Search results for: COSMO models
2542 Experimental and Semi-Analytical Investigation of Wave Interaction with Double Vertical Slotted Walls
Authors: H. Ahmed, A. Schlenkhoff, R. Rousta, R. Abdelaziz
Abstract:
Vertical slotted walls can be used as permeable breakwaters to provide economical and environmental protection from undesirable waves and currents inside the port. The permeable breakwaters are partially protection and have been suggested to overcome the environmental disadvantages of fully protection breakwaters. For regular waves a semi-analytical model is based on an eigenfunction expansion method and utilizes a boundary condition at the surface of each wall are developed to detect the energy dissipation through the slots. Extensive laboratory tests are carried out to validate the semi-analytic models. The structure of the physical model contains two walls and it consists of impermeable upper and lower part, where the draft is based a decimal multiple of the total depth. The middle part is permeable with a porosity of 50%. The second barrier is located at a distant of 0.5, 1, 1.5 and 2 times of the water depth from the first one. A comparison of the theoretical results with previous studies and experimental measurements of the present study show a good agreement and that, the semi-analytical model is able to adequately reproduce most the important features of the experiment.Keywords: permeable breakwater, double vertical slotted walls, semi-analytical model, transmission coefficient, reflection coefficient, energy dissipation coefficient
Procedia PDF Downloads 3852541 Automatic Generating CNC-Code for Milling Machine
Authors: Chalakorn Chitsaart, Suchada Rianmora, Mann Rattana-Areeyagon, Wutichai Namjaiprasert
Abstract:
G-code is the main factor in computer numerical control (CNC) machine for controlling the tool-paths and generating the profile of the object’s features. For obtaining high surface accuracy of the surface finish, non-stop operation is required for CNC machine. Recently, to design a new product, the strategy that concerns about a change that has low impact on business and does not consume lot of resources has been introduced. Cost and time for designing minor changes can be reduced since the traditional geometric details of the existing models are applied. In order to support this strategy as the alternative channel for machining operation, this research proposes the automatic generating codes for CNC milling operation. Using this technique can assist the manufacturer to easily change the size and the geometric shape of the product during the operation where the time spent for setting up or processing the machine are reduced. The algorithm implemented on MATLAB platform is developed by analyzing and evaluating the geometric information of the part. Codes are created rapidly to control the operations of the machine. Comparing to the codes obtained from CAM, this developed algorithm can shortly generate and simulate the cutting profile of the part.Keywords: geometric shapes, milling operation, minor changes, CNC Machine, G-code, cutting parameters
Procedia PDF Downloads 3502540 Using an Epidemiological Model to Study the Spread of Misinformation during the Black Lives Matter Movement
Authors: Maryam Maleki, Esther Mead, Mohammad Arani, Nitin Agarwal
Abstract:
The proliferation of social media platforms like Twitter has heightened the consequences of the spread of misinformation. To understand and model the spread of misinformation, in this paper, we leveraged the SEIZ (Susceptible, Exposed, Infected, Skeptics) epidemiological model to describe the underlying process that delineates the spread of misinformation on Twitter. Compared to the other epidemiological models, this model produces broader results because it includes the additional Skeptics (Z) compartment, wherein a user may be Exposed to an item of misinformation but not engage in any reaction to it, and the additional Exposed (E) compartment, wherein the user may need some time before deciding to spread a misinformation item. We analyzed misinformation regarding the unrest in Washington, D.C. in the month of March 2020, which was propagated by the use of the #DCblackout hashtag by different users across the U.S. on Twitter. Our analysis shows that misinformation can be modeled using the concept of epidemiology. To the best of our knowledge, this research is the first to attempt to apply the SEIZ epidemiological model to the spread of a specific item of misinformation, which is a category distinct from that of rumor and hoax on online social media platforms. Applying a mathematical model can help to understand the trends and dynamics of the spread of misinformation on Twitter and ultimately help to develop techniques to quickly identify and control it.Keywords: Black Lives Matter, epidemiological model, mathematical modeling, misinformation, SEIZ model, Twitter
Procedia PDF Downloads 1722539 CTHTC: A Convolution-Backed Transformer Architecture for Temporal Knowledge Graph Embedding with Periodicity Recognition
Authors: Xinyuan Chen, Mohd Nizam Husen, Zhongmei Zhou, Gongde Guo, Wei Gao
Abstract:
Temporal Knowledge Graph Completion (TKGC) has attracted increasing attention for its enormous value; however, existing models lack capabilities to capture both local interactions and global dependencies simultaneously with evolutionary dynamics, while the latest achievements in convolutions and Transformers haven't been employed in this area. What’s more, periodic patterns in TKGs haven’t been fully explored either. To this end, a multi-stage hybrid architecture with convolution-backed Transformers is introduced in TKGC tasks for the first time combining the Hawkes process to model evolving event sequences in a continuous-time domain. In addition, the seasonal-trend decomposition is adopted to identify periodic patterns. Experiments on six public datasets are conducted to verify model effectiveness against state-of-the-art (SOTA) methods. An extensive ablation study is carried out accordingly to evaluate architecture variants as well as the contributions of independent components in addition, paving the way for further potential exploitation. Besides complexity analysis, input sensitivity and safety challenges are also thoroughly discussed for comprehensiveness with novel methods.Keywords: temporal knowledge graph completion, convolution, transformer, Hawkes process, periodicity
Procedia PDF Downloads 792538 Factors of Social Media Platforms on Consumer Behavior
Authors: Zebider Asire Munyelet, Yibeltal Chanie Manie
Abstract:
In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates into the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers.Keywords: consumer Behavior, social media, online purchasing, online transaction
Procedia PDF Downloads 782537 Automated Classification of Hypoxia from Fetal Heart Rate Using Advanced Data Models of Intrapartum Cardiotocography
Authors: Malarvizhi Selvaraj, Paul Fergus, Andy Shaw
Abstract:
Uterine contractions produced during labour have the potential to damage the foetus by diminishing the maternal blood flow to the placenta. In order to observe this phenomenon labour and delivery are routinely monitored using cardiotocography monitors. An obstetrician usually makes the diagnosis of foetus hypoxia by interpreting cardiotocography recordings. However, cardiotocography capture and interpretation is time-consuming and subjective, often lead to misclassification that causes damage to the foetus and unnecessary caesarean section. Both of these have a high impact on the foetus and the cost to the national healthcare services. Automatic detection of foetal heart rate may be an objective solution to help to reduce unnecessary medical interventions, as reported in several studies. This paper aim is to provide a system for better identification and interpretation of abnormalities of the fetal heart rate using RStudio. An open dataset of 552 Intrapartum recordings has been filtered with 0.034 Hz filters in an attempt to remove noise while keeping as much of the discriminative data as possible. Features were chosen following an extensive literature review, which concluded with FIGO features such as acceleration, deceleration, mean, variance and standard derivation. The five features were extracted from 552 recordings. Using these features, recordings will be classified either normal or abnormal. If the recording is abnormal, it has got more chances of hypoxia.Keywords: cardiotocography, foetus, intrapartum, hypoxia
Procedia PDF Downloads 2172536 Modeling of a UAV Longitudinal Dynamics through System Identification Technique
Authors: Asadullah I. Qazi, Mansoor Ahsan, Zahir Ashraf, Uzair Ahmad
Abstract:
System identification of an Unmanned Aerial Vehicle (UAV), to acquire its mathematical model, is a significant step in the process of aircraft flight automation. The need for reliable mathematical model is an established requirement for autopilot design, flight simulator development, aircraft performance appraisal, analysis of aircraft modifications, preflight testing of prototype aircraft and investigation of fatigue life and stress distribution etc. This research is aimed at system identification of a fixed wing UAV by means of specifically designed flight experiment. The purposely designed flight maneuvers were performed on the UAV and aircraft states were recorded during these flights. Acquired data were preprocessed for noise filtering and bias removal followed by parameter estimation of longitudinal dynamics transfer functions using MATLAB system identification toolbox. Black box identification based transfer function models, in response to elevator and throttle inputs, were estimated using least square error technique. The identification results show a high confidence level and goodness of fit between the estimated model and actual aircraft response.Keywords: fixed wing UAV, system identification, black box modeling, longitudinal dynamics, least square error
Procedia PDF Downloads 3262535 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 2602534 An Improved Convolution Deep Learning Model for Predicting Trip Mode Scheduling
Authors: Amin Nezarat, Naeime Seifadini
Abstract:
Trip mode selection is a behavioral characteristic of passengers with immense importance for travel demand analysis, transportation planning, and traffic management. Identification of trip mode distribution will allow transportation authorities to adopt appropriate strategies to reduce travel time, traffic and air pollution. The majority of existing trip mode inference models operate based on human selected features and traditional machine learning algorithms. However, human selected features are sensitive to changes in traffic and environmental conditions and susceptible to personal biases, which can make them inefficient. One way to overcome these problems is to use neural networks capable of extracting high-level features from raw input. In this study, the convolutional neural network (CNN) architecture is used to predict the trip mode distribution based on raw GPS trajectory data. The key innovation of this paper is the design of the layout of the input layer of CNN as well as normalization operation, in a way that is not only compatible with the CNN architecture but can also represent the fundamental features of motion including speed, acceleration, jerk, and Bearing rate. The highest prediction accuracy achieved with the proposed configuration for the convolutional neural network with batch normalization is 85.26%.Keywords: predicting, deep learning, neural network, urban trip
Procedia PDF Downloads 1392533 Motivation for Higher Education: An Exploration of Lived Experiences of Students with Disabilities in a Ghanaian University
Authors: Yaw Akoto
Abstract:
The social construction of disability in a Ghanaian society has created a restriction on the development of the academic potentials of persons with disabilities. Ghanaian societal perceptions position persons with disabilities as needy, evil, feeble and 'abnormal' that a person with disability cannot contribute anything meaningful to their own development, society, and the nation as well. Almost all Ghanaian cultures believe the Gods visit evil people with disability as such they erect barriers that limit them to select and enroll in education. The few people with disabilities who gain admission to schools drop out due to these barriers erected by the society and institutions. However, there are very few of these students who are able to pursue their education at the higher education level despite these challenges. This qualitative study explores the motivation of students with disabilities to select and enroll in a Ghanaian university. The study used semi-structured interview to solicit information from students with disabilities in a Ghanaian university. Although the quality of students with disabilities experience was affected by culture, discrimination, marginalisation, and lack of support, the prospect of using themselves as role models, employment opportunities and family impingement were among others that pushed them to embark on their educational journey. The findings of this study have implications for societal and institutional levels for restructuring and refining societal perception and institutional policies on disabilities.Keywords: beliefs, Ghanaian university, social construction, students with disabilities
Procedia PDF Downloads 1522532 Data-Driven Decision Making: A Reference Model for Organizational, Educational and Competency-Based Learning Systems
Authors: Emanuel Koseos
Abstract:
Data-Driven Decision Making (DDDM) refers to making decisions that are based on historical data in order to inform practice, develop strategies and implement policies that benefit organizational settings. In educational technology, DDDM facilitates the implementation of differential educational learning approaches such as Educational Data Mining (EDM) and Competency-Based Education (CBE), which commonly target university classrooms. There is a current need for DDDM models applied to middle and secondary schools from a concern for assessing the needs, progress and performance of students and educators with respect to regional standards, policies and evolution of curriculums. To address these concerns, we propose a DDDM reference model developed using educational key process initiatives as inputs to a machine learning framework implemented with statistical software (SAS, R) to provide a best-practices, complex-free and automated approach for educators at their regional level. We assessed the efficiency of the model over a six-year period using data from 45 schools and grades K-12 in the Langley, BC, Canada regional school district. We concluded that the model has wider appeal, such as business learning systems.Keywords: competency-based learning, data-driven decision making, machine learning, secondary schools
Procedia PDF Downloads 1752531 The Role of Interpersonal and Institutional Trusts for the Public Support of Welfare State
Authors: Nazim Habibov, Alena Auchynnikava, Lida Fan
Abstract:
The exploration of the relationship between social trust and the support of the welfare system in transitional countries has attracted growing interests in recent decades. This study estimates the effects of interpersonal and institutional trust on the support of the welfare system in 27 countries in Eastern Europe the former Soviet Union. We estimate the data sets from the Life-in-Transition Survey 2010 and 2016 with binomial regression models. The results indicate that both interpersonal and institutional trust have positive effects on the support for the welfare system in all the three areas under investigation: helping the needy, public healthcare and public education, both in the less developed countries of the former Soviet Union and in the more developed Eastern European countries. Furthermore, the positive effects of interpersonal and institutional trust on support for helping the needy, public healthcare and public education were found to grow over time. In conclusion, this study confirms that interpersonal and institutional trusts have positive effects for the public support of the welfare system in these transitional countries under investigation, regardless of their level of development.Keywords: central and eastern Europe, former Soviet union, international social welfare policy, comparative social welfare policy
Procedia PDF Downloads 1322530 Analytical Model to Predict the Shear Capacity of Reinforced Concrete Beams Externally Strengthened with CFRP Composites Conditions
Authors: Rajai Al-Rousan
Abstract:
This paper presents a proposed analytical model for predicting the shear strength of reinforced concrete beams strengthened with CFRP composites as external reinforcement. The proposed analytical model can predict the shear contribution of CFRP composites of RC beams with an acceptable coefficient of correlation with the tested results. Based on the comparison of the proposed model with the published well-known models (ACI model, Triantafillou model, and Colotti model), the ACI model had a wider range of 0.16 to 10.08 for the ratio between tested and predicted ultimate shears at failure. Also, an acceptable range of 0.27 to 2.78 for the ratio between tested and predicted ultimate shears by the Triantafillou model. Finally, the best prediction (the ratio between the tested and predicted ones) of the ultimate shear capacity is observed by using Colotti model with a range of 0.20 to 1.78. Thus, the contribution of the CFRP composites as external reinforcement can be predicted with high accuracy by using the proposed analytical model.Keywords: predicting, shear capacity, reinforced concrete, beams, strengthened, externally, CFRP composites
Procedia PDF Downloads 2302529 Enhanced Arabic Semantic Information Retrieval System Based on Arabic Text Classification
Authors: A. Elsehemy, M. Abdeen , T. Nazmy
Abstract:
Since the appearance of the Semantic web, many semantic search techniques and models were proposed to exploit the information in ontology to enhance the traditional keyword-based search. Many advances were made in languages such as English, German, French and Spanish. However, other languages such as Arabic are not fully supported yet. In this paper we present a framework for ontology based information retrieval for Arabic language. Our system consists of four main modules, namely query parser, indexer, search and a ranking module. Our approach includes building a semantic index by linking ontology concepts to documents, including an annotation weight for each link, to be used in ranking the results. We also augmented the framework with an automatic document categorizer, which enhances the overall document ranking. We have built three Arabic domain ontologies: Sports, Economic and Politics as example for the Arabic language. We built a knowledge base that consists of 79 classes and more than 1456 instances. The system is evaluated using the precision and recall metrics. We have done many retrieval operations on a sample of 40,316 documents with a size 320 MB of pure text. The results show that the semantic search enhanced with text classification gives better performance results than the system without classification.Keywords: Arabic text classification, ontology based retrieval, Arabic semantic web, information retrieval, Arabic ontology
Procedia PDF Downloads 5272528 Linguistic Features for Sentence Difficulty Prediction in Aspect-Based Sentiment Analysis
Authors: Adrian-Gabriel Chifu, Sebastien Fournier
Abstract:
One of the challenges of natural language understanding is to deal with the subjectivity of sentences, which may express opinions and emotions that add layers of complexity and nuance. Sentiment analysis is a field that aims to extract and analyze these subjective elements from text, and it can be applied at different levels of granularity, such as document, paragraph, sentence, or aspect. Aspect-based sentiment analysis is a well-studied topic with many available data sets and models. However, there is no clear definition of what makes a sentence difficult for aspect-based sentiment analysis. In this paper, we explore this question by conducting an experiment with three data sets: ”Laptops”, ”Restaurants”, and ”MTSC” (Multi-Target-dependent Sentiment Classification), and a merged version of these three datasets. We study the impact of domain diversity and syntactic diversity on difficulty. We use a combination of classifiers to identify the most difficult sentences and analyze their characteristics. We employ two ways of defining sentence difficulty. The first one is binary and labels a sentence as difficult if the classifiers fail to correctly predict the sentiment polarity. The second one is a six-level scale based on how many of the top five best-performing classifiers can correctly predict the sentiment polarity. We also define 9 linguistic features that, combined, aim at estimating the difficulty at sentence level.Keywords: sentiment analysis, difficulty, classification, machine learning
Procedia PDF Downloads 922527 Chemopreventive Potency of Medicinal and Eatable Plant, Gromwell Seed on in Vitro and in Vivo Carcinogenesis Systems
Authors: Harukuni Tokuda, Xu FengHao, Nobutaka Suzuki
Abstract:
As part of an ongoing our projects to investigate the anti-tumor promoring properties (chemopreventive potency) of Gromwell seed, dry powder materials and its active compounds were carried out through useful test systems. Gromwell seed (Coix lachryma-jobi seed) (GS) is a grass crop that has long been used and played a role in traditional medicine as a nourishing food, and for the treatment of various aliments, paticularly cancer. The application of a new screening procedure which utilizes the synergistic effect of short-chain fatty acids and phorbol esters in enable rapid and easy detection of naturally occurring substances(anti-tumor promoters chemo-preventive agents) with inhibition of Epstein-Barr virus(EBV) activation, using human lymphblastoid cells. In addition, we have now extended these investigations to a new tumorigenesis model in which we initiated the tumors with DMBA intiation and promoted with 1.7 nmol of TPA in two-stage mouse skin test and other models. these results provide a basis for further development of these botanical supplements for human cancer chemoprevention and observations seem that this materials more extensively as one of the trials for the purpose of complementary and alternative medicine.Keywords: chemoprevention, medicinal plant, mouse, carcinogenesis systems
Procedia PDF Downloads 4822526 Control of a Plane Jet Spread by Tabs at the Nozzle Exit
Authors: Makito Sakai, Takahiro Kiwata, Takumi Awa, Hiroshi Teramoto, Takaaki Kono, Kuniaki Toyoda
Abstract:
Using experimental and numerical results, this paper describes the effects of tabs on the flow characteristics of a plane jet at comparatively low Reynolds numbers while focusing on the velocity field and the vortical structure. The flow visualization and velocity measurements were respectively carried out using laser Doppler velocimetry (LDV) and particle image velocimetry (PIV). In addition, three-dimensional (3D) plane jet numerical simulations were performed using ANSYS Fluent, a commercially available computational fluid dynamics (CFD) software application. We found that the spreads of jets perturbed by large delta tabs and round tabs were larger than those produced by the other tabs tested. Additionally, it was determined that a plane jet with square tabs had the smallest jet spread downstream, and the jet’s centerline velocity was larger than those of jets perturbed by the other tabs tested. It was also observed that the spanwise vortical structure of a plane jet with tabs disappeared completely. Good agreement was found between the experimental and numerical simulation velocity profiles in the area near the nozzle exit when the laminar flow model was used. However, we also found that large eddy simulation (LES) is better at predicting the developing flow field of a plane jet than the laminar and the standard k-ε turbulent models.Keywords: plane jet, flow control, tab, flow measurement, numerical simulation
Procedia PDF Downloads 3372525 Contrasting Patterns of Accumulation, Partitioning, and Reallocation Patterns of Dm and N Within the Maize Canopy Under Decreased N Availabilities
Authors: Panpan Fan, Bo Ming, Niels P. R. Anten, Jochem B. Evers, Yaoyao Li, Shaokun Li, Ruizhi Xie
Abstract:
The reallocation of dry matter (DM) and nitrogen (N) from vegetative tissues to the grain sinks are critical for grain yield. The objective of this study was to quantify the DM and N accumulation, partition, and reallocation at the single-leaf, different-organ, and individual-plant scales and clarify the responses to different levels of N availabilities. A two-year field experiment was conducted in Jinlin province, Northeast China, with three N fertilizer rates to create the different N availability levels: N0 (N deficiency), N1(low supply), and N2 (high supply). The results showed that grain N depends more on reallocations of vegetative organs compared with grain DM. Besides, vegetative organs reallocated more DM and N to grain under lower N availability, whereas more grain DM and grain N were derived from post-silking leaf photosynthesis and post-silking N uptake from the soil under high N availability. Furthermore, the reallocation amount and reallocation efficiency of leaf DM and leaf N content differed among leaf ranks and were regulated by N availability; specifically, the DM reallocation occurs mainly on senesced leaves, whereas the leaf N reallocation was in live leaves. These results provide a theoretical basis for deriving parameters in crop models for the simulation of the demand, uptake, partition, and reallocation processes of DM and N.Keywords: dry matter, leaf N content, leaf rank, N availability, reallocation efficiency
Procedia PDF Downloads 1302524 Governing Urban Water Infrasystems: A Case Study of Los Angeles in the Context of Global Frameworks
Authors: Joachim Monkelbaan, Marcia Hale
Abstract:
Now that global frameworks for sustainability governance (e.g. the Sustainable Development Goals, Paris Climate Agreement and Sendai Framework for Disaster Risk Reduction) are in place, the question is how these aspirations that represent major transitions can be put into practice. Water ‘infrasystems’ can play an especially significant role in strengthening regional sustainability. Infrasystems include both hard and soft infrastructure, such as pipes and technology for delivering water, as well as the institutions and governance models that direct its delivery. As such, an integrated infrasystems view is crucial for Integrative Water Management (IWM). Due to frequently contested ownership of and responsibility for water resources, these infrasystems can also play an important role in facilitating conflict and catalysing community empowerment, especially through participatory approaches to governance. In this paper, we analyze the water infrasystem of the Los Angeles region through the lens of global frameworks for sustainability governance. By complementing a solid overview of governance theories with empirical data from interviews with water actors in the LA metropolitan region (including NGOs, water managers, scientists and elected officials), this paper elucidates ways for this infrasystem to be better aligned with global sustainability frameworks. In addition, it opens up the opportunity to scrutinize the appropriateness of global frameworks when it comes to fostering sustainability action at the local level.Keywords: governance, transitions, global frameworks, infrasystems
Procedia PDF Downloads 2462523 Combination of Lamotrigine and Duloxetine: A Potential Approach for the Treatment of Acute Bipolar Depression
Authors: Kedar S. Prabhavalkar, Nimmy Baby Poovanpallil
Abstract:
Lamotrigine is approved for maintenance treatment of bipolar I disorder. However, its role in the treatment of acute bipolar depression is not well clear. Its efficacy in the treatment of major depressive disorders including refractory unipolar depression suggested the use of lamotrigine as an augmentation drug for acute bipolar depression. The present study aims to evaluate and perform a comparative analysis of the therapeutic effects of lamotrigine, an epileptic mood stabilizer, when used alone and in combination with duloxetine in treating acute bipolar depression at different doses of lamotrigine. Male swiss albino mice were used. For evaluation of efficacy of combination, immobility period was analyzed 30 min after the treatment from forced swim and tail suspension tests. Further amount of sucrose consumed in sucrose preference test was estimated. The combination of duloxetine and lamotrigine showed potentiation of antidepressant activity in acute models. Decrease in immobility time and increase in the amount of sucrose consumption in stressed mice were higher in combined group compared to lamotrigine monotherapy group. Brain monoamine levels were also attenuated more with combination compared to monotherapy. Results of the present study suggest potential role of lamotrigine and duloxetine combination in the treatment of acute bipolar depression.Keywords: lamotrigine, duloxetine, acute bipolar depression, augmentation
Procedia PDF Downloads 5122522 Modeling of Ductile Fracture Using Stress-Modified Critical Strain Criterion for Typical Pressure Vessel Steel
Authors: Carlos Cuenca, Diego Sarzosa
Abstract:
Ductile fracture occurs by the mechanism of void nucleation, void growth and coalescence. Potential sites for initiation are second phase particles or non-metallic inclusions. Modelling of ductile damage at the microscopic level is very difficult and complex task for engineers. Therefore, conservative predictions of ductile failure using simple models are necessary during the design and optimization of critical structures like pressure vessels and pipelines. Nowadays, it is well known that the initiation phase is strongly influenced by the stress triaxiality and plastic deformation at the microscopic level. Thus, a simple model used to study the ductile failure under multiaxial stress condition is the Stress Modified Critical Strain (SMCS) approach. Ductile rupture has been study for a structural steel under different stress triaxiality conditions using the SMCS method. Experimental tests are carried out to characterize the relation between stress triaxiality and equivalent plastic strain by notched round bars. After calibration of the plasticity and damage properties, predictions are made for low constraint bending specimens with and without side grooves. Stress/strain fields evolution are compared between the different geometries. Advantages and disadvantages of the SMCS methodology are discussed.Keywords: damage, SMSC, SEB, steel, failure
Procedia PDF Downloads 2982521 Recovery from Relational Trauma through the Practice of the Four Noble Truths in Buddhism
Authors: Yi-You Hung
Abstract:
Relational trauma has garnered significant attention recently, as it can create barriers in the personal, interpersonal, and professional realms. Without proper intervention, its psychological impact can be profound. In psychotherapy, the demand for culturally adaptive intervention models is growing. This article compares two therapeutic approaches focused on ‘self’ and ‘non-self’. It then incorporates Buddhist concepts of ‘dukkha’ (suffering), ‘samudaya’ (origin), ‘nirodha’ (cessation), and ‘magga’ (path) to develop culturally sensitive psychological interventions. Unlike Western psychotherapy, which often focuses on self, symptom relief, and restoring self-functioning, the ‘non-self’ approach encourages therapists to embody the principles of the Four Noble Truths. This perspective aims to help individuals reconstruct their internal relational state through shared suffering, compassion, wisdom, mindfulness, and righteous conduct. By understanding these concepts, therapists can guide individuals to ‘return to their inherent emptiness and non-self,’ resonating with the Buddhist belief that realizing this emptiness is a fundamental human goal. However, the model's limitations include individuals' need to embrace this cultural discourse and for therapists to learn Buddhist concepts deeply. Further research is essential to validate the effectiveness of this model in treating relational trauma cases.Keywords: buddhism, buddhist principles, culturally adaptive interventions, relational trauma
Procedia PDF Downloads 282520 Exploring Individual and Team Approaches in Crafting Workplace Inclusivity for Deaf and Hard of Hearing Employees in Malaysia
Authors: Nor Wahiza Abdul Wahat, Nor Haniza Abdul Wahat, Siti Noormi Alias, Mohamad Sazali Shaari
Abstract:
This study prepares the groundwork for the development of a strategic model and instrument for workplace inclusivity for deaf and hard-of-hearing employees in Malaysia. In the past, scholars have discussed inclusivity of workplaces to the extent to which employees feel they are significantly part of the organizational processes. Such processes include access to information, connectedness to colleagues and team members as well as their ability to participate in and influence decision-making processes. A qualitative study was conducted to explore on experiences of employed deaf and hard-of-hearing employees in a few Malaysian organizations. Data were collected from two focus group discussions involving male and female deaf and hard of hearing employees. Three in-depth interviews were also conducted with employer representatives. Generated themes highlighted individual, and team approaches towards crafting workplace inclusivity for deaf and hard of hearing employees in Malaysia. The adaptiveness of deaf and hard-of-hearing employees and social inclusion by colleagues were among the emerged sub-themes. This study allowed the researchers to further develop workplace inclusivity instruments and models for the benefit of deaf and hard of hearing Malaysian employees, as well as their employers.Keywords: deaf, hard of hearing, workplace inclusivity, disabilities
Procedia PDF Downloads 1772519 Transformational Justice for Employees' Job Satisfaction
Authors: Hassan Barau Singhry
Abstract:
Purpose: Leadership or the absence of it is an important behaviour affecting employees’ job satisfaction. Although, there are many models of leadership, one that stands out in a period of change is the transformational behaviour. The aim of this study is to investigate the role of an organizational justice on the relationship between transformational leadership and employee job satisfaction. The study is based on the assumption that change begins with leaders and leaders should be fair and just. Methodology: A cross-sectional survey through structured questionnaire was employed to collect the data of this study. The population is selected the three tiers of government such as the local, state, and federal governments in Nigeria. The sampling method used in this research is stratified random sampling. 418 middle managers of public organizations respondents to the questionnaire. Multiple regression aided by structural equation modeling was employed to test 4 hypothesized relationships. Finding: The regression results support for the mediating role of organizational justice such as distributive, procedural, interpersonal and informational justice in the link between transformational leadership and job satisfaction. Originality/value: This study adds to the literature of human resource management by empirically validating and integrating transformational leadership behaviour with the four dimensions of organizational justice theory. The study is expected to be beneficial to the top and middle-level administrators as well as theory building and testing.Keywords: distributive justice, job satisfaction, organizational justice, procedural justice, transformational leadership
Procedia PDF Downloads 1772518 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 4382517 Matching Law in Autoshaped Choice in Neural Networks
Authors: Giselle Maggie Fer Castañeda, Diego Iván González
Abstract:
The objective of this work was to study the autoshaped choice behavior in the Donahoe, Burgos and Palmer (DBP) neural network model and analyze it under the matching law. Autoshaped choice can be viewed as a form of economic behavior defined as the preference between alternatives according to their relative outcomes. The Donahoe, Burgos and Palmer (DBP) model is a connectionist proposal that unifies operant and Pavlovian conditioning. This model has been used for more than three decades as a neurobehavioral explanation of conditioning phenomena, as well as a generator of predictions suitable for experimental testing with non-human animals and humans. The study consisted of different simulations in which, in each one, a ratio of reinforcement was established for two alternatives, and the responses (i.e., activations) in each of them were measured. Choice studies with animals have demonstrated that the data generally conform closely to the generalized matching law equation, which states that the response ratio equals proportionally to the reinforcement ratio; therefore, it was expected to find similar results with the neural networks of the Donahoe, Burgos and Palmer (DBP) model since these networks have simulated and predicted various conditioning phenomena. The results were analyzed by the generalized matching law equation, and it was observed that under some contingencies, the data from the networks adjusted approximately to what was established by the equation. Implications and limitations are discussed.Keywords: matching law, neural networks, computational models, behavioral sciences
Procedia PDF Downloads 772516 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1952515 Evaluation of High Damping Rubber Considering Initial History through Dynamic Loading Test and Program Analysis
Authors: Kyeong Hoon Park, Taiji Mazuda
Abstract:
High damping rubber (HDR) bearings are dissipating devices mainly used in seismic isolation systems and have a great damping performance. Although many studies have been conducted on the dynamic model of HDR bearings, few models can reflect phenomena such as dependency of experienced shear strain on initial history. In order to develop a model that can represent the dependency of experienced shear strain of HDR by Mullins effect, dynamic loading test was conducted using HDR specimen. The reaction of HDR was measured by applying a horizontal vibration using a hybrid actuator under a constant vertical load. Dynamic program analysis was also performed after dynamic loading test. The dynamic model applied in program analysis is a bilinear type double-target model. This model is modified from typical bilinear model. This model can express the nonlinear characteristics related to the initial history of HDR bearings. Based on the dynamic loading test and program analysis results, equivalent stiffness and equivalent damping ratio were calculated to evaluate the mechanical properties of HDR and the feasibility of the bilinear type double-target model was examined.Keywords: base-isolation, bilinear model, high damping rubber, loading test
Procedia PDF Downloads 1242514 Modeling of Tool Flank Wear in Finish Hard Turning of AISI D2 Using Genetic Programming
Authors: V. Pourmostaghimi, M. Zadshakoyan
Abstract:
Efficiency and productivity of the finish hard turning can be enhanced impressively by utilizing accurate predictive models for cutting tool wear. However, the ability of genetic programming in presenting an accurate analytical model is a notable characteristic which makes it more applicable than other predictive modeling methods. In this paper, the genetic equation for modeling of tool flank wear is developed with the use of the experimentally measured flank wear values and genetic programming during finish turning of hardened AISI D2. Series of tests were conducted over a range of cutting parameters and the values of tool flank wear were measured. On the basis of obtained results, genetic model presenting connection between cutting parameters and tool flank wear were extracted. The accuracy of the genetically obtained model was assessed by using two statistical measures, which were root mean square error (RMSE) and coefficient of determination (R²). Evaluation results revealed that presented genetic model predicted flank wear over the study area accurately (R² = 0.9902 and RMSE = 0.0102). These results allow concluding that the proposed genetic equation corresponds well with experimental data and can be implemented in real industrial applications.Keywords: cutting parameters, flank wear, genetic programming, hard turning
Procedia PDF Downloads 1802513 Modeling User Departure Time Choice for Work Trips in High Traffic Suburban Roads
Authors: Saeed Sayyad Hagh Shomar
Abstract:
Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using the users’ stated preference in questionnaire models users’ departure time choice affected by congestion pricing schemes in high traffic suburban entrance roads of Tehran. The results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.Keywords: congestion pricing, departure time, modeling, travel timing, time of the day, transportation planning
Procedia PDF Downloads 298