorder disrupts sleep and diminishes quality of life (1). The most common conditions highly associated with RLS include renalfailure, iron and folic acid deficiency, peripheral neuropathy, pregnancy, celiacdisease, Crohn’sdiseaseandrarelymalignancy (2).Despite a clear relation between low peripheral iron and increased prevalence and severity of RLS, the prevalence and clinical significance of RLS in iron-deficientanemic populations is unknown (2). We report here a case of RLS due to iron deficiency in the setting of neuroendocrinetumor. Report of Case: A 35 year-old man was referred to our clinic with general weakness, weight loss (10 kg in 2 months)and 2-month history of uncomfortable sensations in his legs with urge to move, partially relieved by movement. The symptoms were presented very day, worsening in the evening; the discomfort forced the patient to getup and walk around at night. RLS was severe, with a score of 22 at the International RLS ratingscale. The patient had no past medical history. The patient underwent a complete set of blood analyses and the following ab normal values were found (normal limitswithinbrackets): hemoglobin 9.9 g/dl (14-18), MCV 70 fL (80-94), ferritin 3,5 ng/mL (13-150). Brain and spinemagnetic resonance imaging was normal. The patient consultated with gastroenterology clinic and gastointestinal systemendoscopy was performed for theetiology of the iron deficiency anemia. After the gastricbiopsy, results allowed us to reach the diagnosis of neuroen docrine tumor and the patient referred to oncology clinic. Discussion: The first important consideration from this case report is that the patient was referred to our clinic because of his severe RLS symptoms dramatically reducing his quality of life. However, our clinical study clearly demonstrated that RLS was not the primary disease. Considering the information available for this patient, we believe that the most likely possibility is that RLS was secondary to iron deficiency, a very well-known and established cause of RLS in theliterature (3,4). Neuroendocrine tumors (NETs) are rare epithelial neoplasms with neuroendocrine differentiation that most commonly originate in the lungs and gastrointestinal tract (5). NETs vary widely in their clinical presentation; symptoms are often nonspecific and can be mistaken for those of other more common conditions (6). 50% of patients with reported disease stage have either regional or distant metastases at diagnosis (7). Accurate and earlier NET diagnosis is the first step in shortening the time to optimal care and improved outcomes for patients (8). The most important message from this case report is that RLS symptoms can sometimes be thesign of a life-threatening condition. Conclusion: Careful and complete collection of clinical and laboratory data should be carried out in RLS patients. Inparticular, if RLS onset coincides with weight loss and iron deficieny anemia, gastricendos copy should be performed. It is known about that malignancy is a rare etiology in RLS patients and to our knowledge; it is the first case with neuro endocrine tumor presenting with RLS.

Keywords: neurology, neuroendocrine tumor, restless legs syndrome, sleep

Procedia PDF Downloads 262
140 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 43
139 Deep Learning for Image Correction in Sparse-View Computed Tomography

Authors: Shubham Gogri, Lucia Florescu

Abstract:

Medical diagnosis and radiotherapy treatment planning using Computed Tomography (CT) rely on the quantitative accuracy and quality of the CT images. At the same time, requirements for CT imaging include reducing the radiation dose exposure to patients and minimizing scanning time. A solution to this is the sparse-view CT technique, based on a reduced number of projection views. This, however, introduces a new problem— the incomplete projection data results in lower quality of the reconstructed images. To tackle this issue, deep learning methods have been applied to enhance the quality of the sparse-view CT images. A first approach involved employing Mir-Net, a dedicated deep neural network designed for image enhancement. This showed promise, utilizing an intricate architecture comprising encoder and decoder networks, along with the incorporation of the Charbonnier Loss. However, this approach was computationally demanding. Subsequently, a specialized Generative Adversarial Network (GAN) architecture, rooted in the Pix2Pix framework, was implemented. This GAN framework involves a U-Net-based Generator and a Discriminator based on Convolutional Neural Networks. To bolster the GAN's performance, both Charbonnier and Wasserstein loss functions were introduced, collectively focusing on capturing minute details while ensuring training stability. The integration of the perceptual loss, calculated based on feature vectors extracted from the VGG16 network pretrained on the ImageNet dataset, further enhanced the network's ability to synthesize relevant images. A series of comprehensive experiments with clinical CT data were conducted, exploring various GAN loss functions, including Wasserstein, Charbonnier, and perceptual loss. The outcomes demonstrated significant image quality improvements, confirmed through pertinent metrics such as Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) between the corrected images and the ground truth. Furthermore, learning curves and qualitative comparisons added evidence of the enhanced image quality and the network's increased stability, while preserving pixel value intensity. The experiments underscored the potential of deep learning frameworks in enhancing the visual interpretation of CT scans, achieving outcomes with SSIM values close to one and PSNR values reaching up to 76.

Keywords: generative adversarial networks, sparse view computed tomography, CT image correction, Mir-Net

Procedia PDF Downloads 119
138 On Dialogue Systems Based on Deep Learning

Authors: Yifan Fan, Xudong Luo, Pingping Lin

Abstract:

Nowadays, dialogue systems increasingly become the way for humans to access many computer systems. So, humans can interact with computers in natural language. A dialogue system consists of three parts: understanding what humans say in natural language, managing dialogue, and generating responses in natural language. In this paper, we survey deep learning based methods for dialogue management, response generation and dialogue evaluation. Specifically, these methods are based on neural network, long short-term memory network, deep reinforcement learning, pre-training and generative adversarial network. We compare these methods and point out the further research directions.

Keywords: dialogue management, response generation, deep learning, evaluation

Procedia PDF Downloads 133
137 Monocular 3D Person Tracking AIA Demographic Classification and Projective Image Processing

Authors: McClain Thiel

Abstract:

Object detection and localization has historically required two or more sensors due to the loss of information from 3D to 2D space, however, most surveillance systems currently in use in the real world only have one sensor per location. Generally, this consists of a single low-resolution camera positioned above the area under observation (mall, jewelry store, traffic camera). This is not sufficient for robust 3D tracking for applications such as security or more recent relevance, contract tracing. This paper proposes a lightweight system for 3D person tracking that requires no additional hardware, based on compressed object detection convolutional-nets, facial landmark detection, and projective geometry. This approach involves classifying the target into a demographic category and then making assumptions about the relative locations of facial landmarks from the demographic information, and from there using simple projective geometry and known constants to find the target's location in 3D space. Preliminary testing, although severely lacking, suggests reasonable success in 3D tracking under ideal conditions.

Keywords: monocular distancing, computer vision, facial analysis, 3D localization

Procedia PDF Downloads 110
136 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 119
135 Generating Product Description with Generative Pre-Trained Transformer 2

Authors: Minh-Thuan Nguyen, Phuong-Thai Nguyen, Van-Vinh Nguyen, Quang-Minh Nguyen

Abstract:

Research on automatically generating descriptions for e-commerce products is gaining increasing attention in recent years. However, the generated descriptions of their systems are often less informative and attractive because of lacking training datasets or the limitation of these approaches, which often use templates or statistical methods. In this paper, we explore a method to generate production descriptions by using the GPT-2 model. In addition, we apply text paraphrasing and task-adaptive pretraining techniques to improve the qualify of descriptions generated from the GPT-2 model. Experiment results show that our models outperform the baseline model through automatic evaluation and human evaluation. Especially, our methods achieve a promising result not only on the seen test set but also in the unseen test set.

Keywords: GPT-2, product description, transformer, task-adaptive, language model, pretraining

Procedia PDF Downloads 171
134 The Effects of Urbanization on Peri-Urban Livelihood in Ghana: A Case of Kumasi Peri-Urban Communities

Authors: Charles Kwaku Oppong

Abstract:

The research linked urban expansion resulting from urbanization with changing morphology processes happening in peri-urban communities. Two villages of Kumasi City peri-urban were used as a case study. Appropriate analytical framework and methodology (literature review and empirical evidence) were employed to ensure that all pertinent issues of peri-urban interface are brought to light. It was discovered from the study that since peri-urban livelihood is linked with assets base; it has been found that stock of asset, as well as transformation processes, were major factors in the shaping of livelihoods strategies. For that reason, success or failure of household livelihoods was seen to relate to the kind of livelihood strategy employed. With efforts to mitigate for livelihoods failure due to peri-urban development, households' recourse to remittances, land disposal, and other means as an alternative livelihood approach. The study calls for local government policy interventions in regulating peri-urban transformation process and providing safety nets for the vulnerable.

Keywords: urban expansion, peri-urban interface, livelihoods, asset

Procedia PDF Downloads 216
133 Life Cycle Assesment (LCA) Study of Shrimp Fishery in the South East Coast of Arabian Sea

Authors: Leela Edwin, Rithin Joseph, P. H. Dhiju Das, K. A. Sayana, P. S. Muhammed Sherief

Abstract:

The shrimp trawl fishery is considered one of the more valuable fisheries from the South east Coast of Arabian Sea. Inventory data for the shrimp were collected over 1 year period and used to carry out a life cycle assessment (LCA). LCA was performed to assess and compare the environmental impacts associated with the fishing operations related to shrimp fishery. This analysis included the operation of the vessels, together with major inputs related to the production of diesel, trawl nets, or anti-fouling paints. Data regarding vessel operation was obtained from the detailed questionnaires filled out by 180 trawlers. The analysis on environmental impacts linked to shrimp extraction on a temporal scale, showed that varying landings enhanced the environmental burdens mainly associated with activities related to diesel production, transport and consumption of the fishing vessels. Discard rates for trawlers were also identified as a major environmental impact in this fishery.

Keywords: shrimp trawling, life cycle assesment (LCA), Arabian sea, environmental impacts

Procedia PDF Downloads 293
132 The Women’s Empowerment and Children’s Bell-Being in Italy: An Empirical Research Starting From the Capability Approach

Authors: Alba Francesca Canta

Abstract:

The present is one of those times when what normally seems to constitute a reason for living vanishes, particularly in times of crisis, during which certainties of all times crumble, and critical issues emerge, especially in already problematic areas such as the role of women and children. This paper aims to explore the issue of gender and highlight the importance of education for people’s development and well-being. The study is part of the broader framework of the capability approach, a multidimensional approach based on the need to consider a person’s wealth by virtue of their opportunity and freedom to live a ‘life of worth. The results of empirical research conducted in 2020 will be presented, the main objective of which was to measure, through qualitative (project techniques, focus groups, interviews with key informants) and quantitative (questionnaire) methods, the level of empowerment of women in two Italian territories and the consequent well-being of their children. By means of the relationship study, the present research results show that a higher level of women’s empowerment corresponds to a higher level of children’s well-being in a positive virtuous process. The opportunity structure and education are the main driving guide both to women’s empowerment and children’s well-being, emphasizing the importance of education to gender culture as a key factor for the development of the whole society. Among all the traumatic events that broke the harmony of the world and caused an abrupt turn in all areas of society, the crisis of democracy and education are some of the harshest. Nevertheless, education continues to be a fundamental pillar of Global Development Agendas, and above all, democratic education is the main factor in the development of a generative society, capable of forming people who know how to live in society. In this context, recovering democratic and inclusive education can be the key to a breakthrough. In the capability approach Sen, and other Scholars, point out education from two different perspectives: a. education as a fundamental right capable of influencing other real fields of people’s life (i.e., being educated to prevent illness, to vote, etc.) and b. spread communitarian education, tolerance, inclusive, democratic, and respectful, capable of forming human beings. This kind of educational system can directly lead to a general process of gender education that presupposes respect for essential principles: equality, uniqueness, and the participation of all in the processes of defining a democratic society. Many practices of women and children’s exclusions essentially derive from social factors (norms, values, quality of institutions, relations of power, educational and cultural practices) that can build strong barriers. Respect for these principles and education for gender culture could foster the renewal of society and the acquisition of fundamental skills for a generative and inclusive society, such as critical skills, cosmopolitan skills, and narrative imagination.

Keywords: capability approach, children’s well-being, education, women’s empowerment

Procedia PDF Downloads 41
131 Taxonomic and Faunistic Data on the Genus Triaspis Haliday, 1835 (Hymenoptera: Braconidae: Brachistinae) from Turkey

Authors: Tülin Koldaş, Özlem Çetin Erdoğan, Ahmet Beyarslan

Abstract:

Brachistinae Föerster, 1862 is a subfamily of the family Braconidae (order Hymenoptera) with about 410 species distributed all around the world. Brachistinae includes the genera, Eubazus Nees von Esenbeck 1814, Foersteria Szépligeti 1896, Chelostes van Achterberg 1990, Triaspis Haliday 1835 and Schizoprymnus Förster 1862. Members of the subfamily live as parasitoids on the families Curculionidae and Apionidae (Coleoptera), which also include very important agricultural pests.  In generally, members of the genus Triaspis are poorly known biologically. The genus is represented by 37 species in the West Palearctic region and 118 species worldwide. Adult specimens of Triaspis were collected from as wide a range of habitats as possible at different altitudes in different parts of Turkey between 1982 and 2010. Samples collected from short plants using standard insect sweeping nets were transferred into tubes containing 70% ethanol and labelled following their preparations according to museum techniques. Seven Triaspis species have been reported from Turkey in this study. Five of these species are new to the fauna of Turkey.

Keywords: Triaspis, Braconidae, Hymenoptera, Turkey, fauna

Procedia PDF Downloads 93
130 Modelling of Relocation and Battery Autonomy Problem on Electric Cars Sharing Dynamic by Using Discrete Event Simulation and Petri Net

Authors: Taha Benarbia, Kay W. Axhausen, Anugrah Ilahi

Abstract:

Electric car sharing system as ecologic transportation increasing in the world. The complexity of managing electric car sharing systems, especially one-way trips and battery autonomy have direct influence to on supply and demand of system. One must be able to precisely model the demand and supply of these systems to better operate electric car sharing and estimate its effect on mobility management and the accessibility that it provides in urban areas. In this context, our work focus to develop performances optimization model of the system based on discrete event simulation and stochastic Petri net. The objective is to search optimal decisions and management parameters of the system in order to fulfil at best demand while minimizing undesirable situations. In this paper, we present new model of electric cars sharing with relocation based on monitoring system. The proposed approach also help to precise the influence of battery charging level on the behaviour of system as important decision parameter of this complex and dynamical system.

Keywords: electric car-sharing systems, smart mobility, Petri nets modelling, discrete event simulation

Procedia PDF Downloads 153
129 Quantitative Analysis of Presence, Consciousness, Subconsciousness, and Unconsciousness

Authors: Hooshmand Kalayeh

Abstract:

The human brain consists of reptilian, mammalian, and thinking brain. And mind consists of conscious, subconscious, and unconscious parallel neural-net programs. The primary objective of this paper is to propose a methodology for quantitative analysis of neural-nets associated with these mental activities in the neocortex. The secondary objective of this paper is to suggest a methodology for quantitative analysis of presence; the proposed methodologies can be used as a first-step to measure, monitor, and understand consciousness and presence. This methodology is based on Neural-Networks (NN), number of neuron in each NN associated with consciousness, subconsciouness, and unconsciousness, and number of neurons in neocortex. It is assumed that the number of neurons in each NN is correlated with the associated area and volume. Therefore, online and offline visualization techniques can be used to identify these neural-networks, and online and offline measurement methods can be used to measure areas and volumes associated with these NNs. So, instead of the number of neurons in each NN, the associated area or volume also can be used in the proposed methodology. This quantitative analysis and associated online and offline measurements and visualizations of different Neural-Networks enable us to rewire the connections in our brain for a more balanced living.

Keywords: brain, mind, consciousness, presence, sub-consciousness, unconsciousness, skills, concentrations, attention

Procedia PDF Downloads 287
128 Shark Resources in the Iranian Waters of the Persian Gulf

Authors: Nassir Niamaimandi, Mehrdad Hosaini Shabankareh

Abstract:

This study was analyzed the annual catch and trawl survey data of sharks in the northern part of the Persian Gulf (26˚ 30΄ to 30˚ 00΄N and 49˚ 00΄ to 56˚ 00΄E) from 2004 to 2009. Trawl survey was conducted by research vessel Ferdous, equipped with bottom trawl nets in meshes 400mm and 80mm at the body, and cod-end, respectively. Ten stratums were selected in the study area and 199 stations were randomly trawled. The density (CPUA) of shark resources was estimated based on swept area method. The annual total catch was obtained from Iranian fisheries organization (Shilat). The results of catch per unit area showed 250.7 kg/nm2 in 2004 to 49.7 kg/nm2 in 2009. There was a high degree of variability of CPUA among different areas and the maximum was estimated 1870.8 kg/nm2 in Nayband and Mogham. In catch composition data, sharks have a decreasing trend from 4.2% in 2004 to 2.9% in 2009 that shows a decline with an annual average 1.3% during 2004-2009. This results suggesting that the shark resource is overexploited and the current effort is far higher than the effort required harvesting optimum yields.

Keywords: shark resources, Iranian waters, Persian Gulf, Trawl survey

Procedia PDF Downloads 528
127 Modern Machine Learning Conniptions for Automatic Speech Recognition

Authors: S. Jagadeesh Kumar

Abstract:

This expose presents a luculent of recent machine learning practices as employed in the modern and as pertinent to prospective automatic speech recognition schemes. The aspiration is to promote additional traverse ablution among the machine learning and automatic speech recognition factions that have transpired in the precedent. The manuscript is structured according to the chief machine learning archetypes that are furthermore trendy by now or have latency for building momentous hand-outs to automatic speech recognition expertise. The standards offered and convoluted in this article embraces adaptive and multi-task learning, active learning, Bayesian learning, discriminative learning, generative learning, supervised and unsupervised learning. These learning archetypes are aggravated and conferred in the perspective of automatic speech recognition tools and functions. This manuscript bequeaths and surveys topical advances of deep learning and learning with sparse depictions; further limelight is on their incessant significance in the evolution of automatic speech recognition.

Keywords: automatic speech recognition, deep learning methods, machine learning archetypes, Bayesian learning, supervised and unsupervised learning

Procedia PDF Downloads 415
126 Effect of Pollination on Qualitative Characters of Rapeseed (Brassica campestris l. Var. Toria) Seed in Chitwan, Nepal

Authors: Rameshwor Pudasaini

Abstract:

An experiment was conducted to study the effect of pollination quality of rapeseed seed in Chitwan during 2012-2013. The experiment was designed in Randomized Complete Block with four replications and five pollination treatments. The rapeseed plots were caged with mosquito nets at 10% flowering except natural pollination. Two-framed colonies of Apis mellifera L. and Apis cerana F. were introduced separately for pollination, and control plot caged without pollinators. The highest germination percent was observed on Apis cerana F. pollinated plot seeds (90.50% germination) and lowest on control plots (42.00% germination) seeds. Similarly, seed test weight of Apis cerana F. pollinated plots (3.22 gm/ 1000 seed) and Apis mellifera L. pollinated plots (2.93 gm/1000 seed) were and control plots (2.26 gm/ 1000 seed) recorded respectively. However, oil content was recorded highest on pollinated by Apis cerana F. (36.1 %) and lowest on control plots (32.8%). This study clearly indicated pollination increases the seed quality of rapeseed and therefore, management of honeybee is necessary for higher quality of rapeseed under Chitwan condition.

Keywords: apis cerana, apis mellifera, rapeseed pollination, rapeseed quality

Procedia PDF Downloads 315