Search results for: network group behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18014

Search results for: network group behavior

17684 Securing Mobile Ad-Hoc Network Utilizing OPNET Simulator

Authors: Tariq A. El Shheibia, Halima Mohamed Belhamad

Abstract:

This paper is considered securing data based on multi-path protocol (SDMP) in mobile ad hoc network utilizing OPNET simulator modular 14.5, including the AODV routing protocol at the network as based multi-path algorithm for message security in MANETs. The main idea of this work is to present a way that is able to detect the attacker inside the MANETs. The detection for this attacker will be performed by adding some effective parameters to the network.

Keywords: MANET, AODV, malicious node, OPNET

Procedia PDF Downloads 289
17683 Artificial Intelligence Based Meme Generation Technology for Engaging Audience in Social Media

Authors: Andrew Kurochkin, Kostiantyn Bokhan

Abstract:

In this study, a new meme dataset of ~650K meme instances was created, a technology of meme generation based on the state of the art deep learning technique - GPT-2 model was researched, a comparative analysis of machine-generated memes and human-created was conducted. We justified that Amazon Mechanical Turk workers can be used for the approximate estimating of users' behavior in a social network, more precisely to measure engagement. It was shown that generated memes cause the same engagement as human memes that produced low engagement in the social network (historically). Thus, generated memes are less engaging than random memes created by humans.

Keywords: content generation, computational social science, memes generation, Reddit, social networks, social media interaction

Procedia PDF Downloads 129
17682 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks

Authors: Rei-Heng Cheng, Wen-Pinn Fang

Abstract:

A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.

Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks

Procedia PDF Downloads 386
17681 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 91
17680 Emotional Processing Difficulties in Recovered Anorexia Nervosa Patients: State or Trait

Authors: Telma Fontao de Castro, Kylee Miller, Maria Xavier Araújo, Isabel Brandao, Sandra Torres

Abstract:

Objective: There is a dearth of research investigating the long-term emotional functioning of individuals recovered from anorexia nervosa (AN). This 15-year longitudinal study aimed to examine whether difficulties in cognitive processing of emotions persisted after long-term AN recovery and its link to anxiety and depression. Method: Twenty-four females, who were tested longitudinally during their acute and recovered AN phases, and 24 healthy control (HC) women, were screened for anxiety, depression, alexithymia, and emotion regulation difficulties (ER; only assessed in recovery phase). Results: Anxiety, depression, and alexithymia levels decreased significantly with AN recovery. However, scores on anxiety and difficulty in identifying feelings (alexithymia factor) remained high when compared to the HC group. Scores on emotion regulation difficulties were also lower in HC group. The abovementioned differences between AN recovered group and HC group in difficulties in identifying and accepting feelings and lack of emotional clarity were no longer present when the effect of anxiety and depression was controlled. Conclusions: Findings suggest that emotional dysfunction tends to decrease in AN recovered phase. However, using an HC group as a reference, we conclude that several emotional difficulties are still increased after long-term AN recovery, in particular, limited access to emotion regulation strategies, and difficulty controlling impulses and engaging in goal-directed behavior, thus suggesting to be a trait vulnerability. In turn, competencies related to emotional clarity and acceptance of emotional responses seem to be state-dependent phenomena linked to anxiety and depression. In sum, managing emotions remains a challenge for individuals recovered from AN. Under this circumstance, maladaptive eating behavior can serve as an affect regulatory function, increasing the risk of relapse. Emotional education and stabilization of depressive and anxious symptomatology after recovery emerge as an important avenue to protect from long-term AN relapse.

Keywords: alexithymia, anorexia nervosa, emotion recognition, emotion regulation

Procedia PDF Downloads 119
17679 Assessing Artificial Neural Network Models on Forecasting the Return of Stock Market Index

Authors: Hamid Rostami Jaz, Kamran Ameri Siahooei

Abstract:

Up to now different methods have been used to forecast the index returns and the index rate. Artificial intelligence and artificial neural networks have been one of the methods of index returns forecasting. This study attempts to carry out a comparative study on the performance of different Radial Base Neural Network and Feed-Forward Perceptron Neural Network to forecast investment returns on the index. To achieve this goal, the return on investment in Tehran Stock Exchange index is evaluated and the performance of Radial Base Neural Network and Feed-Forward Perceptron Neural Network are compared. Neural networks performance test is applied based on the least square error in two approaches of in-sample and out-of-sample. The research results show the superiority of the radial base neural network in the in-sample approach and the superiority of perceptron neural network in the out-of-sample approach.

Keywords: exchange index, forecasting, perceptron neural network, Tehran stock exchange

Procedia PDF Downloads 458
17678 Mapping Network Connection of Personality Traits and Psychiatric Symptoms in Chinese Adolescents

Authors: Yichao Lv, Minmin Cai, Yanqiang Tao, Xinyuan Zou, Chao Zhang, Xiangping Liu

Abstract:

Objective: This study aims to explore the network structure of personality traits and mental health and identify key factors for effective intervention strategies. Methods: All participants (N = 6,067; 3,368 females) underwent the Eysenck Personality Scale (EPQ) to measure personality traits and the Symptom Self-rating Scale (SCL-90) to measure psychiatric symptoms. Using the mean value of the SCL-90 total score plus one standard deviation as the cutoff, 854 participants (14.08%; 528 females) were categorized as individuals exhibiting potential psychological symptoms and were included in the follow-up network analysis. The structure and bridge centrality of the network for dimensions of EPQ and SCL-90 were estimated. Results: Between the EPQ and SCL-90, psychoticism (P), extraversion (E), and neuroticism (N) showed the strongest positive correlations with somatization (Som), interpersonal sensitivity (IS), and hostility (Hos), respectively. Extraversion (E), somatization (Som), and anxiety (Anx) were identified as the most important bridge factors influencing the overall network. Conclusions: This study explored the network structure and complex connections between mental health and personality traits from a network perspective, providing potential targets for intervening in adolescent personality traits and mental health.

Keywords: EPQ, SCL-90, Chinese adolescents, network analysis

Procedia PDF Downloads 41
17677 The Effectiveness of Cognitive Behavioural Intervention in Alleviating Social Avoidance for Blind Students

Authors: Mohamed M. Elsherbiny

Abstract:

Social Avoidance is one of the most important problems that face a good number of disabled students. It results from the negative attitudes of non-disabled students, teachers and others. Some of the past research has shown that non-disabled individuals hold negative attitudes toward persons with disabilities. The present study aims to alleviate Social Avoidance by applying the Cognitive Behavioral Intervention. 24 Blind students aged 19–24 (university students) were randomly chosen we compared an experimental group (consisted of 12 students) who went through the intervention program, with a control group (12 students also) who did not go through such intervention. We used the Social Avoidance and Distress Scale (SADS) to assess social anxiety and distress behavior. The author used many techniques of cognitive behavioral intervention such as modeling, cognitive restructuring, extension, contingency contracts, self-monitoring, assertiveness training, role play, encouragement and others. Statistically, T-test was employed to test the research hypothesis. Result showed that there is a significance difference between the experimental group and the control group after the intervention and also at the follow up stages of the Social Avoidance and Distress Scale. Also for the experimental group, there is a significance difference before the intervention and the follow up stages for the scale. Results showed that, there is a decrease in social avoidance. Accordingly, cognitive behavioral intervention program was successful in decreasing social avoidance for blind students.

Keywords: social avoidance, cognitive behavioral intervention, blind disability, disability

Procedia PDF Downloads 405
17676 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 452
17675 Intelligent Grading System of Apple Using Neural Network Arbitration

Authors: Ebenezer Obaloluwa Olaniyi

Abstract:

In this paper, an intelligent system has been designed to grade apple based on either its defective or healthy for production in food processing. This paper is segmented into two different phase. In the first phase, the image processing techniques were employed to extract the necessary features required in the apple. These techniques include grayscale conversion, segmentation where a threshold value is chosen to separate the foreground of the images from the background. Then edge detection was also employed to bring out the features in the images. These extracted features were then fed into the neural network in the second phase of the paper. The second phase is a classification phase where neural network employed to classify the defective apple from the healthy apple. In this phase, the network was trained with back propagation and tested with feed forward network. The recognition rate obtained from our system shows that our system is more accurate and faster as compared with previous work.

Keywords: image processing, neural network, apple, intelligent system

Procedia PDF Downloads 393
17674 Pressure Sensitive v/s Pressure Resistance Institutional Investors towards Socially Responsible Investment Behavior: Evidence from Malaysia

Authors: Mohammad Talha, Abdullah Sallehhuddin Abdullah Salim, Abdul Aziz Abdul Jalil, Norzarina Md Yatim

Abstract:

The significant contribution of institutional investors across the globe in socially responsible investment (SRI) is well-documented in the literature. Nevertheless, how the SRI behavior of pressure-resistant, pressure-sensitive and pressure-indeterminate institutional investors remain unexplored extensively. This study examines the moderating effect of institutional investors towards socially responsible investment behavior in the context of emerging economies. This study involved 229 institutional investors in Malaysia. A total of 1,145 questionnaires were distributed. Out of these, 308 (130 pressure sensitive institutional investors and 178 pressure resistant institutional investors), representing a usable rate of 26.9 per cent, were found fit for data analysis. Utilizing multi-group analysis via AMOS, this study found evidence for the presence of moderating effect by a type of institutional investor topology in socially responsible investment behavior. At intentional level, it established that type of institutional investor was a significant moderator in the relationship between subjective norms, and caring ethical climate with intention among pressure-resistant institutional investors, as well as between perceived behavioral controls with intention among pressure-sensitive institutional investors. At the behavioral level, the results evidenced that there was only a significant moderating effect between intention and socially responsible investment behavior among pressure-resistant institutional investors. The outcomes are expected to benefit policy makers, regulators, and market participants in order to leap forward SRI growth in developing economies. Nevertheless, the outcomes are limited to a few factors, and it is believed that future studies shall address those limitations.

Keywords: socially responsible investment, behavior, pressure sensitive investors, pressure insensitive investors, Institutional Investment Malaysia

Procedia PDF Downloads 359
17673 Investigating Effective Factors on the Customer Switching Behaviour in the Saipa Emdad Khodro Company of Iran

Authors: Rohollah Asadian Kohestani, Mustafa Hashemzadeh

Abstract:

The present paper is the outcome of a field research that was conducted with the study objective of influencing factor's effect on the behavior of customers switching in the Saipa Emdad Khodro Company. To achieve this goal, six factors of service quality, service cost, waiting time to receive services, reputation of organization, costs of switching and the way to respond the needs of customers as the independent variables of research and their effect on the customer switching was studied as the variable related to the research. The statistical society of this research included all customers of the Saipa Emdad Khodro company that possess the vehicles of automobile manufacturing group of Saipa throughout the country and the statistical sample included 150 persons of such customers. The results of this research indicated that all under study factors excluding the reputation factor effect on the behavior of customer switching.

Keywords: customer services, switching cost, service price, customer switching behavior

Procedia PDF Downloads 293
17672 Is Fashion Consumption Ageless? A Study of Differences in Fashion Consumption Behavior of Generation X, Y, and Z Females

Authors: Vaishali Joshi, Pallav Joshi

Abstract:

The main objective of this study is to examine the fashion consumption behavior of females with respect to their age group. Differences were studied in the pre-purchase, purchase and post-purchase behavior of females belonging to three age cohorts such as Generation X, Generation Y, and Generation Z. Quantitative approach was used to conduct this research. Data was collected through structured questionnaire. The questionnaire consisted of three sections. Section one included a question of the source of information of purchasing fashion apparels which measure the pre-purchase behavior. Section two measures purchase behavior which included two questions: i. motivations for purchasing fashion apparel and ii. important attributes considered for purchasing fashion apparel. The last section included a question regarding disposal of fashion apparel which measures the post-purchase behavior. Hundred females were selected as the respondents for this study through convenience sampling in the fashion streets. They were categorized into three age groups and then the results were analyzed. Four hypotheses were developed after reviewing the existing literature. Regression analysis was conducted for testing the hypothesis. Hypothesis one was accepted which stated that ‘social influence’ as a source of information for purchasing fashion apparels decreases with age. Hypothesis two was accepted which suggested that motivation of ‘Attention seeking’ for purchasing fashion apparel decreases with age. Hypothesis three and four also accepted which suggested that the importance of ‘Quality’ and ‘Price’ increases with age but hypothesis five was rejected which suggested that the importance of ‘Fit’ increases with age and last but not the least hypothesis six was accepted which suggested that the ‘duration’ of using fashion apparel increases with age. Limitation of the study deals with the sample of only female respondents. Implication can be made from this research in the field of Fashion apparel industry with respect to consumer segmentation and better marketing approaches can be implemented by the marketers form this study. Further research can be concluded by including male respondents also.

Keywords: fashion, consumption behavior, age cohorts, motivation

Procedia PDF Downloads 261
17671 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 426
17670 Reliability Improvement of Power System Networks Using Adaptive Genetic Algorithm

Authors: Alireza Alesaadi

Abstract:

Reliability analysis is a powerful method for determining the weak points of the electrical networks. In designing of electrical network, it is tried to design the most reliable network with minimal system shutting down, but it is usually associated with increasing the cost. In this paper, using adaptive genetic algorithm, a method was presented that provides the most reliable system with a certain economical cost. Finally, the proposed method is applied to a sample network and results will be analyzed.

Keywords: reliability, adaptive genetic algorithm, electrical network, communication engineering

Procedia PDF Downloads 496
17669 Mechanized Harvest Impact on Reproductive Performance of Ewes of Some Villages

Authors: Jaber Jafarzadeh

Abstract:

The two nodes of treatment for the study of indirect effects on the reproductive performance of sheep farming machines used. During the harvest period of 30 days (from 20th July to 20th September) and coincides with the period, sheep are also harvested the following day why the fields and in the second group were 30 ewes and were kept in farms that harvest was done by machinery during harvest about 15-20 days (from 20th July to early September), respectively. -Ya Term mating season is better than the ram up Astafadh Knym- of early September, no matter the point of beginning. Based on the data obtained, it was found that the rate of return to oestrus in the first group is lower than the second group and the rate of lambing in the first group was significantly (0.05> P) is greater than the second group (138% vs. 97%). Estrus synchronization in the first group and the second group was better than that.

Keywords: mechanized harvest, twin birth, mating season, reproductive performance of ewes

Procedia PDF Downloads 594
17668 GIS-Based Topographical Network for Minimum “Exertion” Routing

Authors: Katherine Carl Payne, Moshe Dror

Abstract:

The problem of minimum cost routing has been extensively explored in a variety of contexts. While there is a prevalence of routing applications based on least distance, time, and related attributes, exertion-based routing has remained relatively unexplored. In particular, the network structures traditionally used to construct minimum cost paths are not suited to representing exertion or finding paths of least exertion based on road gradient. In this paper, we introduce a topographical network or “topograph” that enables minimum cost routing based on the exertion metric on each arc in a given road network as it is related to changes in road gradient. We describe an algorithm for topograph construction and present the implementation of the topograph on a road network of the state of California with ~22 million nodes.

Keywords: topograph, RPE, routing, GIS

Procedia PDF Downloads 538
17667 Influence of Pile Radius on Inertial Response of Pile Group in Fundamental Frequency of Homogeneous Soil Medium

Authors: Faghihnia Torshizi Mostafa, Saitoh Masato

Abstract:

An efficient method is developed for the response of a group of vertical, cylindrical fixed-head, finite length piles embedded in a homogeneous elastic stratum, subjected to harmonic force atop the pile group cap. Pile to pile interaction is represented through simplified beam-on-dynamic-Winkler-foundation (BDWF) with realistic frequency-dependent springs and dashpots. Pile group effect is considered through interaction factors. New closed-form expressions for interaction factors and curvature ratios atop the pile are extended by considering different boundary conditions at the tip of the piles (fixed, hinged). In order to investigate the fundamental characteristics of inertial bending strains in pile groups, inertial bending strains at the head of each pile are expressed in terms of slenderness ratio. The results of parametric study give valuable insight in understanding the behavior of fixed head pile groups in fundamental natural frequency of soil stratum.

Keywords: Winkler-foundation, fundamental frequency of soil stratum, normalized inertial bending strain, harmonic excitation

Procedia PDF Downloads 408
17666 Understanding Consumer Behaviors by Using Neuromarketing Tools and Methods

Authors: Tabrej Khan

Abstract:

Neuromarketing can refer to the commercial application of neuroscience technologies and insights to drive business further. On the other side, consumer neuroscience can be seen as the academic use of neuroscience to better understand marketing effects on consumer behavior. Consumer Neuroscience and Neuromarketing is a multidisciplinary effort between economics, psychology, and neuroscience and information technology. Traditional methods are using survey, interviews, focus group people are overtly and consciously reporting on their experience and thoughts. The unconscious side of customer behavior is largely unmeasured in the traditional methods. Neuroscience has a potential to understand the unconscious part. Through this paper, we are going to present specific results of selected tools and methods that are used to understand consumer behaviors.

Keywords: neuromarketing, neuroscience, consumer behaviors, tools

Procedia PDF Downloads 390
17665 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization

Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati

Abstract:

In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.

Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network

Procedia PDF Downloads 377
17664 Tranexamic Acid in Orthopedic Surgery in Children

Authors: K. Amanzoui, A. Erragh, M. Elharit, A. Afif, K. Elfakhr, S. Kalouch, A. Chlilek

Abstract:

Orthopedic surgery is a provider of pre and postoperative bleeding; patients are exposed to several risks, and different measures are proposed to reduce bleeding during surgery, called the transfusion-sparing method, including tranexamic acid, which has shown its effectiveness in numerous studies. A prospective analytical study in 50 children was carried out in the orthopedic traumatology operating room of the EL HAROUCHI hospital of the CHU IBN ROCHD in Casablanca over a period of six months (April to October 2022). Two groups were randomized: one receiving tranexamic acid (Group A) and a non-receiving control group (Group B). The average age was 10.3 years, of which 58.8% were female. The first type of surgery was thoracolumbar scoliosis (52%). The average preoperative hemoglobin was 12.28 g/dl in group A, against 12.67 g/dl in the control group. There was no significant difference between the two groups (p=0.148). Mean intraoperative bleeding was 396.29 ml in group A versus 412 ml in the control group. No significant difference was observed for this parameter (p=0.632). The average hemoglobin level in the immediate postoperative period in our patients is 10.2 g/dl. In group A, it was 10.95 g/dl versus 10.93 g/dl in group B. At H24 postoperative, the mean hemoglobin value was 10.29 g/dl in group A against 9.5 g/dl in group B. For group A, the blood loss recorded during the first 24 hours was 209.43 ml, against 372 ml in group B, with a significant difference between the two groups (p=0.001). There is no statistically significant difference between the 2 groups in terms of the use of fillers, ephedrine or intraoperative transfusion. While for postoperative transfusion, we note the existence of a statistically significant difference between group A and group B. It is suggested that the use of tranexamic acid is an effective, simple, and low-cost way to limit postoperative blood loss and the need for transfusion.

Keywords: tranexamic acid, blood loss, orthopedic surgery, children

Procedia PDF Downloads 63
17663 Network Word Discovery Framework Based on Sentence Semantic Vector Similarity

Authors: Ganfeng Yu, Yuefeng Ma, Shanliang Yang

Abstract:

The word discovery is a key problem in text information retrieval technology. Methods in new word discovery tend to be closely related to words because they generally obtain new word results by analyzing words. With the popularity of social networks, individual netizens and online self-media have generated various network texts for the convenience of online life, including network words that are far from standard Chinese expression. How detect network words is one of the important goals in the field of text information retrieval today. In this paper, we integrate the word embedding model and clustering methods to propose a network word discovery framework based on sentence semantic similarity (S³-NWD) to detect network words effectively from the corpus. This framework constructs sentence semantic vectors through a distributed representation model, uses the similarity of sentence semantic vectors to determine the semantic relationship between sentences, and finally realizes network word discovery by the meaning of semantic replacement between sentences. The experiment verifies that the framework not only completes the rapid discovery of network words but also realizes the standard word meaning of the discovery of network words, which reflects the effectiveness of our work.

Keywords: text information retrieval, natural language processing, new word discovery, information extraction

Procedia PDF Downloads 89
17662 Vulnerability Assessment of Healthcare Interdependent Critical Infrastructure Coloured Petri Net Model

Authors: N. Nivedita, S. Durbha

Abstract:

Critical Infrastructure (CI) consists of services and technological networks such as healthcare, transport, water supply, electricity supply, information technology etc. These systems are necessary for the well-being and to maintain effective functioning of society. Critical Infrastructures can be represented as nodes in a network where they are connected through a set of links depicting the logical relationship among them; these nodes are interdependent on each other and interact with each at other at various levels, such that the state of each infrastructure influences or is correlated to the state of another. Disruption in the service of one infrastructure nodes of the network during a disaster would lead to cascading and escalating disruptions across other infrastructures nodes in the network. The operation of Healthcare Infrastructure is one such Critical Infrastructure that depends upon a complex interdependent network of other Critical Infrastructure, and during disasters it is very vital for the Healthcare Infrastructure to be protected, accessible and prepared for a mass casualty. To reduce the consequences of a disaster on the Critical Infrastructure and to ensure a resilient Critical Health Infrastructure network, knowledge, understanding, modeling, and analyzing the inter-dependencies between the infrastructures is required. The paper would present inter-dependencies related to Healthcare Critical Infrastructure based on Hierarchical Coloured Petri Nets modeling approach, given a flood scenario as the disaster which would disrupt the infrastructure nodes. The model properties are being analyzed for the various state changes which occur when there is a disruption or damage to any of the Critical Infrastructure. The failure probabilities for the failure risk of interconnected systems are calculated by deriving a reachability graph, which is later mapped to a Markov chain. By analytically solving and analyzing the Markov chain, the overall vulnerability of the Healthcare CI HCPN model is demonstrated. The entire model would be integrated with Geographic information-based decision support system to visualize the dynamic behavior of the interdependency of the Healthcare and related CI network in a geographically based environment.

Keywords: critical infrastructure interdependency, hierarchical coloured petrinet, healthcare critical infrastructure, Petri Nets, Markov chain

Procedia PDF Downloads 519
17661 The Influence of Psychological Capital Dimensions to Performance through OCB with Resistance to Change as Moderating Variable

Authors: Bambang Suko Priyono, Tristiana Rijanti

Abstract:

This study examines the influence of Psychological Capital Dimensions to Organizational Citizenship Behavior. There are four dimensions of Psychological Capital such as hope, optimism, resilience, and self-efficacy. It also tests the moderation effect of Resistance to Change in the relation between Psychological Capital’s dimensions and Organizational Citizenship Behavior, and the influence of Organizational Citizenship Behavior to employees’ performance. The data from the chosen 160 respondents from Public Service Institution is processed using multiple regression and interaction method. The study results in: 1) Hope positively significantly influences Organizational Citizenship Behavior, 2) Optimism positively significantly influences Organizational Citizenship Behavior, 3) Resilience positively significantly influences Organizational Citizenship Behavior, 4) Self-efficacy positively significantly influences Organizational Citizenship Behavior, 5) Resistance to change is moderating variable between hope and Organizational Citizenship Behavior, 6) Resistance to change is moderating variable between self-efficacy and Organizational Citizenship Behavior, 7) Organizational Citizenship Behavior positively significantly influences performance. On the contrary, resistance to change as a moderating variable is proven for hope and resilience.

Keywords: organizational citizenship behavior, performance, psychological capital’s dimensions, and resistance to change

Procedia PDF Downloads 678
17660 Domain-Specific Deep Neural Network Model for Classification of Abnormalities on Chest Radiographs

Authors: Nkechinyere Joy Olawuyi, Babajide Samuel Afolabi, Bola Ibitoye

Abstract:

This study collected a preprocessed dataset of chest radiographs and formulated a deep neural network model for detecting abnormalities. It also evaluated the performance of the formulated model and implemented a prototype of the formulated model. This was with the view to developing a deep neural network model to automatically classify abnormalities in chest radiographs. In order to achieve the overall purpose of this research, a large set of chest x-ray images were sourced for and collected from the CheXpert dataset, which is an online repository of annotated chest radiographs compiled by the Machine Learning Research Group, Stanford University. The chest radiographs were preprocessed into a format that can be fed into a deep neural network. The preprocessing techniques used were standardization and normalization. The classification problem was formulated as a multi-label binary classification model, which used convolutional neural network architecture to make a decision on whether an abnormality was present or not in the chest radiographs. The classification model was evaluated using specificity, sensitivity, and Area Under Curve (AUC) score as the parameter. A prototype of the classification model was implemented using Keras Open source deep learning framework in Python Programming Language. The AUC ROC curve of the model was able to classify Atelestasis, Support devices, Pleural effusion, Pneumonia, A normal CXR (no finding), Pneumothorax, and Consolidation. However, Lung opacity and Cardiomegaly had a probability of less than 0.5 and thus were classified as absent. Precision, recall, and F1 score values were 0.78; this implies that the number of False Positive and False Negative is the same, revealing some measure of label imbalance in the dataset. The study concluded that the developed model is sufficient to classify abnormalities present in chest radiographs into present or absent.

Keywords: transfer learning, convolutional neural network, radiograph, classification, multi-label

Procedia PDF Downloads 113
17659 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation

Authors: Sopheak Sorn, Kwok Yip Szeto

Abstract:

Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.

Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio

Procedia PDF Downloads 414
17658 Projective Lag Synchronization in Drive-Response Dynamical Networks via Hybrid Feedback Control

Authors: Mohd Salmi Md Noorani, Ghada Al-Mahbashi, Sakhinah Abu Bakar

Abstract:

This paper investigates projective lag synchronization (PLS) behavior in drive response dynamical networks (DRDNs) model with identical nodes. A hybrid feedback control method is designed to achieve the PLS with mismatch and without mismatch terms. The stability of the error dynamics is proven theoretically using the Lyapunov stability theory. Finally, analytical results show that the states of the dynamical network with non-delayed coupling can be asymptotically synchronized onto a desired scaling factor under the designed controller. Moreover, the numerical simulations results demonstrate the validity of the proposed method.

Keywords: drive-response dynamical network, projective lag synchronization, hybrid feedback control, stability theory

Procedia PDF Downloads 381
17657 A New Method to Reduce 5G Application Layer Payload Size

Authors: Gui Yang Wu, Bo Wang, Xin Wang

Abstract:

Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.

Keywords: 5G, JSON, payload size, service-based interface

Procedia PDF Downloads 173
17656 Thermal Network Model for a Large Scale AC Induction Motor

Authors: Sushil Kumar, M. Dakshina Murty

Abstract:

Thermal network modelling has proven to be important tool for thermal analysis of electrical machine. This article investigates numerical thermal network model and experimental performance of a large-scale AC motor. Experimental temperatures were measured using RTD in the stator which have been compared with the numerical data. Thermal network modelling fairly predicts the temperature of various components inside the large-scale AC motor. Results of stator winding temperature is compared with experimental results which are in close agreement with accuracy of 6-10%. This method of predicting hot spots within AC motors can be readily used by the motor designers for estimating the thermal hot spots of the machine.

Keywords: AC motor, thermal network, heat transfer, modelling

Procedia PDF Downloads 319
17655 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.

Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation

Procedia PDF Downloads 496