Search results for: co-citation networks; keyword co-occurrence network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6101

Search results for: co-citation networks; keyword co-occurrence network

1451 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 55
1450 Old Community Spatial Integration: Discussion on the Mechanism of Aging Space System Replacement

Authors: Wan-I Chen, Tsung-I Pai

Abstract:

Future the society aging of population will create the social problem has not had the good mechanism solution in the Asian country, especially in Taiwan. In the future ten year the people in Taiwan must facing the condition which is localization aging social problem. In this situation, how to use the spatial in eco way to development space use to solve the old age spatial demand is the way which might develop in the future Taiwan society. Over the next 10 years, taking care of the aging people will become part of the social problem of aging phenomenon. The research concentrate in the feasibility of spatial substitution, secondary use of spatial might solve out of spatial problem for aging people. In order to prove the space usable, the research required to review the project with the support system and infill system for space experiment, by using network grid way. That defined community level of space elements location relationship, make new definitions of space and return to cooperation. Research to innovation in the the appraisal space causes the possibility, by spatial replacement way solution on spatial insufficient suitable condition. To evaluation community spatial by using the support system and infill system in order to see possibilities of use in replacement inner space and modular architecture into housing. The study is discovering the solution on the Eco way to develop space use to figure out the old age spatial demand.

Keywords: sustainable use, space conversion, integration, replacement


Procedia PDF Downloads 174
1449 Educational Turn towards Digitalization by Changing Leadership, Networks and Qualification Concepts

Authors: Patricia Girrbach

Abstract:

Currently, our society is facing a new and incremental upheaval technological revolution named digitalization. In order to face the relating challenges organizations have to be prepared. They need appropriate circumstances in order to cope with current issues concerning digital transformation processes. Nowadays digitalization emerged as top issues for companies and business leaders. In this context, it is a pressure on companies to have a positive, productive digital culture. And indeed, Organizations realize that they need to address this important issue. In this context 87 percent of organizations quote culture and engagement as one of their top challenges in terms of any change process, but especially in terms of the digital turn. Executives can give their company a competitive advantage and attract top talent by having a strong workplace culture that supports digitalization. Many current studies attest that fact. Digital-oriented companies can hire more easily, they have the lowest voluntary turnover rates, deliver better customer service, and are more profitable over the long run. Based on this background it is important to provide companies starting points and practical measurements how to reach this goal. The major findings are that firms need to make sense out of digitalization. In this context, they should focus on internal but also on external stakeholders. Furthermore, they should create certain working conditions and they should support the qualification of employees, e.g. by Virtual Reality. These measurements can create positive experiences in terms of digitalization in order to ensure the support of stuff in terms of the digital turn. Based on several current studies and literature research this paper provides concrete measurements for companies in order to enable the digital turn. Therefore, the aim of this paper is providing possible practical starting points which support both the education of employees by digitalization as well as the digital turn itself within the organization.

Keywords: digitalization, industry 4.0, education 4.0, virtual reality

Procedia PDF Downloads 156
1448 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator

Authors: Amin Zabihinejad, Philippe Viarouge

Abstract:

In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.

Keywords: direct power control, three level rectifier, real time simulator, high power application

Procedia PDF Downloads 514
1447 Service Interactions Coordination Using a Declarative Approach: Focuses on Deontic Rule from Semantics of Business Vocabulary and Rules Models

Authors: Nurulhuda A. Manaf, Nor Najihah Zainal Abidin, Nur Amalina Jamaludin

Abstract:

Coordinating service interactions are a vital part of developing distributed applications that are built up as networks of autonomous participants, e.g., software components, web services, online resources, involve a collaboration between a diverse number of participant services on different providers. The complexity in coordinating service interactions reflects how important the techniques and approaches require for designing and coordinating the interaction between participant services to ensure the overall goal of a collaboration between participant services is achieved. The objective of this research is to develop capability of steering a complex service interaction towards a desired outcome. Therefore, an efficient technique for modelling, generating, and verifying the coordination of service interactions is developed. The developed model describes service interactions using service choreographies approach and focusing on a declarative approach, advocating an Object Management Group (OMG) standard, Semantics of Business Vocabulary and Rules (SBVR). This model, namely, SBVR model for service choreographies focuses on a declarative deontic rule expressing both obligation and prohibition, which can be more useful in working with coordinating service interactions. The generated SBVR model is then be formulated and be transformed into Alloy model using Alloy Analyzer for verifying the generated SBVR model. The transformation of SBVR into Alloy allows to automatically generate the corresponding coordination of service interactions (service choreography), hence producing an immediate instance of execution that satisfies the constraints of the specification and verifies whether a specific request can be realised in the given choreography in the generated choreography.

Keywords: service choreography, service coordination, behavioural modelling, complex interactions, declarative specification, verification, model transformation, semantics of business vocabulary and rules, SBVR

Procedia PDF Downloads 150
1446 The Determinant Factors of Technology Adoption for Improving Firm’s Performance; Toward a Conceptual Model

Authors: Zainal Arifin, Avanti Fontana

Abstract:

Considering that TOE framework is the most useful instrument for studying technology adoption in firm context, this paper will analyze the influence of technological, organizational and environmental (TOE) factors to the Dynamic capabilities (DCs) associated with technology adoption strategy for improving the firm’s performance. Focusing on the determinant factors of technology adoption at the firm level, the study will contribute to the broader study of resource base view (RBV) and dynamic capability (DC). There is no study connecting directly the TOE factors to the DCs, this paper proposes technology adoption as a functional competence/capability which mediates a relationship between technology adoptions with firm’s performance. The study wants to show a conceptual model of the indirect effects of DCs at the firm level, which can be key predictors of firm performance in dynamic business environment. The results of this research is mostly relevant to top corporate executives (BOD) or top management team (TMT) who seek to provide some supporting ‘hardware’ content and condition such as technological factors, organizational factors, environmental factors, and to improve firm's ‘software ‘ ability such as adaptive capability, absorptive capability and innovative capability, in order to achieve a successful technology adoption in organization. There are also mediating factors which are elaborated at this paper; timing and external network. A further research for showing its empirical results is highly recommended.

Keywords: technology adoption, TOE framework, dynamic capability, resources based view

Procedia PDF Downloads 328
1445 Novel IPN Hydrogel Beads as pH Sensitive Drug Delivery System for an Anti-Ulcer Drug

Authors: Vishal Kumar Gupta

Abstract:

Purpose: This study has been undertaken to develop novel pH sensitive interpenetrating network hydrogel beads. Methods: The pH sensitive PAAM-g-Guar gum copolymer was synthesized by free radical polymerization followed by alkaline hydrolysis. Beads of guar gum-grafted-polyacrylamide and sodium Carboxy methyl cellulose (Na CMC) loaded with Pantoprazole sodium were prepared and evaluated for pH sensitivity, swelling properties, drug entrapment efficiency and in vitro drug release characteristics. Seven formulations were prepared for the drug with varying polymer and cross linker concentrations. Results: The grafting and alkaline hydrolysis reactions were confirmed by FT-IR spectroscopy. Differential scanning calorimetry was carried out to know the compatibility of encapsulated drug with the polymers. Scanning electron microscopic study revealed that the IPN beads were spherical. The entrapment efficiency was found to be in the range of 85-92%. Particle size analysis was carried out by optical microscopy. As the pH of the medium was changed from 1.2 to 7.4, a considerable increase in swelling was observed for all beads. Increase in the copolymer concentration showed sustained the drug release up to 12 hrs. Drug release from the beads followed super case II transport mechanism. Conclusion: It was concluded that guar gum-acrylamide beads, cross-linked with aluminum chloride offer an opportunity for controlled drug release of pantoprazole sodium.

Keywords: IPN, hydrogels, DSC, SEM

Procedia PDF Downloads 266
1444 Exploring Simple Sequence Repeats within Conserved microRNA Precursors Identified from Tea Expressed Sequence Tag (EST) Database

Authors: Anjan Hazra, Nirjhar Dasgupta, Chandan Sengupta, Sauren Das

Abstract:

Tea (Camellia sinensis) has received substantial attention from the scientific world time to time, not only for its commercial importance, but also for its demand to the health-conscious people across the world for its extensive use as potential sources of antioxidant supplement. These health-benefit traits primarily rely on some regulatory networks of different metabolic pathways. Development of microsatellite markers from the conserved genomic regions is being worthwhile for studying the genetic diversity of closely related species or self-pollinated species. Although several SSR markers have been reported, in tea the trait-specific Simple Sequence Repeats (SSRs) are yet to be identified, which can be used for marker assisted breeding technique. MicroRNAs are endogenous, noncoding, short RNAs directly involved in regulating gene expressions at the post-transcriptional level. It has been found that diversity in miRNA gene interferes the formation of its characteristic hair pin structure and the subsequent function. In the present study, the precursors of small regulatory RNAs (microRNAs) has been fished out from tea Expressed Sequence Tag (EST) database. Furthermore, the simple sequence repeat motifs within the putative miRNA precursor genes are also identified in order to experimentally validate their existence and function. It is already known that genic-SSR markers are very adept and breeder-friendly source for genetic diversity analysis. So, the potential outcome of this in-silico study would provide some novel clues in understanding the miRNA-triggered polymorphic genic expression controlling specific metabolic pathways, accountable for tea quality.

Keywords: micro RNA, simple sequence repeats, tea quality, trait specific marker

Procedia PDF Downloads 309
1443 Menopause Cultural Research: A Comparative Study of National and Diasporic Chinese Menopausal Women’s Perceptions and Lived Experience of Menopause

Authors: Yilin Wang, Ayumi Goto

Abstract:

Although most females will experience menopause due to social value habits of cultural factors, some Chinese women may lack the confidence to talk about the problems they are experiencing while going through menopause. Also, sometimes the inappropriateness of medical terminology leads to panic when women face the symptoms associated with menopause. On top of that, when women avoid discussing menopause as a topic, others are less likely to pay attention to the needs of menopausal women as their bodies change. This research will compare the experience of Chinese menopausal women and diasporic Chinese women's perceptions of menopause. A qualitative study will be conducted by collecting and analyzing experiences and perceptions to compare differences in women's perceptions of menopause, considering cultural and social factors. In addition, the study will gather information on the differences in the conceptualization of menopause between the Chinese and Canadian medical fields. Co-design sessions will be held to establish how to bring menopause to the attention of people other than women. Furthermore, a support network for menopause women will be created through these co-design sessions. It is hoped that this research will contribute to a proper understanding of menopause and provide support for Chinese women. This research is built upon feminist standpoint theory and inclusive design theory. The results of this study will be presented in this paper.

Keywords: menopause, feminist standpoint theory, Chinese national & diasporic women, inclusive design

Procedia PDF Downloads 105
1442 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems

Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano

Abstract:

The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.

Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring

Procedia PDF Downloads 146
1441 Analysis of Risks of Adopting Integrated Project Delivery: Application of Bayesian Theory

Authors: Shan Li, Qiuwen Ma

Abstract:

Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasing attention from construction industry due to its reliability to deliver high-performing buildings. However, unavailable IPD specific insurance concerns the industry participants who are interested in IPD implementation. Even though the risk management capability can be enhanced using shared risk mechanism, some risks may occur when the partners do not commit themselves into the integrated practices in a desired manner. This is because the intense collaboration and close integration can not only create added value but bring new opportunistic behaviors and disputes. The study is aimed to investigate the risks of implementing IPD using Bayesian theory. IPD risk taxonomy is presented to identify all potential risks of implementing IPD and a risk network map is developed to capture the interdependencies between IPD risks. The conditional relations between risk occurrences and the impacts of IPD risks on project performances are evaluated and simulated based on Bayesian theory. The probability of project outcomes is predicted by simulation. In addition, it is found that some risks caused by integration are most possible occurred risks. This study can help the IPD project participants identify critical risks of adopting IPD to improve project performances. In addition, it is helpful to develop IPD specific insurance when the pertinent risks can be identified.

Keywords: Bayesian theory, integrated project delivery, project risks, project performances

Procedia PDF Downloads 296
1440 An Analysis on Clustering Based Gene Selection and Classification for Gene Expression Data

Authors: K. Sathishkumar, V. Thiagarasu

Abstract:

Due to recent advances in DNA microarray technology, it is now feasible to obtain gene expression profiles of tissue samples at relatively low costs. Many scientists around the world use the advantage of this gene profiling to characterize complex biological circumstances and diseases. Microarray techniques that are used in genome-wide gene expression and genome mutation analysis help scientists and physicians in understanding of the pathophysiological mechanisms, in diagnoses and prognoses, and choosing treatment plans. DNA microarray technology has now made it possible to simultaneously monitor the expression levels of thousands of genes during important biological processes and across collections of related samples. Elucidating the patterns hidden in gene expression data offers a tremendous opportunity for an enhanced understanding of functional genomics. However, the large number of genes and the complexity of biological networks greatly increase the challenges of comprehending and interpreting the resulting mass of data, which often consists of millions of measurements. A first step toward addressing this challenge is the use of clustering techniques, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. This work presents an analysis of several clustering algorithms proposed to deals with the gene expression data effectively. The existing clustering algorithms like Support Vector Machine (SVM), K-means algorithm and evolutionary algorithm etc. are analyzed thoroughly to identify the advantages and limitations. The performance evaluation of the existing algorithms is carried out to determine the best approach. In order to improve the classification performance of the best approach in terms of Accuracy, Convergence Behavior and processing time, a hybrid clustering based optimization approach has been proposed.

Keywords: microarray technology, gene expression data, clustering, gene Selection

Procedia PDF Downloads 321
1439 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 369
1438 Phosphate Regulation of Arbuscular Mycorrhiza Symbiosis in Rice

Authors: Debatosh Das, Moxian Chen, Jianhua Zhang, Caroline Gutjahr

Abstract:

Arbuscular mycorrhiza (AM) is a mutualistic symbiosis between plant roots and Glomeromycotina fungi, which is activated under low but inhibited by high phosphate. The effect of phosphate on AM development has been observed for many years, but mechanisms regulating it under contrasting phosphate levels remain unknown. Based on previous observations that promoters of several AM functional genes contain PHR binding motifs, we hypothesized that PHR2, a master regulator of phosphate starvation response in rice, was recruited to regulate AM symbiosis development. We observed a drastic reduction in root colonization and significant AM transcriptome modulation in phr2. PHR2 targets genes required for root colonization and AM signaling. The role of PHR2 in improving root colonization, mycorrhizal phosphate uptake, and growth response was confirmed in field soil. In conclusion, rice PHR2, which is considered a master regulator of phosphate starvation responses, acts as a positive regulator of AM symbiosis between Glomeromycotina fungi and rice roots. PHR2 directly targets the transcription of plant strigolactone and AM genes involved in the establishment of this symbiosis. Our work facilitates an understanding of ways to enhance AMF propagule populations introduced in field soils (as a biofertilizer) in order to restore the natural plant-AMF networks disrupted by modern agricultural practices. We show that PHR2 is required for AM-mediated improvement of rice yield in low phosphate paddy field soil. Thus, our work contributes knowledge for rational application of AM in sustainable agriculture. Our data provide important insights into the regulation of AM by the plant phosphate status, which has a broad significance in agriculture and terrestrial ecosystems.

Keywords: biofertilizer, phosphate, mycorrhiza, rice, sustainable, symbiosis

Procedia PDF Downloads 130
1437 Alkali Silica Reaction Mitigation and Prevention Measures for Arkansas Local Aggregates

Authors: Amin Kamal Akhnoukh, Lois Zaki Kamel, Magued Mourad Barsoum

Abstract:

The objective of this research is to mitigate and prevent the alkali silica reactivity (ASR) in highway construction projects. ASR is a deleterious reaction initiated when the silica content of the aggregate reacts with alkali hydroxides in cement in the presence of relatively high moisture content. The ASR results in the formation of an expansive white colored gel-like material which forms the destructive tensile stresses inside hardened concrete. In this research, different types of local aggregates available in the State of Arkansas were mixed and mortar bars were poured according to the ASTM specifications. Mortar bars expansion was measured versus time and aggregates with potential ASR problems were detected. Different types of supplementary cementitious materials (SCMs) were used in remixing mortar bars with highly reactive aggregates. Length changes for remixed bars proved that different types of SCMs can be successfully used in reducing the expansive effect of ASR. SCMs percentage by weight is highly dependent on the SCM type. The result of this study will help avoiding future losses due to ASR cracking in construction project and reduce the maintenance, repair, and replacement budgets required for highways network.

Keywords: alkali silica reaction, aggregates, misture, cracks, Mortar Bar Test, supplementary cementitious materials

Procedia PDF Downloads 331
1436 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 360
1435 Providing a Road Pricing and Toll Allocation Method for Toll Roads

Authors: Ali Babaei

Abstract:

There is a worldwide growing tendency toward construction of infrastructures with the possibility of private sector participation instead of free exploitation of public infrastructures. The construction and development of roads through private sector participation is performed by different countries because of appropriate results and benefits such as compensation of public budget deficit in road construction and maintenance and responding to traffic growth (demand). Toll is the most definite form of budget provision in road development. There are two issues in the toll rate assignment: A. costing of transport, B. Cost allocation and distribution of cost between different types of vehicles as each vehicle pay its own share. There can be different goals in toll collection and its extent is variable according to the strategy of toll collection. Costing principles in different countries are based on inclusion of the whole transport and not peculiar to the toll roads. For example, fuel tax policy functions where the road network users pay transportation cost (not just users of toll road). Whereas transportation infrastructures in Iran are free, these methods are not applicable. In Iran, different toll freeways have built by public investment and government provides participation in the road construction through encouragement of financial institutions. In this paper, the existing policies about the toll roads are studied and then the appropriate method of costing and cost allocation to different vehicles is introduced.

Keywords: toll allocation, road pricing, transportation, financial and industrial systems

Procedia PDF Downloads 361
1434 Improving Fake News Detection Using K-means and Support Vector Machine Approaches

Authors: Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy

Abstract:

Fake news and false information are big challenges of all types of media, especially social media. There is a lot of false information, fake likes, views and duplicated accounts as big social networks such as Facebook and Twitter admitted. Most information appearing on social media is doubtful and in some cases misleading. They need to be detected as soon as possible to avoid a negative impact on society. The dimensions of the fake news datasets are growing rapidly, so to obtain a better result of detecting false information with less computation time and complexity, the dimensions need to be reduced. One of the best techniques of reducing data size is using feature selection method. The aim of this technique is to choose a feature subset from the original set to improve the classification performance. In this paper, a feature selection method is proposed with the integration of K-means clustering and Support Vector Machine (SVM) approaches which work in four steps. First, the similarities between all features are calculated. Then, features are divided into several clusters. Next, the final feature set is selected from all clusters, and finally, fake news is classified based on the final feature subset using the SVM method. The proposed method was evaluated by comparing its performance with other state-of-the-art methods on several specific benchmark datasets and the outcome showed a better classification of false information for our work. The detection performance was improved in two aspects. On the one hand, the detection runtime process decreased, and on the other hand, the classification accuracy increased because of the elimination of redundant features and the reduction of datasets dimensions.

Keywords: clustering, fake news detection, feature selection, machine learning, social media, support vector machine

Procedia PDF Downloads 174
1433 Development of Fuzzy Logic and Neuro-Fuzzy Surface Roughness Prediction Systems Coupled with Cutting Current in Milling Operation

Authors: Joseph C. Chen, Venkata Mohan Kudapa

Abstract:

Development of two real-time surface roughness (Ra) prediction systems for milling operations was attempted. The systems used not only cutting parameters, such as feed rate and spindle speed, but also the cutting current generated and corrected by a clamp type energy sensor. Two different approaches were developed. First, a fuzzy inference system (FIS), in which the fuzzy logic rules are generated by experts in the milling processes, was used to conduct prediction modeling using current cutting data. Second, a neuro-fuzzy system (ANFIS) was explored. Neuro-fuzzy systems are adaptive techniques in which data are collected on the network, processed, and rules are generated by the system. The inference system then uses these rules to predict Ra as the output. Experimental results showed that the parameters of spindle speed, feed rate, depth of cut, and input current variation could predict Ra. These two systems enable the prediction of Ra during the milling operation with an average of 91.83% and 94.48% accuracy by FIS and ANFIS systems, respectively. Statistically, the ANFIS system provided better prediction accuracy than that of the FIS system.

Keywords: surface roughness, input current, fuzzy logic, neuro-fuzzy, milling operations

Procedia PDF Downloads 140
1432 National Scope Study on Resilience of Nursing Teams During the COVID-19 Pandemic: Brazilian Experience

Authors: Elucir Gir, Laelson Rochelle Milanês Sousa, Pedro Henrique Tertuliano Leoni, Carla Aparecida Arena Ventura, Ana Cristina de Oliveira e Silva, Renata Karina Reis

Abstract:

Context and significance: Resilience is a protective agent for the physical and mental well-being of nursing professionals. Team members are constantly subjected to high levels of work stress that can negatively impact care performance and users of health services. Stress levels have been exacerbated with the COVID-19 pandemic. Objective: The aim of this study was to analyze the resilience of nursing professionals in Brazil during the COVID-19 pandemic. Method: Cross-sectional study with a quantitative approach carried out with professionals from nursing teams from all regions of Brazil. Data collection took place in the first year of the pandemic between October and December 2020. Data were obtained through an online questionnaire posted on social networks. The information collected included the sociodemographic characterization of the nursing professionals and the Brief Resilient Coping Scale was applied. Student's t-test for independent samples and analysis of variance (ANOVA) were used to compare resilience scores with sociodemographic variables. Results: 8,792 nursing professionals participated in the study, 5,767 (65.6%) were nurses, 7,437 (84.6%) were female and 2,643 (30.1%) were from the Northeast region of Brazil, 5,124 (58.8% ) had low levels of resilience. The results showed a statistically significant difference between the resilience score and the variables: professional category (p<0.001); sex (p = 0.003); age range (p<0.001); region of Brazil (p<0.001); marital status (p=0.029) and providing assistance in a field hospital (p<0.001). Conclusion: Participants in this study had, in general, low levels of resilience. There is an urgent need for actions aimed at promoting the psychological health of nursing professionals inserted in pandemic contexts. Descriptors: Psychological Resilience; Nursing professionals; COVID-19; SARSCoV-2.

Keywords: psychological resilience, nursing professionals, COVID-19, SARS-CoV-2

Procedia PDF Downloads 83
1431 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 303
1430 Promoting Psychosocial Intervention in Social Work to Manage Intersectional Stigma among Sexual Minorities during COVID-19 Pandemic in Uganda: Implications for Social Work Practice

Authors: Simon Mwima, Kasule Solomon Kibirige, Evans Jennifer Mann, Bosco Mukuba, Edson Chipalo, Agnes Nzomene, Eusebius Small, Moses Okumu

Abstract:

Introduction: Social workers must create, implement, and evaluate client-centered psychosocial interventions (CCPI) to reduce the impact of intersectional stigma on HIV service utilization among sexual minorities. We contribute to the scarcity of evidence about sexual minorities in Uganda by using social support theory to explore clients' perceptions that shape CCPI. Based on Focused Group Discussion (FGD) with 31 adolescents recruited from Kampala's HIV clinics in 2021, our findings reveal the positive influence of instrumental, informational, esteem, emotional, and social network support as intersectional stigma reduction interventions. Men who have sex with men, lesbians, and bisexual women used such strategies to navigate a heavily criminalized and stigmatizing setting during the COVID-19 pandemic in Uganda. Conclusion: This study provides evidence for the social work profession to develop and implement psychosocial interventions that reduce HIV stigma and discrimination among MSM, lesbians, and bisexual young people living with HIV in Uganda.

Keywords: pyschosocial interventions, social work, intersectional stigma, HIV/AIDS, adolescents, sexual minorities, Uganda

Procedia PDF Downloads 105
1429 Multi-Layer Perceptron and Radial Basis Function Neural Network Models for Classification of Diabetic Retinopathy Disease Using Video-Oculography Signals

Authors: Ceren Kaya, Okan Erkaymaz, Orhan Ayar, Mahmut Özer

Abstract:

Diabetes Mellitus (Diabetes) is a disease based on insulin hormone disorders and causes high blood glucose. Clinical findings determine that diabetes can be diagnosed by electrophysiological signals obtained from the vital organs. 'Diabetic Retinopathy' is one of the most common eye diseases resulting on diabetes and it is the leading cause of vision loss due to structural alteration of the retinal layer vessels. In this study, features of horizontal and vertical Video-Oculography (VOG) signals have been used to classify non-proliferative and proliferative diabetic retinopathy disease. Twenty-five features are acquired by using discrete wavelet transform with VOG signals which are taken from 21 subjects. Two models, based on multi-layer perceptron and radial basis function, are recommended in the diagnosis of Diabetic Retinopathy. The proposed models also can detect level of the disease. We show comparative classification performance of the proposed models. Our results show that proposed the RBF model (100%) results in better classification performance than the MLP model (94%).

Keywords: diabetic retinopathy, discrete wavelet transform, multi-layer perceptron, radial basis function, video-oculography (VOG)

Procedia PDF Downloads 254
1428 Selection of New Business in Brazilian Companies Incubators through Hierarchical Methodology

Authors: Izabel Cristina Zattar, Gilberto Passos Lima, Guilherme Schünemann de Oliveira

Abstract:

In Brazil, there are several institutions committed to the development of new businesses based on product innovation. Among them are business incubators, universities and science institutes. Business incubators can be defined as nurseries for new companies, which may be in the technology segment, discussed in this article. Business incubators provide services related to infrastructure, such as physical space and meeting rooms. Besides these services, incubators also offer assistance in the form of information and communication, access to finance, relationship networks and business monitoring and mentoring processes. Business incubators support not all technology companies. One of the business incubators tasks is to assess the nature and feasibility of new business proposals. To assist this goal, this paper proposes a methodology for evaluating new business using the Analytic Hierarchy Process (AHP). This paper presents the concepts used in the assessing methodology application for new business, concepts that have been tested with positive results in practice. This study counts on three main steps: first, a hierarchy was built, based on new business manuals used by the business incubators. These books and manuals relate business selection requirements, such as the innovation status and other technological aspects. Then, a questionnaire was generated, in order to guide incubator experts in the parity comparisons at all hierarchy levels. The weights of each requirement are calculated from information obtained from the questionnaire responses. Finally, the proposed method was applied to evaluate five new business proposals, which were applying to be part of a company incubator. The main result is the classification of these new businesses, which helped the incubator experts to decide what companies were more eligible to work with. This classification may also be helpful to the decision-making process of business incubators in future selection processes.

Keywords: Analytic Hierarchy Process (AHP), Brazilian companies incubators, technology companies, incubator

Procedia PDF Downloads 371
1427 Remote Sensing and Gis Use in Trends of Urbanization and Regional Planning

Authors: Sawan Kumar Jangid

Abstract:

The paper attempts to study various facets of urbanization and regional planning in the framework of the present conditions and future needs. Urbanization is a dynamic system in which development and changes are prominent features; which implies population growth and changes in the primary, secondary and tertiary sector in the economy. Urban population is increasing day by day due to a natural increase in population and migration from rural areas, and the impact is bound to have in urban areas in terms of infrastructure, environment, water supply and other vital resources. For the organized way of planning and monitoring the implementation of Physical urban and regional plans high-resolution satellite imagery is the potential solution. Now the Remote Sensing data is widely used in urban as well as regional planning, infrastructure planning mainly telecommunication and transport network planning, highway development, accessibility to market area development in terms of catchment and population built-up area density. With Remote Sensing it is possible to identify urban growth, which falls outside the formal planning control. Remote Sensing and GIS technique combined together facilitate the planners, in making a decision, for general public and investors to have relevant data for their use in minimum time. This paper sketches out the Urbanization modal for the future development of Urban and Regional Planning. The paper suggests, a dynamic approach towards regional development strategy.

Keywords: development, dynamic, migration, resolution

Procedia PDF Downloads 417
1426 Tamukkana, Ancient Achaemenids City near the Persian Gulf

Authors: Ghulamhossein Nezami

Abstract:

Civilizations based in Iran, especially in the south, have always realized the all-around importance of the Persian Sea and for various reasons, have paid full attention to it. The first of these was the pre-Aryan government, Ilam in the coastal province of Sharihum and the city of Lian (now the port of Bushehr) in terms of trade, defense and religion. With the establishment of the Achaemenids on the entire plateau of Iran to the center of Persia, they created several communication routes from Parseh to the shores of the Persian Gulf, which ended in the present Bushehr province. This coastal area was extended by a road in the coastal plain to the more southern parts of the ports of Ausinze - according to Ptolemy the port of Siraf before the Sassanids - and Epstane and Hormozia in the present-day Strait of Hormuz. Meanwhile, the ancient city of Temukknana, whose new historical documents testify to its extraordinary importance in the Achaemenid period, especially Darius I of the Achaemenids, from a strategic position with the coastal areas, the coasts and on the other hand with the gamers, the political center. - Achaemenid administration, had. New archeological evidence, research, and excavations show that both the famous Achaemenid kings and courtiers paid special attention to Tamukknana. The discovery of a tomb and three Achaemenid palaces from before the reign of Cyrus to Xerxes in this region showed the importance of the strategic, security-defense and commercial position of this region, extraordinary for the Achaemenids. Therefore, the city of Temukkana in the Dashtestan region of present-day Bushehr province became an important Achaemenid center on the Persian Gulf coast and became the political-economic center of gravity of the Achaemenids and the regulator of communication networks on the Persian Gulf coast. This event showed that the Achaemenids attached importance to their economic goals and oversight of their vast territory by the Persian Gulf. Methods: Book resources and field study.

Keywords: Achaemenids, Bushehr, Persian Gulf, Tamukkana

Procedia PDF Downloads 190
1425 Parametric Analysis and Optimal Design of Functionally Graded Plates Using Particle Swarm Optimization Algorithm and a Hybrid Meshless Method

Authors: Foad Nazari, Seyed Mahmood Hosseini, Mohammad Hossein Abolbashari, Mohammad Hassan Abolbashari

Abstract:

The present study is concerned with the optimal design of functionally graded plates using particle swarm optimization (PSO) algorithm. In this study, meshless local Petrov-Galerkin (MLPG) method is employed to obtain the functionally graded (FG) plate’s natural frequencies. Effects of two parameters including thickness to height ratio and volume fraction index on the natural frequencies and total mass of plate are studied by using the MLPG results. Then the first natural frequency of the plate, for different conditions where MLPG data are not available, is predicted by an artificial neural network (ANN) approach which is trained by back-error propagation (BEP) technique. The ANN results show that the predicted data are in good agreement with the actual one. To maximize the first natural frequency and minimize the mass of FG plate simultaneously, the weighted sum optimization approach and PSO algorithm are used. However, the proposed optimization process of this study can provide the designers of FG plates with useful data.

Keywords: optimal design, natural frequency, FG plate, hybrid meshless method, MLPG method, ANN approach, particle swarm optimization

Procedia PDF Downloads 363
1424 Evaluation of Aquifer Protective Capacity and Soil Corrosivity Using Geoelectrical Method

Authors: M. T. Tsepav, Y. Adamu, M. A. Umar

Abstract:

A geoelectric survey was carried out in some parts of Angwan Gwari, an outskirt of Lapai Local Government Area on Niger State which belongs to the Nigerian Basement Complex, with the aim of evaluating the soil corrosivity, aquifer transmissivity and protective capacity of the area from which aquifer characterisation was made. The G41 Resistivity Meter was employed to obtain fifteen Schlumberger Vertical Electrical Sounding data along profiles in a square grid network. The data were processed using interpex 1-D sounding inversion software, which gives vertical electrical sounding curves with layered model comprising of the apparent resistivities, overburden thicknesses and depth. This information was used to evaluate longitudinal conductance and transmissivities of the layers. The results show generally low resistivities across the survey area and an average longitudinal conductance variation from 0.0237Siemens in VES 6 to 0.1261 Siemens in VES 15 with almost the entire area giving values less than 1.0 Siemens. The average transmissivity values range from 96.45 Ω.m2 in VES 4 to 299070 Ω.m2 in VES 1. All but VES 4 and VES14 had an average overburden greater than 400 Ω.m2, these results suggest that the aquifers are highly permeable to fluid movement within, leading to the possibility of enhanced migration and circulation of contaminants in the groundwater system and that the area is generally corrosive.

Keywords: geoelectric survey, corrosivity, protective capacity, transmissivity

Procedia PDF Downloads 333
1423 Performance Comparison of Droop Control Methods for Parallel Inverters in Microgrid

Authors: Ahmed Ismail, Mustafa Baysal

Abstract:

Although the energy source in the world is mainly based on fossil fuels today, there is a need for alternative energy generation systems, which are more economic and environmentally friendly, due to continuously increasing demand of electric energy and lacking power resources and networks. Distributed Energy Resources (DERs) such as fuel cells, wind and solar power have recently become widespread as alternative generation. In order to solve several problems that might be encountered when integrating DERs to power system, the microgrid concept has been proposed. A microgrid can operate both grid connected and island mode to benefit both utility and customers. For most distributed energy resources (DER) which are connected in parallel in LV-grid like micro-turbines, wind plants, fuel cells and PV cells electrical power is generated as a direct current (DC) and converted to an alternative currents (AC) by inverters. So the inverters are assumed to be primary components in a microgrid. There are many control techniques of parallel inverters to manage active and reactive sharing of the loads. Some of them are based on droop method. In literature, the studies are usually focused on improving the transient performance of inverters. In this study, the performance of two different controllers based on droop control method is compared for the inverters operated in parallel without any communication feedback. For this aim, a microgrid in which inverters are controlled by conventional droop controller and modified droop controller is designed. Modified controller is obtained by adding PID into conventional droop control. Active and reactive power sharing performance, voltage and frequency responses of those control methods are measured in several operational cases. Study cases have been simulated by MATLAB-SIMULINK.

Keywords: active and reactive power sharing, distributed generation, droop control, microgrid

Procedia PDF Downloads 590
1422 Steel Bridge Coating Inspection Using Image Processing with Neural Network Approach

Authors: Ahmed Elbeheri, Tarek Zayed

Abstract:

Steel bridges deterioration has been one of the problems in North America for the last years. Steel bridges deterioration mainly attributed to the difficult weather conditions. Steel bridges suffer fatigue cracks and corrosion, which necessitate immediate inspection. Visual inspection is the most common technique for steel bridges inspection, but it depends on the inspector experience, conditions, and work environment. So many Non-destructive Evaluation (NDE) models have been developed use Non-destructive technologies to be more accurate, reliable and non-human dependent. Non-destructive techniques such as The Eddy Current Method, The Radiographic Method (RT), Ultra-Sonic Method (UT), Infra-red thermography and Laser technology have been used. Digital Image processing will be used for Corrosion detection as an Alternative for visual inspection. Different models had used grey-level and colored digital image for processing. However, color image proved to be better as it uses the color of the rust to distinguish it from the different backgrounds. The detection of the rust is an important process as it’s the first warning for the corrosion and a sign of coating erosion. To decide which is the steel element to be repainted and how urgent it is the percentage of rust should be calculated. In this paper, an image processing approach will be developed to detect corrosion and its severity. Two models were developed 1st to detect rust and 2nd to detect rust percentage.

Keywords: steel bridge, bridge inspection, steel corrosion, image processing

Procedia PDF Downloads 299