Search results for: interior point methods
15590 CTHTC: A Convolution-Backed Transformer Architecture for Temporal Knowledge Graph Embedding with Periodicity Recognition
Authors: Xinyuan Chen, Mohd Nizam Husen, Zhongmei Zhou, Gongde Guo, Wei Gao
Abstract:
Temporal Knowledge Graph Completion (TKGC) has attracted increasing attention for its enormous value; however, existing models lack capabilities to capture both local interactions and global dependencies simultaneously with evolutionary dynamics, while the latest achievements in convolutions and Transformers haven't been employed in this area. What’s more, periodic patterns in TKGs haven’t been fully explored either. To this end, a multi-stage hybrid architecture with convolution-backed Transformers is introduced in TKGC tasks for the first time combining the Hawkes process to model evolving event sequences in a continuous-time domain. In addition, the seasonal-trend decomposition is adopted to identify periodic patterns. Experiments on six public datasets are conducted to verify model effectiveness against state-of-the-art (SOTA) methods. An extensive ablation study is carried out accordingly to evaluate architecture variants as well as the contributions of independent components in addition, paving the way for further potential exploitation. Besides complexity analysis, input sensitivity and safety challenges are also thoroughly discussed for comprehensiveness with novel methods.Keywords: temporal knowledge graph completion, convolution, transformer, Hawkes process, periodicity
Procedia PDF Downloads 7815589 Theoretical Investigation of Gas Adsorption on Metal- Graphene Surface
Authors: Fatemeh Safdari, Amirnaser Shamkhali, Gholamabbas Parsafar
Abstract:
Carbon nanostructures are of great importance in academic research and industry, which can be mentioned to chemical sensors, catalytic processes, pharmaceutical and environmental issues. Common point in all of these applications is the occurrence of adsorption of molecules on these structures. Important carbon nanostructures in this case are mainly nanotubes and graphene. To modify pure graphene, recently, many experimental and theoretical studies have carried out to investigate of metal adsorption on graphene. In this work, the adsorption of CO molecules on pure graphene and on metal adatom on graphene surface has been simulated based on density functional theory (DFT). All calculations were performed by PBE functional and Troullier-Martins pseudopotentials. Density of states (DOS) for graphene-CO, graphen and CO around the Fermi energy has been moved and very small mixing occured which implies the physisorption of CO on the bare graphen surface. While, the results have showed that CO adsorption on transition-metal adatom on graphene surface is chemisorption.Keywords: adsorption, density functional theory, graphene, metal adatom
Procedia PDF Downloads 34815588 Government Credit Card in State Financial Management: Public Sector Innovation in Indonesia
Authors: Paramita Nur Kurniati, Stanislaus Riyanta
Abstract:
In the midst of the heightened usage of electronic money (e-money), Indonesian government expenditure is yet governed through cash-basis transactions. This conventional system brings about a number of potential risks and obstacles to operational conduct, including state financial liquidity issue. Consequently, Ministry of Finance is currently establishing the cashless payment methods for State Budget (APBN). Included in those advance methods is credit card facility as a government expenditure payment scheme. This policy is one of the innovations within the public sector learned from other countries’ best practices. Moreover, this particular method is already prominent within the private-sector realm. Qualitative descriptive analysis technique is implemented to evaluate the contemporary innovation of using government credit card in the path towards cashless society. This approach is expected to generate several benefits for the government, particularly in minimizing corruption within the state financial management. Effective coordination among policy makers and policy implementers is essential for the success of this policy’s exercise, without neglecting prudence and public transparency aspects. Government credit card usage shall be the potent resolution for enhancing the government’s overall public service performance.Keywords: cashless basis, cashless society, government credit card, public sector innovation
Procedia PDF Downloads 14915587 Fabrication of Powdery Composites Based Alumina and Its Consolidation by Hot Pressing Method in OXY-GON Furnace
Authors: T. Kuchukhidze, N. Jalagonia, T. Korkia, V. Gabunia, N. Jalabadze, R. Chedia
Abstract:
In this work, obtaining methods of ultrafine alumina powdery composites and high temperature pressing technology of matrix ceramic composites with different compositions have been discussed. Alumina was obtained by solution combustion synthesis and sol-gel methods. Metal carbides containing powdery composites were obtained by homogenization of finishing powders in nanomills, as well as by their single-step high temperature synthesis .Different types of matrix ceramics composites (α-Al2O3-ZrO2-Y2O3, α-Al2O3- Y2O3-MgO, α-Al2O3-SiC-Y2O3, α-Al2O3-WC-Co-Y2O3, α-Al2O3- B4C-Y2O3, α-Al2O3- B4C-TiB2 etc.) were obtained by using OXYGON furnace. Consolidation of powders were carried out at 1550- 1750°C (hold time - 1 h, pressure - 50 MPa). Corundum ceramics samples have been obtained and characterized by high hardness and fracture toughness, absence of open porosity, high corrosion resistance. Their density reaches 99.5-99.6% TD. During the work, the following devices have been used: High temperature vacuum furnace OXY-GON Industries Inc (USA), Electronic Scanning Microscopes Nikon Eclipse LV 150, Optical Microscope NMM- 800TRF, Planetary mill Pulverisette 7 premium line, Shimadzu Dynamic Ultra Micro Hardness Tester DUH-211S, Analysette 12 Dynasizer.Keywords: α-alumina, consolidation, phase transformation, powdery composites
Procedia PDF Downloads 34815586 The Geometry of Natural Formation: an Application of Geometrical Analysis for Complex Natural Order of Pomegranate
Authors: Anahita Aris
Abstract:
Geometry always plays a key role in natural structures, which can be a source of inspiration for architects and urban designers to create spaces. By understanding formative principles in nature, a variety of options can be provided that lead to freedom of formation. The main purpose of this paper is to analyze the geometrical order found in pomegranate to find formative principles explaining its complex structure. The point is how spherical arils of pomegranate pressed together inside the fruit and filled the space as they expand in the growing process, which made a self-organized system leads to the formation of each of the arils are unique in size, topology and shape. The main challenge of this paper would be using advanced architectural modeling techniques to discover these principles.Keywords: advanced modeling techniques, architectural modeling, computational design, the geometry of natural formation, geometrical analysis, the natural order of pomegranate, voronoi diagrams
Procedia PDF Downloads 22015585 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information
Abstract:
Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method
Procedia PDF Downloads 16715584 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 33915583 Modeling Pan Evaporation Using Intelligent Methods of ANN, LSSVM and Tree Model M5 (Case Study: Shahroud and Mayamey Stations)
Authors: Hamidreza Ghazvinian, Khosro Ghazvinian, Touba Khodaiean
Abstract:
The importance of evaporation estimation in water resources and agricultural studies is undeniable. Pan evaporation are used as an indicator to determine the evaporation of lakes and reservoirs around the world due to the ease of interpreting its data. In this research, intelligent models were investigated in estimating pan evaporation on a daily basis. Shahroud and Mayamey were considered as the studied cities. These two cities are located in Semnan province in Iran. The mentioned cities have dry weather conditions that are susceptible to high evaporation potential. Meteorological data of 11 years of synoptic stations of Shahrood and Mayamey cities were used. The intelligent models used in this study are Artificial Neural Network (ANN), Least Squares Support Vector Machine (LSSVM), and M5 tree models. Meteorological parameters of minimum and maximum air temperature (Tmax, Tmin), wind speed (WS), sunshine hours (SH), air pressure (PA), relative humidity (RH) as selected input data and evaporation data from pan (EP) to The output data was considered. 70% of data is used at the education level, and 30 % of the data is used at the test level. Models used with explanation coefficient evaluation (R2) Root of Mean Squares Error (RMSE) and Mean Absolute Error (MAE). The results for the two Shahroud and Mayamey stations showed that the above three models' operations are rather appropriate.Keywords: pan evaporation, intelligent methods, shahroud, mayamey
Procedia PDF Downloads 7415582 The Capacity Building in the Natural Disaster Management of Thailand
Authors: Eakarat Boonreang
Abstract:
The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1)link operation and information in the natural disaster management between nation, province, local and community levels, 2)enhance competency and resources of public sectors which relate to the natural disaster management, 3)establish proactive natural disaster management both planning and implementation, 4)decentralize the natural disaster management to local government organizations, 5)construct public awareness in the natural disaster management to community, 6)support Community Based Disaster Risk Management (CBDRM) seriously, and 7)emphasis on participation in the natural disaster management of all stakeholders.Keywords: capacity building, Community Based Disaster Risk Management (CBDRM), Natural Disaster Management, Thailand
Procedia PDF Downloads 55715581 Message Passing Neural Network (MPNN) Approach to Multiphase Diffusion in Reservoirs for Well Interconnection Assessments
Authors: Margarita Mayoral-Villa, J. Klapp, L. Di G. Sigalotti, J. E. V. Guzmán
Abstract:
Automated learning techniques are widely applied in the energy sector to address challenging problems from a practical point of view. To this end, we discuss the implementation of a Message Passing algorithm (MPNN)within a Graph Neural Network(GNN)to leverage the neighborhood of a set of nodes during the aggregation process. This approach enables the characterization of multiphase diffusion processes in the reservoir, such that the flow paths underlying the interconnections between multiple wells may be inferred from previously available data on flow rates and bottomhole pressures. The results thus obtained compare favorably with the predictions produced by the Reduced Order Capacitance-Resistance Models (CRM) and suggest the potential of MPNNs to enhance the robustness of the forecasts while improving the computational efficiency.Keywords: multiphase diffusion, message passing neural network, well interconnection, interwell connectivity, graph neural network, capacitance-resistance models
Procedia PDF Downloads 14915580 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'
Authors: Kurt S. Candilas
Abstract:
This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.Keywords: Nothing Gold Can Stay, mimesis, birth, death
Procedia PDF Downloads 47215579 ICanny: CNN Modulation Recognition Algorithm
Authors: Jingpeng Gao, Xinrui Mao, Zhibin Deng
Abstract:
Aiming at the low recognition rate on the composite signal modulation in low signal to noise ratio (SNR), this paper proposes a modulation recognition algorithm based on ICanny-CNN. Firstly, the radar signal is transformed into the time-frequency image by Choi-Williams Distribution (CWD). Secondly, we propose an image processing algorithm using the Guided Filter and the threshold selection method, which is combined with the hole filling and the mask operation. Finally, the shallow convolutional neural network (CNN) is combined with the idea of the depth-wise convolution (Dw Conv) and the point-wise convolution (Pw Conv). The proposed CNN is designed to complete image classification and realize modulation recognition of radar signal. The simulation results show that the proposed algorithm can reach 90.83% at 0dB and 71.52% at -8dB. Therefore, the proposed algorithm has a good classification and anti-noise performance in radar signal modulation recognition and other fields.Keywords: modulation recognition, image processing, composite signal, improved Canny algorithm
Procedia PDF Downloads 19115578 Challenges for Implementing Standards Compliant with Iso/Iec 17025, for Narcotics and DNA Laboratory’s
Authors: Blerim Olluri
Abstract:
A forensic science laboratory in Kosovo has never been organized at the level of most modern forensic science laboratories. This was made possible after the war of 1999 with the help and support from the United States. The United States Government/ICITAP provided 9.5 million dollars to support this project, this support have greatly benefitted law enforcement in Kosovo. With the establishment of Operative Procedures of Work and the law for Kosovo Agency of Forensic, the accreditation with ISO/IEC 17025 of the KAF labs it becomes mandatory. Since 2012 Laboratory’s DNA/Serology and Narcotics has begun reviewing and harmonizing their procedures according to ISO/IEC 17025. The focus of this work was to create quality manuals, procedures, work instructions, quality documentation and quality records. Furthermore, during this time is done the validation of work methods from scientific qualified personnel of KAF, without any help from other foreign agencies or accreditation body.In October 2014 we had the first evaluation based on ISO 17025 standards. According to the initial report of this assessment we have non conformity in test and Calibration methods method’s, and accommodation and environmental conditions. We identified several issues that are of extreme importance to KAF. One the most important issue is to create a professional group with experts of KAF, which will work in all the obligations, requested from ISO/IEC 17025. As conclusions that we earn in this path of accreditation, are that laboratory’s need to take corrective action, and all nonconformance’s must be addressed and corrective action taken before accreditation can be granted.Keywords: accreditation, assessment, narcotics, DNA
Procedia PDF Downloads 36415577 A Survey of Key Challenges of Adopting Agile in Global Software Development: A Case Study with Malaysia Perspective
Authors: Amna Batool
Abstract:
Agile methodology is the current most popular technique in software development projects. Agile methods in software development bring optimistic impact on software performances, quality and customer satisfaction. There are some organizations and small-medium enterprises adopting agile into their local software development projects as well as in distributed software development projects. Adopting agile methods in local software development projects is valuable. However, agile global software deployment needs an attention. There are different key challenges in agile global software development that need to resolve and enhance the global software development cycles. The proposed systematic literature review investigates all key challenges of agile in global software development. Moreover, a quantitative methodology (an actual survey) targeted to present a real case scenario of these particular key challenges faced by one of the software houses that is BestWeb Malaysia. The outcomes of systematic literature and the results of quantitative methodology are compared with each other to evaluate if the key challenges pointed out in systematic review still exist. The proposed research and its exploratory results can assist small medium enterprises to avoid these challenges by adopting the best practices in their global software development projects. Moreover, it is helpful for novice researchers to get valuable information altogether.Keywords: agile software development, ASD challenges, agile global software development, challenges in agile global software development
Procedia PDF Downloads 15715576 The Relationship between Eating Disorders (Anorexia and Bulimia Nervosa) with Some of the Demographic Factors among University Students
Authors: Shima Hashemi, Firoozeh Ghazanfari
Abstract:
Introduction: Eating disorder is a psychiatric disorder that is increasingly growing. This study aimed to determine the relationship between eating disorders (anorexia and bulimia nervosa) with some of the demographic factors among Lorestan University of Medical Sciences students. Materials and Methods: This study is a cross-sectional and descriptive study that was done at Lorestan University of Medical Sciences in 2019. Four hundred fifty students were studied by stratified and cluster sampling methods. For gathering data, we use the standard questionnaire Eating Attitudes Test EAT (26). Data were analyzed using statistical software SPSS. Results: According to the results, 144 (32%) males and 305 (67.8%) females were studied. 88.7% were single, and 8.9% were married. In the anorexia nervosa group, the results showed that there was a significant meaning between demographic information, and the number of family members, marital status, BMI, level of education, family income, father and mother education, as well as in the bulimia nervosa group, there was no significant meaning with any demographic information (p>0.05). Conclusion: Anorexia and bulimia nervosa are two known types of eating disorders, and some demographic factors can be effective in causing or aggravating these disorders.Keywords: eating disorder, anorexia nervosa, bulimia nervosa, students
Procedia PDF Downloads 9715575 Modified Newton's Iterative Method for Solving System of Nonlinear Equations in Two Variables
Authors: Sara Mahesar, Saleem M. Chandio, Hira Soomro
Abstract:
Nonlinear system of equations in two variables is a system which contains variables of degree greater or equal to two or that comprises of the transcendental functions. Mathematical modeling of numerous physical problems occurs as a system of nonlinear equations. In applied and pure mathematics it is the main dispute to solve a system of nonlinear equations. Numerical techniques mainly used for finding the solution to problems where analytical methods are failed, which leads to the inexact solutions. To find the exact roots or solutions in case of the system of non-linear equations there does not exist any analytical technique. Various methods have been proposed to solve such systems with an improved rate of convergence and accuracy. In this paper, a new scheme is developed for solving system of non-linear equation in two variables. The iterative scheme proposed here is modified form of the conventional Newton’s Method (CN) whose order of convergence is two whereas the order of convergence of the devised technique is three. Furthermore, the detailed error and convergence analysis of the proposed method is also examined. Additionally, various numerical test problems are compared with the results of its counterpart conventional Newton’s Method (CN) which confirms the theoretic consequences of the proposed method.Keywords: conventional Newton’s method, modified Newton’s method, order of convergence, system of nonlinear equations
Procedia PDF Downloads 25815574 Morphological Properties in Ndre Mjeda's Works
Authors: Shyhrete Morina
Abstract:
This paper deals with morphological features in Mjeda's works. To make such a distinction, these features will be compared to standard Albanian language, considering the linguistic structure in the morphological field, which represent an all-important segment of Albanian language. Therefore, the study will focus mainly on the description and construction of these paradigms, which will give a linguistic insight into the entire work of Mjeda as the author who wrote in the dialect of northwestern Geg. Therefore, we have tried to distinguish different parts of the author's language, as well as the distinctive features or even the similarities of these paradigms that arise in the literary work of Mjeda. By constructing the corpus of this phonetic and grammar segment from the whole of Mjeda's work, we have seen that in these fields has built a variety of grammar structures, which for the history of Albanian are of special importance, that in the full variant of the work, as far as we can investigate, we will point out in all the distinctive features. Therefore, our study aims to highlight the linguistic features, namely the author's deep knowledge toward the language, the authenticity of its use, and its mutual relationship with it.Keywords: distinctive morpholgy, nouns, adjetives, pronouns, Albanian standard language
Procedia PDF Downloads 16115573 Transforming the Automotive Production: A Bibliometric Analysis on Lean-Green Management
Authors: Ayse Melissa Ergun
Abstract:
The lean management concept is a widely used and implemented production improvement solution especially in the automotive sector. However, in the recent years the need for an efficient production system became no longer sufficient for companies. The increasing importance of green production and environmental sustainability pushed companies to modify their manufacturing systems in a more environmentally conscious way. As a result, the recent improvements in the automotive sector has surpassed the lean management directives and currently are in need of a more sustainable and green transformation. At this point a comprehensive approach like Lean-Green (LG) Management, which combines lean management and green applications, gains popularity in the sector. This study conducts a bibliometric analysis between the years 2015-2023 for LG management. This study aims to identify the current standing of the literature. The most researched branches of the concept have been determined by the conducted analysis. Furthermore, this study sheds a light on the future research directions for scholars.Keywords: LG management, sustainability, lean, green, automotive, bibliometric analysis
Procedia PDF Downloads 1415572 An Approach to Electricity Production Utilizing Waste Heat of a Triple-Pressure Cogeneration Combined Cycle Power Plant
Authors: Soheil Mohtaram, Wu Weidong, Yashar Aryanfar
Abstract:
This research investigates the points with heat recovery potential in a triple-pressure cogeneration combined cycle power plant and determines the amount of waste heat that can be recovered. A modified cycle arrangement is then adopted for accessing thermal potentials. Modeling the energy system is followed by thermodynamic and energetic evaluation, and then the price of the manufactured products is also determined using the Total Revenue Requirement (TRR) method and term economic analysis. The results of optimization are then presented in a Pareto chart diagram by implementing a new model with dual objective functions, which include power cost and produce heat. This model can be utilized to identify the optimal operating point for such power plants based on electricity and heat prices in different regions.Keywords: heat loss, recycling, unused energy, efficient production, optimization, triple-pressure cogeneration
Procedia PDF Downloads 8215571 Application of Simulated Annealing to Threshold Optimization in Distributed OS-CFAR System
Authors: L. Abdou, O. Taibaoui, A. Moumen, A. Talib Ahmed
Abstract:
This paper proposes an application of the simulated annealing to optimize the detection threshold in an ordered statistics constant false alarm rate (OS-CFAR) system. Using conventional optimization methods, such as the conjugate gradient, can lead to a local optimum and lose the global optimum. Also for a system with a number of sensors that is greater than or equal to three, it is difficult or impossible to find this optimum; Hence, the need to use other methods, such as meta-heuristics. From a variety of meta-heuristic techniques, we can find the simulated annealing (SA) method, inspired from a process used in metallurgy. This technique is based on the selection of an initial solution and the generation of a near solution randomly, in order to improve the criterion to optimize. In this work, two parameters will be subject to such optimisation and which are the statistical order (k) and the scaling factor (T). Two fusion rules; “AND” and “OR” were considered in the case where the signals are independent from sensor to sensor. The results showed that the application of the proposed method to the problem of optimisation in a distributed system is efficiency to resolve such problems. The advantage of this method is that it allows to browse the entire solutions space and to avoid theoretically the stagnation of the optimization process in an area of local minimum.Keywords: distributed system, OS-CFAR system, independent sensors, simulating annealing
Procedia PDF Downloads 49715570 Trauma after Childbirth: The Mediating Effects of Subjective Experience
Authors: Grace Baptie, Jackie Andrade, Alison Bacon, Alyson Norman
Abstract:
Background: Many women experience their childbirth as traumatic, and 4-6% of mothers present with postnatal posttraumatic stress disorder (PTSD) as a result of their birth. Aims: To measure the relationship between obstetric and subjective experience of childbirth on mothers’ experience of postnatal trauma and identify salient aspects of the birth experience considered traumatic. Methods: Women who had given birth within the last year completed an online mixed-methods survey reporting on their subjective and obstetric birth experience as well as symptoms of postnatal trauma, depression and anxiety. Findings: 29% of mothers experienced their labour as traumatic and 15% met full or partial criteria for PTSD. Feeling supported and in control mediated the relationship between obstetric intervention and postnatal trauma symptoms. Five key themes were identified from the qualitative data regarding aspects of the birth considered traumatic including: obstetric complications; lack of control; concern for baby; psychological trauma and lack of support. Conclusion: Subjective birth experience is a significantly stronger predictor of postnatal trauma than level of medical intervention, the psychological consequences of which can be buffered by an increased level of support and control.Keywords: birth trauma, perinatal mental health, postnatal PTSD, subjective experience
Procedia PDF Downloads 15015569 Peer-To-Peer Lending and Macroeconomics: Searching for a Link
Authors: Asror Nigmonov Asqar Ogli, Sitora Inoyatova Amonovna
Abstract:
It has been a decade when the crowdfunding and P2P lending opportunities were created. Today, the market of these modern alternative investments is becoming increasingly complex to navigate. There are overwhelming amount of peer-to-peer lending platforms both in developed and emerging economies. This study looks into this market via the cross country empirical study. In this respect, it tests the effect of various macroeconomic factors on P2P loan lending. Based on the existing literature that largely lacks empirical investigations, it builds regression model that aims to explore the relationship between economy and P2P lending. Though the author found it extremely difficult to compare the findings with earlier studies, this paper had identified certain tendencies in the data and had certain policy implications. However, the paper could not find any significant effect of economic variables on P2P lending. The paper can be considered as a starting point in empirical investigation of P2P lending and highlights room further research based on limitations of the study.Keywords: peer-to-peer lending, crowdfunding, marketplace lending, alternative finance, fintech
Procedia PDF Downloads 19915568 Design and Optimization of a 6 Degrees of Freedom Co-Manipulated Parallel Robot for Prostate Brachytherapy
Authors: Aziza Ben Halima, Julien Bert, Dimitris Visvikis
Abstract:
In this paper, we propose designing and evaluating a parallel co-manipulated robot dedicated to low-dose-rate prostate brachytherapy. We developed 6 degrees of freedom compact and lightweight robot easy to install in the operating room thanks to its parallel design. This robotic system provides a co-manipulation allowing the surgeon to keep control of the needle’s insertion and consequently to improve the acceptability of the plan for the clinic. The best dimension’s configuration was solved by calculating the geometric model and using an optimization approach. The aim was to ensure the whole coverage of the prostate volume and consider the allowed free space around the patient that includes the ultrasound probe. The final robot dimensions fit in a cube of 300 300 300 mm³. A prototype was 3D printed, and the robot workspace was measured experimentally. The results show that the proposed robotic system satisfies the medical application requirements and permits the needle to reach any point within the prostate.Keywords: medical robotics, co-manipulation, prostate brachytherapy, optimization
Procedia PDF Downloads 20715567 Performance and Limitations of Likelihood Based Information Criteria and Leave-One-Out Cross-Validation Approximation Methods
Authors: M. A. C. S. Sampath Fernando, James M. Curran, Renate Meyer
Abstract:
Model assessment, in the Bayesian context, involves evaluation of the goodness-of-fit and the comparison of several alternative candidate models for predictive accuracy and improvements. In posterior predictive checks, the data simulated under the fitted model is compared with the actual data. Predictive model accuracy is estimated using information criteria such as the Akaike information criterion (AIC), the Bayesian information criterion (BIC), the Deviance information criterion (DIC), and the Watanabe-Akaike information criterion (WAIC). The goal of an information criterion is to obtain an unbiased measure of out-of-sample prediction error. Since posterior checks use the data twice; once for model estimation and once for testing, a bias correction which penalises the model complexity is incorporated in these criteria. Cross-validation (CV) is another method used for examining out-of-sample prediction accuracy. Leave-one-out cross-validation (LOO-CV) is the most computationally expensive variant among the other CV methods, as it fits as many models as the number of observations. Importance sampling (IS), truncated importance sampling (TIS) and Pareto-smoothed importance sampling (PSIS) are generally used as approximations to the exact LOO-CV and utilise the existing MCMC results avoiding expensive computational issues. The reciprocals of the predictive densities calculated over posterior draws for each observation are treated as the raw importance weights. These are in turn used to calculate the approximate LOO-CV of the observation as a weighted average of posterior densities. In IS-LOO, the raw weights are directly used. In contrast, the larger weights are replaced by their modified truncated weights in calculating TIS-LOO and PSIS-LOO. Although, information criteria and LOO-CV are unable to reflect the goodness-of-fit in absolute sense, the differences can be used to measure the relative performance of the models of interest. However, the use of these measures is only valid under specific circumstances. This study has developed 11 models using normal, log-normal, gamma, and student’s t distributions to improve the PCR stutter prediction with forensic data. These models are comprised of four with profile-wide variances, four with locus specific variances, and three which are two-component mixture models. The mean stutter ratio in each model is modeled as a locus specific simple linear regression against a feature of the alleles under study known as the longest uninterrupted sequence (LUS). The use of AIC, BIC, DIC, and WAIC in model comparison has some practical limitations. Even though, IS-LOO, TIS-LOO, and PSIS-LOO are considered to be approximations of the exact LOO-CV, the study observed some drastic deviations in the results. However, there are some interesting relationships among the logarithms of pointwise predictive densities (lppd) calculated under WAIC and the LOO approximation methods. The estimated overall lppd is a relative measure that reflects the overall goodness-of-fit of the model. Parallel log-likelihood profiles for the models conditional on equal posterior variances in lppds were observed. This study illustrates the limitations of the information criteria in practical model comparison problems. In addition, the relationships among LOO-CV approximation methods and WAIC with their limitations are discussed. Finally, useful recommendations that may help in practical model comparisons with these methods are provided.Keywords: cross-validation, importance sampling, information criteria, predictive accuracy
Procedia PDF Downloads 39215566 Video Text Information Detection and Localization in Lecture Videos Using Moments
Authors: Belkacem Soundes, Guezouli Larbi
Abstract:
This paper presents a robust and accurate method for text detection and localization over lecture videos. Frame regions are classified into text or background based on visual feature analysis. However, lecture video shows significant degradation mainly related to acquisition conditions, camera motion and environmental changes resulting in low quality videos. Hence, affecting feature extraction and description efficiency. Moreover, traditional text detection methods cannot be directly applied to lecture videos. Therefore, robust feature extraction methods dedicated to this specific video genre are required for robust and accurate text detection and extraction. Method consists of a three-step process: Slide region detection and segmentation; Feature extraction and non-text filtering. For robust and effective features extraction moment functions are used. Two distinct types of moments are used: orthogonal and non-orthogonal. For orthogonal Zernike Moments, both Pseudo Zernike moments are used, whereas for non-orthogonal ones Hu moments are used. Expressivity and description efficiency are given and discussed. Proposed approach shows that in general, orthogonal moments show high accuracy in comparison to the non-orthogonal one. Pseudo Zernike moments are more effective than Zernike with better computation time.Keywords: text detection, text localization, lecture videos, pseudo zernike moments
Procedia PDF Downloads 15215565 Need for Shariah Screening of Companies in Nigeria: Lessons from Other Jurisdictions
Authors: Aishat Abdul-Qadir Zubair
Abstract:
Background: The absence of Shari’ah screening methodology for companies in Nigeria has further engineered the uncertainty surrounding the acceptability of investing in certain companies by people professing the religion of Islam due to the nature of the activities carried out by these companies. There are some existing shariah screening indices in other jurisdictions whose criteria can be used to check if a company or business is shariah-compliant or not. Examples such as FTSE, DJIM, Standard and Poor to mention just a few. What these indices have tried to do is to ensure that there are benchmarks to check with before investing in companies that carry out mixed activities in their business, wherein some are halal and others may be haram. Purpose: There have been numerous studies on the need to adopt certain screening methodologies as well as call for new methods in screening companies for shariah compliance in order to suit the investments needs of Muslims in other jurisdictions. It is, however, unclear how suitable these methodologies will be to Nigeria. This paper, therefore, seeks to address this gap to consider an appropriate screening methodology to be employed in Nigeria, drawing from the experience of other jurisdictions. Methods: This study employs a triangulation of both quantitative and qualitative methods to analyze the need for Shari’ah screening of companies in Nigeria. The qualitative method is used by way of ijtihad, and this study tries to apply some Islamic Principles of Maqasid al-shari’ah as well as Qawaid al-Fiqiyyah to analyze activities of companies in order to ensure that they are indeed Shari’ah compliant. In addition, using the quantitative data gathered from the interview survey, the perspective of the investors with regards to the need for Shari’ah screening of companies in Nigeria is further analyzed. Results: The result of the study shows that there is a lack of awareness from the teeming Muslim population in Nigeria on the need for Shari’ah screening of companies in Nigeria. The result further shows that there is the need to take into cognizance the peculiar nature of company activities in Nigeria before any particular Shari’ah screening methodology is adopted and setting the necessary benchmarks. Conclusion and Implications: The study concludes that there is the need to ensure that the conscious Muslims in Nigeria screen companies for Shari’ah compliance so that they can easily identify the companies to invest in. The paper, therefore, recommends that the Nigerian government need to come up with a screening methodology that will suit the peculiar nature of companies in Nigeria. The study thus has a direct implication on the Investment regulatory bodies in Nigeria such as the Securities and Exchange Commission (SEC), Central Bank of Nigeria (CBN) as well as the investor Muslims.Keywords: Shari'ah screening, Muslims, investors, companies
Procedia PDF Downloads 16715564 Investigation of the Stability of the F* Iterative Algorithm on Strong Peudocontractive Mappings and Its Applications
Authors: Felix Damilola Ajibade, Opeyemi O. Enoch, Taiwo Paul Fajusigbe
Abstract:
This paper is centered on conducting an inquiry into the stability of the F* iterative algorithm to the fixed point of a strongly pseudo-contractive mapping in the framework of uniformly convex Banach spaces. To achieve the desired result, certain existing inequalities in convex Banach spaces were utilized, as well as the stability criteria of Harder and Hicks. Other necessary conditions for the stability of the F* algorithm on strong pseudo-contractive mapping were also obtained. Through a numerical approach, we prove that the F* iterative algorithm is H-stable for strongly pseudo-contractive mapping. Finally, the solution of the mixed-type Volterra-Fredholm functional non-linear integral equation is estimated using our results.Keywords: stability, F* -iterative algorithm, pseudo-contractive mappings, uniformly convex Banach space, mixed-type Volterra-Fredholm integral equation
Procedia PDF Downloads 10415563 Multi-Criteria Geographic Information System Analysis of the Costs and Environmental Impacts of Improved Overland Tourist Access to Kaieteur National Park, Guyana
Authors: Mark R. Leipnik, Dahlia Durga, Linda Johnson-Bhola
Abstract:
Kaieteur is the most iconic National Park in the rainforest-clad nation of Guyana in South America. However, the magnificent 226-meter-high waterfall at its center is virtually inaccessible by surface transportation, and the occasional charter flights to the small airstrip in the park are too expensive for many tourists and residents. Thus, the largest waterfall in all of Amazonia, where the Potaro River plunges over a single free drop twice as high as Victoria Falls, remains preserved in splendid isolation inside a 57,000-hectare National Park established by the British in 1929, in the deepest recesses of a remote jungle canyon. Kaieteur Falls are largely unseen firsthand, but images of the falls are depicted on the Guyanese twenty dollar note, in every Guyanese tourist promotion, and on many items in the national capital of Georgetown. Georgetown is only 223-241 kilometers away from the falls. The lack of a single mileage figure demonstrates there is no single overland route. Any journey, except by air, involves changes of vehicles, a ferry ride, and a boat ride up a jungle river. It also entails hiking for many hours to view the falls. Surface access from Georgetown (or any city) is thus a 3-5 day-long adventure; even in the dry season, during the two wet seasons, travel is a particularly sticky proposition. This journey was made overland by the paper's co-author Dahlia Durga. This paper focuses on potential ways to improve overland tourist access to Kaieteur National Park from Georgetown. This is primarily a GIS-based analysis, using multiple criteria to determine the least cost means of creating all-weather road access to the area near the base of the falls while minimizing distance and elevation changes. Critically, it also involves minimizing the number of new bridges required to be built while utilizing the one existing ferry crossings of a major river. Cost estimates are based on data from road and bridge construction engineers operating currently in the interior of Guyana. The paper contains original maps generated with ArcGIS of the potential routes for such an overland connection, including the one deemed optimal. Other factors, such as the impact on endangered species habitats and Indigenous populations, are considered. This proposed infrastructure development is taking place at a time when Guyana is undergoing the largest boom in its history due to revenues from offshore oil and gas development. Thus, better access to the most important tourist attraction in the country is likely to happen eventually in some manner. But the questions of the most environmentally sustainable and least costly alternatives for such access remain. This paper addresses those questions and others related to access to this magnificent natural treasure and the tradeoffs such access will have on the preservation of the currently pristine natural environment of Kaieteur Falls.Keywords: nature tourism, GIS, Amazonia, national parks
Procedia PDF Downloads 16615562 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction
Authors: Irfan Mohiuddin, Ahmad Al Mogren
Abstract:
In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines
Procedia PDF Downloads 14315561 Correlation between Adherence to Islamic Principles of Success and Academic Achievement
Authors: Zuwaira Abubakar
Abstract:
Islam is the Divine religion which guides Man ways of leading a prosperous life in this life and the hereafter. This study was conducted in order to investigate the possible relationship between adherence to Islamic principles of success and academic performance of university students. Accordingly, a questionnaire based on Islamized principles of success (referred to as 'Islamic character quotient inventory (ICQi)') was correlated with CGPA (Cumulative Grade Point Averages) of 343 students of Usmanu Danfodiyo University Sokoto. The empirical testing indicates that the total score on ICQi correlated positively and significantly with academic performance of the respondent. Students with either high or medium adherence have a significantly (P<0.01) higher CGPA than their counterparts with the low-adherence level. However, the result did not show a significant relationship between the CGPA of highly adherent individuals and that of those with medium adherence level. This may suggests that Islam is not for spiritual life only but also relevant and useful for our practical life.Keywords: academic, Islam, principles, success
Procedia PDF Downloads 232