• Title/Summary/Keyword: Detecting Effectiveness

Search Result 341, Processing Time 0.021 seconds

Detection of multi-type data anomaly for structural health monitoring using pattern recognition neural network

  • Gao, Ke;Chen, Zhi-Dan;Weng, Shun;Zhu, Hong-Ping;Wu, Li-Ying
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.129-140
    • /
    • 2022
  • The effectiveness of system identification, damage detection, condition assessment and other structural analyses relies heavily on the accuracy and reliability of the measured data in structural health monitoring (SHM) systems. However, data anomalies often occur in SHM systems, leading to inaccurate and untrustworthy analysis results. Therefore, anomalies in the raw data should be detected and cleansed before further analysis. Previous studies on data anomaly detection mainly focused on just single type of data anomaly for denoising or removing outliers, meanwhile, the existing methods of detecting multiple data anomalies are usually time consuming. For these reasons, recognising multiple anomaly patterns for real-time alarm and analysis in field monitoring remains a challenge. Aiming to achieve an efficient and accurate detection for multi-type data anomalies for field SHM, this study proposes a pattern-recognition-based data anomaly detection method that mainly consists of three steps: the feature extraction from the long time-series data samples, the training of a pattern recognition neural network (PRNN) using the features and finally the detection of data anomalies. The feature extraction step remarkably reduces the time cost of the network training, making the detection process very fast. The performance of the proposed method is verified on the basis of the SHM data of two practical long-span bridges. Results indicate that the proposed method recognises multiple data anomalies with very high accuracy and low calculation cost, demonstrating its applicability in field monitoring.

Machine Learning Algorithm Accuracy for Code-Switching Analytics in Detecting Mood

  • Latib, Latifah Abd;Subramaniam, Hema;Ramli, Siti Khadijah;Ali, Affezah;Yulia, Astri;Shahdan, Tengku Shahrom Tengku;Zulkefly, Nor Sheereen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.334-342
    • /
    • 2022
  • Nowadays, as we can notice on social media, most users choose to use more than one language in their online postings. Thus, social media analytics needs reviewing as code-switching analytics instead of traditional analytics. This paper aims to present evidence comparable to the accuracy of code-switching analytics techniques in analysing the mood state of social media users. We conducted a systematic literature review (SLR) to study the social media analytics that examined the effectiveness of code-switching analytics techniques. One primary question and three sub-questions have been raised for this purpose. The study investigates the computational models used to detect and measures emotional well-being. The study primarily focuses on online postings text, including the extended text analysis, analysing and predicting using past experiences, and classifying the mood upon analysis. We used thirty-two (32) papers for our evidence synthesis and identified four main task classifications that can be used potentially in code-switching analytics. The tasks include determining analytics algorithms, classification techniques, mood classes, and analytics flow. Results showed that CNN-BiLSTM was the machine learning algorithm that affected code-switching analytics accuracy the most with 83.21%. In addition, the analytics accuracy when using the code-mixing emotion corpus could enhance by about 20% compared to when performing with one language. Our meta-analyses showed that code-mixing emotion corpus was effective in improving the mood analytics accuracy level. This SLR result has pointed to two apparent gaps in the research field: i) lack of studies that focus on Malay-English code-mixing analytics and ii) lack of studies investigating various mood classes via the code-mixing approach.

Determining the reliability of diagnosis and treatment using artificial intelligence software with panoramic radiographs

  • Kaan Orhan;Ceren Aktuna Belgin;David Manulis;Maria Golitsyna;Seval Bayrak;Secil Aksoy;Alex Sanders;Merve Onder;Matvey Ezhov;Mamat Shamshiev;Maxim Gusarev;Vladislav Shlenskii
    • Imaging Science in Dentistry
    • /
    • v.53 no.3
    • /
    • pp.199-207
    • /
    • 2023
  • Purpose: The objective of this study was to evaluate the accuracy and effectiveness of an artificial intelligence (AI) program in identifying dental conditions using panoramic radiographs(PRs), as well as to assess the appropriateness of its treatment recommendations. Materials and Methods: PRs from 100 patients(representing 4497 teeth) with known clinical examination findings were randomly selected from a university database. Three dentomaxillofacial radiologists and the Diagnocat AI software evaluated these PRs. The evaluations were focused on various dental conditions and treatments, including canal filling, caries, cast post and core, dental calculus, fillings, furcation lesions, implants, lack of interproximal tooth contact, open margins, overhangs, periapical lesions, periodontal bone loss, short fillings, voids in root fillings, overfillings, pontics, root fragments, impacted teeth, artificial crowns, missing teeth, and healthy teeth. Results: The AI demonstrated almost perfect agreement (exceeding 0.81) in most of the assessments when compared to the ground truth. The sensitivity was very high (above 0.8) for the evaluation of healthy teeth, artificial crowns, dental calculus, missing teeth, fillings, lack of interproximal contact, periodontal bone loss, and implants. However, the sensitivity was low for the assessment of caries, periapical lesions, pontic voids in the root canal, and overhangs. Conclusion: Despite the limitations of this study, the synthesized data suggest that AI-based decision support systems can serve as a valuable tool in detecting dental conditions, when used with PR for clinical dental applications.

Corruption Risks in the System of Providing Economic Security of the State

  • Pinchuk, Vitaliy;Shaposhnykova, Iryna;Kuvakin, Serhiy;Kozak, Kateryna;Popova, Liubov;Lopashchuk, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.69-76
    • /
    • 2022
  • At the current stage of globalization and European integration of Ukraine, the aspects related to the effective fight against corruption in the system of economic security of our country are receiving more and more attention, as they become a prerequisite for continuing reforms based on international funding. In order to consider this issue and solve this problem, the necessary step is to develop and implement real mechanisms of the system for detecting and preventing corrupt behavior, which are based on international anti-corruption standards. The leading component of this system is the management of corruption risks in the system of economic security in order to identify them and implement measures to reduce them. This study analyzes the corruption perception index in Ukraine in recent years, which showed a positive, albeit somewhat slow dynamics of its growth, indicating a gradual increase in overcoming corruption through the introduction of a number of anti-corruption measures and changes. It is proved that the current stage of socio-economic development of the country contributes to strengthening the processes of combating corruption and preventing corruption risks, creating an effective and efficient anti-corruption system of the state. The concept of "corruption" was studied, it was found that in the field of public administration it is considered from different positions and is closely related to the concept of "corruption risks". The essence and features of corruption risks are studied, the preconditions of their occurrence are formulated, the relationship between the causes of corruption risks and economic security in the field of public authority has been established. The system of corruption risk management is considered and its components are characterized. It is proposed to increase the effectiveness of anticorruption policy through the implementation of measures aimed at investigating the causes of corruption risks, as well as developed effective and effective means of reducing corruption risks within the system of economic security

The Efficiency of Long Short-Term Memory (LSTM) in Phenology-Based Crop Classification

  • Ehsan Rahimi;Chuleui Jung
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.1
    • /
    • pp.57-69
    • /
    • 2024
  • Crop classification plays a vitalrole in monitoring agricultural landscapes and enhancing food production. In this study, we explore the effectiveness of Long Short-Term Memory (LSTM) models for crop classification, focusing on distinguishing between apple and rice crops. The aim wasto overcome the challenges associatedwith finding phenology-based classification thresholds by utilizing LSTM to capture the entire Normalized Difference Vegetation Index (NDVI)trend. Our methodology involvestraining the LSTM model using a reference site and applying it to three separate three test sites. Firstly, we generated 25 NDVI imagesfrom the Sentinel-2A data. Aftersegmenting study areas, we calculated the mean NDVI values for each segment. For the reference area, employed a training approach utilizing the NDVI trend line. This trend line served as the basis for training our crop classification model. Following the training phase, we applied the trained model to three separate test sites. The results demonstrated a high overall accuracy of 0.92 and a kappa coefficient of 0.85 for the reference site. The overall accuracies for the test sites were also favorable, ranging from 0.88 to 0.92, indicating successful classification outcomes. We also found that certain phenological metrics can be less effective in crop classification therefore limitations of relying solely on phenological map thresholds and emphasizes the challenges in detecting phenology in real-time, particularly in the early stages of crops. Our study demonstrates the potential of LSTM models in crop classification tasks, showcasing their ability to capture temporal dependencies and analyze timeseriesremote sensing data.While limitations exist in capturing specific phenological events, the integration of alternative approaches holds promise for enhancing classification accuracy. By leveraging advanced techniques and considering the specific challenges of agricultural landscapes, we can continue to refine crop classification models and support agricultural management practices.

Numerical simulation of localization of a sub-assembly with failed fuel pins in the prototype fast breeder reactor

  • Abhitab Bachchan;Puspendu Hazra;Nimala Sundaram;Subhadip Kirtan;Nakul Chaudhary;A. Riyas;K. Devan
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3648-3658
    • /
    • 2023
  • The early localization of a fuel subassembly with a failed (wet rupture) fuel pin is very important in reactors to limit the associated radiological and operational consequences. This requires a fast and reliable system for failure detection and their localization in the core. In the Prototype Fast Breeder Reactor, the system specially designed for this purpose is Failed Fuel Location Modules (FFLM) housed in the control plug region. It identifies a failed sub-assembly by detecting the presence of delayed neutrons in the sodium from a failed sub-assembly. During the commissioning phase of PFBR, it is mandatory to demonstrate the FFLM effectiveness. The paper highlights the engineering and physics design aspects of FFLM and the integrated simulation towards its function demonstration with a source assembly containing a perforated metallic fuel pin. This test pin mimics a MOX pin of 1 cm2 of geometrical defect area. At 10% power and 20% sodium flow rate, the counts rate in the BCCs of FFLM system range from 75 cps to 145 cps depending upon the position of DN source assembly. The model developed for the counts simulation is applicable to both metal and MOX pins with proper values of k-factor and escape coefficient.

An Inquiry Over Rayleigh's Pioneering Experiments for the Detection of Shadow, Reflection, Interference, and Diffraction of Sound (소리의 그늘, 반사, 간섭, 회절의 검출을 위한 레일리의 선구적 실험에 대한 연구)

  • Ku, Ja-Hyon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.55-60
    • /
    • 2007
  • The shadow, reflection, interference, and diffraction are proper phenomena concerning sound that is a kind of wave. By the late nineteenth century, similar optical phenomena had been detected already but these phenomena concerning sound had not been convincingly detected. It was Rayleigh who succeeded in detecting those phenomena without any reasonable doubt by the virtue of his original instruments and smart experimental settings. Rayleigh could detect the sound shadow by using the corner of a building and erase the shadow by some reflectors. And he constructed some apparatus similar to Young's interference apparatus famous in optics to detect the sonic interference. Furthermore, he first succeeded in illustrating the acoustical effectiveness of Poisson's disk by which optical diffraction had already been well known, and tested the effect of diffraction by spherical obstacles to ascertain that the result coincided with his theory.

Object Detection Capabilities and Performance Evaluation of 3D LiDAR Systems in Urban Air Mobility Environments (UAM 환경에서 3D LiDAR 시스템을 통한 객체 검출 기능 및 성능 평가)

  • Bon-soo Koo;In-ho choi;Jaewook Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.3
    • /
    • pp.300-308
    • /
    • 2024
  • Urban air mobility (UAM) is emerging as a revolutionary transportation solution to urban congestion and environmental issues. Especially, electric vertical take-off and landing (eVTOL) aircraft are expected to enhance urban mobility, reduce traffic congestion, and decrease environmental pollution. However, the successful implementation and operation of UAM systems heavily rely on advanced technological infrastructure, particularly in sensor technology. Among these, 3D light detection and ranging (LiDAR) systems are essential for detecting obstacles and generating pathways in complex urban environments. This paper focuses on the challenges of developing LiDAR-based perception solutions, emphasizing the importance and performance of object detection capabilities using 3D LiDAR. It integrates LiDAR data processing algorithms and object detection methodologies to experimentally validate the effectiveness of perception solutions that contribute to the safe navigation of aircraft. This research significantly enhances the ability of aircraft to recognize and avoid obstacles effectively within urban settings.

Utilizing the n-back Task to Investigate Working Memory and Extending Gerontological Educational Tools for Applicability in School-aged Children

  • Chih-Chin Liang;Si-Jie Fu
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • In this research, a cohort of two children, aged 7-8 years, was selected to participate in a specialized three-week training program aimed at enhancing their working memory. The program consisted of three sessions, each lasting approximately 30 minutes. The primary goal was to investigate the impact and developmental trajectory of working memory in school-aged children. Working memory plays a significant role in young children's learning and daily activities. To address the needs of this demographic, products should offer both educational and enjoyable activities that engage working memory. Digital educational tools, known for their flexibility, are suitable for both older individuals and young children. By updating software or modifying content, these tools can be effectively repurposed for young learners without extensive hardware changes, making them both cost-effective and practical. For example, memory training games initially designed for older adults can be adapted for young children by altering images, music, or storylines. Furthermore, incorporating elements familiar to children, like animals, toys, or fairy tales, can increase their engagement in these activities. Historically, working memory capabilities have been assessed predominantly through traditional intelligence tests. However, recent research questions the adequacy of these behavioral measures in accurately detecting changes in working memory. To bridge this gap, the current study utilized electroencephalography (EEG) as a more sophisticated and precise tool for monitoring potential changes in working memory after the training. The research findings were revealing. Participants showed marked improvement in their performance on n-back tasks, a standard measure for evaluating working memory. This improvement post-training strongly supports the effectiveness of the training program. The results indicate that such targeted and structured training programs can significantly enhance the working memory abilities of children in this age group, providing promising implications for educational strategies and cognitive development interventions.

Deep learning-based anomaly detection in acceleration data of long-span cable-stayed bridges

  • Seungjun Lee;Jaebeom Lee;Minsun Kim;Sangmok Lee;Young-Joo Lee
    • Smart Structures and Systems
    • /
    • v.33 no.2
    • /
    • pp.93-103
    • /
    • 2024
  • Despite the rapid development of sensors, structural health monitoring (SHM) still faces challenges in monitoring due to the degradation of devices and harsh environmental loads. These challenges can lead to measurement errors, missing data, or outliers, which can affect the accuracy and reliability of SHM systems. To address this problem, this study proposes a classification method that detects anomaly patterns in sensor data. The proposed classification method involves several steps. First, data scaling is conducted to adjust the scale of the raw data, which may have different magnitudes and ranges. This step ensures that the data is on the same scale, facilitating the comparison of data across different sensors. Next, informative features in the time and frequency domains are extracted and used as input for a deep neural network model. The model can effectively detect the most probable anomaly pattern, allowing for the timely identification of potential issues. To demonstrate the effectiveness of the proposed method, it was applied to actual data obtained from a long-span cable-stayed bridge in China. The results of the study have successfully verified the proposed method's applicability to practical SHM systems for civil infrastructures. The method has the potential to significantly enhance the safety and reliability of civil infrastructures by detecting potential issues and anomalies at an early stage.