Search results for: hardy cross networks accuracy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9694

Search results for: hardy cross networks accuracy

6154 Visibility as a Catalyst for Driving LGBT-Inclusive Growth in India: Rethinking the Diversity and Inclusion Model

Authors: Koel Chakraborty

Abstract:

This paper critically examines the role of ‘disclosure and visibility’ of sexual minorities in a heteronormative organizational setting. The paper wishes to comment on the importance of promoting ‘visibility’ as an important catalyst in increasing the efficacy of outreach programs as part of diversity management practices as well as increasing the efficacy of teams. The aim of the research is to assess the pitfalls of not bringing ‘one’s authentic or whole self’ to work. In doing so, it will address whether Inclusive Leadership at the top propels employees to come out. The paper finally discusses and recommends strategies that could be helpful toward attaining and improving the visibility factor at a cross-functional level. This is a qualitative research with interviews and surveys conducted in inclusive workplace environments across various private sector companies in India.

Keywords: LGBT, diversity, organisation, leadership

Procedia PDF Downloads 200
6153 Spectral Analysis of Heart Rate Variability for Normal and Preeclamptic Pregnants

Authors: Abdulnasir Hossen, Alaa Barhoum, Deepali Jaju, V. Gowri, L. Al-Kharusi, M. Hassan, K. Al-Hashmi

Abstract:

Preeclampsia is a pregnancy disorder associated with increase in blood pressure and excess amount of protein in the urine. HRV analysis has been used by many researchers to identify preeclamptic pregnancy from normal pregnancy. A study in this regard to identify preeclamptic pregnancy in Oman from normal pregnant was conducted on 40 subjects (20 patients and 20 normal). The subjects were collected from two hospitals in Oman. A Fast Fourier transform (FFT) spectral analysis has shown that patients with preeclamptic pregnancy have a reduction in the power of the HF band and an increase in the power of the LF band of HRV compared with subjects with normal pregnancy. The accuracy of identification obtained was 80%.

Keywords: preelampsia, pregnancy hypertension, normal pregnant, FFT, spectral analysis, HRV

Procedia PDF Downloads 549
6152 Effect of Synthetic Jet on Wind Turbine Noise

Authors: Reda Mankbadi

Abstract:

The current work explores the use of Synthetic Jet Actuators (SJAs) for control of the acoustic radiation of a low-speed transitioning airfoil in a uniform stream. In the adopted numerical procedure, the actuator is modeled without its resonator cavity through imposing a simple fluctuating-velocity boundary condition at the bottom of the actuator's orifice. The orifice cavity, with the properly defined boundary condition, is then embedded into the airfoil surface. High-accuracy viscous simulations are then conducted to study the effects of the actuation on sound radiated by the airfoil. Results show that SJA can considerably suppress the radiated sound of the airfoil in uniform incoming stream.

Keywords: simulations, aeroacoustics, wind turbine noise, synthetic jet actuators (SJAs)

Procedia PDF Downloads 348
6151 Bundle Block Detection Using Spectral Coherence and Levenberg Marquardt Neural Network

Authors: K. Padmavathi, K. Sri Ramakrishna

Abstract:

This study describes a procedure for the detection of Left and Right Bundle Branch Block (LBBB and RBBB) ECG patterns using spectral Coherence(SC) technique and LM Neural Network. The Coherence function finds common frequencies between two signals and evaluate the similarity of the two signals. The QT variations of Bundle Blocks are observed in lead V1 of ECG. Spectral Coherence technique uses Welch method for calculating PSD. For the detection of normal and Bundle block beats, SC output values are given as the input features for the LMNN classifier. Overall accuracy of LMNN classifier is 99.5 percent. The data was collected from MIT-BIH Arrhythmia database.

Keywords: bundle block, SC, LMNN classifier, welch method, PSD, MIT-BIH, arrhythmia database

Procedia PDF Downloads 276
6150 The Relations between Coping Strategies, Caregiver Bonding, and Dating Violence of Emerging Adults: Cross-Cultural Comparison between China and Turkiye

Authors: Zubaidan Yushan, Hudayar Cıhan

Abstract:

Turkiye and China are countries that have collective cultures, but they have different cultural backgrounds. They have different cultures, different religions, and different levels of economic development. The aim of this study is to test the moderation effect of caregiver bonding on the relationship between dating violence and coping strategies among unmarried emerging adults in China and Turkiye. Participants ages were 19 and 26 years (X=23.66, SD=3.66), unmarried emerging adults Turkish 171 participants (72.5% women, 24% men, 3.5% prefer not to say), Chinese 170 participants (71.8% women, 21.8% men, 6.5% prefer not to say). All participants had been in a relationship for more than six months. Participants completed The Conflict Tactics Scales—(CTS2), The Cope Inventory, and The Parental Bonding Instrument (PBI). Examining the dating violence and coping strategies of the participant's relationship through caregiver bonding moderation analysis was performed using the Jamovi. Significance was tested using the bootstrapping method with bias-corrected confidence estimates. The outcome variable for analysis was dating violence, and the predictor variable for the analysis was coping strategies. The moderator variable evaluated for the analysis was parent attachment. Before the analysis, the mean-centered scores of each variable and moderator were calculated. Furthermore, the moderation analysis was conducted separately for each outcome. The Moderation analysis results show that the sub-dimension of over-protection moderates psychological aggression perpetration and avoidance coping in China. The sub-dimension of care moderates injury victimization and avoidance management in Turkiye; also, over-protection moderates injury victimization and social support coping. Moreover, the sub-dimension of care moderates sexual coercion perpetration and avoidance coping. In the results, caregiver bonding moderates the relationship between coping strategies and dating violence, which may be explained by the fact that our ways of coping with problems are learned, and people are influenced by their parents when they face problems. Therefore, problem-solving is permanently fixed, and each person has his or her fixed solution, which leads to a habit of using solutions to problems. However, sometimes, these solutions become the justification for the injured or abusive person. The quality of the attachment between parents can regulate this state. The results are somewhat similar to and slightly different from those in the previous literature. These mixed results indicate the need for further exploration. Many other factors, such as alcohol, drug violence, and pathological problems, maybe the reasons for these differences. In addition, diverse factors such as the study environment and the applied measurement scales may also affect the results.

Keywords: caregiver bonding, coping strategies, dating violence, emerging adulthood, cross-cultural, comparison

Procedia PDF Downloads 51
6149 Effects of Age and Energy Expenditure on Obesity Among Adults in Abeokuta, Nigeria

Authors: Adeniyi Samuel Adekoya

Abstract:

The study assessed the independent effects of age and energy expenditure on the risks of obesity among adults (20-64 years). A cross-sectional study with changes in age, changes in work and leisure-time, and physical activities information played roles, with cut-off for energy expenditure and BMI in rural and urban localities. Physical activity information determined the energy expenditure, while the BMI determined the risk of obesity among the subjects. Statistically, age has a strong and direct association with obesity in both rural and urban settings, while energy expenditure was inverse in its association. Findings from the this study showed that in developing societies, age tends to be a risk factor for obesity, whereas energy expenditure is to be protective. Level of education and economic development are also relevant modifiers of the influences exerted by these variables.

Keywords: age, energy expenditure, BMI, rural/urban

Procedia PDF Downloads 420
6148 2D Point Clouds Features from Radar for Helicopter Classification

Authors: Danilo Habermann, Aleksander Medella, Carla Cremon, Yusef Caceres

Abstract:

This paper aims to analyze the ability of 2d point clouds features to classify different models of helicopters using radars. This method does not need to estimate the blade length, the number of blades of helicopters, and the period of their micro-Doppler signatures. It is also not necessary to generate spectrograms (or any other image based on time and frequency domain). This work transforms a radar return signal into a 2D point cloud and extracts features of it. Three classifiers are used to distinguish 9 different helicopter models in order to analyze the performance of the features used in this work. The high accuracy obtained with each of the classifiers demonstrates that the 2D point clouds features are very useful for classifying helicopters from radar signal.

Keywords: helicopter classification, point clouds features, radar, supervised classifiers

Procedia PDF Downloads 218
6147 Flow Characteristic Analysis for Hatch Type Air Vent Head of Bulk Cargo Ship by Computational Fluid Dynamics

Authors: Hanik Park, Kyungsook Jeon, Suchul Shin, Youngchul Park

Abstract:

The air vent head prevents the inflow of seawater into the cargo holds when it is used for the ballast tank on heavy weather. In this study, the flow characteristics and the grid size were created by the application of Computational Fluid Dynamics by taking into the consideration of comparison of test results. Then, the accuracy of the analysis was verified by comparing with experimental results. Based on this analysis, accurate turbulence model and grid size can be selected. Thus, the design characteristic of air vent head for bulk carrier contributes the reliability based on the research results.

Keywords: bulk carrier, FEM, SST, vent

Procedia PDF Downloads 514
6146 Virtual Assessment of Measurement Error in the Fractional Flow Reserve

Authors: Keltoum Chahour, Mickael Binois

Abstract:

Due to a lack of standardization during the invasive fractional flow reserve (FFR) procedure, the index is subject to many sources of uncertainties. In this paper, we investigate -through simulation- the effect of the (FFR) device position and configuration on the obtained value of the (FFR) fraction. For this purpose, we use computational fluid dynamics (CFD) in a 3D domain corresponding to a diseased arterial portion. The (FFR) pressure captor is introduced inside it with a given length and coefficient of bending to capture the (FFR) value. To get over the computational limitations, basically, the time of the simulation is about 2h 15min for one (FFR) value; we generate a Gaussian Process (GP) model for (FFR) prediction. The (GP) model indicates good accuracy and demonstrates the effective error in the measurement created by the random configuration of the pressure captor.

Keywords: fractional flow reserve, Gaussian processes, computational fluid dynamics, drift

Procedia PDF Downloads 126
6145 Deformulation and Comparative Analysis of Apparently Similar Polymers Using Multiple Modes of Pyrolysis-Gc/Ms

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in deformulation, comparative analysis as well as reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro-furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. This presentation demonstrates the study of two similar polymers by performing different mode of operations in the same system: Evolve gas analysis (EGA), Flash pyrolysis, Thermal desorption analysis, and Heart-cutting analysis. Unknown polymer materials and their chemical compositions are identified.

Keywords: gas chromatography/mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 257
6144 Entrepreneurship and the Discovery and Exploitation of Business Opportunities: Empirical Evidence from the Malawian Tourism Sector

Authors: Aravind Mohan Krishnan

Abstract:

This paper identifies a research gap in the literature on tourism entrepreneurship in Malawi, Africa, and investigates how entrepreneurs from the Malawian tourism sector discover and exploit business opportunities. In particular, the importance of prior experience and business networks in the opportunity development process is debated. Another area of empirical research examined here is the opportunity recognition-venture creation sequence. While Malawi presents fruitful business opportunities, exploiting these opportunities into fully realized business ideas is a real challenge due to the country’s difficult business environment and poor promotional and marketing efforts. The study concludes by calling for further research in Sub-Saharan Africa in order to develop our understanding of entrepreneurship in this (African) context.

Keywords: entrepreneurship, Malawi, opportunities, tourism

Procedia PDF Downloads 331
6143 Measurement of the Neutron Spectrum of 241AmLi and 241AmF Sources Using the Bonner Sphere Spectrometers

Authors: Victor Rocha Carvalho

Abstract:

The Bonner Sphere Spectrometry was used to obtain the average energy, the fluence rate, and radioprotection quantities such as the personal and ambient dose equivalent of the ²⁴¹AmLi and ²⁴¹AmF isotopic neutron sources used in the Neutron Metrology Laboratory - LN. The counts of the sources were performed with six different spherical moderators around the detector. Through this, the neutron spectrum was obtained by means of the software named NeuraLN, developed by the LN, that uses the neural networks technique. The 241AmLi achieved a result close to the literature, and 241AmF, which contains few published references, acquired a result with a slight variation from the literature. Therefore, besides fulfilling its objective, the work raises questions about a possible standard of the ²⁴¹AmLi and about the lack of work with the ²⁴¹AmF.

Keywords: nuclear physics, neutron metrology, neutron spectrometry, bonner sphere spectrometers

Procedia PDF Downloads 94
6142 Hosoya Polynomials of Mycielskian Graphs

Authors: Sanju Vaidya, Aihua Li

Abstract:

Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry Wiener introduced a topological index related to molecular branching. Now there are more than 100 topological indices for graphs. For example, Hosoya polynomials (also called Wiener polynomials) were introduced to derive formulas for certain vulnerability measures and topological indices for various graphs. In this paper, we will find a relation between the Hosoya polynomials of any graph and its Mycielskian graph. Additionally, using this we will compute vulnerability measures, closeness and betweenness centrality, and extended Wiener indices. It is fascinating to see how Hosoya polynomials are useful in the two diverse fields, cybersecurity and chemistry.

Keywords: hosoya polynomial, mycielskian graph, graph vulnerability measure, topological index

Procedia PDF Downloads 64
6141 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 252
6140 Estimation of Sediment Transport into a Reservoir Dam

Authors: Kiyoumars Roushangar, Saeid Sadaghian

Abstract:

Although accurate sediment load prediction is very important in planning, designing, operating and maintenance of water resources structures, the transport mechanism is complex, and the deterministic transport models are based on simplifying assumptions often lead to large prediction errors. In this research, firstly, two intelligent ANN methods, Radial Basis and General Regression Neural Networks, are adopted to model of total sediment load transport into Madani Dam reservoir (north of Iran) using the measured data and then applicability of the sediment transport methods developed by Engelund and Hansen, Ackers and White, Yang, and Toffaleti for predicting of sediment load discharge are evaluated. Based on comparison of the results, it is found that the GRNN model gives better estimates than the sediment rating curve and mentioned classic methods.

Keywords: sediment transport, dam reservoir, RBF, GRNN, prediction

Procedia PDF Downloads 492
6139 A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts

Authors: Midhun Xavier

Abstract:

This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product.

Keywords: blockchain, Ethereum, node-red, IEC 61499, multi-agent system, MQTT

Procedia PDF Downloads 84
6138 Features Dimensionality Reduction and Multi-Dimensional Voice-Processing Program to Parkinson Disease Discrimination

Authors: Djamila Meghraoui, Bachir Boudraa, Thouraya Meksen, M.Boudraa

Abstract:

Parkinson's disease is a pathology that involves characteristic perturbations in patients’ voices. This paper describes a proposed method that aims to diagnose persons with Parkinson (PWP) by analyzing on line their voices signals. First, Thresholds signals alterations are determined by the Multi-Dimensional Voice Program (MDVP). Principal Analysis (PCA) is exploited to select the main voice principal componentsthat are significantly affected in a patient. The decision phase is realized by a Mul-tinomial Bayes (MNB) Classifier that categorizes an analyzed voice in one of the two resulting classes: healthy or PWP. The prediction accuracy achieved reaching 98.8% is very promising.

Keywords: Parkinson’s disease recognition, PCA, MDVP, multinomial Naive Bayes

Procedia PDF Downloads 273
6137 Recognition of a Thinly Bedded Distal Turbidite: A Case Study from a Proterozoic Delta System, Chaossa Formation, Simla Group, Western Lesser Himalaya, India

Authors: Priyanka Mazumdar, Ananya Mukhopadhyay

Abstract:

A lot of progress has been achieved in the research of turbidites during the last decades. However, their relationship to delta systems still deserves further attention. This paper addresses example of fine grained turbidite from a pro-deltaic deposit of a Proterozoic mixed energy delta system exposed along Chaossa-Baliana river section of the Chaossa Formation of the Simla Basin. Lithostratigraphic analysis of the Chaossa Formation reveals three major facies associations (prodelta deposit-FA1, delta slope deposit-FA2 and delta front deposit-FA3) based on lithofacies types, petrography and sedimentary structures. Detailed process-based facies and paleoenvironmental analysis of the study area have led to identification of more than150 m thick coarsening-upwards deltaic successions composed of fine grained turbidites overlain by delta slope deposits. Erosional features are locally common at the base of turbidite beds and still more widespread at the top. The complete sequence has eight sub-divisions that are here termed T1 to T8. The basal subdivision (T1) comprises a massive graded unit with a sharp, scoured base, internal parallel-lamination and cross-lamination. The overlying sequence shows textural and compositional grading through alternating silt and mud laminae (T2). T2 is overlying by T3 which is characterized by climbing ripple and cross lamination. Parallel laminae are the predominant facies attributes of T4 which caps the T3 unit. T5 has a loaded scour base and is mainly characterized laminated silt. The topmost three divisions, graded mud (T6), ungraded mud (T7) and laminated mud (T8). The proposed sequence is analogous to the Bouma (1962) structural scheme for sandy turbidites. Repetition of partial sequences represents deposition from different stages of evolution of a large, muddy, turbidity flow. Detailed facies analysis of the study area reveals that the sediments of the turbidites developed during normal regression at the stage of stable or marginally rising sea level. Thin-bedded turbidites were deposited predominantly by turbidity currents in the relatively shallower part of the Simla basin. The fine-grained turbidites are developed by resedimentation of delta-front sands and slumping of upper pro-delta muds.

Keywords: turbidites, prodelta, proterozoic, Simla Basin, Bouma sequence

Procedia PDF Downloads 265
6136 Predicting the Product Life Cycle of Songs on Radio - How Record Labels Can Manage Product Portfolio and Prioritise Artists by Using Machine Learning Techniques

Authors: Claus N. Holm, Oliver F. Grooss, Robert A. Alphinas

Abstract:

This research strives to predict the remaining product life cycle of a song on radio after it has been played for one or two months. The best results were achieved using a k-d tree to calculate the most similar songs to the test songs and use a Random Forest model to forecast radio plays. An 82.78% and 83.44% accuracy is achieved for the two time periods, respectively. This explorative research leads to over 4500 test metrics to find the best combination of models and pre-processing techniques. Other algorithms tested are KNN, MLP and CNN. The features only consist of daily radio plays and use no musical features.

Keywords: hit song science, product life cycle, machine learning, radio

Procedia PDF Downloads 150
6135 Dynamic Performance Analysis of Distribution/ Sub-Transmission Networks with High Penetration of PV Generation

Authors: Cristian F.T. Montenegro, Luís F. N. Lourenço, Maurício B. C. Salles, Renato M. Monaro

Abstract:

More PV systems have been connected to the electrical network each year. As the number of PV systems increases, some issues affecting grid operations have been identified. This paper studied the impacts related to changes in solar irradiance on a distribution/sub-transmission network, considering variations due to moving clouds and daily cycles. Using MATLAB/Simulink software, a solar farm of 30 MWp was built and then implemented to a test network. From simulations, it has been determined that irradiance changes can have a significant impact on the grid by causing voltage fluctuations outside the allowable thresholds. This work discussed some local control strategies and grid reinforcements to mitigate the negative effects of the irradiance changes on the grid.

Keywords: reactive power control, solar irradiance, utility-scale PV systems, voltage fluctuations

Procedia PDF Downloads 455
6134 A Feature Clustering-Based Sequential Selection Approach for Color Texture Classification

Authors: Mohamed Alimoussa, Alice Porebski, Nicolas Vandenbroucke, Rachid Oulad Haj Thami, Sana El Fkihi

Abstract:

Color and texture are highly discriminant visual cues that provide an essential information in many types of images. Color texture representation and classification is therefore one of the most challenging problems in computer vision and image processing applications. Color textures can be represented in different color spaces by using multiple image descriptors which generate a high dimensional set of texture features. In order to reduce the dimensionality of the feature set, feature selection techniques can be used. The goal of feature selection is to find a relevant subset from an original feature space that can improve the accuracy and efficiency of a classification algorithm. Traditionally, feature selection is focused on removing irrelevant features, neglecting the possible redundancy between relevant ones. This is why some feature selection approaches prefer to use feature clustering analysis to aid and guide the search. These techniques can be divided into two categories. i) Feature clustering-based ranking algorithm uses feature clustering as an analysis that comes before feature ranking. Indeed, after dividing the feature set into groups, these approaches perform a feature ranking in order to select the most discriminant feature of each group. ii) Feature clustering-based subset search algorithms can use feature clustering following one of three strategies; as an initial step that comes before the search, binded and combined with the search or as the search alternative and replacement. In this paper, we propose a new feature clustering-based sequential selection approach for the purpose of color texture representation and classification. Our approach is a three step algorithm. First, irrelevant features are removed from the feature set thanks to a class-correlation measure. Then, introducing a new automatic feature clustering algorithm, the feature set is divided into several feature clusters. Finally, a sequential search algorithm, based on a filter model and a separability measure, builds a relevant and non redundant feature subset: at each step, a feature is selected and features of the same cluster are removed and thus not considered thereafter. This allows to significantly speed up the selection process since large number of redundant features are eliminated at each step. The proposed algorithm uses the clustering algorithm binded and combined with the search. Experiments using a combination of two well known texture descriptors, namely Haralick features extracted from Reduced Size Chromatic Co-occurence Matrices (RSCCMs) and features extracted from Local Binary patterns (LBP) image histograms, on five color texture data sets, Outex, NewBarktex, Parquet, Stex and USPtex demonstrate the efficiency of our method compared to seven of the state of the art methods in terms of accuracy and computation time.

Keywords: feature selection, color texture classification, feature clustering, color LBP, chromatic cooccurrence matrix

Procedia PDF Downloads 127
6133 Calculating Stress Intensity Factor of Cracked Axis by Using a Meshless Method

Authors: S. Shahrooi, A. Talavari

Abstract:

Numeral study on the crack and discontinuity using element-free methods has been widely spread in recent years. In this study, for stress intensity factor calculation of the cracked axis under torsional loading has been used from a new element-free method as MLPG method. Region range is discretized by some dispersed nodal points. From method of moving least square (MLS) utilized to create the functions using these nodal points. Then, results of meshless method and finite element method (FEM) were compared. The results is shown which the element-free method was of good accuracy.

Keywords: stress intensity factor, crack, torsional loading, meshless method

Procedia PDF Downloads 559
6132 The Effect of Corporate Governance to Islamic Banking Performance Using Maqasid Index Approach in Indonesia

Authors: Audia Syafa'atur Rahman, Rozali Haron

Abstract:

The practices of Islamic banking are more attuned to the goals of profit maximization rather than obtaining ethical profit. Ethical profit is obtained from interest-free earnings and to give an impact which benefits to the growth of society and economy. Good corporate governance practices are needed to assure the sustainability of Islamic banks in order to achieve Maqasid Shariah with the main purpose of boosting the well-being of people. The Maqasid Shariah performance measurement is used to measure the duties and responsibilities expected to be performed by Islamic banks. It covers not only unification dimension like financial measurement, but also many dimensions covered to reflect the main purpose of Islamic banks. The implementation of good corporate governance is essential because it covers the interests of the stakeholders and facilitates effective monitoring to encourage Islamic banks to utilize resources more efficiently in order to achieve the Maqasid Shariah. This study aims to provide the empirical evidence on the Maqasid performance of Islamic banks in relation to the Maqasid performance evaluation model, to examine the influence of SSB characteristics and board structures to Islamic Banks performance as measured by Maqasid performance evaluation model. By employing the simple additive weighting method, Maqasid index for all the Islamic Banks in Indonesia within 2012 to 2016 ranged from above 11% to 28%. The Maqasid Syariah performance index where results reached above 20% are obtained by Islamic Banks such as Bank Muamalat Indonesia, Bank Panin Syariah, and Bank BRI Syariah. The consistent achievement above 23% is achieved by BMI. Other Islamic Banks such as Bank Victoria Syariah, Bank Jabar Banten Syariah, Bank BNI Syariah, Bank Mega Syariah, BCA Syariah, and Maybank Syariah Indonesia shows a fluctuating value of the Maqasid performance index every year. The impact of SSB characteristics and board structures are tested using random-effects generalized least square. The findings indicate that SSB characteristics (Shariah Supervisory Board size, Shariah Supervisory Board cross membership, Shariah Supervisory Board Education, and Shariah Supervisory Board reputation) and board structures (Board size and Board independence) have an essential role in improving the performance of Islamic Banks. The findings denote Shariah Supervisory Board with smaller size, higher portion of Shariah Supervisory Board cross membership; lesser Shariah Supervisory Board holds doctorate degree, lesser reputable scholar, more members on board of directors, and less independence non-executive directors will enhance the performance of Islamic Banks.

Keywords: Maqasid Shariah, corporate governance, Islamic banks, Shariah supervisory board

Procedia PDF Downloads 234
6131 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 50
6130 Designing a Cyclic Redundancy Checker-8 for 32 Bit Input Using VHDL

Authors: Ankit Shai

Abstract:

CRC or Cyclic Redundancy Check is one of the most common, and one of the most powerful error-detecting codes implemented on modern computers. Most of the modern communication protocols use some error detection algorithms in digital networks and storage devices to detect accidental changes to raw data between transmission and reception. Cyclic Redundancy Check, or CRC, is the most popular one among these error detection codes. CRC properties are defined by the generator polynomial length and coefficients. The aim of this project is to implement an efficient FPGA based CRC-8 that accepts a 32 bit input, taking into consideration optimal chip area and high performance, using VHDL. The proposed architecture is implemented on Xilinx ISE Simulator. It is designed while keeping in mind the hardware design, complexity and cost factor.

Keywords: cyclic redundancy checker, CRC-8, 32-bit input, FPGA, VHDL, ModelSim, Xilinx

Procedia PDF Downloads 290
6129 Basket Option Pricing under Jump Diffusion Models

Authors: Ali Safdari-Vaighani

Abstract:

Pricing financial contracts on several underlying assets received more and more interest as a demand for complex derivatives. The option pricing under asset price involving jump diffusion processes leads to the partial integral differential equation (PIDEs), which is an extension of the Black-Scholes PDE with a new integral term. The aim of this paper is to show how basket option prices in the jump diffusion models, mainly on the Merton model, can be computed using RBF based approximation methods. For a test problem, the RBF-PU method is applied for numerical solution of partial integral differential equation arising from the two-asset European vanilla put options. The numerical result shows the accuracy and efficiency of the presented method.

Keywords: basket option, jump diffusion, ‎radial basis function, RBF-PUM

Procedia PDF Downloads 347
6128 Levy Model for Commodity Pricing

Authors: V. Benedico, C. Anacleto, A. Bearzi, L. Brice, V. Delahaye

Abstract:

The aim in present paper is to construct an affordable and reliable commodity prices based on a recalculation of its cost through time which allows visualize the potential risks and thus, take more appropriate decisions regarding forecasts. Here attention has been focused on Levy model, more reliable and realistic than classical random Gaussian one as it takes into consideration observed abrupt jumps in case of sudden price variation. In application to Energy Trading sector where it has never been used before, equations corresponding to Levy model have been written for electricity pricing in European market. Parameters have been set in order to predict and simulate the price and its evolution through time to remarkable accuracy. As predicted by Levy model, the results show significant spikes which reach unconventional levels contrary to currently used Brownian model.

Keywords: commodity pricing, Lévy Model, price spikes, electricity market

Procedia PDF Downloads 424
6127 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 78
6126 PsyVBot: Chatbot for Accurate Depression Diagnosis using Long Short-Term Memory and NLP

Authors: Thaveesha Dheerasekera, Dileeka Sandamali Alwis

Abstract:

The escalating prevalence of mental health issues, such as depression and suicidal ideation, is a matter of significant global concern. It is plausible that a variety of factors, such as life events, social isolation, and preexisting physiological or psychological health conditions, could instigate or exacerbate these conditions. Traditional approaches to diagnosing depression entail a considerable amount of time and necessitate the involvement of adept practitioners. This underscores the necessity for automated systems capable of promptly detecting and diagnosing symptoms of depression. The PsyVBot system employs sophisticated natural language processing and machine learning methodologies, including the use of the NLTK toolkit for dataset preprocessing and the utilization of a Long Short-Term Memory (LSTM) model. The PsyVBot exhibits a remarkable ability to diagnose depression with a 94% accuracy rate through the analysis of user input. Consequently, this resource proves to be efficacious for individuals, particularly those enrolled in academic institutions, who may encounter challenges pertaining to their psychological well-being. The PsyVBot employs a Long Short-Term Memory (LSTM) model that comprises a total of three layers, namely an embedding layer, an LSTM layer, and a dense layer. The stratification of these layers facilitates a precise examination of linguistic patterns that are associated with the condition of depression. The PsyVBot has the capability to accurately assess an individual's level of depression through the identification of linguistic and contextual cues. The task is achieved via a rigorous training regimen, which is executed by utilizing a dataset comprising information sourced from the subreddit r/SuicideWatch. The diverse data present in the dataset ensures precise and delicate identification of symptoms linked with depression, thereby guaranteeing accuracy. PsyVBot not only possesses diagnostic capabilities but also enhances the user experience through the utilization of audio outputs. This feature enables users to engage in more captivating and interactive interactions. The PsyVBot platform offers individuals the opportunity to conveniently diagnose mental health challenges through a confidential and user-friendly interface. Regarding the advancement of PsyVBot, maintaining user confidentiality and upholding ethical principles are of paramount significance. It is imperative to note that diligent efforts are undertaken to adhere to ethical standards, thereby safeguarding the confidentiality of user information and ensuring its security. Moreover, the chatbot fosters a conducive atmosphere that is supportive and compassionate, thereby promoting psychological welfare. In brief, PsyVBot is an automated conversational agent that utilizes an LSTM model to assess the level of depression in accordance with the input provided by the user. The demonstrated accuracy rate of 94% serves as a promising indication of the potential efficacy of employing natural language processing and machine learning techniques in tackling challenges associated with mental health. The reliability of PsyVBot is further improved by the fact that it makes use of the Reddit dataset and incorporates Natural Language Toolkit (NLTK) for preprocessing. PsyVBot represents a pioneering and user-centric solution that furnishes an easily accessible and confidential medium for seeking assistance. The present platform is offered as a modality to tackle the pervasive issue of depression and the contemplation of suicide.

Keywords: chatbot, depression diagnosis, LSTM model, natural language process

Procedia PDF Downloads 61
6125 Characterization of Herberine Hydrochloride Nanoparticles

Authors: Bao-Fang Wen, Meng-Na Dai, Gao-Pei Zhu, Chen-Xi Zhang, Jing Sun, Xun-Bao Yin, Yu-Han Zhao, Hong-Wei Sun, Wei-Fen Zhang

Abstract:

A drug-loaded nanoparticles containing berberine hydrochloride (BH/FA-CTS-NPs) was prepared. The physicochemical characterizations of BH/FA-CTS-NPs and the inhibitory effect on the HeLa cells were investigated. Folic acid-conjugated chitosan (FA-CTS) was prepared by amino reaction of folic acid active ester and chitosan molecules; BH/FA-CTS-NPs were prepared using ionic cross-linking technique with BH as a model drug. The morphology and particle size were determined by Transmission Electron Microscope (TEM). The average diameters and polydispersity index (PDI) were evaluated by Dynamic Light Scattering (DLS). The interaction between various components and the nanocomplex were characterized by Fourier Transform Infrared Spectroscopy (FT-IR). The entrapment efficiency (EE), drug-loading (DL) and in vitro release were studied by UV spectrophotometer. The effect of cell anti-migratory and anti-invasive actions of BH/FA-CTS-NPs were investigated using MTT assays, wound healing assays, Annexin-V-FITC single staining assays, and flow cytometry, respectively. HeLa nude mice subcutaneously transplanted tumor model was established and treated with different drugs to observe the effect of BH/FA-CTS-NPs in vivo on HeLa bearing tumor. The BH/FA-CTS-NPs prepared in this experiment have a regular shape, uniform particle size, and no aggregation phenomenon. The results of DLS showed that mean particle size, PDI and Zeta potential of BH/FA-CTS NPs were (249.2 ± 3.6) nm, 0.129 ± 0.09, 33.6 ± 2.09, respectively, and the average diameter and PDI were stable in 90 days. The results of FT-IR demonstrated that the characteristic peaks of FA-CTS and BH/FA-CTS-NPs confirmed that FA-CTS cross-linked successfully and BH was encapsulated in NPs. The EE and DL amount were (79.3 ± 3.12) % and (7.24 ± 1.41) %, respectively. The results of in vitro release study indicated that the cumulative release of BH/FA-CTS NPs was (89.48±2.81) % in phosphate-buffered saline (PBS, pH 7.4) within 48h; these results by MTT assays and wund healing assays indicated that BH/FA-CTS NPs not only inhibited the proliferation of HeLa cells in a concentration and time-dependent manner but can induce apoptosis as well. The subcutaneous xenograft tumor formation rate of human cervical cancer cell line HeLa in nude mice was 98% after inoculation for 2 weeks. Compared with BH group and BH/CTS-NPs group, the xenograft tumor growth of BH/FA-CTS-NPs group was obviously slower; the result indicated that BH/FA-CTS-NPs could significantly inhibit the growth of HeLa xenograft tumor. BH/FA-CTS NPs with the sustained release effect could be prepared successfully by the ionic crosslinking method. Considering these properties, block proliferation and impairing the migration of the HeLa cell line, BH/FA-CTS NPs could be an important compound for consideration in the treatment of cervical cancer.

Keywords: folic-acid, chitosan, berberine hydrochloride, nanoparticles, cervical cancer

Procedia PDF Downloads 117