Search results for: traditional and modern architecture
5591 Application of Deep Learning in Top Pair and Single Top Quark Production at the Large Hadron Collider
Authors: Ijaz Ahmed, Anwar Zada, Muhammad Waqas, M. U. Ashraf
Abstract:
We demonstrate the performance of a very efficient tagger applies on hadronically decaying top quark pairs as signal based on deep neural network algorithms and compares with the QCD multi-jet background events. A significant enhancement of performance in boosted top quark events is observed with our limited computing resources. We also compare modern machine learning approaches and perform a multivariate analysis of boosted top-pair as well as single top quark production through weak interaction at √s = 14 TeV proton-proton Collider. The most relevant known background processes are incorporated. Through the techniques of Boosted Decision Tree (BDT), likelihood and Multlayer Perceptron (MLP) the analysis is trained to observe the performance in comparison with the conventional cut based and count approachKeywords: top tagger, multivariate, deep learning, LHC, single top
Procedia PDF Downloads 1115590 Effectiveness of the Use of Polycarboxylic Ether Superplasticizers in High Performance Concrete Containing Silica Fume
Authors: Alya Harichane, Badreddine Harichane
Abstract:
The incorporation of polycarboxylate ether superplasticizer (PCE) and silica fume (SF) in high-performance concretes (HPC) leads to the achievement of remarkable rheological and mechanical improvements. In the fresh state, PCEs are adsorbed on cement particles and dispersants, in turn promoting the workability of the concrete. Silica fume enables a very well compacted concrete to be obtained, which is characterized by high mechanical parameters in its hardened state. Some PCEs are incompatible with silica fume, which can result in the loss of slump and in poor rheological behavior. The main objective of the research is the study of the influence of three types of PCEs, which all have a different molecular architecture, on the rheological and mechanical behavior of high-performance concretes containing 10% of SF as a partial replacement of cement. The results show that the carboxylic density of PCE has an influence on its compatibility with SF.Keywords: polycarboxylate-ether superplasticizer, rheology, compressive strength, high-performance concrete, silica fume
Procedia PDF Downloads 765589 Aromatic and Medicinal Plants in Morocco: Diversity and Socio-Economic Role
Authors: Mohammed Sghir Taleb
Abstract:
Morocco is characterized by a great richness and diversity in aromatic and medicinal plants and it has an ancestral knowledge in the use of plants for medicinal and cosmetic purposes. In effect, the poverty of riparian, specially, mountain populations have greatly contributed to the development of traditional pharmacopoeia in Morocco. The analysis of the bibliographic data showed that a large number of plants in Morocco are exploited for aromatic and medicinal purposes and several of them are commercialized internationally. However, these potentialities of aromatic and medicinal plants are currently subjected to climate change and strong human pressures: Collecting fruits, agriculture development, harvesting plants, urbanization, overgrazing...Keywords: aromatic, medicinal, plant, Morocco
Procedia PDF Downloads 3035588 Optimal Power Exchange of Multi-Microgrids with Hierarchical Coordination
Authors: Beom-Ryeol Choi, Won-Poong Lee, Jin-Young Choi, Young-Hak Shin, Dong-Jun Won
Abstract:
A Microgrid (MG) has a major role in power system. There are numerous benefits, such as ability to reduce environmental impact and enhance the reliability of a power system. Hence, Multi-MG (MMG) consisted of multiple MGs is being studied intensively. This paper proposes the optimal power exchange of MMG with hierarchical coordination. The whole system architecture consists of two layers: 1) upper layer including MG of MG Center (MoMC) which is in charge of the overall management and coordination and 2) lower layer comprised of several Microgrid-Energy Management Systems (MG-EMSs) which make a decision for own schedule. In order to accomplish the optimal power exchange, the proposed coordination algorithm is applied to MMG system. The objective of this process is to achieve optimal operation for improving economics under the grid-connected operation. The simulation results show how the output of each MG can be changed through coordination algorithm.Keywords: microgrids, multi-microgrids, power exchange, hierarchical coordination
Procedia PDF Downloads 3725587 Networked Radar System to Increase Safety of Urban Railroad Crossing
Authors: Sergio Saponara, Luca Fanucci, Riccardo Cassettari, Ruggero Piernicola, Marco Righetto
Abstract:
The paper presents an innovative networked radar system for detection of obstacles in a railway level crossing scenario. This Monitoring System (MS) is able to detect moving or still obstacles within the railway level crossing area automatically, avoiding the need of human presence for surveillance. The MS is also connected to the National Railway Information and Signaling System to communicate in real-time the level crossing status. The architecture is compliant with the highest Safety Integrity Level (SIL4) of the CENELEC standard. The number of radar sensors used is configurable at set-up time and depends on how large the level crossing area can be. At least two sensors are expected and up four can be used for larger areas. The whole processing chain that elaborates the output sensor signals, as well as the communication interface, is fully-digital, was designed in VHDL code and implemented onto a Xilinx Virtex 6.Keywords: radar for safe mobility, railroad crossing, railway, transport safety
Procedia PDF Downloads 4805586 Study of the Use of Artificial Neural Networks in Islamic Finance
Authors: Kaoutar Abbahaddou, Mohammed Salah Chiadmi
Abstract:
The need to find a relevant way to predict the next-day price of a stock index is a real concern for many financial stakeholders and researchers. We have known across years the proliferation of several methods. Nevertheless, among all these methods, the most controversial one is a machine learning algorithm that claims to be reliable, namely neural networks. Thus, the purpose of this article is to study the prediction power of neural networks in the particular case of Islamic finance as it is an under-looked area. In this article, we will first briefly present a review of the literature regarding neural networks and Islamic finance. Next, we present the architecture and principles of artificial neural networks most commonly used in finance. Then, we will show its empirical application on two Islamic stock indexes. The accuracy rate would be used to measure the performance of the algorithm in predicting the right price the next day. As a result, we can conclude that artificial neural networks are a reliable method to predict the next-day price for Islamic indices as it is claimed for conventional ones.Keywords: Islamic finance, stock price prediction, artificial neural networks, machine learning
Procedia PDF Downloads 2375585 The Strategy for Increasing the Competitiveness of Georgia
Authors: G. Erkomaishvili
Abstract:
The paper discusses economic policy of Georgia aiming to increase national competitiveness as well as the tools and means which will help to improve the competitiveness of the country. The sectors of the economy, in which the country can achieve the competitive advantage, are studied. It is noted that the country’s economic policy plays an important role in obtaining and maintaining the competitive advantage - authority should take measures to ensure high level of education; scientific and research activities should be funded by the state; foreign direct investments should be attracted mainly in science-intensive industries; adaptation with the latest scientific achievements of the modern world and deepening of scientific and technical cooperation. Stable business environment and export oriented strategy is the basis for the country’s economic growth. As the outcome of the research, the paper suggests the strategy for improving competitiveness in Georgia; recommendations are provided based on relevant conclusions.Keywords: competitive advantage, competitiveness, competitiveness improvement strategy, competitiveness of Georgia
Procedia PDF Downloads 4135584 Comparative Production of Secondary Metabolites by Prunus africana (Hook. F.) Kalkman Provenances in Cameroon and Some Associated Endophytic Fungi
Authors: Gloria M. Ntuba-Jua, Afui M. Mih, Eneke E. T. Bechem
Abstract:
Prunus africana (Hook. F.) Kalkman, commonly known as Pygeum or African cherry belongs to the Rosaceae family. It is a medium to large, evergreen tree with a spreading crown of 10 to 20 m. It is used by the traditional medical practitioners for the treatment of over 45ailments in Cameroon and sub-Sahara Africa. In modern medicine, it is used in the treatment of benign prostrate hyperplasia (BPH), prostate gland hypertrophy (enlarged prostate glands). This is possible because of its ability to produce some secondary metabolites which are believed to have bioactivity against these ailments. The ready international market for the sale of Prunus bark, uncontrolled exploitation, illegal harvesting using inappropriate techniques and poor timing of harvesting have contributed enormously to making the plant endangered. It is known to harbor a large number of endophytic fungi with the potential to produce similar secondary metabolites as the parent plant. Alternative sourcing of medicinal principles through endophytic fungi requires succinct knowledge of the endophytic fungi. This will serve as a conservation measure for Prunus africana by reducing dependence on Prunus bark for such metabolites. This work thus sought to compare the production of some major secondary metabolites produced by P. africana and some of its associated endophytic fungi. The leaves and stem bark of the plant from different provenances were soaked in methanol for 72 hrs to yield the methanolic crude extract. The phytochemical screening of the methanolic crude extracts using different standard procedures revealed the presence of tannins, flavonoids, terpenoids, saponins, phenolics and steroids. Pure cultures of some predominantly isolated endophyte species from the difference Prunus provenances such as Curvularia sp, and Morphospecies P001 were also grown in Potato Dextrose Broth (PDB) for 21 days and later extracted with Methylene dichloride (MDC) solvent after 24hrs to produce crude culture extracts. Qualitative assessment of crude culture extracts showed the presence of tannins, terpenoids, phenolics and steroids particularly β-Sitosterol, (a major bioactive metabolite) as did the plant tissues. Qualitative analysis by thin layer chromatography (TLC) was done to confirm and compare the production of β-Sitosterol (as marker compounds) in the crude extracts of the plant and endophyte. Samples were loaded on TLC silica gel aluminium barked plate (Kieselgel 60 F254, 0.2 mm, Merck) using acetone/hexane, (3.0:7.0) solvent system. They were visualized under an ultra violet lamp (UV254 and UV360). TLC revealed that leaves had a higher concentration of β-sitosterol in terms of band intensity than stem barks from the different provenances. The intensity of β-sitosterol bands in the culture extracts of endophytes was comparable to the plant extracts except for Curvularia sp (very minute) whose band was very faint. The ability of these fungi to make β-sitosterol was confirmed by TLC analysis with the compound having chromatographic properties (retention factor) similar to those of β-sitosterol standard. The ability of these major endophytes to produce secondary metabolites similar to the host has therefore been demonstrated. There is, therefore, the potential of developing the in vitro production system of Prunus secondary metabolites thereby enhancing its conservation.Keywords: Caneroon, endophytic fungi, Prunus africana, secondary metabolite
Procedia PDF Downloads 2325583 Geometric Continuity in the Form of Iranian Domes, Study of Prominent Safavid and Sasanian Domes
Authors: Nima Valibeig, Haniyeh Mohammadi, Neda Sadat Abdelahi
Abstract:
Persian domes follow different forms depending on the materials used to construct and other factors. One of the factors that shape the form of a dome is the geometric proportion used in the drawing and construction of the dome. Some commonly used proportions are revealed by analysing the shapes and geometric ratio of the monuments’ domes. The proportions are achieved by the proficiency of the skilled architects of the buildings. These proportions can be used to reconstruct damaged parts of the historical monuments. Most of the research on domes is about the historical or stability features of domes, and less attention is made to the geometric system in domes. Therefore, in this study, we study the explicit and implicit geometric proportions in Iranian dome structures for the first time. The study is done based on a literature review and field survey. This research reveals that the permanent geometric rules are perfectly used in the design and construction of the prominent domes.Keywords: geometry in architecture, architectural proportions, prominent domes, iranian golden ratio, geometric proportion
Procedia PDF Downloads 2845582 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 3165581 Relationship between Hofstede’s Cultural Dimensions and Tourism Product Satisfaction
Authors: Thanawit Buafai, Siyathorn Khunon
Abstract:
This paper aims to explore the satisfaction levels of tourism product components on the island of Samui by studying the cultural dimension relationships of Hofsted’s classic theory. Both the six Hofsted cultural dimensions and tourism production satisfaction measures have been of interest worldwide. Therefore, the challenge of this study is to re-confirm previous research results in the ever-changing current contexts of the modern globalized business era. Self-rated questionnaires were employed to collect data from six nationalities of tourists in Samui, totaling 386 samples. The reliability of this research methodology was 0.967. Correlation was applied to analyze the relationships. The results indicate that Masculinity is significantly related to tourism destination satisfaction for every factor, while the other five cultural dimensions are related to some factors of tourism satisfaction. Surprisingly, tourist satisfaction toward the bar/restaurant factor is significantly correlated with all six cultural dimensions.Keywords: cultural dimensions, tourism products, Samui, Thailand
Procedia PDF Downloads 3415580 Identification of COVID-SARS Variants Based on Lactate Test Results
Authors: Zoltan Horvath, Dora Nagy
Abstract:
In this research, it was examined whether individual COVID variants cause differences in the lactate curve of cyclists. After all, the virus variants attacked different organs in our body during the infections. During our tests, we used a traditional lactate step test, the results of which were compared with the values before the infection. In the tests, it has been proven that different virus variants show unique lactate curves. In this way, based on the lactate curve, it is possible to identify which variant caused the disease. Thanks to this, it has been shorten the return time, because we can apply the best return protocol after infection to the competitors.Keywords: COVID-Sars19, lactate, virus mutation, lactate profile
Procedia PDF Downloads 665579 The Multiplier Effects of Intelligent Transport System to Nigerian Economy
Authors: Festus Okotie
Abstract:
Nigeria is the giant of Africa with great and diverse transport potentials yet to be fully tapped into and explored.it is the most populated nation in Africa with nearly 200 million people, the sixth largest oil producer overall and largest oil producer in Africa with proven oil and gas reserves of 37 billion barrels and 192 trillion cubic feet, over 300 square kilometers of arable land and significant deposits of largely untapped minerals. A world bank indicator which measures trading across border ranked Nigeria at 183 out of 185 countries in 2017 and although different governments in the past made efforts through different interventions such as 2007 ports reforms led by Ngozi Okonjo-Iweala, a former minister of Finance and world bank managing director also attempted to resolve some of the challenges such as infrastructure shortcomings, policy and regulatory inconsistencies, overlapping functions and duplicated roles among the different MDA’S. It is one of the fundamental structures smart nations and cities are using to improve the living conditions of its citizens and achieving sustainability. Examples of some of its benefits includes tracking high pedestrian areas, traffic patterns, railway stations, planning and scheduling bus times, it also enhances interoperability, creates alerts of transport situation and has swift capacity to share information among the different platforms and transport modes. It also offers a comprehensive approach to risk management, putting emergency procedures and response capabilities in place, identifying dangers, including vandalism or violence, fare evasion, and medical emergencies. The Nigerian transport system is urgently in need of modern infrastructures such as ITS. Smart city transport technology helps cities to function productively, while improving services for businesses and lives of is citizens. This technology has the ability to improve travel across traditional modes of transport, such as cars and buses, with immediate benefits for city dwellers and also helps in managing transport systems such as dangerous weather conditions, heavy traffic, and unsafe speeds which can result in accidents and loss of lives. Intelligent transportation systems help in traffic control such as permitting traffic lights to react to changing traffic patterns, instead of working on a fixed schedule in traffic. Intelligent transportation systems is very important in Nigeria’s transportation sector and so would require trained personnel to drive its efficiency to greater height because the purpose of introducing it is to add value and at the same time reduce motor vehicle miles and traffic congestion which is a major challenge around Tin can island and Apapa Port, a major transportation hub in Nigeria. The need for the federal government, state governments, houses of assembly to organise a national transportation workshop to begin the process of addressing the challenges in our nation’s transport sector is highly expedient and so bills that will facilitate the implementation of policies to promote intelligent transportation systems needs to be sponsored because of its potentials to create thousands of jobs for our citizens, provide farmers with better access to cities and a better living condition for Nigerians.Keywords: intelligent, transport, system, Nigeria
Procedia PDF Downloads 1165578 Modernist Trends in Ilahiyat Faculties (Islamic Studies Faculties) Turkey, Post-Coup 1980
Authors: Muhammad Hamza Tariq
Abstract:
The regrouping of the Islamists and the politics of religious education was the most common debate in the last decades of Turkish history. Religious schools were criticized to be influenced by partisan politics. Within this turmoil, the faculty of Ilahiyat which was established by the Republic to cherish Islamic modernism and to raise modern clergy also underwent a considerable change. This research studies the revisions in the curriculum of the faculty over the last few decades. A series of interviews were also conducted to observe the prevalent trends, especially modernist among the professors at the Ilahiyat faculties. Lastly, a survey was done among the freshman and final year students based on the similar questions to observe the changes of opinions with regards to their views on Islam, modernity, political Islam, interpretation, etc. A shift in the curriculum was noted though it cannot be overgeneralized whereas a degree of prevalence of modernist thoughts was also recorded among the teachers and the students.Keywords: ilahiyat, divinity, religion, Islamization
Procedia PDF Downloads 3535577 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 675576 A Critical Case Study of Women Police in Ranchi, Jharkhand, India: An Analysis of Work Life Balance of Women in Jharkhand, India
Authors: Swati Minz, Pradeep Munda, Ranchi Jharkhand
Abstract:
Women of today’s era are well educated and they are best and proficient at their skills that are key to success anywhere. Government played a major role in uplifting women in Indian society. Through all these efforts Indian women decided to move forward and started choosing career path which was itself a challenge in their life. The people in the society had a very hatred feeling for the women who chose a career and moved forward. Women in today’s times have achieved a lot but in reality they have to still travel a long way. Women started leaving the secured domains of their home and moved out, but a harsh, cruel, exploitative world awaits them, where women have to prove their talent against the world who see women as merely vassals of producing children. In spite all modernisation, a woman has her limits and emerges to claim traditional male space, juggling with many family problems and multiple roles to excel at a level that would have been perceived as impossible a generation ago. Still a woman in India is storming traditional male fields. Even the occupation which had male monopoly life defense services, merchant navy, administrative or police services, these are the best examples for women now. If these women are taken under consideration they never had any issues while fighting a battle ,or trying to encroach into the men’s world ,but rather, they adopts themselves in the situation and are good ,trying to justify their roles and proving themselves. The last few decades there have been noticed an enormous growth in levels of education, confidence and the most importantly, ambition noticed towards in women, who all are striving their rights and claiming a dignified place in the society. Previously women were educated for the sake to get married and start new family but nowadays they utilize their skill productively. Since the time after independence, considering both women in India in general and women in Jharkhand in particular has played a very prominent role in all walks of life including the professions. Any success and achievement in any organisation depends on their contribution as well. Due to these consequences, there has always been a need to study and focus light on issues affecting women professionals, empowerment and their work life balance.Keywords: women, work life balance, work empowerment, career, struggle, society, challenges, family, society, achievement
Procedia PDF Downloads 3885575 Modelling and Simulation of Biomass Pyrolysis
Authors: P. Ahuja, K. S. S. Sai Krishna
Abstract:
There is a concern over the energy shortage in the modern societies as it is one of the primary necessities. Renewable energy, mainly biomass, is found to be one feasible solution as it is inexhaustible and clean energy source all over the world. Out of various methods, thermo chemical conversion is considered to be the most common and convenient method to extract energy from biomass. The thermo-chemical methods that are employed are gasification, liquefaction and combustion. On gasification biomass yields biogas, on liquefaction biomass yields bio-oil and on combustion biomass yields bio-char. Any attempt to biomass gasification, liquefaction or combustion calls for a good understanding of biomass pyrolysis. So, Irrespective of the method used the first step towards the thermo-chemical treatment of biomass is pyrolysis. Pyrolysis mainly converts the solid mass into liquid with gas and residual char as the byproducts. Liquid is used for the production of heat, power and many other chemicals whereas the gas and char can be used as fuels to generate heat.Keywords: biomass, fluidisation, pyrolysis, simulation
Procedia PDF Downloads 3425574 Rounded-off Measurements and Their Implication on Control Charts
Authors: Ran Etgar
Abstract:
The process of rounding off measurements in continuous variables is commonly encountered. Although it usually has minor effects, sometimes it can lead to poor outcomes in statistical process control using X ̅-chart. The traditional control limits can cause incorrect conclusions if applied carelessly. This study looks into the limitations of classical control limits, particularly the impact of asymmetry. An approach to determining the distribution function of the measured parameter (Y ̅) is presented, resulting in a more precise method to establish the upper and lower control limits. The proposed method, while slightly more complex than Shewhart's original idea, is still user-friendly and accurate and only requires the use of two straightforward tables.Keywords: inaccurate measurement, SPC, statistical process control, rounded-off, control chart
Procedia PDF Downloads 415573 Object-Scene: Deep Convolutional Representation for Scene Classification
Authors: Yanjun Chen, Chuanping Hu, Jie Shao, Lin Mei, Chongyang Zhang
Abstract:
Traditional image classification is based on encoding scheme (e.g. Fisher Vector, Vector of Locally Aggregated Descriptor) with low-level image features (e.g. SIFT, HoG). Compared to these low-level local features, deep convolutional features obtained at the mid-level layer of convolutional neural networks (CNN) have richer information but lack of geometric invariance. For scene classification, there are scattered objects with different size, category, layout, number and so on. It is crucial to find the distinctive objects in scene as well as their co-occurrence relationship. In this paper, we propose a method to take advantage of both deep convolutional features and the traditional encoding scheme while taking object-centric and scene-centric information into consideration. First, to exploit the object-centric and scene-centric information, two CNNs that trained on ImageNet and Places dataset separately are used as the pre-trained models to extract deep convolutional features at multiple scales. This produces dense local activations. By analyzing the performance of different CNNs at multiple scales, it is found that each CNN works better in different scale ranges. A scale-wise CNN adaption is reasonable since objects in scene are at its own specific scale. Second, a fisher kernel is applied to aggregate a global representation at each scale and then to merge into a single vector by using a post-processing method called scale-wise normalization. The essence of Fisher Vector lies on the accumulation of the first and second order differences. Hence, the scale-wise normalization followed by average pooling would balance the influence of each scale since different amount of features are extracted. Third, the Fisher vector representation based on the deep convolutional features is followed by a linear Supported Vector Machine, which is a simple yet efficient way to classify the scene categories. Experimental results show that the scale-specific feature extraction and normalization with CNNs trained on object-centric and scene-centric datasets can boost the results from 74.03% up to 79.43% on MIT Indoor67 when only two scales are used (compared to results at single scale). The result is comparable to state-of-art performance which proves that the representation can be applied to other visual recognition tasks.Keywords: deep convolutional features, Fisher Vector, multiple scales, scale-specific normalization
Procedia PDF Downloads 3315572 The Effect of Contemporary Islamic Thought Liberalization to the Development of Science
Authors: Ibrahim Malik, Vita Fathimah Silondae, Askoning
Abstract:
The liberalization of Islamic thought is not only an impact on the views of Muslim community regarding worldview, but has touched the stage reconstruction of contemporary science. It can be seen from the emergence of Western and Eastern intellectual movements that try to reconstruct contemporary science arguing that scientific culture is not currently able to deliver audiences to change the order of the better society. Such Islamic thought liberalization has a huge influence on the multi-dimensional crisis in various sectors such as the economic, culture, politic, ecology, and other sectors. Therefore, this paper examines the effects of the liberalization of contemporary Islamic thought towards on the development of modern science. The method used in this paper is based on textual study of Al-Qur'an, Hadith (prophetic tradition), and the history of contemporary Islamic thought and comparing it with the reality of the development of science today. So, the influence of Islamic thought liberalization has created a crisis and stagnation of the development of scientific disciplines can be found.Keywords: liberalization, science, Islam, development of science
Procedia PDF Downloads 4285571 Economic Policy of Achieving National Competitive Advantage
Authors: Gulnaz Erkomaishvili, Eteri Kharaishvili, Marina Chavleishvili
Abstract:
The paper discusses the economic policy of increasing national competitiveness, the tools, and means which help the country to improve its competitiveness. The sectors of the economy, in which the country can achieve a competitive advantage, are studied. It is noted that the country’s economic policy plays an important role in obtaining and maintaining a competitive advantage - authority should take measures to ensure a high level of education; scientific and research activities should be funded by the state; foreign direct investments should be attracted mainly in science-intensive industries; adaptation with the latest scientific achievements of the modern world and deepening of scientific and technical cooperation. Stable business environment and export-oriented strategy is the basis for the country’s economic growth. The studies have shown that institutional reforms in Georgia are not enough to significantly improve the country's competitiveness.Keywords: competitiveness, economic policy, competitiveness improvement strategy, competitiveness of Georgia
Procedia PDF Downloads 1285570 Leveraging Deep Q Networks in Portfolio Optimization
Authors: Peng Liu
Abstract:
Deep Q networks (DQNs) represent a significant advancement in reinforcement learning, utilizing neural networks to approximate the optimal Q-value for guiding sequential decision processes. This paper presents a comprehensive introduction to reinforcement learning principles, delves into the mechanics of DQNs, and explores its application in portfolio optimization. By evaluating the performance of DQNs against traditional benchmark portfolios, we demonstrate its potential to enhance investment strategies. Our results underscore the advantages of DQNs in dynamically adjusting asset allocations, offering a robust portfolio management framework.Keywords: deep reinforcement learning, deep Q networks, portfolio optimization, multi-period optimization
Procedia PDF Downloads 345569 LED Lighting Interviews and Assessment in Forest Machines
Authors: Rauno Pääkkönen, Fabriziomaria Gobba, Leena Korpinen
Abstract:
The objective of the study is to assess the implementation of LED lighting into forest machine work in the dark. In addition, the paper includes a wide variety of important and relevant safety and health parameters. In modern, computerized work in the cab of forest machines, artificial illumination is a demanding task when performing duties, such as the visual inspections of wood and computer calculations. We interviewed entrepreneurs and gathered the following as the most pertinent themes: (1) safety, (2) practical problems, and (3) work with LED lighting. The most important comments were in regards to the practical problems of LED lighting. We found indications of technical problems in implementing LED lighting, like snow and dirt on the surfaces of lamps that dim the emission of light. Moreover, service work in the dark forest is dangerous and increases the risks of on-site accidents. We also concluded that the amount of blue light to the eyes should be assessed, especially, when the drivers are working in a semi-dark cab.Keywords: forest machines, health, LED, safety
Procedia PDF Downloads 4315568 Peculiarities of Comprehending the Subjective Well-Being by Student with High and Low Level of Emotional Intelligent
Authors: Veronika Pivkina, Alla Kim, Khon Nataliya
Abstract:
Actuality of the present study is defined first of all the role of subjective well-being problem in modern psychology and the comprehending of subjective well-being by current students. Purpose of this research is to educe peculiarities of comprehending of subjective well-being by students with various levels of emotional intelligent. Methods of research are adapted Russian-Language questionnaire of K. Riff 'The scales of psychological well-being'; emotional intelligent questionnaire of D. V. Lusin. The research involved 72 student from different universities and disciplines aged between 18 and 24. Analyzing the results of the studies, it can be concluded that the understanding of happiness in different groups of students with high and low levels of overall emotional intelligence is different, as well as differentiated by gender. Students with higher level of happiness possess more capacity and higher need to control their emotions, to cause and maintain the desired emotions and control something undesirable.Keywords: subjective well-being, emotional intelligent, psychology of comprehending, students
Procedia PDF Downloads 3755567 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 965566 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs
Authors: Ivan Stanev, Maria Koleva
Abstract:
Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs
Procedia PDF Downloads 3735565 Valorizing Traditional Greek Wheat Varieties: Use of DNA Barcoding for Species Identification and Biochemical Analysis of Their Nutritional Value
Authors: Niki Mougiou, Spyros Didos, Ioanna Bouzouka, Athina Theodorakopoulou, Michael Kornaros, Anagnostis Argiriou
Abstract:
Grains from traditional old Greek cereal varieties were evaluated and compared to commercial cultivars, like Simeto and Mexicali 81, in an effort to valorize local products and assess the nutritional benefits of ancient grains. The samples studied in this research included common wheat, durum wheat, emmer (Triticum dicoccum) and einkorn (Triticum monococcum), as well as barley, oats and rye grains. The Internal Transcribed Spacer 2 (ITS2) nuclear region was amplified and sequenced as a barcode for species identification, allowing the verification of the label of each product. After that, the total content of bound and free polyphenols and flavonoids, as well as the antioxidant activity of bound and free compounds, was measured by classic colorimetric assays using Folin- Ciocalteu, AlCl₃ and DPPH‧ (2,2-diphenyl-1-picrylhydrazyl) reagents, respectively. Moreover, the level of variation of fatty acids was determined in all samples by gas chromatography. The results showed that local old landraces of emmer and einkorn had the highest polyphenol content, 2.4 and 3.3 times higher than the average value of 5 durum wheat samples, respectively. Regarding the total flavonoid content, einkorn had 2.6-fold and emmer 2-fold higher values than common wheat. The antioxidant activity of free or bound compounds was at the same level, at about 20-30% higher in both einkorn and emmer compared to common wheat. Five main fatty acids were detected in all samples, in order of decreasing amounts: linoleic (C18:2) > palmitic (C16:0) ≈ , oleic (C18:1) > eicosenoic (C20:1, cis-11) > stearic (C18:0). Emmer and einkorn showed a higher diversity of fatty acids and a higher content of mono-unsaturated fatty acids compared to common wheat. The results of this study demonstrate the high nutritional value of old local landraces that have been put aside by more productive, yet with lower qualitative characteristics, commercial cultivars, underlining the importance of maintaining sustainable agricultural practices to ensure their continued cultivation.Keywords: biochemical analysis, nutritional value, plant barcoding, wheat
Procedia PDF Downloads 855564 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques
Authors: Stefan K. Behfar
Abstract:
The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing
Procedia PDF Downloads 765563 A Study of Quality Assurance and Unit Verification Methods in Safety Critical Environment
Authors: Miklos Taliga
Abstract:
In the present case study we examined the development and testing methods of systems that contain safety-critical elements in different industrial fields. Consequentially, we observed the classical object-oriented development and testing environment, as both medical technology and automobile industry approaches the development of safety critical elements that way. Subsequently, we examined model-based development. We introduce the quality parameters that define development and testing. While taking modern agile methodology (scrum) into consideration, we examined whether and to what extent the methodologies we found fit into this environment.Keywords: safety-critical elements, quality managent, unit verification, model base testing, agile methods, scrum, metamodel, object-oriented programming, field specific modelling, sprint, user story, UML Standard
Procedia PDF Downloads 5855562 A Machine Learning Approach to Detecting Evasive PDF Malware
Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran
Abstract:
The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.Keywords: PDF, PDF malware, decision tree classifier, random forest classifier
Procedia PDF Downloads 92