Search results for: problem diagnostic
4899 Learning to Recommend with Negative Ratings Based on Factorization Machine
Authors: Caihong Sun, Xizi Zhang
Abstract:
Rating prediction is an important problem for recommender systems. The task is to predict the rating for an item that a user would give. Most of the existing algorithms for the task ignore the effect of negative ratings rated by users on items, but the negative ratings have a significant impact on users’ purchasing decisions in practice. In this paper, we present a rating prediction algorithm based on factorization machines that consider the effect of negative ratings inspired by Loss Aversion theory. The aim of this paper is to develop a concave and a convex negative disgust function to evaluate the negative ratings respectively. Experiments are conducted on MovieLens dataset. The experimental results demonstrate the effectiveness of the proposed methods by comparing with other four the state-of-the-art approaches. The negative ratings showed much importance in the accuracy of ratings predictions.Keywords: factorization machines, feature engineering, negative ratings, recommendation systems
Procedia PDF Downloads 2454898 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 3034897 Design and Analysis of Piping System with Supports Using CAESAR-II
Authors: M. Jamuna Rani, K. Ramanathan
Abstract:
A steam power plant is housed with various types of equipments like boiler, turbine, heat exchanger etc. These equipments are mainly connected with piping systems. Such a piping layout design depends mainly on stress analysis and flexibility. It will vary with respect to pipe geometrical properties, pressure, temperature, and supports. The present paper is to analyze the presence and effect of hangers and expansion joints in the piping layout/routing using CAESAR-II software. Main aim of piping stress analysis is to provide adequate flexibility for absorbing thermal expansion, code compliance for stresses and displacement incurred in piping system. The design is said to be safe if all these are in allowable range as per code. In this study, a sample problem is considered for analysis as per power piping ASME B31.1 code and the results thus obtained are compared.Keywords: ASTM B31.1, hanger, expansion joint, CAESAR-II
Procedia PDF Downloads 3684896 Numerical Analyze of Corona Discharge on HVDC Transmission Lines
Authors: H. Nouri, A. Tabbel, N. Douib, H. Aitsaid, Y. Zebboudj
Abstract:
This study and the field test comparisons were carried out on the Algerian Derguna-Setif transmission systems. The transmission line of normal voltage 225 kV is 65 km long, transported and uses twin bundle conductors protected with two shield wires of transposed galvanized steel. An iterative finite-element method is used to solve Poisons equation. Two algorithms are proposed for satisfying the current continuity condition and updating the space-charge density. A new approach to the problem of corona discharge in transmission system has been described in this paper. The effect of varying the configurations and wires number is also investigated. The analysis of this steady is important in the design of HVDC transmission lines. The potential and electric field have been calculating in locations singular points of the system.Keywords: corona discharge, finite element method, electric field, HVDC
Procedia PDF Downloads 4154895 Magneto-Rheological Damper Based Semi-Active Robust H∞ Control of Civil Structures with Parametric Uncertainties
Authors: Vedat Senol, Gursoy Turan, Anders Helmersson, Vortechz Andersson
Abstract:
In developing a mathematical model of a real structure, the simulation results of the model may not match the real structural response. This is a general problem that arises during dynamic motion of the structure, which may be modeled by means of parameter variations in the stiffness, damping, and mass matrices. These changes in parameters need to be estimated, and the mathematical model is updated to obtain higher control performances and robustness. In this study, a linear fractional transformation (LFT) is utilized for uncertainty modeling. Further, a general approach to the design of an H∞ control of a magneto-rheological damper (MRD) for vibration reduction in a building with mass, damping, and stiffness uncertainties is presented.Keywords: uncertainty modeling, structural control, MR Damper, H∞, robust control
Procedia PDF Downloads 1444894 Aircraft Pitch Attitude Control Using Backstepping
Authors: Labane Chrif
Abstract:
A nonlinear approach to the automatic pitch attitude control problem for aircraft transportation is presented. A nonlinear model describing the longitudinal equations of motion in strict feedback form is derived. Backstepping is utilized for the construction of a globally stabilizing controller with a number of free design parameters. The controller is evaluated using the aircraft transportation. The adaptation scheme proposed allowed us to design an explicit controller with a minimal knowledge of the aircraft aerodynamics. Finally, the simulation results will show that backstepping controller have better dynamic performance, simpler design, higher precision, easier implement, etc. At the same time, the control effect will be significantly improved. In addition, backstepping control is superior in short transition, good stability, anti-disturbance and good control.Keywords: nonlinear control, backstepping, aircraft control, Lyapunov function, longitudinal model
Procedia PDF Downloads 5844893 Quality Fabric Optimization Using Genetic Algorithms
Authors: Halimi Mohamed Taher, Kordoghli Bassem, Ben Hassen Mohamed, Sakli Faouzi
Abstract:
Textile industry has been an important part of many developing countries economies such as Tunisia. This industry is confronted with a challenging and increasing competitive environment. Good quality management in production process is the key factor for retaining existence especially in raw material exploitation. The present work aims to develop an intelligent system for fabric inspection. In the first step, we have studied the method used for fabric control which takes into account the default length and localization in woven. In the second step, we have used a method based on the fuzzy logic to minimize the Demerit point indicator with appropriate total rollers length, so that the quality problem becomes multi-objective. In order to optimize the total fabric quality, we have applied the genetic algorithm (GA).Keywords: fabric control, Fuzzy logic, genetic algorithm, quality management
Procedia PDF Downloads 5944892 Cybercrime: International Police Cooperation with Europol
Authors: Daniel Suarez Alonso
Abstract:
Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.Keywords: Europol, international cooperation, cybercrime, computer crime, law
Procedia PDF Downloads 714891 Analysis and Simulation of TM Fields in Waveguides with Arbitrary Cross-Section Shapes by Means of Evolutionary Equations of Time-Domain Electromagnetic Theory
Authors: Ömer Aktaş, Olga A. Suvorova, Oleg Tretyakov
Abstract:
The boundary value problem on non-canonical and arbitrary shaped contour is solved with a numerically effective method called Analytical Regularization Method (ARM) to calculate propagation parameters. As a result of regularization, the equation of first kind is reduced to the infinite system of the linear algebraic equations of the second kind in the space of L2. This equation can be solved numerically for desired accuracy by using truncation method. The parameters as cut-off wavenumber and cut-off frequency are used in waveguide evolutionary equations of electromagnetic theory in time-domain to illustrate the real-valued TM fields with lossy and lossless media.Keywords: analytical regularization method, electromagnetic theory evolutionary equations of time-domain, TM Field
Procedia PDF Downloads 5024890 Supervised Learning for Cyber Threat Intelligence
Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk
Abstract:
The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.Keywords: threat information sharing, supervised learning, data classification, performance evaluation
Procedia PDF Downloads 1554889 Sloshing Response of Liquid in Prismatic Container under Oscillation
Authors: P. R. Maiti, S. K. Bhattacharyya
Abstract:
Sloshing is a physical phenomenon characterized by the oscillation of unrestrained free surface of liquid in a partially liquid filled container subjected to external excitation. Determination of sloshing frequency in container is important to avoid resonance condition of the system. The complex behavior of the free surface movement and its combined mode of vibration make difficulty for exact analysis of sloshing. In the present study, numerical analysis is carried out for a partially liquid filled tank under external forces. Boundary element approach is used to formulate the sloshing problem in two -dimensional prismatic container with potential flow. Effort has been made to find slosh response for two dimensional problems in partially liquid filled prismatic container.Keywords: sloshing, boundary element method, prismatic container, oscillation
Procedia PDF Downloads 3274888 On Confidence Intervals for the Difference between Inverse of Normal Means with Known Coefficients of Variation
Authors: Arunee Wongkhao, Suparat Niwitpong, Sa-aat Niwitpong
Abstract:
In this paper, we propose two new confidence intervals for the difference between the inverse of normal means with known coefficients of variation. One of these two confidence intervals for this problem is constructed based on the generalized confidence interval and the other confidence interval is constructed based on the closed form method of variance estimation. We examine the performance of these confidence intervals in terms of coverage probabilities and expected lengths via Monte Carlo simulation.Keywords: coverage probability, expected length, inverse of normal mean, coefficient of variation, generalized confidence interval, closed form method of variance estimation
Procedia PDF Downloads 3124887 Effect of Vitrification on Embryos Euploidy Obtained from Thawed Oocytes
Authors: Natalia Buderatskaya, Igor Ilyin, Julia Gontar, Sergey Lavrynenko, Olga Parnitskaya, Ekaterina Ilyina, Eduard Kapustin, Yana Lakhno
Abstract:
Introduction: It is known that cryopreservation of oocytes has peculiar features due to the complex structure of the oocyte. One of the most important features is that mature oocytes contain meiotic division spindle which is very sensitive even to the slightest variation in temperature. Thus, the main objective of this study is to analyse the resulting euploid embryos obtained from thawed oocytes in comparison with the data of preimplantation genetic screening (PGS) in fresh embryo cycles. Material and Methods: The study was conducted at 'Medical Centre IGR' from January to July 2016. Data were analysed for 908 donor oocytes obtained in 67 cycles of assisted reproductive technologies (ART), of which 693 oocytes were used in the 51 'fresh' cycles (group A), and 215 oocytes - 16 ART programs with vitrification female gametes (group B). The average age of donors in the groups match 27.3±2.9 and 27.8±6.6 years. Stimulation of superovulation was conducted the standard way. Vitrification was performed in 1-2 hours after transvaginal puncture and thawing of oocytes were carried out in accordance with the standard protocol of Cryotech (Japan). Manipulation ICSI was performed 4-5 hours after transvaginal follicle puncture for fresh oocytes, or after defrosting - for vitrified female gametes. For the PGS, an embryonic biopsy was done on the third or on the fifth day after fertilization. Diagnostic procedures were performed using fluorescence in situ hybridization with the study of such chromosomes as 13, 16, 18, 21, 22, X, Y. Only morphologically quality blastocysts were used for the transfer, the estimation of which corresponded to the Gardner criteria. The statistical hypotheses were done using the criteria t, x^2 at a significance levels p<0.05, p<0.01, p<0.001. Results: The mean number of mature oocytes per cycle in group A was 13.58±6.65 and in group B - 13.44±6.68 oocytes for patient. The survival of oocytes after thawing totaled 95.3% (n=205), which indicates a highly effective quality of performed vitrification. The proportion of zygotes in the group A corresponded to 91.1%(n=631), in the group B – 80.5%(n=165), which shows statistically significant difference between the groups (p<0.001) and explained by non-viable oocytes elimination after vitrification. This is confirmed by the fact that on the fifth day of embryos development a statistically significant difference in the number of blastocysts was absent (p>0.05), and constituted respectively 61.6%(n=389) and 63.0%(n=104) in the groups. For the PGS performing 250 embryos analyzed in the group A and 72 embryos - in the group B. The results showed that euploidy in the studied chromosomes were 40.0%(n=100) embryos in the group A and 41.7% (n=30) - in the group B, which shows no statistical significant difference (p>0.05). The indicators of clinical pregnancies in the groups amounted to 64.7% (22 pregnancies per 34 embryo transfers) and 61.5% (8 pregnancies per 13 embryo transfers) respectively, and also had no significant difference between the groups (p>0.05). Conclusions: The results showed that the vitrification does not affect the resulting euploid embryos in assisted reproductive technologies and are not reflected in their morphological characteristics in ART programs.Keywords: euploid embryos, preimplantation genetic screening, thawing oocytes, vitrification
Procedia PDF Downloads 3344886 Study on Roll Marks of Stainless Steel in Rolling Mill
Authors: Cai-Wan Chang-Jian, Han-Ting Tsai
Abstract:
In the processing industry of metal forming, rolling is the most used method of processing. In a cold rolling factory of stainless steel, there occurs a product defect on temper rolling process within cold rolling. It is called 'roll marks', which is a phenomenon of undesirable flatness problem. In this research, we performed a series of experimental measurements on the roll marks, and we used optical sensors to measure it and compared the vibration frequency of roll marks with the vibration frequency of key components in the skin pass mill. We found there is less correlation between the above mentioned data. Finally, we took measurement on the motor driver in rolling mill. We found that the undulation frequency of motor could match with the frequency of roll marks, and then we have confirmed that the motor’s undulation caused roll marks.Keywords: roll mark, plane strain, rolling mill, stainless steel
Procedia PDF Downloads 4584885 A Laundry Algorithm for Colored Textiles
Authors: H. E. Budak, B. Arslan-Ilkiz, N. Cakmakci, I. Gocek, U. K. Sahin, H. Acikgoz-Tufan, M. H. Arslan
Abstract:
The aim of this study is to design a novel laundry algorithm for colored textiles which have significant decoloring problem. During the experimental work, bleached knitted single jersey fabric made of 100% cotton and dyed with reactive dyestuff was utilized, since according to a conducted survey textiles made of cotton are the most demanded textile products in the textile market by the textile consumers and for coloration of textiles reactive dyestuffs are the ones that are the most commonly used in the textile industry for dyeing cotton-made products. Therefore, the fabric used in this study was selected and purchased in accordance with the survey results. The fabric samples cut out of this fabric were dyed with different dyeing parameters by using Remazol Brilliant Red 3BS dyestuff in Gyrowash machine at laboratory conditions. From the alternative reactive-dyed cotton fabric samples, the ones that have high tendency to color loss were determined and examined. Accordingly, the parameters of the dyeing process used for these fabric samples were evaluated and the dyeing process which was chosen to be used for causing high tendency to color loss for the cotton fabrics was determined in order to reveal the level of improvement in color loss during this study clearly. Afterwards, all of the untreated fabric samples cut out of the fabric purchased were dyed with the dyeing process selected. When dyeing process was completed, an experimental design was created for the laundering process by using Minitab® program considering temperature, time and mechanical action as parameters. All of the washing experiments were performed in domestic washing machine. 16 washing experiments were performed with 8 different experimental conditions and 2 repeats for each condition. After each of the washing experiments, water samples of the main wash of the laundering process were measured with UV spectrophotometer. The values obtained were compared with the calibration curve of the materials used for the dyeing process. The results of the washing experiments were statistically analyzed with Minitab® program. According to the results, the most suitable washing algorithm to be used in terms of the parameters temperature, time and mechanical action for domestic washing machines for minimizing fabric color loss was chosen. The laundry algorithm proposed in this study have the ability of minimalizing the problem of color loss of colored textiles in washing machines by eliminating the negative effects of the parameters of laundering process on color of textiles without compromising the fundamental effects of basic cleaning action being performed properly. Therefore, since fabric color loss is minimized with this washing algorithm, dyestuff residuals will definitely be lower in the grey water released from the laundering process. In addition to this, with this laundry algorithm it is possible to wash and clean other types of textile products with proper cleaning effect and minimized color loss.Keywords: color loss, laundry algorithm, textiles, domestic washing process
Procedia PDF Downloads 3664884 Modern Imputation Technique for Missing Data in Linear Functional Relationship Model
Authors: Adilah Abdul Ghapor, Yong Zulina Zubairi, Rahmatullah Imon
Abstract:
Missing value problem is common in statistics and has been of interest for years. This article considers two modern techniques in handling missing data for linear functional relationship model (LFRM) namely the Expectation-Maximization (EM) algorithm and Expectation-Maximization with Bootstrapping (EMB) algorithm using three performance indicators; namely the mean absolute error (MAE), root mean square error (RMSE) and estimated biased (EB). In this study, we applied the methods of imputing missing values in the LFRM. Results of the simulation study suggest that EMB algorithm performs much better than EM algorithm in both models. We also illustrate the applicability of the approach in a real data set.Keywords: expectation-maximization, expectation-maximization with bootstrapping, linear functional relationship model, performance indicators
Procedia PDF Downloads 4054883 Validation of Global Ratings in Clinical Performance Assessment
Authors: S. J. Yune, S. Y. Lee, S. J. Im, B. S. Kam, S. Y. Baek
Abstract:
This study aimed to determine the reliability of clinical performance assessments, having been emphasized by ability-based education, and professors overall assessment methods. We addressed the following problems: First, we try to find out whether there is a difference in what we consider to be the main variables affecting the clinical performance test according to the evaluator’s working period and the number of evaluation experience. Second, we examined the relationship among the global rating score (G), analytic global rating score (Gc), and the sum of the analytical checklists (C). What are the main factors affecting clinical performance assessments in relation to the numbers of times the evaluator had administered evaluations and the length of their working period service? What is the relationship between overall assessment score and analytic checklist score? How does analytic global rating with 6 components in OSCE and 4 components in sub-domains (Gc) CPX: aseptic practice, precision, systemic approach, proficiency, successfulness, and attitude overall assessment score and task-specific analytic checklist score sum (C) affect the professor’s overall global rating assessment score (G)? We studied 75 professors who attended a 2016 Bugyeoung Consortium clinical skills performances test evaluating third and fourth year medical students at the Pusan National University Medical school in South Korea (39 prof. in OSCE, 36 prof. in CPX; all consented to participate in our study). Each evaluator used 3 forms; a task-specific analytic checklist, subsequent analytic global rating scale with sub-6 domains, and overall global scale. After the evaluation, the professors responded to the questionnaire on the important factors of clinical performance assessment. The data were analyzed by frequency analysis, correlation analysis, and hierarchical regression analysis using SPSS 21.0. Their understanding of overall assessment was analyzed by dividing the subjects into groups based on experiences. As a result, they considered ‘precision’ most important in overall OSCE assessment, and ‘precise accuracy physical examination’, ‘systemic approaches to taking patient history’, and ‘diagnostic skill capability’ in overall CPX assessment. For OSCE, there was no clear difference of opinion about the main factors, but there was for CPX. Analytic global rating scale score, overall rating scale score, and analytic checklist score had meaningful mutual correlations. According to the regression analysis results, task-specific checklist score sum had the greatest effect on overall global rating. professors regarded task-specific analytic checklist total score sum as best reflecting overall OSCE test score, followed by aseptic practice, precision, systemic approach, proficiency, successfulness, and attitude on a subsequent analytic global rating scale. For CPX, subsequent analytic global rating scale score, overall global rating scale score, and task-specific checklist score had meaningful mutual correlations. These findings support explanations for validity of professors’ global rating in clinical performance assessment.Keywords: global rating, clinical performance assessment, medical education, analytic checklist
Procedia PDF Downloads 2374882 A Qualitative Approach to Engineering Design Issues, Problems, and Solutions
Authors: M. U. Arshid, M. A. Kamal
Abstract:
The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.Keywords: engineering design, engineering design issues, innovation, public sector projects
Procedia PDF Downloads 3514881 Comparison of Machine Learning Models for the Prediction of System Marginal Price of Greek Energy Market
Authors: Ioannis P. Panapakidis, Marios N. Moschakis
Abstract:
The Greek Energy Market is structured as a mandatory pool where the producers make their bid offers in day-ahead basis. The System Operator solves an optimization routine aiming at the minimization of the cost of produced electricity. The solution of the optimization problem leads to the calculation of the System Marginal Price (SMP). Accurate forecasts of the SMP can lead to increased profits and more efficient portfolio management from the producer`s perspective. Aim of this study is to provide a comparative analysis of various machine learning models such as artificial neural networks and neuro-fuzzy models for the prediction of the SMP of the Greek market. Machine learning algorithms are favored in predictions problems since they can capture and simulate the volatilities of complex time series.Keywords: deregulated energy market, forecasting, machine learning, system marginal price
Procedia PDF Downloads 2174880 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network
Abstract:
In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay
Procedia PDF Downloads 3654879 Analyzing Social Media Discourses of Domestic Violence in Promoting Awareness and Support Seeking: An Exploratory Study
Authors: Sudha Subramani, Hua Wang
Abstract:
Domestic Violence (DV) against women is now recognized to be a serious and widespread problem worldwide. There is a growing concern that violence against women has a global public health impact, as well as a violation of human rights. From the existing statistical surveys, it is revealed that there exists a strong relationship between DV and health issues of women like bruising, lacerations, depression, anxiety, flashbacks, sleep disturbances, hyper-arousal, emotional distress, sexually transmitted diseases and so on. This social problem is still considered as behind the closed doors issue and stigmatized topic. Women conceal their sufferings from family and friends, as they experience a lack of trust in others, feelings of shame and embarrassment among the society. Hence, women survivors of DV experience some barriers in seeking the support of specialized services such as health care access, crisis support, and legal guidance. Fortunately, with the popularity of social media like Facebook and Twitter, people share their opinions and emotional feelings to seek the social and emotional support, for sympathetic encouragement, to show compassion and empathy among the public. Considering the DV, social media plays a predominant role in creating the awareness and promoting the support services to the public, as we live in the golden era of social media. The various professional people like the public health researchers, clinicians, psychologists, social workers, national family health organizations, lawyers, and victims or their family and friends share the unprecedentedly valuable information (personal opinions and experiences) in a single platform to improve the social welfare of the community. Though each tweet or post contains a less informational value, the consolidation of millions of messages can generate actionable knowledge and provide valuable insights about the public opinion in general. Hence, this paper reports on an exploratory analysis of the effectiveness of social media for unobtrusive assessment of attitudes and awareness towards DV. In this paper, mixed methods such as qualitative analysis and text mining approaches are used to understand the social media disclosures of DV through the lenses of opinion sharing, anonymity, and support seeking. The results of this study could be helpful to avoid the cost of wide scale surveys, while still maintaining appropriate research conditions is to leverage the abundance of data publicly available on the web. Also, this analysis with data enrichment and consolidation would be useful in assisting advocacy and national family health organizations to provide information about resources and support, raise awareness and counter common stigmatizing attitudes about DV.Keywords: domestic violence, social media, social stigma and support, women health
Procedia PDF Downloads 2934878 21st Century Islam: Global Challenges of Islamic Representation and Knowledge Acquisition
Authors: M. M. Muhammed, O. Khuzaima
Abstract:
This research examined and outlined some of the challenges facing Islam and Muslims in the 21st century, considering global Islamic representation and knowledge acquisition as key objectives. It was observed that the Western media misrepresentation of Islam and the Western ethos embodied by the acquisition of western civilisation are major challenges faced by Islam and Muslims today. The problem of sectarianism, decline in the socio-economic power of Muslim communities and the archaic nature of the Islamic creed were recorded as major actors to the evolving global Islamic issues. It was therefore concluded that Islam is not the reason for these challenges, rather the action of some Muslims and non-Muslims were the contributing factors to the pandemics faced by Islam and Muslims. Some relevant recommendations were made to the Islamic world that could serve as effectual solutions to these lingering problems.Keywords: Islam, challenges, representation, knowledge, century, global, twenty-first
Procedia PDF Downloads 2364877 Quantum Mechanics as A Limiting Case of Relativistic Mechanics
Authors: Ahmad Almajid
Abstract:
The idea of unifying quantum mechanics with general relativity is still a dream for many researchers, as physics has only two paths, no more. Einstein's path, which is mainly based on particle mechanics, and the path of Paul Dirac and others, which is based on wave mechanics, the incompatibility of the two approaches is due to the radical difference in the initial assumptions and the mathematical nature of each approach. Logical thinking in modern physics leads us to two problems: - In quantum mechanics, despite its success, the problem of measurement and the problem of wave function interpretation is still obscure. - In special relativity, despite the success of the equivalence of rest-mass and energy, but at the speed of light, the fact that the energy becomes infinite is contrary to logic because the speed of light is not infinite, and the mass of the particle is not infinite too. These contradictions arise from the overlap of relativistic and quantum mechanics in the neighborhood of the speed of light, and in order to solve these problems, one must understand well how to move from relativistic mechanics to quantum mechanics, or rather, to unify them in a way different from Dirac's method, in order to go along with God or Nature, since, as Einstein said, "God doesn't play dice." From De Broglie's hypothesis about wave-particle duality, Léon Brillouin's definition of the new proper time was deduced, and thus the quantum Lorentz factor was obtained. Finally, using the Euler-Lagrange equation, we come up with new equations in quantum mechanics. In this paper, the two problems in modern physics mentioned above are solved; it can be said that this new approach to quantum mechanics will enable us to unify it with general relativity quite simply. If the experiments prove the validity of the results of this research, we will be able in the future to transport the matter at speed close to the speed of light. Finally, this research yielded three important results: 1- Lorentz quantum factor. 2- Planck energy is a limited case of Einstein energy. 3- Real quantum mechanics, in which new equations for quantum mechanics match and exceed Dirac's equations, these equations have been reached in a completely different way from Dirac's method. These equations show that quantum mechanics is a limited case of relativistic mechanics. At the Solvay Conference in 1927, the debate about quantum mechanics between Bohr, Einstein, and others reached its climax, while Bohr suggested that if particles are not observed, they are in a probabilistic state, then Einstein said his famous claim ("God does not play dice"). Thus, Einstein was right, especially when he didn't accept the principle of indeterminacy in quantum theory, although experiments support quantum mechanics. However, the results of our research indicate that God really does not play dice; when the electron disappears, it turns into amicable particles or an elastic medium, according to the above obvious equations. Likewise, Bohr was right also, when he indicated that there must be a science like quantum mechanics to monitor and study the motion of subatomic particles, but the picture in front of him was blurry and not clear, so he resorted to the probabilistic interpretation.Keywords: lorentz quantum factor, new, planck’s energy as a limiting case of einstein’s energy, real quantum mechanics, new equations for quantum mechanics
Procedia PDF Downloads 854876 Towards a Resources Provisioning for Dynamic Workflows in the Cloud
Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem
Abstract:
Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications
Procedia PDF Downloads 2994875 Software Quality Assurance in Network Security using Cryptographic Techniques
Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar
Abstract:
The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography
Procedia PDF Downloads 7374874 The Impact of an Interactive E-Book on Mathematics Reading and Spatial Ability in Middle School Students
Authors: Abebayehu Yohannes, Hsiu-Ling Chen, Chiu-Chen Chang
Abstract:
Mathematics reading and spatial ability are important learning components in mathematics education. However, many students struggle to understand real-world problems and lack the spatial ability to form internal imagery. To cope with this problem, in this study, an interactive e-book was developed. The result indicated that both groups had a significant increase in the mathematics reading ability test, and a significant difference was observed in the overall mathematics reading score in favor of the experimental group. In addition, the interactive e-book learning mode had significant impacts on students’ spatial ability. It was also found that the richness of content with visual and interactive elements provided in the interactive e-book enhanced students’ satisfaction with the teaching material.Keywords: interactive e-books, spatial ability, mathematics reading, satisfaction, three view
Procedia PDF Downloads 1964873 Trusted Neural Network: Reversibility in Neural Networks for Network Integrity Verification
Authors: Malgorzata Schwab, Ashis Kumer Biswas
Abstract:
In this concept paper, we explore the topic of Reversibility in Neural Networks leveraged for Network Integrity Verification and crafted the term ''Trusted Neural Network'' (TNN), paired with the API abstraction around it, to embrace the idea formally. This newly proposed high-level generalizable TNN model builds upon the Invertible Neural Network architecture, trained simultaneously in both forward and reverse directions. This allows for the original system inputs to be compared with the ones reconstructed from the outputs in the reversed flow to assess the integrity of the end-to-end inference flow. The outcome of that assessment is captured as an Integrity Score. Concrete implementation reflecting the needs of specific problem domains can be derived from this general approach and is demonstrated in the experiments. The model aspires to become a useful practice in drafting high-level systems architectures which incorporate AI capabilities.Keywords: trusted, neural, invertible, API
Procedia PDF Downloads 1514872 A Performance Model for Designing Network in Reverse Logistic
Authors: S. Dhib, S. A. Addouche, T. Loukil, A. Elmhamedi
Abstract:
In this paper, a reverse supply chain network is investigated for a decision making. This decision is surrounded by complex flows of returned products, due to the increasing quantity, the type of returned products and the variety of recovery option products (reuse, recycling, and refurbishment). The most important problem in the reverse logistic network (RLN) is to orient returned products to the suitable type of recovery option. However, returned products orientations from collect sources to the recovery disposition have not well considered in performance model. In this study, we propose a performance model for designing a network configuration on reverse logistics. Conceptual and analytical models are developed with taking into account operational, economic and environmental factors on designing network.Keywords: reverse logistics, network design, performance model, open loop configuration
Procedia PDF Downloads 4384871 Critical and Strategic Issues in Compensation, Staffing and Personnel Management in Nigeria
Authors: Shonuga Olajumoke Adedoyinsola
Abstract:
Staffing and Compensation are at the core of any employment exchange, and they serve as the defining characteristics of any employment relationship. Most organizations understand the benefits that a longer term approach to staff planning can bring and the answer to this problem lies not in trying to implement the traditional approach more effectively, but in implementing a completely different kind of process for strategic staffing. The study focuses on critical points of compensation, staffing and personnel management. The fundamentals of these programs include the elements of vision, potential, communication and motivation. The aim of the paper is to identify the most important attributes of compensation and incentives, staffing and personnel management. Research method is the analysis and synthesis of scientific literature, logical, comparative and graphic representation. On the basis of analysis, the author presents the models of these systems for positive employee attitudes and behaviors.Keywords: compensation, employees, incentives, staffing, personnel management
Procedia PDF Downloads 3014870 Comparison of Different Data Acquisition Techniques for Shape Optimization Problems
Authors: Attila Vámosi, Tamás Mankovits, Dávid Huri, Imre Kocsis, Tamás Szabó
Abstract:
Non-linear FEM calculations are indispensable when important technical information like operating performance of a rubber component is desired. Rubber bumpers built into air-spring structures may undergo large deformations under load, which in itself shows non-linear behavior. The changing contact range between the parts and the incompressibility of the rubber increases this non-linear behavior further. The material characterization of an elastomeric component is also a demanding engineering task. The shape optimization problem of rubber parts led to the study of FEM based calculation processes. This type of problems was posed and investigated by several authors. In this paper the time demand of certain calculation methods are studied and the possibilities of time reduction is presented.Keywords: rubber bumper, data acquisition, finite element analysis, support vector regression
Procedia PDF Downloads 478