Search results for: semantic differential scale
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7911

Search results for: semantic differential scale

7461 A Hyperexponential Approximation to Finite-Time and Infinite-Time Ruin Probabilities of Compound Poisson Processes

Authors: Amir T. Payandeh Najafabadi

Abstract:

This article considers the problem of evaluating infinite-time (or finite-time) ruin probability under a given compound Poisson surplus process by approximating the claim size distribution by a finite mixture exponential, say Hyperexponential, distribution. It restates the infinite-time (or finite-time) ruin probability as a solvable ordinary differential equation (or a partial differential equation). Application of our findings has been given through a simulation study.

Keywords: ruin probability, compound poisson processes, mixture exponential (hyperexponential) distribution, heavy-tailed distributions

Procedia PDF Downloads 333
7460 A Cognitive Semantic Analysis of the Metaphorical Extensions of Come out and Take Over

Authors: Raquel Rossini, Edelvais Caldeira

Abstract:

The aim of this work is to investigate the motivation for the metaphorical uses of two verb combinations: come out and take over. Drawing from cognitive semantics theories, image schemas and metaphors, it was attempted to demonstrate that: a) the metaphorical senses of both 'come out' and 'take over' extend from both the verbs and the particles central (spatial) senses in such verb combinations; and b) the particles 'out' and 'over' also contribute to the whole meaning of the verb combinations. In order to do so, a random selection of 579 concordance lines for come out and 1,412 for take over was obtained from the Corpus of Contemporary American English – COCA. One of the main procedures adopted in the present work was the establishment of verb and particle central senses. As per the research questions addressed in this study, they are as follows: a) how does the identification of trajector and landmark help reveal patterns that contribute for the identification of the semantic network of these two verb combinations?; b) what is the relationship between the schematic structures attributed to the particles and the metaphorical uses found in empirical data?; and c) what conceptual metaphors underlie the mappings from the source to the target domains? The results demonstrated that not only the lexical verbs come and take, but also the particles out and over play an important whole in the different meanings of come out and take over. Besides, image schemas and conceptual metaphors were found to be helpful in order to establish the motivations for the metaphorical uses of these linguistic structures.

Keywords: cognitive linguistics, English syntax, multi-word verbs, prepositions

Procedia PDF Downloads 149
7459 Transformer Life Enhancement Using Dynamic Switching of Second Harmonic Feature in IEDs

Authors: K. N. Dinesh Babu, P. K. Gargava

Abstract:

Energization of a transformer results in sudden flow of current which is an effect of core magnetization. This current will be dominated by the presence of second harmonic, which in turn is used to segregate fault and inrush current, thus guaranteeing proper operation of the relay. This additional security in the relay sometimes obstructs or delays differential protection in a specific scenario, when the 2nd harmonic content was present during a genuine fault. This kind of scenario can result in isolation of the transformer by Buchholz and pressure release valve (PRV) protection, which is acted when fault creates more damage in transformer. Such delays involve a huge impact on the insulation failure, and chances of repairing or rectifying fault of problem at site become very dismal. Sometimes this delay can cause fire in the transformer, and this situation becomes havoc for a sub-station. Such occurrences have been observed in field also when differential relay operation was delayed by 10-15 ms by second harmonic blocking in some specific conditions. These incidences have led to the need for an alternative solution to eradicate such unwarranted delay in operation in future. Modern numerical relay, called as intelligent electronic device (IED), is embedded with advanced protection features which permit higher flexibility and better provisions for tuning of protection logic and settings. Such flexibility in transformer protection IEDs, enables incorporation of alternative methods such as dynamic switching of second harmonic feature for blocking the differential protection with additional security. The analysis and precautionary measures carried out in this case, have been simulated and discussed in this paper to ensure that similar solutions can be adopted to inhibit analogous issues in future.

Keywords: differential protection, intelligent electronic device (IED), 2nd harmonic inhibit, inrush inhibit

Procedia PDF Downloads 295
7458 Etymological Studies and their Role in Consolidating the Identity of the Cultural Heritage; Terminology Related to the Traditional Dagger Making in the Sultanate of Oman as a Model

Authors: Muhammed Muvaffak Alhasan, Ali Alriyami, Ali Almanei

Abstract:

Despite the extreme importance of etymological studies in documenting the linguistic heritage, and showing its roots and connections in the classical language; However, etymological dictionaries are still rare in the Arab library in general. Etymology is the science of etymology that investigates how vocabulary is reproduced and reproduced, by exploring the origin of words and the phonetic and semantic changes that occurred in them over time, trying to reconfigure an identity card for the word showing its origin and the path it took through time until it reached its current state. This research seeks to make an etymological study on the terminology used in the traditional dagger making in the Sultanate of Oman through the following steps: 1. Collecting the terms relating to traditional dagger making and recording them in order to document and preserve them. 2. Arranging them alphabetically in order to facilitate searching and dealing with them. 3. Setting up a historical identification card for each word by applying an etymological study that shows its source from which they descended its links with standard and the phonological and semantic changes it underwent until it reached its current form.

Keywords: cultural heritage, etymology, Omani dagger, Oman

Procedia PDF Downloads 74
7457 Shaping Lexical Concept of 'Mage' through Image Schemas in Dragon Age 'Origins'

Authors: Dean Raiyasmi, Elvi Citraresmana, Sutiono Mahdi

Abstract:

Language shapes the human mind and its concept toward things. Using image schemas, in nowadays technology, even AI (artificial intelligence) can concept things in response to their creator negativity or positivity. This is reflected inside one of the most selling game around the world in 2012 called Dragon Age Origins. The AI in form of NPC (Non-Playable Character) inside the game reflects on the creator of the game on negativity or positivity toward the lexical concept of mage. Through image schemas, shaping the lexical concept of mage deemed possible and proved the negativity or positivity creator of the game toward mage. This research analyses the cognitive-semantic process of image schema and shaping the concept of ‘mage’ by describing kinds of image schemas exist in the Dragon Age Origin Game. This research is also aimed to analyse kinds of image schemas and describing the image schemas which shaping the concept of ‘mage’ itself. The methodology used in this research is qualitative where participative observation is employed with five stages and documentation. The results shows that there are four image schemas exist in the game and those image schemas shaping the lexical concept of ‘mage’.

Keywords: cognitive semantic, image-schema, conceptual metaphor, video game

Procedia PDF Downloads 433
7456 Investigating Translations of Websites of Pakistani Public Offices

Authors: Sufia Maroof

Abstract:

This empirical study investigated the web-translations of five Pakistani public offices (FPSC, FIA, HEC, USB, and Ministry of Finance) offering Urdu tab as an option to access information on their official websites. Triangulation of quantitative and qualitative research design informed the researcher of the semantic, lexical and syntactic caveats in these translations. The study hypothesized that majority of the Pakistani population is oblivious of the Supreme Court’s amendments in language policy concerning national and official language; hence, Urdu web-translations of the public departments have not been accessed effectively. Firstly, the researcher conducted an online survey, comprising of two sections, close ended and short answer based questions. Secondly, the researcher compiled corpus of the five selected websites in a tabular form to compare the data. Thirdly, the administrators of the departments had been contacted regarding the methods of translation and the expertise of the personnel involved. The corpus was assessed for TQA after examining the lexical, semantic, syntactical and technical alignment inaccuracies and imperfections. The study suggests the public offices to invest in their Urdu webs by either hiring expert translators or engaging expertise of a translation agency for this project to offer quality translation to public.

Keywords: machine translations, public offices, Urdu translations, websites

Procedia PDF Downloads 123
7455 Porul: Option Generation and Selection and Scoring Algorithms for a Tamil Flash Card Game

Authors: Anitha Narasimhan, Aarthy Anandan, Madhan Karky, C. N. Subalalitha

Abstract:

Games can be the excellent tools for teaching a language. There are few e-learning games in Indian languages like word scrabble, cross word, quiz games etc., which were developed mainly for educational purposes. This paper proposes a Tamil word game called, “Porul”, which focuses on education as well as on players’ thinking and decision-making skills. Porul is a multiple choice based quiz game, in which the players attempt to answer questions correctly from the given multiple options that are generated using a unique algorithm called the Option Selection algorithm which explores the semantics of the question in various dimensions namely, synonym, rhyme and Universal Networking Language semantic category. This kind of semantic exploration of the question not only increases the complexity of the game but also makes it more interesting. The paper also proposes a Scoring Algorithm which allots a score based on the popularity score of the question word. The proposed game has been tested using 20,000 Tamil words.

Keywords: Porul game, Tamil word game, option selection, flash card, scoring, algorithm

Procedia PDF Downloads 397
7454 Phylogenetic Differential Separation of Environmental Samples

Authors: Amber C. W. Vandepoele, Michael A. Marciano

Abstract:

Biological analyses frequently focus on single organisms, however many times, the biological sample consists of more than the target organism; for example, human microbiome research targets bacterial DNA, yet most samples consist largely of human DNA. Therefore, there would be an advantage to removing these contaminating organisms. Conversely, some analyses focus on a single organism but would greatly benefit from the additional information regarding the other organismal components of the sample. Forensic analysis is one such example, wherein most forensic casework, human DNA is targeted; however, it typically exists in complex non-pristine sample substrates such as soil or unclean surfaces. These complex samples are commonly comprised of not just human tissue but also microbial and plant life, where these organisms may help gain more forensically relevant information about a specific location or interaction. This project aims to optimize a ‘phylogenetic’ differential extraction method that will separate mammalian, bacterial and plant cells in a mixed sample. This is accomplished through the use of size exclusion separation, whereby the different cell types are separated through multiple filtrations using 5 μm filters. The components are then lysed via differential enzymatic sensitivities among the cells and extracted with minimal contribution from the preceding component. This extraction method will then allow complex DNA samples to be more easily interpreted through non-targeting sequencing since the data will not be skewed toward the smaller and usually more numerous bacterial DNAs. This research project has demonstrated that this ‘phylogenetic’ differential extraction method successfully separated the epithelial and bacterial cells from each other with minimal cell loss. We will take this one step further, showing that when adding the plant cells into the mixture, they will be separated and extracted from the sample. Research is ongoing, and results are pending.

Keywords: DNA isolation, geolocation, non-human, phylogenetic separation

Procedia PDF Downloads 108
7453 The Data-Driven Localized Wave Solution of the Fokas-Lenells Equation using PINN

Authors: Gautam Kumar Saharia, Sagardeep Talukdar, Riki Dutta, Sudipta Nandy

Abstract:

The physics informed neural network (PINN) method opens up an approach for numerically solving nonlinear partial differential equations leveraging fast calculating speed and high precession of modern computing systems. We construct the PINN based on strong universal approximation theorem and apply the initial-boundary value data and residual collocation points to weekly impose initial and boundary condition to the neural network and choose the optimization algorithms adaptive moment estimation (ADAM) and Limited-memory Broyden-Fletcher-Golfard-Shanno (L-BFGS) algorithm to optimize learnable parameter of the neural network. Next, we improve the PINN with a weighted loss function to obtain both the bright and dark soliton solutions of Fokas-Lenells equation (FLE). We find the proposed scheme of adjustable weight coefficients into PINN has a better convergence rate and generalizability than the basic PINN algorithm. We believe that the PINN approach to solve the partial differential equation appearing in nonlinear optics would be useful to study various optical phenomena.

Keywords: deep learning, optical Soliton, neural network, partial differential equation

Procedia PDF Downloads 120
7452 Dual Solutions in Mixed Convection Boundary Layer Flow: A Stability Analysis

Authors: Anuar Ishak

Abstract:

The mixed convection stagnation point flow toward a vertical plate is investigated. The external flow impinges normal to the heated plate and the surface temperature is assumed to vary linearly with the distance from the stagnation point. The governing partial differential equations are transformed into a set of ordinary differential equations, which are then solved numerically using MATLAB routine boundary value problem solver bvp4c. Numerical results show that dual solutions are possible for a certain range of the mixed convection parameter. A stability analysis is performed to determine which solution is linearly stable and physically realizable.

Keywords: dual solutions, heat transfer, mixed convection, stability analysis

Procedia PDF Downloads 387
7451 The Solution of Nonlinear Partial Differential Equation for The Phenomenon of Instability in Homogeneous Porous Media by Homotopy Analysis Method

Authors: Kajal K. Patel, M. N. Mehta, T. R. Singh

Abstract:

When water is injected in oil formatted area in secondary oil recovery process the instability occurs near common interface due to viscosity difference of injected water and native oil. The governing equation gives rise to the non-linear partial differential equation and its solution has been obtained by Homotopy analysis method with appropriate guess value of the solution together with some conditions and standard relations. The solution gives the average cross-sectional area occupied by the schematic fingers during the occurs of instability phenomenon. The numerical and graphical presentation has developed by using Maple software.

Keywords: capillary pressure, homotopy analysis method, instability phenomenon, viscosity

Procedia PDF Downloads 490
7450 Search for APN Permutations in Rings ℤ_2×ℤ_2^k

Authors: Daniel Panario, Daniel Santana de Freitas, Brett Stevens

Abstract:

Almost Perfect Nonlinear (APN) permutations with optimal resistance against differential cryptanalysis can be found in several domains. The permutation used in the standard for symmetric cryptography (the AES), for example, is based on a special kind of inversion in GF(28). Although very close to APN (2-uniform), this permutation still contains one number 4 in its differential spectrum, which means that, rigorously, it must be classified as 4-uniform. This fact motivates the search for fully APN permutations in other domains of definition. The extremely high complexity associated to this kind of problem precludes an exhaustive search for an APN permutation with 256 elements to be performed without the support of a suitable mathematical structure. On the other hand, in principle, there is nothing to indicate which mathematically structured domains can effectively help the search, and it is necessary to test several domains. In this work, the search for APN permutations in rings ℤ2×ℤ2k is investigated. After a full, exhaustive search with k=2 and k=3, all possible APN permutations in those rings were recorded, together with their differential profiles. Some very promising heuristics in these cases were collected so that, when used as a basis to prune backtracking for the same search in ℤ2×ℤ8 (search space with size 16! ≅244), just a few tenths of a second were enough to produce an APN permutation in a single CPU. Those heuristics were empirically extrapolated so that they could be applied to a backtracking search for APNs over ℤ2×ℤ16 (search space with size 32! ≅2117). The best permutations found in this search were further refined through Simulated Annealing, with a definition of neighbors suitable to this domain. The best result produced with this scheme was a 3-uniform permutation over ℤ2×ℤ16 with only 24 values equal to 3 in the differential spectrum (all the other 968 values were less than or equal 2, as it should be the case for an APN permutation). Although far from being fully APN, this result is technically better than a 4-uniform permutation and demanded only a few seconds in a single CPU. This is a strong indication that the use of mathematically structured domains, like the rings described in this work, together with heuristics based on smaller cases, can lead to dramatic cuts in the computational resources involved in the complexity of the search for APN permutations in extremely large domains.

Keywords: APN permutations, heuristic searches, symmetric cryptography, S-box design

Procedia PDF Downloads 153
7449 Dynamics Analyses of Swing Structure Subject to Rotational Forces

Authors: Buntheng Chhorn, WooYoung Jung

Abstract:

Large-scale swing has been used in entertainment and performance, especially in circus, for a very long time. To increase the safety of this type of structure, a thorough analysis for displacement and bearing stress was performed for an extreme condition where a full cycle swing occurs. Different masses, ranging from 40 kg to 220 kg, and velocities were applied on the swing. Then, based on the solution of differential dynamics equation, swing velocity response to harmonic force was obtained. Moreover, the resistance capacity was estimated based on ACI steel structure design guide. Subsequently, numerical analysis was performed in ABAQUS to obtain the stress on each frame of the swing. Finally, the analysis shows that the expansion of swing structure frame section was required for mass bigger than 150kg.

Keywords: swing structure, displacement, bearing stress, dynamic loads response, finite element analysis

Procedia PDF Downloads 377
7448 Toward an Understanding of the Neurofunctional Dissociation between Animal and Tool Concepts: A Graph Theoretical Analysis

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from Mc Rae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-world, resilience to damage

Procedia PDF Downloads 540
7447 Stability Analysis for an Extended Model of the Hypothalamus-Pituitary-Thyroid Axis

Authors: Beata Jackowska-Zduniak

Abstract:

We formulate and analyze a mathematical model describing dynamics of the hypothalamus-pituitary-thyroid homoeostatic mechanism in endocrine system. We introduce to this system two types of couplings and delay. In our model, feedback controls the secretion of thyroid hormones and delay reflects time lags required for transportation of the hormones. The influence of delayed feedback on the stability behaviour of the system is discussed. Analytical results are illustrated by numerical examples of the model dynamics. This system of equations describes normal activity of the thyroid and also a couple of types of malfunctions (e.g. hyperthyroidism).

Keywords: mathematical modeling, ordinary differential equations, endocrine system, delay differential equation

Procedia PDF Downloads 331
7446 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 82
7445 Parallel Particle Swarm Optimization Optimized LDI Controller with Lyapunov Stability Criterion for Nonlinear Structural Systems

Authors: P. W. Tsai, W. L. Hong, C. W. Chen, C. Y. Chen

Abstract:

In this paper, we present a neural network (NN) based approach represent a nonlinear Tagagi-Sugeno (T-S) system. A linear differential inclusion (LDI) state-space representation is utilized to deal with the NN models. Taking advantage of the LDI representation, the stability conditions and controller design are derived for a class of nonlinear structural systems. Moreover, the concept of utilizing the Parallel Particle Swarm Optimization (PPSO) algorithm to solve the common P matrix under the stability criteria is given in this paper.

Keywords: Lyapunov stability, parallel particle swarm optimization, linear differential inclusion, artificial intelligence

Procedia PDF Downloads 650
7444 The Mechanism of Calcium Carbonate Scale Deposition Affected by Carboxymethyl Chitosan

Authors: Genaro Bolívar, Manuel Mas, Maria Tortolero, Jorge Salazar

Abstract:

Due to the extensive use of water injection for oil displacement and pressure maintenance in oil fields, many reservoirs experience the problem of scale deposition when injection water starts to break through. In most cases the scaled-up wells are caused by the formation of sulfate and carbonate scales of calcium and strontium. Due to their relative hardness and low solubility, there are limited processes available for their removal and preventive measures such as the “squeeze” inhibitor treatment have to be taken. It is, therefore, important to gain a proper understanding of the kinetics of scale formation and its detrimental effects on formation damage under both inhibited and uninhibited conditions. Recently, the production of chitosan was started in our country and in the PDVSA-Intevep laboratories was synthesized and evaluated the properties of carboxymethyl chitosan (CMQ) as chelating agent of Ca2 + ions in water injection. In this regard, the characterization of the biopolymer by 13C - NMR, FTIR, TGA, and TM0374-2007 standard laboratory test has demonstrated the ability to remove up to 70% calcium ions in solution and shows a behavior that approaches that of commercial products.

Keywords: carboxymethyl chitosan, scale, calcium carbonate scale deposition, water injection

Procedia PDF Downloads 431
7443 Determination of the Minimum Time and the Optimal Trajectory of a Moving Robot Using Picard's Method

Authors: Abbes Lounis, Kahina Louadj, Mohamed Aidene

Abstract:

This paper presents an optimal control problem applied to a robot; the problem is to determine a command which makes it possible to reach a final state from a given initial state in record time. The approach followed to solve this optimization problem with constraints on the control starts by presenting the equations of motion of the dynamic system then by applying Pontryagin's maximum principle (PMP) to determine the optimal control, and Picard's successive approximation method combined with the shooting method to solve the resulting differential system.

Keywords: robotics, Pontryagin's Maximum Principle, PMP, Picard's method, shooting method, non-linear differential systems

Procedia PDF Downloads 251
7442 Study of the Microstructural Evolution and Precipitation Kinetic in AZ91 Alloys

Authors: A. Azizi, M. Toubane, L. Chetibi

Abstract:

Differential scanning calorimetry (DSC) is a widely used technique for the study of phase transformations, particularly in the study of precipitation. The kinetic of the precipitation and dissolution is always related to the concept of activation energy Ea. The determination of the activation energy gives important information about the kinetic of the precipitation reaction. In this work, we were interested in the study of the isothermal and non-isothermal treatments on the decomposition of the supersaturated solid solution in the alloy AZ91 (Mg-9 Al-Zn 1-0.2 Mn. mass fraction %), using Differential Calorimetric method. Through this method, the samples were heat treated up to 425° C, using different rates. To calculate the apparent activation energies associated with the formation of precipitated phases, we used different isoconversional methods. This study was supported by other analysis: X-ray diffraction and microhardness measurements.

Keywords: calorimetric, activation energy, AZ91 alloys, microstructural evolution

Procedia PDF Downloads 436
7441 Magnetohydrodynamic Flow over an Exponentially Stretching Sheet

Authors: Raj Nandkeolyar, Precious Sibanda

Abstract:

The flow of a viscous, incompressible, and electrically conducting fluid under the influence of aligned magnetic field acting along the direction of fluid flow over an exponentially stretching sheet is investigated numerically. The nonlinear partial differential equations governing the flow model is transformed to a set of nonlinear ordinary differential equations using suitable similarity transformation and the solution is obtained using a local linearization method followed by the Chebyshev spectral collocation method. The effects of various parameters affecting the flow and heat transfer as well as the induced magnetic field are discussed using suitable graphs and tables.

Keywords: aligned magnetic field, exponentially stretching sheet, induced magnetic field, magnetohydrodynamic flow

Procedia PDF Downloads 446
7440 Sustainable Micro Architecture: A Pattern for Urban Release Areas

Authors: Saber Fatourechian

Abstract:

People within modern cities have faced macro urban values spreads rapidly through current style of living. Unexpected phenomena without any specific features of micro scale, humanity and urban social/cultural patterns. The gap between micro and macro scale is unidentified and people could not recognize where they are especially in the interaction between life and city. Urban life details were verified. Micro architecture is a pattern in which human activity derives from human needs in an unconscious position. Sustainable attitude via micro architecture causes flexibility in decision making through micro urbanism essentially impacts macro scale. In this paper the definition of micro architecture and its relation with city and human activity are argued, there after the interaction between micro and macro scale is presented as an effective way for urban sustainable development.

Keywords: micro architecture, sustainability, human activity, city

Procedia PDF Downloads 497
7439 Factor Structure of the University of California, Los Angeles (UCLA) Loneliness Scale: Gender, Age, and Marital Status Differences

Authors: Hamzeh Dodeen

Abstract:

This study aims at examining the effects of item wording effects on the factor structure of the University of California, Los Angeles (UCLA) Loneliness Scale: gender, age, and marital status differences. A total of 2374 persons from the UAE participated, representing six different populations (teenagers/elderly, males/females, and married/unmarried). The results of the exploratory factor analysis using principal axis factoring with (oblique) rotation revealed that two factors were extracted from the 20 items of the scale. The nine positively worded items were highly loaded on the first factor, while 10 out of the 11 negatively worded items were highly loaded on the second factor. The two-factor solution was confirmed on the six different populations based on age, gender, and marital status. It has been concluded that the rating of the UCLA scale is affected by a response style related to the item wording.

Keywords: UCLA Loneliness Scale, loneliness, positively worded items, factor structure, negatively worded items

Procedia PDF Downloads 347
7438 Effect of Polarized Light Therapy on Oral Mucositis in Cancer Patients Receiving Chemotherapy

Authors: Zakaria Mowafy Emam Mowafy, Hamed Abd Allah Hamed, Marwa Mahmoud Abd-Elmotalb, Andrew Anis Fakhray Mosaad

Abstract:

The purpose of this paper is to determine the efficacy of polarized light therapy for chemotherapy-treated cancer patients who have oral mucositis. Methods of evaluation are the measurement of the WHO oral mucositis scale and the common toxicity criteria scale. Methods: Thirty cancer patients receiving chemotherapy (males and females) who had oral mucositis and ulceration pain, and their ages ranged from 30 to 55 years, were divided into two groups. Group (A), composed of 15 patients, received the Bioptron light therapy (BLT) in addition to the routine medical care of oral mucositis. Group (B) received only the routine medical care of oral mucositis; the duration of the BLT application was 10 minutes applied daily for 30 days. Results and conclusion: Results showed that the application of the BLT had valuable healing effects on oral mucositis in cancer patients receiving chemotherapy, as evidenced by the high decreases of the WHO oral mucositis scale and the common toxicity criteria scale.

Keywords: Bioptron light therapy, oral mucositis, WHO oral mucositis scale, common toxicity criteria scale

Procedia PDF Downloads 97
7437 Basket Option Pricing under Jump Diffusion Models

Authors: Ali Safdari-Vaighani

Abstract:

Pricing financial contracts on several underlying assets received more and more interest as a demand for complex derivatives. The option pricing under asset price involving jump diffusion processes leads to the partial integral differential equation (PIDEs), which is an extension of the Black-Scholes PDE with a new integral term. The aim of this paper is to show how basket option prices in the jump diffusion models, mainly on the Merton model, can be computed using RBF based approximation methods. For a test problem, the RBF-PU method is applied for numerical solution of partial integral differential equation arising from the two-asset European vanilla put options. The numerical result shows the accuracy and efficiency of the presented method.

Keywords: basket option, jump diffusion, ‎radial basis function, RBF-PUM

Procedia PDF Downloads 346
7436 Productive Efficiency in Asean Banking

Authors: Suhartono Suhartono

Abstract:

Issue of cost efficiency is then becoming pivotal point because public expect cost of banking operation reducing and benefited of consumers. This study examines the determinants of cost efficiency of banks operating in 8 member countries of the Association of Southeast Asian Nations (ASEAN). This study uses economics theory approach to examine the existence of economies of scale in the ASEAN Banking market especially on its impact on cost efficiency. We apply concept of average cost (AC) as a proxy for the cost efficiency. We find that economies of scale is existing in the banking market indicating scale and scope economies should be considered in the industrial policy. The stronger capital position is also positive to efficiency means stronger capitalized banks are more efficient. Bank that remunerates better tend to be more efficient as result economic capital effect.

Keywords: cost efficiency, ASEAN, economies of scale, issue of cost

Procedia PDF Downloads 373
7435 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 84
7434 Magnetohydrodynamic 3D Maxwell Fluid Flow Towards a Horizontal Stretched Surface with Convective Boundary Conditions

Authors: M. Y. Malika, Farzana, Abdul Rehman

Abstract:

The study deals with the steady, 3D MHD boundary layer flow of a non-Newtonian Maxwell fluid flow due to a horizontal surface stretched exponentially in two lateral directions. The temperature at the boundary is assumed to be distributed exponentially and possesses convective boundary conditions. The governing nonlinear system of partial differential equations along with associated boundary conditions is simplified using a suitable transformation and the obtained set of ordinary differential equations is solved through numerical techniques. The effects of important involved parameters associated with fluid flow and heat flux are shown through graphs.

Keywords: boundary layer flow, exponentially stretched surface, Maxwell fluid, numerical solution

Procedia PDF Downloads 581
7433 The Usage of Negative Emotive Words in Twitter

Authors: Martina Katalin Szabó, István Üveges

Abstract:

In this paper, the usage of negative emotive words is examined on the basis of a large Hungarian twitter-database via NLP methods. The data is analysed from a gender point of view, as well as changes in language usage over time. The term negative emotive word refers to those words that, on their own, without context, have semantic content that can be associated with negative emotion, but in particular cases, they may function as intensifiers (e.g. rohadt jó ’damn good’) or a sentiment expression with positive polarity despite their negative prior polarity (e.g. brutális, ahogy ez a férfi rajzol ’it’s awesome (lit. brutal) how this guy draws’. Based on the findings of several authors, the same phenomenon can be found in other languages, so it is probably a language-independent feature. For the recent analysis, 67783 tweets were collected: 37818 tweets (19580 tweets written by females and 18238 tweets written by males) in 2016 and 48344 (18379 tweets written by females and 29965 tweets written by males) in 2021. The goal of the research was to make up two datasets comparable from the viewpoint of semantic changes, as well as from gender specificities. An exhaustive lexicon of Hungarian negative emotive intensifiers was also compiled (containing 214 words). After basic preprocessing steps, tweets were processed by ‘magyarlanc’, a toolkit is written in JAVA for the linguistic processing of Hungarian texts. Then, the frequency and collocation features of all these words in our corpus were automatically analyzed (via the analysis of parts-of-speech and sentiment values of the co-occurring words). Finally, the results of all four subcorpora were compared. Here some of the main outcomes of our analyses are provided: There are almost four times fewer cases in the male corpus compared to the female corpus when the negative emotive intensifier modified a negative polarity word in the tweet (e.g., damn bad). At the same time, male authors used these intensifiers more frequently, modifying a positive polarity or a neutral word (e.g., damn good and damn big). Results also pointed out that, in contrast to female authors, male authors used these words much more frequently as a positive polarity word as well (e.g., brutális, ahogy ez a férfi rajzol ’it’s awesome (lit. brutal) how this guy draws’). We also observed that male authors use significantly fewer types of emotive intensifiers than female authors, and the frequency proportion of the words is more balanced in the female corpus. As for changes in language usage over time, some notable differences in the frequency and collocation features of the words examined were identified: some of the words collocate with more positive words in the 2nd subcorpora than in the 1st, which points to the semantic change of these words over time.

Keywords: gender differences, negative emotive words, semantic changes over time, twitter

Procedia PDF Downloads 198
7432 Evaluate the Effect of Teaching Small Scale Bussiness and Entrepreneurship on Graduates Unemployment in Nigeria: A Case Study of Anambra and Enugu State, South East Nigeria

Authors: Erinma Chibuzo Nwandu

Abstract:

Graduates unemployment has risen astronomically in spite of the emphasis on teaching of small scale business and Entrepreneurship in schools. This study sets out to evaluate the effect of teaching small scale business and Entrepreneurship on graduates’ unemployment in Nigeria. This study adopted the survey research design. Thus the nature of data for this study is primary, sourced by the use of a questionnaire administered to a sample of two thousand and sixty-five (2065) respondents drawn from groups of graduates who are employed, unemployed and self-employed in South East Nigeria. Simple percentages, Chi-square and regression analysis were used to derive useful and meaningful information and test the hypotheses respectively. Findings from the study suggest that Nigeria graduates are ill prepared to embark on small-scale business and entrepreneurship after graduation, and that teaching of small scale business and entrepreneurship in Nigeria tertiary institutions is ineffective on graduate unemployment reduction. Findings also suggest that while a lot of graduates agreed that they have taken a class(s) on small scale or entrepreneurship, they received more theoretical teachings than practical, more so while teachings on small scale business or entrepreneurship motivated graduates to think of self-employment, most of them cannot do a good business plan and hence could not benefit from some kind of Government assisted program for small-scale business and bank loan for the sake of small scale business. Thus, so many graduates are not interested in small scale business or entrepreneurship development as a result of lack of startup capital. The study thus recommends that course content and teaching method of entrepreneurship education needs to be reviewed and re-structured to constitute more practical teachings than theoretical teachings. Also, graduates should be exposed to seminar /workshop for self-employment at least once every semester. There should be practical teaching and practice of developing a business plan that will be viable to attract government or private sponsorship as well for it to be viable to attract financing from financing institutions. Government should provide a fund such as venture capital financing arrangement to empower business startups in Nigeria by graduates’.

Keywords: entrepreneurship, small scale business, startup capital, unemployment

Procedia PDF Downloads 270