Search results for: target detection.
760 High Temperature Hydrogen Sensors Based On Pd/Ta2O5/SiC MOS Capacitor
Authors: J. H. Choi, S. J. Kim, M. S. Jung, S. J. Kim, S. J. Joo, S. C. Kim
Abstract:
There are a many of needs for the development of SiC-based hydrogen sensor for harsh environment applications. We fabricated and investigated Pd/Ta2O5/SiC-based hydrogen sensors with MOS capacitor structure for high temperature process monitoring and leak detection applications in such automotive, chemical and petroleum industries as well as direct monitoring of combustion processes. In this work, we used silicon carbide (SiC) as a substrate to replace silicon which operating temperatures are limited to below 200°C. Tantalum oxide was investigated as dielectric layer which has high permeability for hydrogen gas and high dielectric permittivity, compared with silicon dioxide or silicon nitride. Then, electrical response properties, such as I-V curve and dependence of capacitance on hydrogen concentrations were analyzed in the temperature ranges of room temperature to 500°C for performance evaluation of the sensor.Keywords: High temperature, hydrogen sensor, SiC, Ta2O5 dielectric layer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2072759 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.
Keywords: Attacker, behavioural models, cyber risk assessment, cyber-security, human factors, investigative psychology, ISO27001, ISO27005.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 983758 Investigation of the Unbiased Characteristic of Doppler Frequency to Different Antenna Array Geometries
Authors: Somayeh Komeylian
Abstract:
Array signal processing techniques have been recently developing in a variety application of the performance enhancement of receivers by refraining the power of jamming and interference signals. In this scenario, biases induced to the antenna array receiver degrade significantly the accurate estimation of the carrier phase. Owing to the integration of frequency becomes the carrier phase, we have obtained the unbiased doppler frequency for the high precision estimation of carrier phase. The unbiased characteristic of Doppler frequency to the power jamming and the other interference signals allows achieving the highly accurate estimation of phase carrier. In this study, we have rigorously investigated the unbiased characteristic of Doppler frequency to the variation of the antenna array geometries. The simulation results have efficiently verified that the Doppler frequency remains also unbiased and accurate to the variation of antenna array geometries.
Keywords: Array signal processing, unbiased Doppler frequency, GNSS, carrier phase, slowly fluctuating point target.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 910757 Video Quality Assessment using Visual Attention Approach for Sign Language
Authors: Julia Kucerova, Jaroslav Polec, Darina Tarcsiova
Abstract:
Visual information is very important in human perception of surrounding world. Video is one of the most common ways to capture visual information. The video capability has many benefits and can be used in various applications. For the most part, the video information is used to bring entertainment and help to relax, moreover, it can improve the quality of life of deaf people. Visual information is crucial for hearing impaired people, it allows them to communicate personally, using the sign language; some parts of the person being spoken to, are more important than others (e.g. hands, face). Therefore, the information about visually relevant parts of the image, allows us to design objective metric for this specific case. In this paper, we present an example of an objective metric based on human visual attention and detection of salient object in the observed scene.Keywords: sign language, objective video quality, visual attention, saliency
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584756 Modeling Engagement with Multimodal Multisensor Data: The Continuous Performance Test as an Objective Tool to Track Flow
Authors: Mohammad H. Taheri, David J. Brown, Nasser Sherkat
Abstract:
Engagement is one of the most important factors in determining successful outcomes and deep learning in students. Existing approaches to detect student engagement involve periodic human observations that are subject to inter-rater reliability. Our solution uses real-time multimodal multisensor data labeled by objective performance outcomes to infer the engagement of students. The study involves four students with a combined diagnosis of cerebral palsy and a learning disability who took part in a 3-month trial over 59 sessions. Multimodal multisensor data were collected while they participated in a continuous performance test. Eye gaze, electroencephalogram, body pose, and interaction data were used to create a model of student engagement through objective labeling from the continuous performance test outcomes. In order to achieve this, a type of continuous performance test is introduced, the Seek-X type. Nine features were extracted including high-level handpicked compound features. Using leave-one-out cross-validation, a series of different machine learning approaches were evaluated. Overall, the random forest classification approach achieved the best classification results. Using random forest, 93.3% classification for engagement and 42.9% accuracy for disengagement were achieved. We compared these results to outcomes from different models: AdaBoost, decision tree, k-Nearest Neighbor, naïve Bayes, neural network, and support vector machine. We showed that using a multisensor approach achieved higher accuracy than using features from any reduced set of sensors. We found that using high-level handpicked features can improve the classification accuracy in every sensor mode. Our approach is robust to both sensor fallout and occlusions. The single most important sensor feature to the classification of engagement and distraction was shown to be eye gaze. It has been shown that we can accurately predict the level of engagement of students with learning disabilities in a real-time approach that is not subject to inter-rater reliability, human observation or reliant on a single mode of sensor input. This will help teachers design interventions for a heterogeneous group of students, where teachers cannot possibly attend to each of their individual needs. Our approach can be used to identify those with the greatest learning challenges so that all students are supported to reach their full potential.
Keywords: Affective computing in education, affect detection, continuous performance test, engagement, flow, HCI, interaction, learning disabilities, machine learning, multimodal, multisensor, physiological sensors, Signal Detection Theory, student engagement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1273755 In silico Analysis of Human microRNAs Targeting Influenza a Viruses (subtype H1N1, H5N1 and H3N2)
Authors: Kritsada Khongnomnan, Wittaya Poomipak, Yong Poovorawan, Sunchai Payungporn
Abstract:
In this study, three subtypes of influenza A viruses (pH1N1, H5N1 and H3N2) which naturally infected human were analyzed by bioinformatic approaches to find candidate human cellular miRNAs targeting viral genomes. There were 76 miRNAs targeting influenza A viruses. Among these candidates, 70 miRNAs were subtypes specifically targeting each subtype of influenza A virus including 21 miRNAs targeted subtype H1N1, 27 miRNAs targeted subtype H5N1 and 22 miRNAs targeted subtype H3N2. The remaining 6 miRNAs target on multiple subtypes of influenza A viruses. Uniquely, hsa-miR-3145 is the only one candidate miRNA targeting PB1 gene of all three subtypes. Obviously, most of the candidate miRNAs are targeting on polymerase complex genes (PB2, PB1 and PA) of influenza A viruses. This study predicted potential human miRNAs targeting on different subtypes of influenza A viruses which might be useful for inhibition of viral replication and for better understanding of the interaction between virus and host cell.
Keywords: Human miRNAs, Influenza A viruses, H1N1, H5N1, H3N2
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1498754 Use of Cultural Symbols for Transferring House to the Home in the Case of Famagusta
Authors: M. Sokhanvar, S. M. Shahidipour
Abstract:
One of the essential requirements for the human beings is the house for living. This is necessary to make the place of satisfaction for contemporary houses residents by attention to their culture. In this article represented the relevant theoretical literature on cultural symbols by use the architecture semiotic to construct the houses as a better place for living. In fact, make a place for everyday life with changing the house to the home is one of the most challengeable subject for architects all around the world. The target of this article is to find Cypriot houses cultural symbols that assist architect to design and build contemporary houses, to make more satisfaction for its residents according to Cypriot life style and their culture. This paper is based on researching the effect of cultural symbols on housing, would require various types of methods. However, this study focuses on two methods, which are quantitative and qualitative. The purpose of the case-specific study is to finding the symbols that used in contemporary houses by attention to the Cypriot cultural symbols in Famagusta houses.
Keywords: Houses, home, architectural symbols, cultural symbols.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642753 Comparison between Haar and Daubechies Wavelet Transformations on FPGA Technology
Authors: Fatma H. Elfouly, Mohamed I. Mahmoud, Moawad I. M. Dessouky, Salah Deyab
Abstract:
Recently, the Field Programmable Gate Array (FPGA) technology offers the potential of designing high performance systems at low cost. The discrete wavelet transform has gained the reputation of being a very effective signal analysis tool for many practical applications. However, due to its computation-intensive nature, current implementation of the transform falls short of meeting real-time processing requirements of most application. The objectives of this paper are implement the Haar and Daubechies wavelets using FPGA technology. In addition, the Bit Error Rate (BER) between the input audio signal and the reconstructed output signal for each wavelet is calculated. From the BER, it is seen that the implementations execute the operation of the wavelet transform correctly and satisfying the perfect reconstruction conditions. The design procedure has been explained and designed using the stat-ofart Electronic Design Automation (EDA) tools for system design on FPGA. Simulation, synthesis and implementation on the FPGA target technology has been carried out.
Keywords: Daubechies wavelet, discrete wavelet transform, Haar wavelet, Xilinx FPGA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7233752 Real-Time Image Analysis of Capsule Endoscopy for Bleeding Discrimination in Embedded System Platform
Authors: Yong-Gyu Lee, Gilwon Yoon
Abstract:
Image processing for capsule endoscopy requires large memory and it takes hours for diagnosis since operation time is normally more than 8 hours. A real-time analysis algorithm of capsule images can be clinically very useful. It can differentiate abnormal tissue from health structure and provide with correlation information among the images. Bleeding is our interest in this regard and we propose a method of detecting frames with potential bleeding in real-time. Our detection algorithm is based on statistical analysis and the shapes of bleeding spots. We tested our algorithm with 30 cases of capsule endoscopy in the digestive track. Results were excellent where a sensitivity of 99% and a specificity of 97% were achieved in detecting the image frames with bleeding spots.Keywords: bleeding, capsule endoscopy, image processing, real time analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1883751 Binary Phase-Only Filter Watermarking with Quantized Embedding
Authors: Hu Haibo, Liu Yi, He Ming
Abstract:
The binary phase-only filter digital watermarking embeds the phase information of the discrete Fourier transform of the image into the corresponding magnitudes for better image authentication. The paper proposed an approach of how to implement watermark embedding by quantizing the magnitude, with discussing how to regulate the quantization steps based on the frequencies of the magnitude coefficients of the embedded watermark, and how to embed the watermark at low frequency quantization. The theoretical analysis and simulation results show that algorithm flexibility, security, watermark imperceptibility and detection performance of the binary phase-only filter digital watermarking can be effectively improved with quantization based watermark embedding, and the robustness against JPEG compression will also be increased to some extent.Keywords: binary phase-only filter, discrete Fourier transform, digital watermarking, image authentication, quantization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546750 Scale, Technique and Composition Effects of CO2 Emissions under Trade Liberalization of EGS: A CGE Evaluation for Argentina
Authors: M. Priscila Ramos, Omar O. Chisari, Juan Pablo Vila Martínez
Abstract:
Current literature about trade liberalization of environmental goods and services (EGS) raises doubts about the extent of the triple win-win situation for trade, development and the environment. However, much of this literature does not consider the possibility that this agreement carries technological transmissions, either through trade or foreign direct investment. This paper presents a computable general equilibrium model calibrated for Argentina, where there are alternative technologies (one dirty and one clean according to carbon emissions) to produce the same goods. In this context, the trade liberalization of EGS allows to increase GDP, trade, reduce unemployment and improve the households welfare. However, the capital mobility appears as the key assumption to jointly reach the environmental target, when the positive scale effect generated by the increase in trade is offset by the change in the composition of production (composition and technical effects by the use of the clean alternative technology) and of consumption (composition effect by substitution of relatively lesspolluting imported goods).Keywords: CGE modeling, CO2 emissions, composition effect, scale effect, technique effect, trade liberalization of EGS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1878749 Reduced Inventories, High Reliability and Short Throughput Times by Using CONWIP Production Planning System
Authors: Tomas Duranik, Juraj Ruzbarsky, Markus Stopper
Abstract:
CONWIP (constant work-in-process) as a pull production system have been widely studied by researchers to date. The CONWIP pull production system is an alternative to pure push and pure pull production systems. It lowers and controls inventory levels which make the throughput better, reduces production lead time, delivery reliability and utilization of work. In this article a CONWIP pull production system was simulated. It was simulated push and pull planning system. To compare these systems via a production planning system (PPS) game were adjusted parameters of each production planning system. The main target was to reduce the total WIP and achieve throughput and delivery reliability to minimum values. Data was recorded and evaluated. A future state was made for real production of plastic components and the setup of the two indicators with CONWIP pull production system which can greatly help the company to be more competitive on the market.Keywords: CONWIP, constant work in process, delivery reliability, hybrid production planning, PPS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2277748 Computational Analysis of Potential Inhibitors Selected Based On Structural Similarity for the Src SH2 Domain
Authors: W. P. Hu, J. V. Kumar, Jeffrey J. P. Tsai
Abstract:
The inhibition of SH2 domain regulated protein-protein interactions is an attractive target for developing an effective chemotherapeutic approach in the treatment of disease. Molecular simulation is a useful tool for developing new drugs and for studying molecular recognition. In this study, we searched potential drug compounds for the inhibition of SH2 domain by performing structural similarity search in PubChem Compound Database. A total of 37 compounds were screened from the database, and then we used the LibDock docking program to evaluate the inhibition effect. The best three compounds (AP22408, CID 71463546 and CID 9917321) were chosen for MD simulations after the LibDock docking. Our results show that the compound CID 9917321 can produce a more stable protein-ligand complex compared to other two currently known inhibitors of Src SH2 domain. The compound CID 9917321 may be useful for the inhibition of SH2 domain based on these computational results. Subsequently experiments are needed to verify the effect of compound CID 9917321 on the SH2 domain in the future studies.
Keywords: Nonpeptide inhibitor, Src SH2 domain, LibDock, molecular dynamics simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2082747 A Preliminary Study of Drug Perfusion Enhancement by Microstreaming Induced by an Oscillating Microbubble
Authors: Jin Sun Oh, Kyung Ho Lee, S ang Gug Chung, Kyehan Rhee
Abstract:
Microbubbbles incorporating ultrasound have been used to increase the efficacy of targeted drug delivery, because microstreaming induced by cavitating bubbles affects the drug perfusion into the target cells and tissues. In order to clarify the physical effects of microstreaming on drug perfusion into tissues, a preliminary experimental study of perfusion enhancement by a stably oscillating microbubble was performed. Microstreaming was induced by an oscillating bubble at 15 kHz, and perfusion of dye into an agar phantom was optically measured by histology on agar phantom. Surface color intensity and the penetration length of dye in the agar phantom were increased more than 70% and 30%, respectively, due to the microstreaming induced by an oscillating bubble. The mass of dye perfused into a tissue phantom for 30 s was increased about 80% in the phantom with an oscillating bubble. This preliminary experiment shows the physical effects of steady streaming by an oscillating bubble can enhance the drug perfusion into the tissues while minimizing the biological effects.
Keywords: Bubble, Mass Transfer, Microstreaming, Drug Delivery, Acoustic Wave.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1887746 Identification of Slum Areas for Improvement Inputs in Lafia Town, Nasarawa State
Authors: Bashayi Obadiah, Barau Daniel
Abstract:
One of the United Nations Millennium Development targets is to 'achieve significant improvement in lives of at least 100 million slum dwellers, by 2020'. To monitor progress on this target a first step is to develop an operational definition to identify slum settlements. The indicators selected are: access to water and sanitation, sufficient living area, a house with durable material on a non-hazardous location and with tenure security. This paper describes the techniques of identifying slums and applied the techniques in identifying slum in Lafia town. The methodology used was selection of one district in Lafia town for this study and the district was zoned into four units. The total of 10% sample size out of 2,482 households of 250 questionnaires was administered using systematic sampling method based on proportion of houses at each zones as 90, 70, 40 and 50 respectively. The result shows that the area is a second order degeneration that needs a major improvement. Recommendations were made in this regard for urgent intervention in improving or upgrading of housing and infrastructural facilities
Keywords: Urban slums, security, safety, degeneration, upgrading.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3013745 Segmentation of Cardiac Images by the Force Field Driven Speed Term
Authors: Renato Dedic, Madjid Allili, Roger Lecomte, Adbelhamid Benchakroun
Abstract:
The class of geometric deformable models, so-called level sets, has brought tremendous impact to medical imagery. In this paper we present yet another application of level sets to medical imaging. The method we give here will in a way modify the speed term in the standard level sets equation of motion. To do so we build a potential based on the distance and the gradient of the image we study. In turn the potential gives rise to the force field: F~F(x, y) = P ∀(p,q)∈I ((x, y) - (p, q)) |ÔêçI(p,q)| |(x,y)-(p,q)| 2 . The direction and intensity of the force field at each point will determine the direction of the contour-s evolution. The images we used to test our method were produced by the Univesit'e de Sherbrooke-s PET scanners.Keywords: PET, Cardiac, Heart, Mouse, Geodesic, Geometric, Level Sets, Deformable Models, Edge Detection, Segmentation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1217744 Tongue Diagnosis System Based on PCA and SVM
Authors: Jin-Woong Park, Sun-Kyung Kang, Sung-Tae Jung
Abstract:
In this study, we propose a tongue diagnosis method which detects the tongue from face image and divides the tongue area into six areas, and finally generates tongue coating ratio of each area. To detect the tongue area from face image, we use ASM as one of the active shape models. Detected tongue area is divided into six areas widely used in the Korean traditional medicine and the distribution of tongue coating of the six areas is examined by SVM(Support Vector Machine). For SVM, we use a 3-dimensional vector calculated by PCA(Principal Component Analysis) from a 12-dimentional vector consisting of RGB, HIS, Lab, and Luv. As a result, we detected the tongue area stably using ASM and found that PCA and SVM helped raise the ratio of tongue coating detection.Keywords: Active Shape Model, Principal Component Analysis, Support Vector Machine, Tongue diagnosis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870743 Mobile Robot Path Planning in a 2-Dimentional Mesh
Authors: Doraid Dalalah
Abstract:
A topologically oriented neural network is very efficient for real-time path planning for a mobile robot in changing environments. When using a recurrent neural network for this purpose and with the combination of the partial differential equation of heat transfer and the distributed potential concept of the network, the problem of obstacle avoidance of trajectory planning for a moving robot can be efficiently solved. The related dimensional network represents the state variables and the topology of the robot's working space. In this paper two approaches to problem solution are proposed. The first approach relies on the potential distribution of attraction distributed around the moving target, acting as a unique local extreme in the net, with the gradient of the state variables directing the current flow toward the source of the potential heat. The second approach considers two attractive and repulsive potential sources to decrease the time of potential distribution. Computer simulations have been carried out to interrogate the performance of the proposed approaches.Keywords: Mobile robot, Path Planning, Mesh, Potential field.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1929742 Detection of Airborne Bacteria and Mildew in the Shanghai Metro System
Authors: Feng Zhou, Yuyan Wang
Abstract:
This study aimed to detect and to identify the main strains of airborne microorganisms present in the Shanghai Metro system. Samples were collected using agar plates exposed to the air and microorganisms were identified using catalase, plasma coagulase and hymolytic analysis. The results show that the concentration of mildew present within a newly opened metro line was significantly higher than for other lines. Differences among underground and elevated stations can be attributed to differences in passenger flow and the environment surrounding the stations. Additionally, the investigation indicated that bacteria reached maximum levels at different times on weekdays and weekends. The bacteria in the Metro stations were identified as primarily Gram positive, consisting mainly of coagulase-negative staphylococcus strains (CNS).Keywords: Bacteria, environment, Metro system, mildew, passenger flow
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2023741 Optimal Design of the Power Generation Network in California: Moving towards 100% Renewable Electricity by 2045
Authors: Wennan Long, Yuhao Nie, Yunan Li, Adam Brandt
Abstract:
To fight against climate change, California government issued the Senate Bill No. 100 (SB-100) in 2018 September, which aims at achieving a target of 100% renewable electricity by the end of 2045. A capacity expansion problem is solved in this case study using a binary quadratic programming model. The optimal locations and capacities of the potential renewable power plants (i.e., solar, wind, biomass, geothermal and hydropower), the phase-out schedule of existing fossil-based (nature gas) power plants and the transmission of electricity across the entire network are determined with the minimal total annualized cost measured by net present value (NPV). The results show that the renewable electricity contribution could increase to 85.9% by 2030 and reach 100% by 2035. Fossil-based power plants will be totally phased out around 2035 and solar and wind will finally become the most dominant renewable energy resource in California electricity mix.
Keywords: 100% renewable electricity, California, capacity expansion, binary quadratic programming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 738740 Marketing Management and Cultural Learning Center: The Case Study of Arts and Cultural Office, Suansunandha Rajabhat University
Authors: Pirada Techaratpong
Abstract:
This qualitative research has 2 objectives: to study marketing management of the cultural learning center in Suansunandha Rajabhat University and to suggest guidelines to improve its marketing management. This research is based on a case study of the Arts and Culture Office in Suansunandha Rajabhat University, Bangkok. This research found the Art and Culture Office has no formal marketing management. However, the marketing management is partly covered in the overall business plan, strategic plan, and action plan. The process can be divided into 5 stages. The marketing concept has long been introduced to its policy but not apparently put into action due to inflexible system. Some gaps are found in the process. The research suggests the Art and Culture Office implement the concept of marketing orientation, meeting the needs and wants of its target customers and adapt to the changing situation. Minor guidelines for improvement are provided.
Keywords: Marketing, management, museum, cultural learning center.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1579739 A Generalized Sparse Bayesian Learning Algorithm for Near-Field Synthetic Aperture Radar Imaging: By Exploiting Impropriety and Noncircularity
Authors: Pan Long, Bi Dongjie, Li Xifeng, Xie Yongle
Abstract:
The near-field synthetic aperture radar (SAR) imaging is an advanced nondestructive testing and evaluation (NDT&E) technique. This paper investigates the complex-valued signal processing related to the near-field SAR imaging system, where the measurement data turns out to be noncircular and improper, meaning that the complex-valued data is correlated to its complex conjugate. Furthermore, we discover that the degree of impropriety of the measurement data and that of the target image can be highly correlated in near-field SAR imaging. Based on these observations, A modified generalized sparse Bayesian learning algorithm is proposed, taking impropriety and noncircularity into account. Numerical results show that the proposed algorithm provides performance gain, with the help of noncircular assumption on the signals.Keywords: Complex-valued signal processing, synthetic aperture radar (SAR), 2-D radar imaging, compressive sensing, Sparse Bayesian learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1537738 Evolution of Fuzzy Neural Networks Using an Evolution Strategy with Fuzzy Genotype Values
Authors: Hidehiko Okada
Abstract:
Evolution strategy (ES) is a well-known instance of evolutionary algorithms, and there have been many studies on ES. In this paper, the author proposes an extended ES for solving fuzzy-valued optimization problems. In the proposed ES, genotype values are not real numbers but fuzzy numbers. Evolutionary processes in the ES are extended so that it can handle genotype instances with fuzzy numbers. In this study, the proposed method is experimentally applied to the evolution of neural networks with fuzzy weights and biases. Results reveal that fuzzy neural networks evolved using the proposed ES with fuzzy genotype values can model hidden target fuzzy functions even though no training data are explicitly provided. Next, the proposed method is evaluated in terms of variations in specifying fuzzy numbers as genotype values. One of the mostly adopted fuzzy numbers is a symmetric triangular one that can be specified by its lower and upper bounds (LU) or its center and width (CW). Experimental results revealed that the LU model contributed better to the fuzzy ES than the CW model, which indicates that the LU model should be adopted in future applications of the proposed method.
Keywords: Evolutionary algorithm, evolution strategy, fuzzy number, feedforward neural network, neuroevolution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1556737 Monitoring of Spectrum Usage and Signal Identification Using Cognitive Radio
Authors: O. S. Omorogiuwa, E. J. Omozusi
Abstract:
The monitoring of spectrum usage and signal identification, using cognitive radio, is done to identify frequencies that are vacant for reuse. It has been established that ‘internet of things’ device uses secondary frequency which is free, thereby facing the challenge of interference from other users, where some primary frequencies are not being utilised. The design was done by analysing a specific frequency spectrum, checking if all the frequency stations that range from 87.5-108 MHz are presently being used in Benin City, Edo State, Nigeria. From the results, it was noticed that by using Software Defined Radio/Simulink, we were able to identify vacant frequencies in the range of frequency under consideration. Also, we were able to use the significance of energy detection threshold to reuse this vacant frequency spectrum, when the cognitive radio displays a zero output (that is decision H0), meaning that the channel is unoccupied. Hence, the analysis was able to find the spectrum hole and identify how it can be reused.
Keywords: Spectrum, interference, telecommunication, cognitive radio, frequency.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 876736 Determination of Penicillins Residues in Livestock and Marine Products by LC/MS/MS
Authors: Ji Young Song, Soo Jung Hu, Hyunjin Joo, Joung Boon Hwang, Mi Ok Kim, Shin Jung Kang, Dae Hyun Cho
Abstract:
Multi-residue analysis method for penicillins was developed and validated in bovine muscle, chicken, milk, and flatfish. Detection was based on liquid chromatography tandem mass spectrometry (LC/MS/MS). The developed method was validated for specificity, precision, recovery, and linearity. The analytes were extracted with 80% acetonitrile and clean-up by a single reversed-phase solid-phase extraction step. Six penicillins presented recoveries higher than 76% with the exception of Amoxicillin (59.7%). Relative standard deviations (RSDs) were not more than 10%. LOQs values ranged from 0.1 and to 4.5 ug/kg. The method was applied to 128 real samples. Benzylpenicillin was detected in 15 samples and Cloxacillin was detected in 7 samples. Oxacillin was detected in 2 samples. But the detected levels were under the MRL levels for penicillins in samples.Keywords: Penicillins, livestock product, Multi-residue analysis, LC/MS/MS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3422735 Identity Verification Using k-NN Classifiers and Autistic Genetic Data
Authors: Fuad M. Alkoot
Abstract:
DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN).
Keywords: Biometrics, identity verification, genetic data, k-nearest neighbor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1124734 Recursive Least Squares Adaptive Filter a better ISI Compensator
Authors: O. P. Sharma, V. Janyani, S. Sancheti
Abstract:
Inter-symbol interference if not taken care off may cause severe error at the receiver and the detection of signal becomes difficult. An adaptive equalizer employing Recursive Least Squares algorithm can be a good compensation for the ISI problem. In this paper performance of communication link in presence of Least Mean Square and Recursive Least Squares equalizer algorithm is analyzed. A Model of communication system having Quadrature amplitude modulation and Rician fading channel is implemented using MATLAB communication block set. Bit error rate and number of errors is evaluated for RLS and LMS equalizer algorithm, due to change in Signal to Noise Ratio (SNR) and fading component gain in Rician fading Channel.
Keywords: Least mean square (LMS), Recursive least squares(RLS), Adaptive equalization, Bit error rate (BER), Rician fading channel, Quadrature Amplitude Modulation (QAM), Signal to noiseratio (SNR).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3082733 Diagnosis of Diabetes Using Computer Methods: Soft Computing Methods for Diabetes Detection Using Iris
Authors: Piyush Samant, Ravinder Agarwal
Abstract:
Complementary and Alternative Medicine (CAM) techniques are quite popular and effective for chronic diseases. Iridology is more than 150 years old CAM technique which analyzes the patterns, tissue weakness, color, shape, structure, etc. for disease diagnosis. The objective of this paper is to validate the use of iridology for the diagnosis of the diabetes. The suggested model was applied in a systemic disease with ocular effects. 200 subject data of 100 each diabetic and non-diabetic were evaluated. Complete procedure was kept very simple and free from the involvement of any iridologist. From the normalized iris, the region of interest was cropped. All 63 features were extracted using statistical, texture analysis, and two-dimensional discrete wavelet transformation. A comparison of accuracies of six different classifiers has been presented. The result shows 89.66% accuracy by the random forest classifier.
Keywords: Complementary and alternative medicine, Iridology, iris, feature extraction, classification, disease prediction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1864732 An Expert System for Assessment of Learning Outcomes for ABET Accreditation
Authors: M. H. Imam, Imran A. Tasadduq, Abdul-Rahim Ahmad, Fahd M. Aldosari
Abstract:
Learning outcomes of a course (CLOs) and the abilities at the time of graduation referred to as Student Outcomes (SOs) are required to be assessed for ABET accreditation. A question in an assessment must target a CLO as well as an SO and must represent a required level of competence. This paper presents the idea of an Expert System (ES) to select a proper question to satisfy ABET accreditation requirements. For ES implementation, seven attributes of a question are considered including the learning outcomes and Bloom’s Taxonomy level. A database contains all the data about a course including course content topics, course learning outcomes and the CLO-SO relationship matrix. The knowledge base of the presented ES contains a pool of questions each with tags of the specified attributes. Questions and the attributes represent expert opinions. With implicit rule base the inference engine finds the best possible question satisfying the required attributes. It is shown that the novel idea of such an ES can be implemented and applied to a course with success. An application example is presented to demonstrate the working of the proposed ES.
Keywords: Expert system, student outcomes, course learning outcomes, question attributes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1504731 Investigating the Geopolymerization Process of Aluminosilicates and Its Impact on the Compressive Strength of the Produced Geopolymers
Authors: Heba Z. Fouad, Tarek M. Madkour, Safwan A. Khedr
Abstract:
This paper investigates multiple factors that impact the formation of geopolymers and their compressive strength to be utilized in construction as an environmentally-friendly material. Bentonite and Kaolinite were thermally calcinated at 750 °C to obtain Metabentonite and Metakaolinite with higher reactivity. Both source materials were activated using a solution of sodium hydroxide (NaOH). Thereafter, samples were cured at different temperatures. The samples were analyzed chemically using a host of spectroscopic techniques. The bulk density and compressive strength of the produced geopolymer pastes were studied. Findings indicate that the ratio of NaOH solution to source material affects the compressive strength, being optimal at 0.54. Moreover, controlled heat curing was proven effective to improve compressive strength. The existence of characteristic Fourier Transform Infrared Spectroscopy (FTIR) peaks at approximately 1020 cm-1 and 460 cm-1 which correspond to the asymmetric stretching vibration of Si-O-T and bending vibration of Si-O-Si, hence, confirming the formation of the target geopolymer.
Keywords: alcination of metakaolinite, compressive strength, FTIR analysis, geopolymer, green cement
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 392