Search results for: double-input rule module
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1505

Search results for: double-input rule module

1235 Subspace Rotation Algorithm for Implementing Restricted Hopfield Network as an Auto-Associative Memory

Authors: Ci Lin, Tet Yeap, Iluju Kiringa

Abstract:

This paper introduces the subspace rotation algorithm (SRA) to train the Restricted Hopfield Network (RHN) as an auto-associative memory. Subspace rotation algorithm is a gradient-free subspace tracking approach based on the singular value decomposition (SVD). In comparison with Backpropagation Through Time (BPTT) on training RHN, it is observed that SRA could always converge to the optimal solution and BPTT could not achieve the same performance when the model becomes complex, and the number of patterns is large. The AUTS case study showed that the RHN model trained by SRA could achieve a better structure of attraction basin with larger radius(in general) than the Hopfield Network(HNN) model trained by Hebbian learning rule. Through learning 10000 patterns from MNIST dataset with RHN models with different number of hidden nodes, it is observed that an several components could be adjusted to achieve a balance between recovery accuracy and noise resistance.

Keywords: hopfield neural network, restricted hopfield network, subspace rotation algorithm, hebbian learning rule

Procedia PDF Downloads 113
1234 Multi-source Question Answering Framework Using Transformers for Attribute Extraction

Authors: Prashanth Pillai, Purnaprajna Mangsuli

Abstract:

Oil exploration and production companies invest considerable time and efforts to extract essential well attributes (like well status, surface, and target coordinates, wellbore depths, event timelines, etc.) from unstructured data sources like technical reports, which are often non-standardized, multimodal, and highly domain-specific by nature. It is also important to consider the context when extracting attribute values from reports that contain information on multiple wells/wellbores. Moreover, semantically similar information may often be depicted in different data syntax representations across multiple pages and document sources. We propose a hierarchical multi-source fact extraction workflow based on a deep learning framework to extract essential well attributes at scale. An information retrieval module based on the transformer architecture was used to rank relevant pages in a document source utilizing the page image embeddings and semantic text embeddings. A question answering framework utilizingLayoutLM transformer was used to extract attribute-value pairs incorporating the text semantics and layout information from top relevant pages in a document. To better handle context while dealing with multi-well reports, we incorporate a dynamic query generation module to resolve ambiguities. The extracted attribute information from various pages and documents are standardized to a common representation using a parser module to facilitate information comparison and aggregation. Finally, we use a probabilistic approach to fuse information extracted from multiple sources into a coherent well record. The applicability of the proposed approach and related performance was studied on several real-life well technical reports.

Keywords: natural language processing, deep learning, transformers, information retrieval

Procedia PDF Downloads 191
1233 Improving the Performance of Proton Exchange Membrane Using Fuzzy Logic

Authors: Sadık Ata, Kevser Dincer

Abstract:

In this study, the performance of proton exchange membrane (PEM) fuel cell was experimentally investigated and modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Coating on the anode side of the PEM fuel cell was accomplished with the spin method by using Yttria-stabilized zirconia (YSZ). Input-output parameters were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6),High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between experimental data and RBMTF is done by using statistical methods like absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of performance PEM fuel cell.

Keywords: proton exchange membrane (PEM), fuel cell, rule-based mamdani-type fuzzy (RMBTF) modelling, Yttria-stabilized zirconia (YSZ)

Procedia PDF Downloads 237
1232 Optimization of the Dam Management to Satisfy the Irrigation Demand: A Case Study in Algeria

Authors: Merouane Boudjerda, Bénina Touaibia, Mustapha K Mihoubi

Abstract:

In Algeria, water resources play a crucial role in economic development. But over the last decades, they are relatively limited and gradually decreasing to the detriment of agriculture. The agricultural irrigation is the primary water consuming sector followed by the domestic and industrial sectors. The research presented in this paper focuses on the optimization of irrigation water demand. Dynamic Programming-Neural Network (DPNN) method is applied to investigate reservoir optimization. The optimal operation rule is formulated to minimize the gap between water release and water irrigation demand. As a case study, Boukerdane dam’s reservoir system in North of Algeria has been selected to examine our proposed optimization model. The application of DPNN method allowed increasing the satisfaction rate (SR) from 34% to 60%. In addition, the operation rule generated showed more reliable and resilience operation for the examined case study.

Keywords: water management, agricultural demand, Boukerdane dam, dynamic programming, artificial neural network

Procedia PDF Downloads 127
1231 Physical Verification Flow on Multiple Foundries

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Muhammad Al Baqir Zinal Abidin, Md Hanif Md Nasir

Abstract:

This paper will discuss how we optimize our physical verification flow in our IC Design Department having various rule decks from multiple foundries. Our ultimate goal is to achieve faster time to tape-out and avoid schedule delay. Currently the physical verification runtimes and memory usage have drastically increased with the increasing number of design rules, design complexity and the size of the chips to be verified. To manage design violations, we use a number of solutions to reduce the amount of violations needed to be checked by physical verification engineers. The most important functions in physical verifications are DRC (design rule check), LVS (layout vs. schematic) and XRC (extraction). Since we have a multiple number of foundries for our design tape-outs, we need a flow that improve the overall turnaround time and ease of use of the physical verification process. The demand for fast turnaround time is even more critical since the physical design is the last stage before sending the layout to the foundries.

Keywords: physical verification, DRC, LVS, XRC, flow, foundry, runset

Procedia PDF Downloads 652
1230 Validation of the Arabic Version of the InterSePT Scale for Suicidal Thinking (ISST) among the Arab Population in Qatar

Authors: S. Hammoudeh, S. Ghuloum, A. Abdelhakam, A. AlMujalli, M. Opler, Y. Hani, A. Yehya, S. Mari, R. Elsherbiny, Z. Mahfoud, H. Al-Amin

Abstract:

Introduction: Suicidal ideation and attempts are very common in patients with schizophrenia and still contributes to the high mortality in this population. The InterSePT Scale for Suicidal Thinking (ISST) is a validated tool used to assess suicidal ideation in patients with schizophrenia. This research aims to validate the Arabic version of the ISST among the Arabs residing in Qatar. Methods: Patients diagnosed with schizophrenia were recruited from the department of Psychiatry, Rumailah Hospital, Doha, Qatar. Healthy controls were recruited from the primary health care centers in Doha, Qatar. The validation procedures including professional and expert translation, pilot survey and back translation of the ISST were implemented. Diagnosis of schizophrenia was confirmed using the validated Arabic version of Mini International Neuropsychiatric Interview (MINI 6, module K) for schizophrenia. The gold standard was the module B on suicidality from MINI 6 also. This module was administered by a rater who was blinded to the results of ISST. Results: Our sample (n=199) was composed of 98 patients diagnosed with schizophrenia (age 36.03 ± 9.88 years; M/F is 2/1) and 101 healthy participants (age 35.01 ± 8.23 years; M/F is 1/2). Among patients with schizophrenia: 26.5% were married, 17.3% had a college degree, 28.6% were employed, 9% had committed suicide once, and 4.4% had more than 4 suicide attempts. Among the control group: 77.2% were married, 57.4% had a college degree, and 99% were employed. The mean score on the ISST was 2.36 ± 3.97 vs. 0.47 ± 1.44 for the schizophrenia and control groups, respectively. The overall Cronbach’s alpha was 0.91. Conclusions: This is the first study in the Arab world to validate the ISST in an Arabic-based population. The psychometric properties indicate that the Arabic version of the ISST is a valid tool to assess the severity of suicidal ideation in Arabic speaking patients diagnosed with schizophrenia.

Keywords: mental health, Qatar, schizophrenia, suicide

Procedia PDF Downloads 558
1229 Development of Coastal Inundation–Inland and River Flow Interface Module Based on 2D Hydrodynamic Model

Authors: Eun-Taek Sin, Hyun-Ju Jang, Chang Geun Song, Yong-Sik Han

Abstract:

Due to the climate change, the coastal urban area repeatedly suffers from the loss of property and life by flooding. There are three main causes of inland submergence. First, when heavy rain with high intensity occurs, the water quantity in inland cannot be drained into rivers by increase in impervious surface of the land development and defect of the pump, storm sewer. Second, river inundation occurs then water surface level surpasses the top of levee. Finally, Coastal inundation occurs due to rising sea water. However, previous studies ignored the complex mechanism of flooding, and showed discrepancy and inadequacy due to linear summation of each analysis result. In this study, inland flooding and river inundation were analyzed together by HDM-2D model. Petrov-Galerkin stabilizing method and flux-blocking algorithm were applied to simulate the inland flooding. In addition, sink/source terms with exponentially growth rate attribute were added to the shallow water equations to include the inland flooding analysis module. The applications of developed model gave satisfactory results, and provided accurate prediction in comprehensive flooding analysis. The applications of developed model gave satisfactory results, and provided accurate prediction in comprehensive flooding analysis. To consider the coastal surge, another module was developed by adding seawater to the existing Inland Flooding-River Inundation binding module for comprehensive flooding analysis. Based on the combined modules, the Coastal Inundation – Inland & River Flow Interface was simulated by inputting the flow rate and depth data in artificial flume. Accordingly, it was able to analyze the flood patterns of coastal cities over time. This study is expected to help identify the complex causes of flooding in coastal areas where complex flooding occurs, and assist in analyzing damage to coastal cities. Acknowledgements—This research was supported by a grant ‘Development of the Evaluation Technology for Complex Causes of Inundation Vulnerability and the Response Plans in Coastal Urban Areas for Adaptation to Climate Change’ [MPSS-NH-2015-77] from the Natural Hazard Mitigation Research Group, Ministry of Public Safety and Security of Korea.

Keywords: flooding analysis, river inundation, inland flooding, 2D hydrodynamic model

Procedia PDF Downloads 359
1228 Mechanical Properties of Lithium-Ion Battery at Different Packing Angles Under Impact Loading

Authors: Wei Zhao, Yuxuan Yao, Hao Chen

Abstract:

In order to find out the mechanical properties and failure behavior of lithium-ion batteries, drop hammer impact experiments and finite element simulations are carried out on batteries with different packed angles. Firstly, a drop hammer impact experiment system, which is based on the DHR-1808 drop hammer and oscilloscope, is established, and then a drop test of individual batteries and packed angles of 180 ° and 120 ° are carried out. The image of battery deformation, force-time curve and voltage-time curve are recorded. Secondly, finite element models of individual batteries and two packed angles are established, and the results of the test and simulation are compared. Finally, the mechanical characteristics and failure behavior of lithium-ion battery modules with the packed arrangement of 6 * 6 and packing angles of 180 °, 120 °, 90 ° and 60 ° are analyzed under the same velocity with different battery packing angles, and the same impact energy with different impact velocity and different packing angles. The result shows that the individual battery is destroyed completely in the drop hammer impact test with an initial impact velocity of 3m/s and drop height of 459mm, and the voltage drops to close to 0V when the test ends. The voltage drops to 12V when packed angle of 180°, and 3.6V when packed angle of 120°. It is found that the trend of the force-time curve between simulation and experiment is generally consistent. The difference in maximum peak value is 3.9kN for a packing angle of 180° and 1.3kN for a packing angle of 120°. Under the same impact velocity and impact energy, the strain rate of the battery module with a packing angle of 180° is the lowest, and the maximum stress can reach 26.7MPa with no battery short-circuited. The research under our experiment and simulation shows that the lithium-ion battery module with a packing angle of 180 ° is the least likely to be damaged, which can sustain the maximum stress under the same impact load.

Keywords: battery module, finite element simulation, power battery, packing angle

Procedia PDF Downloads 61
1227 Effect of Reflective Practices on the Performance of Prospective Teachers

Authors: Madiha Zahid, Afifa Khanam

Abstract:

The present study aims to investigate the effect of reflective teaching practices on prospective teachers’ performance. Reflective teaching practice helps teachers to plan, implement and improve their performance by rethinking about their strengths and weaknesses. An action research was conducted by the researcher. All prospective teachers of sixth semester in a women university’s teacher education program were the population of the study. From 40 students, 20 students were taken as experimental group, and the rest of 20 students were taken as control group. During the action research a cyclic process of producing a module, training teachers for the reflective practices and then observing them during their class for reflective practice was done by the researchers. The research used a set of rubrics and checklists for assessing prospective teachers’ performance during their class. Finally, the module was modified with the help of findings. It was found that the training has improved the performance of teachers as they revised and modified their teaching strategies through reflective practice. However, they were not able to train their students for reflective practice as per expectation. The study has implications for teacher training programs to include reflective practice modules as part of their course work for making them better teachers.

Keywords: reflective practices, prospective teacher, effect, performance

Procedia PDF Downloads 172
1226 Second Time’s a Charm: The Intervention of the European Patent Office on the Strategic Use of Divisional Applications

Authors: Alissa Lefebre

Abstract:

It might seem intuitive to hope for a fast decision on the patent grant. After all, a granted patent provides you with a monopoly position, which allows you to obstruct others from using your technology. However, this does not take into account the strategic advantages one can obtain from keeping their patent applications pending. First, you have the financial advantage of postponing certain fees, although many applicants would probably agree that this is not the main benefit. As the scope of the patent protection is only decided upon at the grant, the pendency period introduces uncertainty amongst rivals. This uncertainty entails not knowing whether the patent will actually get granted and what the scope of protection will be. Consequently, rivals can only depend upon limited and uncertain information when deciding what technology is worth pursuing. One way to keep patent applications pending, is the use of divisional applications. These applicants can be filed out of a parent application as long as that parent application is still pending. This allows the applicant to pursue (part of) the content of the parent application in another application, as the divisional application cannot exceed the scope of the parent application. In a fast-moving and complex market such as the tele- and digital communications, it might allow applicants to obtain an actual monopoly position as competitors are discouraged to pursue a certain technology. Nevertheless, this practice also has downsides to it. First of all, it has an impact on the workload of the examiners at the patent office. As the number of patent filings have been increasing over the last decades, using strategies that increase this number even more, is not desirable from the patent examiners point of view. Secondly, a pending patent does not provide you with the protection of a granted patent, thus not only create uncertainty for the rivals, but also for the applicant. Consequently, the European patent office (EPO) has come up with a “raising the bar initiative” in which they have decided to tackle the strategic use of divisional applications. Over the past years, two rules have been implemented. The first rule in 2010 introduced a time limit, upon which divisional applications could only be filed within a 24-month limit after the first communication with the patent office. However, after carrying-out a user feedback survey, the EPO abolished the rule again in 2014 and replaced it by a fee mechanism. The fee mechanism is still in place today, which might be an indication of a better result compared to the first rule change. This study tests the impact of these rules on the strategic use of divisional applications in the tele- and digital communication industry and provides empirical evidence on their success. Upon using three different survival models, we find overall evidence that divisional applications prolong the pendency time and that only the second rule is able to tackle the strategic patenting and thus decrease the pendency time.

Keywords: divisional applications, regulatory changes, strategic patenting, EPO

Procedia PDF Downloads 124
1225 Improving Student Retention: Enhancing the First Year Experience through Group Work, Research and Presentation Workshops

Authors: Eric Bates

Abstract:

Higher education is recognised as being of critical importance in Ireland and has been linked as a vital factor to national well-being. Statistics show that Ireland has one of the highest rates of higher education participation in Europe. However, student retention and progression, especially in Institutes of Technology, is becoming an issue as rates on non-completion rise. Both within Ireland and across Europe student retention is seen as a key performance indicator for higher education and with these increasing rates the Irish higher education system needs to be flexible and adapt to the situation it now faces. The author is a Programme Chair on a Level 6 full time undergraduate programme and experience to date has shown that the first year undergraduate students take some time to identify themselves as a group within the setting of a higher education institute. Despite being part of a distinct class on a specific programme some individuals can feel isolated as he or she take the first step into higher education. Such feelings can contribute to students eventually dropping out. This paper reports on an ongoing initiative that aims to accelerate the bonding experience of a distinct group of first year undergraduates on a programme which has a high rate of non-completion. This research sought to engage the students in dynamic interactions with their peers to quickly evolve a group sense of coherence. Two separate modules – a Research Module and a Communications module - delivered by the researcher were linked across two semesters. Students were allocated into random groups and each group was given a topic to be researched. There were six topics – essentially the six sub-headings on the DIT Graduate Attribute Statement. The research took place in a computer lab and students also used the library. The output from this was a document that formed part of the submission for the Research Module. In the second semester the groups then had to make a presentation of their findings where each student spoke for a minimum amount of time. Presentation workshops formed part of that module and students were given the opportunity to practice their presentation skills. These presentations were video recorded to enable feedback to be given. Although this was a small scale study preliminary results found a strong sense of coherence among this particular cohort and feedback from the students was very positive. Other findings indicate that spreading the initiative across two semesters may have been an inhibitor. Future challenges include spreading such Initiatives College wide and indeed sector wide.

Keywords: first year experience, student retention, group work, presentation workshops

Procedia PDF Downloads 225
1224 Designing an Introductory Python Course for Finance Students

Authors: Joelle Thng, Li Fang

Abstract:

Objective: As programming becomes a highly valued and sought-after skill in the economy, many universities have started offering Python courses to help students keep up with the demands of employers. This study focuses on designing a university module that effectively educates undergraduate students on financial analysis using Python programming. Methodology: To better satisfy the specific demands for each sector, this study adopted a qualitative research modus operandi to craft a module that would complement students’ existing financial skills. The lessons were structured using research-backed educational learning tools, and important Python concepts were prudently screened before being included in the syllabus. The course contents were streamlined based on criteria such as ease of learning and versatility. In particular, the skills taught were modelled in a way to ensure they were beneficial for financial data processing and analysis. Results: Through this study, a 6-week course containing the chosen topics and programming applications was carefully constructed for finance students. Conclusion: The findings in this paper will provide valuable insights as to how teaching programming could be customised for students hailing from various academic backgrounds.

Keywords: curriculum development, designing effective instruction, higher education strategy, python for finance students

Procedia PDF Downloads 73
1223 Establishment of an Information Platform Increases Spontaneous Reporting of Adverse Drug Reactions

Authors: Pei-Chun Chen, Chi-Ting Tseng, Lih-Chi Chen, Kai-Hsiang Yang

Abstract:

Introduction: The pharmacist is responsible for encouraging adverse drug reaction (ADR) reporting. In a local center in Northern Taiwan, promotion and rewarding of ADR reporting have continued for over six years but failed to bring significant changes. This study aims to find a solution to increase ADR reporting. Research question or hypothesis: We hypothesized that under-reporting is due to the inconvenience of the reporting system. Reports were made conventionally through printed sheets. We proposed that reports made per month will increase if they were computerized. Study design: An ADR reporting platform was established in April 2015, before which was defined as the first stage of this study (January-March, 2015) and after which the second stage. The third stage commenced in November, 2015, after adding a reporting module to physicians prescription system. ADRs could be reported simultaneously when documenting drug allergies. Methods: ADR report rates during the three stages of the study were compared. Effects of the information platform on reporting were also analyzed. Results: During the first stage, the number of ADR reports averaged 6 per month. In the second stage, the number of reports per month averaged 1.86. Introducing the information platform had little effect on the monthly number of ADR reports. The average number of reports each month during the third stage of the study was 11±3.06, with 70.43% made electronically. Reports per month increased significantly after installing the reporting module in November, 2015 (P<0.001, t-test). In the first two stages, 29.03% of ADR reports were made by physicians, as compared to 70.42% of cases in the third stage of the study. Increased physician reporting possibly account for these differences. Conclusion: Adding a reporting module to the prescription system significantly increased ADR reporting. Improved accessibility is likely the cause. The addition of similar modules to computer systems of other healthcare professions may be considered to encourage spontaneous ADR reporting.

Keywords: adverse drug reactions, adverse drug reaction reporting systems, regional hospital, prescription system

Procedia PDF Downloads 343
1222 Classification of Political Affiliations by Reduced Number of Features

Authors: Vesile Evrim, Aliyu Awwal

Abstract:

By the evolvement in technology, the way of expressing opinions switched the direction to the digital world. The domain of politics as one of the hottest topics of opinion mining research merged together with the behavior analysis for affiliation determination in text which constitutes the subject of this paper. This study aims to classify the text in news/blogs either as Republican or Democrat with the minimum number of features. As an initial set, 68 features which 64 are constituted by Linguistic Inquiry and Word Count (LIWC) features are tested against 14 benchmark classification algorithms. In the later experiments, the dimensions of the feature vector reduced based on the 7 feature selection algorithms. The results show that Decision Tree, Rule Induction and M5 Rule classifiers when used with SVM and IGR feature selection algorithms performed the best up to 82.5% accuracy on a given dataset. Further tests on a single feature and the linguistic based feature sets showed the similar results. The feature “function” as an aggregate feature of the linguistic category, is obtained as the most differentiating feature among the 68 features with 81% accuracy by itself in classifying articles either as Republican or Democrat.

Keywords: feature selection, LIWC, machine learning, politics

Procedia PDF Downloads 379
1221 SiamMask++: More Accurate Object Tracking through Layer Wise Aggregation in Visual Object Tracking

Authors: Hyunbin Choi, Jihyeon Noh, Changwon Lim

Abstract:

In this paper, we propose SiamMask++, an architecture that performs layer-wise aggregation and depth-wise cross-correlation and introduce multi-RPN module and multi-MASK module to improve EAO (Expected Average Overlap), a representative performance evaluation metric for Visual Object Tracking (VOT) challenge. The proposed architecture, SiamMask++, has two versions, namely, bi_SiamMask++, which satisfies the real time (56fps) on systems equipped with GPUs (Titan XP), and rf_SiamMask++, which combines mask refinement modules for EAO improvements. Tests are performed on VOT2016, VOT2018 and VOT2019, the representative datasets of Visual Object Tracking tasks labeled as rotated bounding boxes. SiamMask++ perform better than SiamMask on all the three datasets tested. SiamMask++ is achieved performance of 62.6% accuracy, 26.2% robustness and 39.8% EAO, especially on the VOT2018 dataset. Compared to SiamMask, this is an improvement of 4.18%, 37.17%, 23.99%, respectively. In addition, we do an experimental in-depth analysis of how much the introduction of features and multi modules extracted from the backbone affects the performance of our model in the VOT task.

Keywords: visual object tracking, video, deep learning, layer wise aggregation, Siamese network

Procedia PDF Downloads 150
1220 A Web Service-Based Framework for Mining E-Learning Data

Authors: Felermino D. M. A. Ali, S. C. Ng

Abstract:

E-learning is an evolutionary form of distance learning and has become better over time as new technologies emerged. Today, efforts are still being made to embrace E-learning systems with emerging technologies in order to make them better. Among these advancements, Educational Data Mining (EDM) is one that is gaining a huge and increasing popularity due to its wide application for improving the teaching-learning process in online practices. However, even though EDM promises to bring many benefits to educational industry in general and E-learning environments in particular, its principal drawback is the lack of easy to use tools. The current EDM tools usually require users to have some additional technical expertise to effectively perform EDM tasks. Thus, in response to these limitations, this study intends to design and implement an EDM application framework which aims at automating and simplify the development of EDM in E-learning environment. The application framework introduces a Service-Oriented Architecture (SOA) that hides the complexity of technical details and enables users to perform EDM in an automated fashion. The framework was designed based on abstraction, extensibility, and interoperability principles. The framework implementation was made up of three major modules. The first module provides an abstraction for data gathering, which was done by extending Moodle LMS (Learning Management System) source code. The second module provides data mining methods and techniques as services; it was done by converting Weka API into a set of Web services. The third module acts as an intermediary between the first two modules, it contains a user-friendly interface that allows dynamically locating data provider services, and running knowledge discovery tasks on data mining services. An experiment was conducted to evaluate the overhead of the proposed framework through a combination of simulation and implementation. The experiments have shown that the overhead introduced by the SOA mechanism is relatively small, therefore, it has been concluded that a service-oriented architecture can be effectively used to facilitate educational data mining in E-learning environments.

Keywords: educational data mining, e-learning, distributed data mining, moodle, service-oriented architecture, Weka

Procedia PDF Downloads 234
1219 The Image of Saddam Hussein and Collective Memory: The Semiotics of Ba'ath Regime's Mural in Iraq (1980-2003)

Authors: Maryam Pirdehghan

Abstract:

During the Ba'ath Party's rule in Iraq, propaganda was utilized to justify and to promote Saddam Hussein's image in the collective memory as the greatest Arab leader. Consequently, urban walls were routinely covered with images of Saddam. Relying on these images, the regime aimed to provide a basis for evoking meanings in the public opinion, which would supposedly strengthen Saddam’s power and reconstruct facts to legitimize his political ideology. Nonetheless, Saddam was not always portrayed with common and explicit elements but in certain periods of his rule, the paintings depicted him in an unusual context, where various historical and contemporary elements were combined in a narrative background. Therefore, an understanding of the implied socio-political references of these elements is required to fully elucidate the impact of these images on forming the memory and collective unconscious of the Iraqi people. To obtain such understanding, one needs to address the following questions: a) How Saddam Hussein is portrayed in mural during his rule? b) What of elements and mythical-historical narratives are found in the paintings? c) Which Saddam's political views were subject to the collective memory through mural? Employing visual semiotics, this study reveals that during Saddam Hussein's regime, the paintings were initially simple portraits but gradually transformed into narrative images, characterized by a complex network of historical, mythical and religious elements. These elements demonstrate the transformation of a secular-nationalist politician into a Muslim ruler who tried to instill three major policies in domestic and international relations i.e. the arabization of Iraq, as well as the propagation of pan-arabism ideology (first period), the implementation of anti-Israel policy (second period) and the implementation of anti-American-British policy (last period).

Keywords: Ba'ath Party, Saddam Hussein, mural, Iraq, propaganda, collective memory

Procedia PDF Downloads 322
1218 Theorem on Inconsistency of The Classical Logic

Authors: T. J. Stepien, L. T. Stepien

Abstract:

This abstract concerns an extremely fundamental issue. Namely, the fundamental problem of science is the issue of consistency. In this abstract, we present the theorem saying that the classical calculus of quantifiers is inconsistent in the traditional sense. At the beginning, we introduce a notation, and later we remind the definition of the consistency in the traditional sense. S1 is the set of all well-formed formulas in the calculus of quantifiers. RS1 denotes the set of all rules over the set S1. Cn(R, X) is the set of all formulas standardly provable from X by rules R, where R is a subset of RS1, and X is a subset of S1. The couple < R,X > is called a system, whenever R is a subset of RS1, and X is a subset of S1. Definition: The system < R,X > is consistent in the traditional sense if there does not exist any formula from the set S1, such that this formula and its negation are provable from X, by using rules from R. Finally, < R0+, L2 > denotes the classical calculus of quantifiers, where R0+ consists of Modus Ponens and the generalization rule. L2 is the set of all formulas valid in the classical calculus of quantifiers. The Main Result: The system < R0+, L2 > is inconsistent in the traditional sense.

Keywords: classical calculus of quantifiers, classical predicate calculus, generalization rule, consistency in the traditional sense, Modus Ponens

Procedia PDF Downloads 198
1217 The Incesant Subversion of Judiciary by African Political Leaders

Authors: Joy Olayemi Gbala, Fatai Olatokunbo, Philip Cloud

Abstract:

Catastrophic dictatorship has been discovered to be the major leadership challenge that orchestrates stagnated and contrasted economy with dysfunctional democracy in Africa through willful misappropriation of resources and egregious subversion of the rule of law. Almost invariably, most African leaders inexplicably often become power drunk and addicted which usually leads to abuse of state power, abdication of constitutional duties, unjustly withdrawal of business license of operation, human right violation, election malpractices, financial corruption, disruptions of policies of democratic government transition, annulment of free and fair election, and disruptions of legal electoral procedures and unachievable dividends of democracy and many more. Owing to this, most African nations have gone and still go through political unrest and insurgencies leading to loss of lives and property, violent protests, detention of detractors and political activists and massive human displacement. This research work is concerned with, and investigates the causes, menace, consequences and impacts of subverting the rule of law in Africa on the economy and the development of the continent with a suggested practical solution to the plights.

Keywords: corruption, law, leadership, violation

Procedia PDF Downloads 151
1216 Detecting Memory-Related Gene Modules in sc/snRNA-seq Data by Deep-Learning

Authors: Yong Chen

Abstract:

To understand the detailed molecular mechanisms of memory formation in engram cells is one of the most fundamental questions in neuroscience. Recent single-cell RNA-seq (scRNA-seq) and single-nucleus RNA-seq (snRNA-seq) techniques have allowed us to explore the sparsely activated engram ensembles, enabling access to the molecular mechanisms that underlie experience-dependent memory formation and consolidation. However, the absence of specific and powerful computational methods to detect memory-related genes (modules) and their regulatory relationships in the sc/snRNA-seq datasets has strictly limited the analysis of underlying mechanisms and memory coding principles in mammalian brains. Here, we present a deep-learning method named SCENTBOX, to detect memory-related gene modules and causal regulatory relationships among themfromsc/snRNA-seq datasets. SCENTBOX first constructs codifferential expression gene network (CEGN) from case versus control sc/snRNA-seq datasets. It then detects the highly correlated modules of differential expression genes (DEGs) in CEGN. The deep network embedding and attention-based convolutional neural network strategies are employed to precisely detect regulatory relationships among DEG genes in a module. We applied them on scRNA-seq datasets of TRAP; Ai14 mouse neurons with fear memory and detected not only known memory-related genes, but also the modules and potential causal regulations. Our results provided novel regulations within an interesting module, including Arc, Bdnf, Creb, Dusp1, Rgs4, and Btg2. Overall, our methods provide a general computational tool for processing sc/snRNA-seq data from case versus control studie and a systematic investigation of fear-memory-related gene modules.

Keywords: sc/snRNA-seq, memory formation, deep learning, gene module, causal inference

Procedia PDF Downloads 117
1215 Optimization of SWL Algorithms Using Alternative Adder Module in FPGA

Authors: Tayab D. Memon, Shahji Farooque, Marvi Deshi, Imtiaz Hussain Kalwar, B. S. Chowdhry

Abstract:

Recently single-bit ternary FIR-like filter (SBTFF) hardware synthesize in FPGA is reported and compared with multi-bit FIR filter on similar spectral characteristics. Results shows that SBTFF dominates upon multi-bit filter overall. In this paper, an optimized adder module for ternary quantized sigma-delta modulated signal is presented. The adder is simulated using ModelSim for functional verification the area-performance of the proposed adder were obtained through synthesis in Xilinx and compared to conventional adder trees. The synthesis results show that the proposed adder tree achieves higher clock rates and lower chip area at higher inputs to the adder block; whereas conventional adder tree achieves better performance and lower chip area at lower number of inputs to the same adder block. These results enhance the usefulness of existing short word length DSP algorithms for fast and efficient mobile communication.

Keywords: short word length (SWL), DSP algorithms, FPGA, SBTFF, VHDL

Procedia PDF Downloads 341
1214 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 547
1213 Jean-Francois Lyotrard's Concept of Different and the Conceptual Problems of Beauty in Philosophy of Contemporary Art

Authors: Sunandapriya Bhikkhu, Shimo Sraman

Abstract:

The main objective of this research is to analytically study the concept of Lyotard’s different that rejects the monopoly criteria and single rule with the incommensurable, which can explain about conceptual problems of beauty in the philosophy of contemporary art. In Lyotard’s idea that basic value judgment of human should be a value like a phrase that is a small unit and an individual such as the aesthetic value that to explain the art world. From the concept of the anti-war artist that rejects the concept of the traditional aesthetic which cannot be able to explain the changing in contemporary society but emphasizes the meaning of individual beauty that is at the beginning of contemporary art today. In the analysis of the problem, the researcher supports the concept of Lyotard’s different that emphasizes the artistic expression which opens the space of perception and beyond the limitations of language process. Art is like phrase or small units that can convey a sense of humanity through the aesthetic value of the individual, not social criteria or universal. The concept of Lyotard’s different awakens and challenge us to the rejection of the single rule that is not open the social space to minorities by not accepting the monopoly criteria.

Keywords: difference, Jean-Francois Lyotard, postmodern, beauty, contemporary art

Procedia PDF Downloads 301
1212 Decision Analysis Module for Excel

Authors: Radomir Perzina, Jaroslav Ramik

Abstract:

The Analytic Hierarchy Process is frequently used approach for solving decision making problems. There exists wide range of software programs utilizing that approach. Their main disadvantage is that they are relatively expensive and missing intermediate calculations. This work introduces a Microsoft Excel add-in called DAME – Decision Analysis Module for Excel. Comparing to other computer programs DAME is free, can work with scenarios or multiple decision makers and displays intermediate calculations. Users can structure their decision models into three levels – scenarios/users, criteria and variants. Items on all levels can be evaluated either by weights or pair-wise comparisons. There are provided three different methods for the evaluation of the weights of criteria, the variants as well as the scenarios – Saaty’s Method, Geometric Mean Method and Fuller’s Triangle Method. Multiplicative and additive syntheses are supported. The proposed software package is demonstrated on couple of illustrating examples of real life decision problems.

Keywords: analytic hierarchy process, multi-criteria decision making, pair-wise comparisons, Microsoft Excel, scenarios

Procedia PDF Downloads 447
1211 Analysis of the Use of a NAO Robot to Improve Social Skills in Children with Autism Spectrum Disorder in Saudi Arabia

Authors: Eman Alarfaj, Hissah Alabdullatif, Huda Alabdullatif, Ghazal Albakri, Nor Shahriza Abdul Karim

Abstract:

Autism Spectrum Disorder is extensively spread amid children; it affects their social, communication and interactive skills. As robotics technology has been proven to be a significant helpful utility those able individuals to overcome their disabilities. Robotic technology is used in ASD therapy. The purpose of this research is to show how Nao robots can improve the social skills for children who suffer from autism in Saudi Arabia by interacting with the autistic child and perform a number of tasks. The objective of this research is to identify, implement, and test the effectiveness of the module for interacting with ASD children in an autism center in Saudi Arabia. The methodology in this study followed the ten layers of protocol that needs to be followed during any human-robot interaction. Also, in order to elicit the scenario module, TEACCH Autism Program was adopted. Six different qualified interaction modules have been elicited and designed in this study; the robot will be programmed to perform these modules in a series of controlled interaction sessions with the Autistic children to enhance their social skills.

Keywords: humanoid robot Nao, ASD, human-robot interaction, social skills

Procedia PDF Downloads 258
1210 A Location-Based Search Approach According to Users’ Application Scenario

Authors: Shih-Ting Yang, Chih-Yun Lin, Ming-Yu Li, Jhong-Ting Syue, Wei-Ming Huang

Abstract:

Global positioning system (GPS) has become increasing precise in recent years, and the location-based service (LBS) has developed rapidly. Take the example of finding a parking lot (such as Parking apps). The location-based service can offer immediate information about a nearby parking lot, including the information about remaining parking spaces. However, it cannot provide expected search results according to the requirement situations of users. For that reason, this paper develops a “Location-based Search Approach according to Users’ Application Scenario” according to the location-based search and demand determination to help users obtain the information consistent with their requirements. The “Location-based Search Approach based on Users’ Application Scenario” of this paper consists of one mechanism and three kernel modules. First, in the Information Pre-processing Mechanism (IPM), this paper uses the cosine theorem to categorize the locations of users. Then, in the Information Category Evaluation Module (ICEM), the kNN (k-Nearest Neighbor) is employed to classify the browsing records of users. After that, in the Information Volume Level Determination Module (IVLDM), this paper makes a comparison between the number of users’ clicking the information at different locations and the average number of users’ clicking the information at a specific location, so as to evaluate the urgency of demand; then, the two-dimensional space is used to estimate the application situations of users. For the last step, in the Location-based Search Module (LBSM), this paper compares all search results and the average number of characters of the search results, categorizes the search results with the Manhattan Distance, and selects the results according to the application scenario of users. Additionally, this paper develops a Web-based system according to the methodology to demonstrate practical application of this paper. The application scenario-based estimate and the location-based search are used to evaluate the type and abundance of the information expected by the public at specific location, so that information demanders can obtain the information consistent with their application situations at specific location.

Keywords: data mining, knowledge management, location-based service, user application scenario

Procedia PDF Downloads 119
1209 Determinants of Inward Foreign Direct Investment: New Evidence from Bangladesh

Authors: Mohammad Maruf Hasan

Abstract:

Foreign Direct Investment (FDI) has been increased at a remarkable position around the globe in which emerging economies are getting more FDI compared to industrialized economies. This study aims to examine the determinants of inward FDI flows in Bangladesh. To estimate the long and short-run impact of the FDI determinants for 1996-2020, we employed the Autoregressive-Distributed Lag (ARDL) model. Results show that: (1) macroeconomic determinants, such as economic growth, infrastructure, and market size, have a significant and strong positive effect.(2) Inflation exchange rate shows insignificant effects, while trade openness has mixed (short-run negative, long-run positive) effects on FDI inflows in both the long and short run. (3) Current institutional determinants rule of law has a positive effect on FDI inflows but is statistically insignificant, political stability has a negative, and the rule of law has a considerable beneficial impact on inflows of FDI. (4) The macroeconomic factors have been determined to impact Bangladesh's FDI inflows. Finally, a stable macroeconomic climate is more effective at luring FDI, as this study confirms. From a policy perspective, this study will help the government and policymakers to make a new investment policy.

Keywords: determinants, FDI, ARDL, Bangladesh

Procedia PDF Downloads 71
1208 Performance of Partially Covered N Number of Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) Series Connected Water Heating System

Authors: Rohit Tripathi, Sumit Tiwari, G. N. Tiwari

Abstract:

In present study, an approach is adopted where photovoltaic thermal flat plate collector is integrated with compound parabolic concentrator. Analytical expression of temperature dependent electrical efficiency of N number of partially covered Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) water collector connected in series has been derived with the help of basic thermal energy balance equations. Analysis has been carried for winter weather condition at Delhi location, India. Energy and exergy performance of N - partially covered Photovoltaic Thermal (PVT) - Compound Parabolic Concentrator (CPC) Water collector system has been compared for two cases: (i) 25% area of water collector covered by PV module, (ii) 75% area of water collector covered by PV module. It is observed that case (i) has been best suited for thermal performance and case (ii) for electrical energy as well as overall exergy.

Keywords: compound parabolic concentrator, energy, photovoltaic thermal, temperature dependent electrical efficiency

Procedia PDF Downloads 401
1207 Optimization of Agricultural Water Demand Using a Hybrid Model of Dynamic Programming and Neural Networks: A Case Study of Algeria

Authors: M. Boudjerda, B. Touaibia, M. K. Mihoubi

Abstract:

In Algeria agricultural irrigation is the primary water consuming sector followed by the domestic and industrial sectors. Economic development in the last decade has weighed heavily on water resources which are relatively limited and gradually decreasing to the detriment of agriculture. The research presented in this paper focuses on the optimization of irrigation water demand. Dynamic Programming-Neural Network (DPNN) method is applied to investigate reservoir optimization. The optimal operation rule is formulated to minimize the gap between water release and water irrigation demand. As a case study, Foum El-Gherza dam’s reservoir system in south of Algeria has been selected to examine our proposed optimization model. The application of DPNN method allowed increasing the satisfaction rate (SR) from 12.32% to 55%. In addition, the operation rule generated showed more reliable and resilience operation for the examined case study.

Keywords: water management, agricultural demand, dam and reservoir operation, Foum el-Gherza dam, dynamic programming, artificial neural network

Procedia PDF Downloads 112
1206 Predication Model for Leukemia Diseases Based on Data Mining Classification Algorithms with Best Accuracy

Authors: Fahd Sabry Esmail, M. Badr Senousy, Mohamed Ragaie

Abstract:

In recent years, there has been an explosion in the rate of using technology that help discovering the diseases. For example, DNA microarrays allow us for the first time to obtain a "global" view of the cell. It has great potential to provide accurate medical diagnosis, to help in finding the right treatment and cure for many diseases. Various classification algorithms can be applied on such micro-array datasets to devise methods that can predict the occurrence of Leukemia disease. In this study, we compared the classification accuracy and response time among eleven decision tree methods and six rule classifier methods using five performance criteria. The experiment results show that the performance of Random Tree is producing better result. Also it takes lowest time to build model in tree classifier. The classification rules algorithms such as nearest- neighbor-like algorithm (NNge) is the best algorithm due to the high accuracy and it takes lowest time to build model in classification.

Keywords: data mining, classification techniques, decision tree, classification rule, leukemia diseases, microarray data

Procedia PDF Downloads 318