Search results for: priority rules
1908 Assertion-Driven Test Repair Based on Priority Criteria
Authors: Ruilian Zhao, Shukai Zhang, Yan Wang, Weiwei Wang
Abstract:
Repairing broken test cases is an expensive and challenging task in evolving software systems. Although an automated repair technique with intent preservation has been proposed, but it does not take into account the association between test repairs and assertions, leading to a large number of irrelevant candidates and decreasing the repair capability. This paper proposes an assertion-driven test repair approach. Furthermore, an intent-oriented priority criterion is raised to guide the repair candidate generation, making the repairs closer to the intent of the test. In more detail, repair targets are determined through post-dominance relations between assertions and the methods that directly cause compilation errors. Then, test repairs are generated from the target in a bottom-up way, guided by the intent-oriented priority criteria. Finally, the generated repair candidates are prioritized to match the original test intent. The approach is implemented and evaluated on the benchmark of 4 open-source programs and 91 broken test cases. The result shows that the approach can fix 89% (81/91) of broken test cases, which is more effective than the existing intentpreserved test repair approach, and our intent-oriented priority criteria work well.Keywords: test repair, test intent, software test, test case evolution
Procedia PDF Downloads 1291907 Multi-Level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment
Authors: Anju Bala, Inderveer Chana
Abstract:
Task scheduling is the key concern for the execution of performance-driven workflow applications. As efficient scheduling can have major impact on the performance of the system, task scheduling is often chosen for assigning the request to resources in an efficient way based on cloud resource characteristics. In this paper, priority based task scheduling algorithm has been proposed that prioritizes the tasks based on the length of the instructions. The proposed scheduling approach prioritize the tasks of Cloud applications according to the limits set by six sigma control charts based on dynamic threshold values. Further, the proposed algorithm has been validated through the CloudSim toolkit. The experimental results demonstrate that the proposed algorithm is effective for handling multiple task lists from workflows and in considerably reducing Makespan and Execution time.Keywords: cloud computing, priority based scheduling, task scheduling, VM allocation
Procedia PDF Downloads 5171906 A Priority Based Imbalanced Time Minimization Assignment Problem: An Iterative Approach
Authors: Ekta Jain, Kalpana Dahiya, Vanita Verma
Abstract:
This paper discusses a priority based imbalanced time minimization assignment problem dealing with the allocation of n jobs to m < n persons in which the project is carried out in two stages, viz. Stage-I and Stage-II. Stage-I consists of n1 ( < m) primary jobs and Stage-II consists of remaining (n-n1) secondary jobs which are commenced only after primary jobs are finished. Each job is to be allocated to exactly one person, and each person has to do at least one job. It is assumed that nature of the Stage-I jobs is such that one person can do exactly one primary job whereas a person can do more than one secondary job in Stage-II. In a particular stage, all persons start doing the jobs simultaneously, but if a person is doing more than one job, he does them one after the other in any order. The aim of the proposed study is to find the feasible assignment which minimizes the total time for the two stage execution of the project. For this, an iterative algorithm is proposed, which at each iteration, solves a constrained imbalanced time minimization assignment problem to generate a pair of Stage-I and Stage-II times. For solving this constrained problem, an algorithm is developed in the current paper. Later, alternate combinations based method to solve the priority based imbalanced problem is also discussed and a comparative study is carried out. Numerical illustrations are provided in support of the theory.Keywords: assignment, imbalanced, priority, time minimization
Procedia PDF Downloads 2331905 Software Assessment Using Ant Colony Optimization Algorithm
Authors: Saad M. Darwish
Abstract:
Recently, software quality issues have come to be seen as important subject as we see an enormous growth of agencies involved in software industries. However,these agencies cannot guarantee the quality of their products, thus leaving users in uncertainties. Software certification is the extension of quality by means that quality needs to be measured prior to certification granting process. This research participates in solving the problem of software assessment by proposing a model for assessment and certification of software product that uses a fuzzy inference engine to integrate both of process–driven and application-driven quality assurance strategies. The key idea of the on hand model is to improve the compactness and the interpretability of the model’s fuzzy rules via employing an ant colony optimization algorithm (ACO), which tries to find good rules description by dint of compound rules initially expressed with traditional single rules. The model has been tested by case study and the results have demonstrated feasibility and practicability of the model in a real environment.Keywords: optimization technique, quality assurance, software certification model, software assessment
Procedia PDF Downloads 4871904 Fractional-Order PI Controller Tuning Rules for Cascade Control System
Authors: Truong Nguyen Luan Vu, Le Hieu Giang, Le Linh
Abstract:
The fractional–order proportional integral (FOPI) controller tuning rules based on the fractional calculus for the cascade control system are systematically proposed in this paper. Accordingly, the ideal controller is obtained by using internal model control (IMC) approach for both the inner and outer loops, which gives the desired closed-loop responses. On the basis of the fractional calculus, the analytical tuning rules of FOPI controller for the inner loop can be established in the frequency domain. Besides, the outer loop is tuned by using any integer PI/PID controller tuning rules in the literature. The simulation study is considered for the stable process model and the results demonstrate the simplicity, flexibility, and effectiveness of the proposed method for the cascade control system in compared with the other methods.Keywords: Bode’s ideal transfer function, fractional calculus, fractional–order proportional integral (FOPI) controller, cascade control system
Procedia PDF Downloads 3771903 Evolving Software Assessment and Certification Models Using Ant Colony Optimization Algorithm
Authors: Saad M. Darwish
Abstract:
Recently, software quality issues have come to be seen as important subject as we see an enormous growth of agencies involved in software industries. However, these agencies cannot guarantee the quality of their products, thus leaving users in uncertainties. Software certification is the extension of quality by means that quality needs to be measured prior to certification granting process. This research participates in solving the problem of software assessment by proposing a model for assessment and certification of software product that uses a fuzzy inference engine to integrate both of process–driven and application-driven quality assurance strategies. The key idea of the on hand model is to improve the compactness and the interpretability of the model’s fuzzy rules via employing an ant colony optimization algorithm (ACO), which tries to find good rules description by dint of compound rules initially expressed with traditional single rules. The model has been tested by case study and the results have demonstrated feasibility and practicability of the model in a real environment.Keywords: software quality, quality assurance, software certification model, software assessment
Procedia PDF Downloads 5231902 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures
Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat
Abstract:
In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.Keywords: association rules, clustering, similarity measure, statistical approaches
Procedia PDF Downloads 3201901 A Genetic Algorithm to Schedule the Flow Shop Problem under Preventive Maintenance Activities
Authors: J. Kaabi, Y. Harrath
Abstract:
This paper studied the flow shop scheduling problem under machine availability constraints. The machines are subject to flexible preventive maintenance activities. The nonresumable scenario for the jobs was considered. That is, when a job is interrupted by an unavailability period of a machine it should be restarted from the beginning. The objective is to minimize the total tardiness time for the jobs and the advance/tardiness for the maintenance activities. To solve the problem, a genetic algorithm was developed and successfully tested and validated on many problem instances. The computational results showed that the new genetic algorithm outperforms another earlier proposed algorithm.Keywords: flow shop scheduling, genetic algorithm, maintenance, priority rules
Procedia PDF Downloads 4711900 Anti-Corruption in Adverse Contexts: A Strategic Approach
Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy
Abstract:
Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.Keywords: anti-corruption, development, political settlements analysis, rule of law
Procedia PDF Downloads 4171899 Credit Risk Evaluation Using Genetic Programming
Authors: Ines Gasmi, Salima Smiti, Makram Soui, Khaled Ghedira
Abstract:
Credit risk is considered as one of the important issues for financial institutions. It provokes great losses for banks. To this objective, numerous methods for credit risk evaluation have been proposed. Many evaluation methods are black box models that cannot adequately reveal information hidden in the data. However, several works have focused on building transparent rules-based models. For credit risk assessment, generated rules must be not only highly accurate, but also highly interpretable. In this paper, we aim to build both, an accurate and transparent credit risk evaluation model which proposes a set of classification rules. In fact, we consider the credit risk evaluation as an optimization problem which uses a genetic programming (GP) algorithm, where the goal is to maximize the accuracy of generated rules. We evaluate our proposed approach on the base of German and Australian credit datasets. We compared our finding with some existing works; the result shows that the proposed GP outperforms the other models.Keywords: credit risk assessment, rule generation, genetic programming, feature selection
Procedia PDF Downloads 3531898 Analysis of Users’ Behavior on Book Loan Log Based on Association Rule Mining
Authors: Kanyarat Bussaban, Kunyanuth Kularbphettong
Abstract:
This research aims to create a model for analysis of student behavior using Library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested with testing data set and it showed that the ability of classify data was 79.24 percent and the MSE was 22.91. The results showed that the user’s behavior model by using association rule technique can use to manage the library resources.Keywords: behavior, data mining technique, a priori algorithm, knowledge discovery
Procedia PDF Downloads 4041897 A Situational Awareness Map for Allocating Relief Resources after Earthquake Occurrence
Authors: Hamid Reza Ranjbar, Ali Reza Azmoude Ardalan, Hamid Dehghani, Mohammad Reza Sarajian
Abstract:
Natural disasters are unexpected events which predicting them is difficult. Earthquake is one of the most devastating disasters among natural hazards with high rate of mortality and wide extent of damages. After the earthquake occurrence, managing the critical condition and allocating limited relief sources requiring a complete awareness of damaged area. The information for allocating relief teams should be precise and reliable as much as possible, and be presented in the appropriate time after the earthquake occurrence. This type of information was previously presented in the form of a damage map; conducting relief teams by using damage map mostly lead to waste of time for finding alive occupants under the rubble. In this research, a proposed standard for prioritizing damaged buildings in terms of requiring rescue and relief was presented. This standard prioritizes damaged buildings into four levels of priority including very high, high, moderate and low by considering key parameters such as type of land use, activity time, and inactivity time of each land use, time of earthquake occurrence and distinct index. The priority map by using the proposed standard could be a basis for guiding relief teams towards the areas with high relief priority.Keywords: Damage map, GIS, priority map, USAR
Procedia PDF Downloads 4041896 Association Rules Mining and NOSQL Oriented Document in Big Data
Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub
Abstract:
Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL
Procedia PDF Downloads 1601895 Using Priority Order of Basic Features for Circumscribed Masses Detection in Mammograms
Authors: Minh Dong Le, Viet Dung Nguyen, Do Huu Viet, Nguyen Huu Tu
Abstract:
In this paper, we present a new method for circumscribed masses detection in mammograms. Our method is evaluated on 23 mammographic images of circumscribed masses and 20 normal mammograms from public Mini-MIAS database. The method is quite sanguine with sensitivity (SE) of 95% with only about 1 false positive per image (FPpI). To achieve above results we carry out a progression following: Firstly, the input images are preprocessed with the aim to enhance key information of circumscribed masses; Next, we calculate and evaluate statistically basic features of abnormal regions on training database; Then, mammograms on testing database are divided into equal blocks which calculated corresponding features. Finally, using priority order of basic features to classify blocks as an abnormal or normal regions.Keywords: mammograms, circumscribed masses, evaluated statistically, priority order of basic features
Procedia PDF Downloads 3341894 Spatio-Temporal Data Mining with Association Rules for Lake Van
Authors: Tolga Aydin, M. Fatih Alaeddinoğlu
Abstract:
People, throughout the history, have made estimates and inferences about the future by using their past experiences. Developing information technologies and the improvements in the database management systems make it possible to extract useful information from knowledge in hand for the strategic decisions. Therefore, different methods have been developed. Data mining by association rules learning is one of such methods. Apriori algorithm, one of the well-known association rules learning algorithms, is not commonly used in spatio-temporal data sets. However, it is possible to embed time and space features into the data sets and make Apriori algorithm a suitable data mining technique for learning spatio-temporal association rules. Lake Van, the largest lake of Turkey, is a closed basin. This feature causes the volume of the lake to increase or decrease as a result of change in water amount it holds. In this study, evaporation, humidity, lake altitude, amount of rainfall and temperature parameters recorded in Lake Van region throughout the years are used by the Apriori algorithm and a spatio-temporal data mining application is developed to identify overflows and newly-formed soil regions (underflows) occurring in the coastal parts of Lake Van. Identifying possible reasons of overflows and underflows may be used to alert the experts to take precautions and make the necessary investments.Keywords: apriori algorithm, association rules, data mining, spatio-temporal data
Procedia PDF Downloads 3741893 Social Accountability: Persuasion and Debate to Contain Corruption
Authors: A. Lambert-Mogiliansky
Abstract:
In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.Keywords: accountability, corruption, persuasion, debate
Procedia PDF Downloads 3801892 Simplified Ultimate Strength Assessment of Ship Structures Based on Biro Klasifikasi Indonesia Rules for Hull
Authors: Sukron Makmun, Topan Firmandha, Siswanto
Abstract:
Ultimate Strength Assessment on ship cross section in accordance with Biro Klasifikasi Indonesia (BKI) Rules for Hull, follows step by step incremental iterative approach. In this approach, ship cross section is divided into plate-stiffener combinations and hard corners element. The average stress-strain relationship (σ-ε) for all structural elements will be defined, where the subscript k refers to the modes 0, 1, 2, 3 or 4. These results would be verified with a commercial software calculation in similar cases. The numerical calculations of buckling strength are in accordance with the commercial software (GL Rules ND). Then the comparison of failure behaviours of stiffened panels and hard corners are presented. Where failure modes 3 are likely to occur first follows the failure mode 4 and the last one is the failure mode 1.Keywords: ultimate strength assessment, BKI rules, incremental, plate-stiffener combination and hard corner, commercial software
Procedia PDF Downloads 3671891 Priority of Goal Over Source in Persian Directional Motion Verbs
Authors: Tahereh Samenian
Abstract:
There is ample evidence that source and goal are disproportionately expressed in languages, and goal usually plays a more prominent role than source. The results show that the mismatch between the goal and the source is not entirely rooted in non-linguistic behaviors, i.e. that linguistic descriptions also show the focus of the goal on the source in events; Non-verbal memory for events, on the other hand, indicates that the focus of the goal is only on events that are purposefully moving and the actor is alive. In the present study, an attempt is made to examine the principle of priority of the goal over the source by focusing on Persian directional motion verbs. For this purpose, 117 Persian directional motion verbs have been selected from the dictionary and data for them have been collected from the body of Bijan Khan and the components of goal and source have been identified in sentences and the prominence of the components of goal and source has been shown in the form of diagrams. As it was obtained from the data, Persian motion-directional verbs also showed the bias of the goal over source in motion events.Keywords: motion-directional verbs, priority of goal over source principle, cognitive factors, linguistic factors
Procedia PDF Downloads 861890 Local Boundary Analysis for Generative Theory of Tonal Music: From the Aspect of Classic Music Melody Analysis
Authors: Po-Chun Wang, Yan-Ru Lai, Sophia I. C. Lin, Alvin W. Y. Su
Abstract:
The Generative Theory of Tonal Music (GTTM) provides systematic approaches to recognizing local boundaries of music. The rules have been implemented in some automated melody segmentation algorithms. Besides, there are also deep learning methods with GTTM features applied to boundary detection tasks. However, these studies might face constraints such as a lack of or inconsistent label data. The GTTM database is currently the most widely used GTTM database, which includes manually labeled GTTM rules and local boundaries. Even so, we found some problems with these labels. They are sometimes discrepancies with GTTM rules. In addition, since it is labeled at different times by multiple musicians, they are not within the same scope in some cases. Therefore, in this paper, we examine this database with musicians from the aspect of classical music and relabel the scores. The relabeled database - GTTM Database v2.0 - will be released for academic research usage. Despite the experimental and statistical results showing that the relabeled database is more consistent, the improvement in boundary detection is not substantial. It seems that we need more clues than GTTM rules for boundary detection in the future.Keywords: dataset, GTTM, local boundary, neural network
Procedia PDF Downloads 1451889 Energy-Aware Scheduling in Real-Time Systems: An Analysis of Fair Share Scheduling and Priority-Driven Preemptive Scheduling
Authors: Su Xiaohan, Jin Chicheng, Liu Yijing, Burra Venkata Durga Kumar
Abstract:
Energy-aware scheduling in real-time systems aims to minimize energy consumption, but issues related to resource reservation and timing constraints remain challenges. This study focuses on analyzing two scheduling algorithms, Fair-Share Scheduling (FFS) and Priority-Driven Preemptive Scheduling (PDPS), for solving these issues and energy-aware scheduling in real-time systems. Based on research on both algorithms and the processes of solving two problems, it can be found that Fair-Share Scheduling ensures fair allocation of resources but needs to improve with an imbalanced system load, and Priority-Driven Preemptive Scheduling prioritizes tasks based on criticality to meet timing constraints through preemption but relies heavily on task prioritization and may not be energy efficient. Therefore, improvements to both algorithms with energy-aware features will be proposed. Future work should focus on developing hybrid scheduling techniques that minimize energy consumption through intelligent task prioritization, resource allocation, and meeting time constraints.Keywords: energy-aware scheduling, fair-share scheduling, priority-driven preemptive scheduling, real-time systems, optimization, resource reservation, timing constraints
Procedia PDF Downloads 1191888 An Algorithm Based on Control Indexes to Increase the Quality of Service on Cellular Networks
Authors: Rahman Mofidi, Sina Rahimi, Farnoosh Darban
Abstract:
Communication plays a key role in today’s world, and to support it, the quality of service has the highest priority. It is very important to differentiate between traffic based on priority level. Some traffic classes should be a higher priority than other classes. It is also necessary to give high priority to customers who have more payment for better service, however, without influence on other customers. So to realize that, we will require effective quality of service methods. To ensure the optimal performance of the network in accordance with the quality of service is an important goal for all operators in the mobile network. In this work, we propose an algorithm based on control parameters which it’s based on user feedback that aims at minimizing the access to system transmit power and thus improving the network key performance indicators and increasing the quality of service. This feedback that is known as channel quality indicator (CQI) indicates the received signal level of the user. We aim at proposing an algorithm in control parameter criterion to study improving the quality of service and throughput in a cellular network at the simulated environment. In this work we tried to parameter values have close to their actual level. Simulation results show that the proposed algorithm improves the system throughput and thus satisfies users' throughput and improves service to set up a successful call.Keywords: quality of service, key performance indicators, control parameter, channel quality indicator
Procedia PDF Downloads 2031887 Prioritized Processor-Sharing with a Maximum Permissible Sojourn Time
Authors: Yoshiaki Shikata
Abstract:
A prioritized processor-sharing (PS) system with a maximum permissible sojourn time (MPST) is proposed. In this PS system, a higher-priority request is allocated a larger service ratio than a lower-priority request. Moreover, each request receiving service is guaranteed the maximum permissible sojourn time determined by each priority class, regardless of its service time. Arriving requests that cannot receive service due to this guarantee are rejected. We further propose a guarantee method for implementing such a system, and discuss performance evaluation procedures for the resulting system. Practical performance measures, such as the relationships between the loss probability or mean sojourn time of each class request and the maximum permissible sojourn time are evaluated via simulation. At the arrival of each class request, its acceptance or rejection is judged using extended sojourn times of all requests receiving service in the server. As the MPST increases, the mean sojourn time increases almost linearly. However, the logarithm of the loss probability decreases almost linearly. Moreover with an MPST, the difference in the mean sojourn time for different MPSTs increases with the traffic rate. Conversely, the difference in the loss probability for different MPSTs decreases as the traffic rate increases.Keywords: prioritized processor sharing, priority ratio, permissible sojourn time, loss probability, mean sojourn time, simulation
Procedia PDF Downloads 1921886 Priority Sites for Deforested and Degraded Mountain Restoration Projects in North Korea
Authors: Koo Ja-Choon, Seok Hyun-Deok, Park So-Hee
Abstract:
Even though developed countries have supported aid projects for restoring degraded and deforested mountain, recent North Korean authorities announced that North Korean forest is still very serious. Last 12 years, more than 16 thousand ha of forest were destroyed. Most of previous researches concluded that food and fuel problems should be solved for preventing people from deforesting and degrading forest in North Korea. It means that mountain restoration projects such as A/R(afforestation/reforestation) and REDD(Reducing Emissions from Deforestation and Forest Degradation) project should be implemented with the agroforestry and the forest tending project. Because agroforestry and the forest tending can provide people in the project area with foods and fuels, respectively. Especially, Agroforestry has been operated well with the support of Swiss agency of Development and cooperation since 2003. This paper aims to find the priority sites for mountain restoration project where all types of projects including agroforesty can be implemented simultaneously. We tried to find the primary counties where the areas of these activities were distributed widely and evenly. Recent spatial data of 186 counties representing altitude, gradient and crown density were collected from World Forest Watch. These 3 attributes were used to determine the type of activities; A/R, REDD, Agroforestry and forest tending project. Finally, we calculated the size of 4 activities in 186 counties by using GIS technique. Result shows that Chongjin in Hamgyeongbuk-do, Hoeryong in Hamgyeongbuk-do and Tongchang in Pyeonganbuk-do are on the highest priority of counties. Most of feasible counties whose value of richness and uniformity were greater than the average were located near the eastern coast of North Korea. South Korean government has not supported any aid projects in North Korea since 2010. Recently, South Korea is trying to continue the aid projects for North Korea. Forest project which is not affected by the political situation between North- and South- Korea can be considered as a priority activities. This result can be used when South Korean government determine the priority sites for North Korean mountain restoration project in near future.Keywords: agroforestry, forest restoration project, GIS, North Korea, priority
Procedia PDF Downloads 3191885 I Don’t Want to Have to Wait: A Study Into the Origins of Rule Violations at Rail Pedestrian Level Crossings
Authors: James Freeman, Andry Rakotonirainy
Abstract:
Train pedestrian collisions are common and are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. However, there is limited research that has focused on understanding the reasons why some pedestrians’ break level crossings rules, which limits the development of effective countermeasures. As a result, this study undertook a deeper exploration into the origins of risky pedestrian behaviour through structured interviews. A total of 40 pedestrians who admitted to either intentionally breaking crossing rules or making crossing errors participated in an in-depth telephone interview. Qualitative analysis was undertaken via thematic analysis that revealed participants were more likely to report deliberately breaking rules (rather than make errors), particular after the train had passed the crossing as compared to before it arrives. Predominant reasons for such behaviours were identified to be: calculated risk taking, impatience, poor knowledge of rules and low likelihood of detection. The findings have direct implications for the development of effective countermeasures to improve crossing safety (and managing risk) such as increasing surveillance and transit officer presence, as well as installing appropriate barriers that either deter or incapacitate pedestrians from violating crossing rules. This paper will further outline the study findings in regards to the development of countermeasures as well as provide direction for future research efforts in this area.Keywords: crossings, mistakes, risk, violations
Procedia PDF Downloads 4151884 Revised Risk Priority Number in Failure Mode and Effects Analysis Model from the Perspective of Healthcare System
Authors: Fatemeh Rezaei, Mohammad H. Yarmohammadian, Masoud Ferdosi, Abbas Haghshnas
Abstract:
Background: Failure Modes and Effect Analysis is now having known as the main methods of risk assessment and the accreditation requirements for many organizations. The Risk Priority Number (RPN) approach is generally preferred, especially for its easiness of use. Indeed it does not require statistical data, but it is based on subjective evaluations given by the experts about the Occurrence (O i), the Severity (Si) and the Detectability (D i) of each cause of failure. Methods: This study is a quantitative – qualitative research. In terms of qualitative dimension, method of focus groups with inductive approach is used. To evaluate the results of the qualitative study, quantitative assessment was conducted to calculate RPN score. Results; We have studied patient’s journey process in surgery ward and the most important phase of the process determined Transport of the patient from the holding area to the operating room. Failures of the phase with the highest priority determined by defining inclusion criteria included severity (clinical effect, claim consequence, waste of time and financial loss), occurrence (time- unit occurrence and degree of exposure to risk) and preventability (degree of preventability and defensive barriers) and quantifying risks priority criteria in the context of RPN index. Ability of improved RPN reassess by root cause (RCA) analysis showed some variations. Conclusions: Finally, It could be concluded that understandable criteria should have been developed according to personnel specialized language and communication field. Therefore, participation of both technical and clinical groups is necessary to modify and apply these models.Keywords: failure mode, effects analysis, risk priority number(RPN), health system, risk assessment
Procedia PDF Downloads 3131883 Cooperative Learning Mechanism in Intelligent Multi-Agent System
Authors: Ayman M. Mansour, Bilal Hawashin, Mohammed A. Mansour
Abstract:
In this paper, we propose a cooperative learning mechanism in a multi-agent intelligent system. The basic idea is that intelligent agents are capable of collaborating with one another by sharing their knowledge. The agents will start collaboration by providing their knowledge rules to the other agents. This will allow the most important and insightful detection rules produced by the most experienced agent to bubble up for the benefit of the entire agent community. The updated rules will lead to improving the agents’ decision performance. To evaluate our approach, we designed a five–agent system and implemented it using JADE and FuzzyJess software packages. The agents will work with each other to make a decision about a suspicious medical case. This system provides quick response rate and the decision is faster than the manual methods. This will save patients life.Keywords: intelligent, multi-agent system, cooperative, fuzzy, learning
Procedia PDF Downloads 6841882 Predicting Medical Check-Up Patient Re-Coming Using Sequential Pattern Mining and Association Rules
Authors: Rizka Aisha Rahmi Hariadi, Chao Ou-Yang, Han-Cheng Wang, Rajesri Govindaraju
Abstract:
As the increasing of medical check-up popularity, there are a huge number of medical check-up data stored in database and have not been useful. These data actually can be very useful for future strategic planning if we mine it correctly. In other side, a lot of patients come with unpredictable coming and also limited available facilities make medical check-up service offered by hospital not maximal. To solve that problem, this study used those medical check-up data to predict patient re-coming. Sequential pattern mining (SPM) and association rules method were chosen because these methods are suitable for predicting patient re-coming using sequential data. First, based on patient personal information the data was grouped into … groups then discriminant analysis was done to check significant of the grouping. Second, for each group some frequent patterns were generated using SPM method. Third, based on frequent patterns of each group, pairs of variable can be extracted using association rules to get general pattern of re-coming patient. Last, discussion and conclusion was done to give some implications of the results.Keywords: patient re-coming, medical check-up, health examination, data mining, sequential pattern mining, association rules, discriminant analysis
Procedia PDF Downloads 6401881 Comparative Study of Non-Identical Firearms with Priority to Repair Subject to Inspection
Authors: A. S. Grewal, R. S. Sangwan, Dharambir, Vikas Dhanda
Abstract:
The purpose of this paper is to develop and analyze two reliability models for a system of non-identical firearms – one is standard firearm (called as original unit) and the other is a country-made firearm (called as duplicate /substandard unit). There is a single server who comes immediately to do inspection and repair whenever needed. On the failure of standard firearm, the server inspects the operative country-made firearm to see whether the unit is capable of performing the desired function well or not. If country-made firearm is not capable to do so, the operation of the system is stopped and server starts repair of the standard firearms immediately. However, no inspection is done at the failure of the country-made firearm as the country-made firearm alone is capable of performing the given task well. In model I, priority to repair the standard firearm is given in case system fails completely and country-made firearm is already under repair, whereas in model II there is no such priority. The failure and repair times of each unit are assumed to be independent and uncorrelated random variables. The distributions of failure time of the units are taken as negative exponential while that of repair and inspection times are general. By using semi-Markov process and regenerative point technique some econo-reliability measures are obtained. Graphs are plotted to compare the MTSF (mean time to system failure), availability and profit of the models for a particular case.Keywords: non-identical firearms, inspection, priority to repair, semi-Markov process, regenerative point
Procedia PDF Downloads 4251880 Prioritization of Sub-Watersheds in Semi Arid Region: A Case Study of Shevgaon and Pathardi Tahsils in Maharashtra
Authors: Dadasaheb R. Jawre, Maya G. Unde
Abstract:
Prioritization of sub-watershed plays important role in watershed management. It shows the requirement of watershed to give a treatment for the green growth of the region and conservation of the sub-watersheds. There is a number of factors like topography of the region, climatic characteristics like rainfall and runoff, land-use land-cover, social factors which are related to the development of watershed for agricultural uses and domestic purposes in the region. The present research is throwing a focus on how morphometric parameters in association with GIS analysis will help in identifying the ranking of the sub-watersheds for further development which help of suggested watershed structures. Shevgaon and Pathardi tahsils are drought prone tahsils of Ahmednagar district in Maharashtra. These tahsils come under the semi-arid region. Sub-watershed prioritization is necessary for proper planning and management of natural resources for sustainable development of the study area. Less rainfall and increasing population pressure on the land as well as water resources lead to scarcity of the water in the region. Hence, researcher has selected Shevgaon and Pathardi tahsils for sub-watershed prioritization. There are seven sub-watersheds which selected for the present research paper. In the morphological analysis linear aspects, aerial aspects and relief aspects are considered for the prioritization. The largest sub-watershed is Erdha which is located at Karanji in Pathardi tahsil having an area of 145.06 km2 and smallest sub-watershed is Erandgaon which is located in Shevgaon tahsil having an area of 40.143 km2. For all seven sub-watersheds, seven morphometric parameters were considered for calculating the compound parameter values. Finally, compound parameter values are grouped into three groups such as, high priority (below 4.0), moderate priority (4.0 to 5.0) and low priority (above 5.0) according to the compound value Erandgaon, Chapadgaon and Tarak sub-watersheds comes under high priority group, Erdha and Domeshwar sub-watersheds come under moderate priority group and Chandani and Kasichi sub-watershed come under low priority group. Both the tahsils falls in drought prone area, after getting the watershed structure overall development of the region will take place.Keywords: sub-watersheds, GIS and remote sensing, morphometric analysis, compound parameter value, prioritization
Procedia PDF Downloads 1531879 Rule Insertion Technique for Dynamic Cell Structure Neural Network
Authors: Osama Elsarrar, Marjorie Darrah, Richard Devin
Abstract:
This paper discusses the idea of capturing an expert’s knowledge in the form of human understandable rules and then inserting these rules into a dynamic cell structure (DCS) neural network. The DCS is a form of self-organizing map that can be used for many purposes, including classification and prediction. This particular neural network is considered to be a topology preserving network that starts with no pre-structure, but assumes a structure once trained. The DCS has been used in mission and safety-critical applications, including adaptive flight control and health-monitoring in aerial vehicles. The approach is to insert expert knowledge into the DCS before training. Rules are translated into a pre-structure and then training data are presented. This idea has been demonstrated using the well-known Iris data set and it has been shown that inserting the pre-structure results in better accuracy with the same training.Keywords: neural network, self-organizing map, rule extraction, rule insertion
Procedia PDF Downloads 172