Search results for: missionary works
1151 Deep Reinforcement Learning and Generative Adversarial Networks Approach to Thwart Intrusions and Adversarial Attacks
Authors: Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty, Charles A. Kamhoua
Abstract:
Malicious users exploit vulnerabilities in computer systems, significantly disrupting their performance and revealing the inadequacies of existing protective solutions. Even machine learning-based approaches, designed to ensure reliability, can be compromised by adversarial attacks that undermine their robustness. This paper addresses two critical aspects of enhancing model reliability. First, we focus on improving model performance and robustness against adversarial threats. To achieve this, we propose a strategy by harnessing deep reinforcement learning. Second, we introduce an approach leveraging generative adversarial networks to counter adversarial attacks effectively. Our results demonstrate substantial improvements over previous works in the literature, with classifiers exhibiting enhanced accuracy in classification tasks, even in the presence of adversarial perturbations. These findings underscore the efficacy of the proposed model in mitigating intrusions and adversarial attacks within the machine-learning landscape.Keywords: machine learning, reliability, adversarial attacks, deep-reinforcement learning, robustness
Procedia PDF Downloads 161150 Determination of Organizational Cynicism Levels of Health Care Workers
Authors: Murat İskender Aktaş, Selma Söyük
Abstract:
The aim of this work is to specify the levels of organizational cynicism health workers. Organizational cynicism concept is evaluated in three sub-branches and these are cognitive, affective, and behavioral. The main objective of the work is to answer the questions about the relationship of demographic characteristics like sub-branches of cynicism and age, marital status, education level, total working hours, occupational groups and income levels. As works in our country are analyzed, there have been studies about cynicism in health and other sectors. However, there were no master’s thesis or organizational cynicism research found about the public health professionals. This is why the aim was chosen as to specify the levels of organizational cynicism of public health professionals. The average of the answers of the health workers to the questions about cynicism levels are 2.86. As organizational cynicism is evaluated according to the sub-branches, cognitive subscale average score is 3.21 affective subscale average score is 2.68 and behavioral subscale average score is counted as 2.67. As the results are analyzed, it is seen that the behavioral subscale has the highest average. This shows that the workers are often criticizing the internal complaints and organizational information with their friends out of the organization.Keywords: cynicism, organizational cynicism, health care workers
Procedia PDF Downloads 3411149 Geoecological Problems of Karst Waters in Chiatura Municipality, Georgia
Authors: Liana Khandolishvili, Giorgi Dvalashvili
Abstract:
Karst waters in the world play an important role in the water supply. Among them, the Vaucluse in Chiatura municipality (Georgia) is used as drinking water and is irreplaceable for the local population. Accordingly, it is important to assess their geo-ecological conditions and take care to maintain sustainability. The aim of the paper is to identify the hazards of pollution of underground waters in the karst environment and to develop a scheme for their protection, which will take into consideration both the hydrogeological characteristics and the role of humans. To achieve this goal, the EPIK method was selected using which an epikarst zone of the study area was studied in detail, as well as the protective cover, infiltration conditions and frequency of karst network development, after which the conditions of karst waters in Chiatura municipality was assessed, their main pollutants were identified and the recommendations were prepared for their protection. The results of the study showed that the karst water pollution rate in Chiatura municipality is highest, where karst-fissured layers are represented and intensive extraction works are underway. The EPIK method is innovative in Georgia and was first introduced on the example of karst waters of Chiatura municipality.Keywords: cave, EPIK method, pollution, Karst waters, geology, geography, ecology
Procedia PDF Downloads 941148 Hybrid Approximate Structural-Semantic Frequent Subgraph Mining
Authors: Montaceur Zaghdoud, Mohamed Moussaoui, Jalel Akaichi
Abstract:
Frequent subgraph mining refers usually to graph matching and it is widely used in when analyzing big data with large graphs. A lot of research works dealt with structural exact or inexact graph matching but a little attention is paid to semantic matching when graph vertices and/or edges are attributed and typed. Therefore, it seems very interesting to integrate background knowledge into the analysis and that extracted frequent subgraphs should become more pruned by applying a new semantic filter instead of using only structural similarity in graph matching process. Consequently, this paper focuses on developing a new hybrid approximate structuralsemantic graph matching to discover a set of frequent subgraphs. It uses simultaneously an approximate structural similarity function based on graph edit distance function and a possibilistic vertices similarity function based on affinity function. Both structural and semantic filters contribute together to prune extracted frequent set. Indeed, new hybrid structural-semantic frequent subgraph mining approach searches will be suitable to be applied to several application such as community detection in social networks.Keywords: approximate graph matching, hybrid frequent subgraph mining, graph mining, possibility theory
Procedia PDF Downloads 4051147 Landslide Hazard Zonation and Risk Studies Using Multi-Criteria Decision-Making and Slope Stability Analysis
Authors: Ankit Tyagi, Reet Kamal Tiwari, Naveen James
Abstract:
In India, landslides are the most frequently occurring disaster in the regions of the Himalayas and the Western Ghats. The steep slopes and land use in these areas are quite apprehensive. In the recent past, many landslide hazard zonation (LHZ) works have been carried out in the Himalayas. However, the preparation of LHZ maps considering temporal factors such as seismic ground shaking, seismic amplification at surface level, and rainfall are limited. Hence this study presents a comprehensive use of the multi-criteria decision-making (MCDM) method in landslide risk assessment. In this research, we conducted both geospatial and geotechnical analysis to minimize the danger of landslides. Geospatial analysis is performed using high-resolution satellite data to produce landslide causative factors which were given weightage using the MCDM method. The geotechnical analysis includes a slope stability check, which was done to determine the potential landslide slope. The landslide risk map can provide useful information which helps people to understand the risk of living in an area.Keywords: landslide hazard zonation, PHA, AHP, GIS
Procedia PDF Downloads 1941146 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 3301145 Culture and Commodification: A Study of William Gibson's the Bridge Trilogy
Authors: Aruna Bhat
Abstract:
Culture can be placed within the social structure that embodies both the creation of social groups, and the manner in which they interact with each other. As many critics have pointed out, culture in the Postmodern context has often been considered a commodity, and indeed it shares many attributes with commercial products. Popular culture follows many patterns of behavior derived from Economics, from the simple principle of supply and demand, to the creation of marketable demographics which fit certain criterion. This trend is exemplary visible in contemporary fiction, especially in contemporary science fiction; Cyberpunk fiction in particular which is an off shoot of pure science fiction. William Gibson is one such author who in his works portrays such a scenario, and in his The Bridge Trilogy he adds another level of interpretation to this state of affairs, by describing a world that is centered on industrialization of a new kind – that focuses around data in the cyberspace. In this new world, data has become the most important commodity, and man has become nothing but a nodal point in a vast ocean of raw data resulting into commodification of each thing including Culture. This paper will attempt to study the presence of above mentioned elements in William Gibson’s The Bridge Trilogy. The theories applied will be Postmodernism and Cultural studies.Keywords: culture, commodity, cyberpunk, data, postmodern
Procedia PDF Downloads 5071144 Permissible Horizontal Displacements during the Construction of Vertical Shafts in Soft Soils at the Valley of Mexico: Case History
Authors: Joel M. De La Rosa R.
Abstract:
In this paper, the results obtained when monitoring the horizontal deformations of the soil mass are detailed, during each of the construction stages of several vertical shafts located in the soft soils of the Valley of Mexico, by means of the flotation method. From the analysis of these results, the magnitude and percentage relationship with respect to the diameter and depth of excavation of the horizontal deformations that occurred during the monitoring period is established. Based on the horizontal deformation monitoring system and the information provided by the supervisor's site log, the construction stages that have the greatest impact on deformations are established. Additionally, an analysis of the deformations is carried out, which takes into account the resistance and deformability characteristics of the excavated soils, as well as the prevailing hydraulic conditions. This work will allow construction engineers and institutions in charge of infrastructure works in the Valley of Mexico to establish permissible ranges for horizontal deformations that can occur in very soft and saturated soils, during the different construction stages; improving response protocols to potentially dangerous behaviors.Keywords: vertical shaft, flotation method, very soft clays, construction supervision
Procedia PDF Downloads 1891143 Nexus of Socio-Demographic Factors and Water Fetching Practices: A Study in South-Western Bangladesh
Authors: Mufti Nadimul Quamar Ahmed
Abstract:
Universal and equitable access to safe and inexpensive water is one of the core goals of UN Sustainable Development (Goal-6). Rainwater harvesting and drinkable water scarcity are also prominent themes in the current literature. However, the lack of readily available drinking water sources is a serious roadblock in achieving this major goal in developing countries, especially in Bangladesh. In this study, we aimed to explore how water collecting activities in Bangladesh's coastal region are influenced by participants’ selected socio-demographic characteristics. We gathered information using a structured questionnaire from 154 people who were chosen at random from two of Bangladesh's most susceptible subdistricts situated in the country's southwest coast. Our results show that majority of the respondents think water fetching is a job for the woman as like their other day-day to household works and it’s not a man's duty. Interestingly, we found that person's age, family structure, monthly income and religion all play important roles in how they see and behave water-gathering techniques. Moreover, the local taboo on women and men's roles in water-gathering is also evident in the studied areas.Keywords: water fetching, socio-demographic characteristic, coastal region, Bangladesh, SDG
Procedia PDF Downloads 1241142 Data Collection with Bounded-Sized Messages in Wireless Sensor Networks
Authors: Min Kyung An
Abstract:
In this paper, we study the data collection problem in Wireless Sensor Networks (WSNs) adopting the two interference models: The graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR). The main issue of the problem is to compute schedules with the minimum number of timeslots, that is, to compute the minimum latency schedules, such that data from every node can be collected without any collision or interference to a sink node. While existing works studied the problem with unit-sized and unbounded-sized message models, we investigate the problem with the bounded-sized message model, and introduce a constant factor approximation algorithm. To the best known of our knowledge, our result is the first result of the data collection problem with bounded-sized model in both interference models.Keywords: data collection, collision-free, interference-free, physical interference model, SINR, approximation, bounded-sized message model, wireless sensor networks
Procedia PDF Downloads 2241141 Modified Design of Flyer with Reduced Weight for Use in Textile Machinery
Authors: Payal Patel
Abstract:
Textile machinery is one of the fastest evolving areas which has an application of mechanical engineering. The modular approach towards the processing right from the stage of cotton to the fabric, allows us to observe the result of each process on its input. Cost and space being the major constraints. The flyer is a component of roving machine, which is used as a part of spinning process. In the present work using the application of Hyper Works, the flyer arm has been modified which saves the material used for manufacturing the flyer. The size optimization of the flyer is carried out with the objective of reduction in weight under the constraints of standard operating conditions. The new design of the flyer is proposed and validated using the module of HyperWorks which is equally strong, but light weighted compared to the existing design. Dynamic balancing of the optimized model is carried out to align a principal inertia axis with the geometric axis of rotation. For the balanced geometry of flyer, air resistance is obtained theoretically and with Gambit and Fluent. Static analysis of the balanced geometry has been done to verify the constraint of operating condition. Comparison of weight, deflection, and factor of safety has been made for different aluminum alloys.Keywords: flyer, size optimization, textile, weight
Procedia PDF Downloads 2171140 Unspoken Delights: Creative Strategies for Bypass Censorship System and Depicting Male-Female Relationships in Iranian Cinema
Authors: Parsa Naji
Abstract:
Following the Iran Islamic Revolution in 1979 and the subsequent formation of a theocratic regime, the new regime implemented stringent regulations and a complicated censorship system in the film industry. Thereupon, the screening of films showing the relationships between males and females encountered numerous limitations. Not only did these limits encompass the physical portrayal of the relationship between males and females, but also the dialogues containing explicit sexual or even passionate romantic themes, resulting in a film being permanently consigned to archival storage. However, despite these limitations, Iranian filmmakers persevered in creating their interesting cinematic works. Throughout the years after the revolution, Iranian directors have navigated a series of challenges and obstacles, employing innovative and unconventional methods to bypass the rigorous censorship system imposed by the government, ensuring the screening of their films. This study aims to analyze the creative approaches employed by Iranian filmmakers to circumvent governmental censorship regulations.Keywords: censorship, Iranian cinema, Islamic revolution, male-female relationship
Procedia PDF Downloads 481139 Risk Assessment for Aerial Package Delivery
Authors: Haluk Eren, Ümit Çelik
Abstract:
Recent developments in unmanned aerial vehicles (UAVs) have begun to attract intense interest. UAVs started to use for many different applications from military to civilian use. Some online retailer and logistics companies are testing the UAV delivery. UAVs have great potentials to reduce cost and time of deliveries and responding to emergencies in a short time. Despite these great positive sides, just a few works have been done for routing of UAVs for package deliveries. As known, transportation of goods from one place to another may have many hazards on delivery route due to falling hazards that can be exemplified as ground objects or air obstacles. This situation refers to wide-range insurance concept. For this reason, deliveries that are made with drones get into the scope of shipping insurance. On the other hand, air traffic was taken into account in the absence of unmanned aerial vehicle. But now, it has been a reality for aerial fields. In this study, the main goal is to conduct risk analysis of package delivery services using drone, based on delivery routes.Keywords: aerial package delivery, insurance estimation, territory risk map, unmanned aerial vehicle, route risk estimation, drone risk assessment, drone package delivery
Procedia PDF Downloads 3441138 The Hyundai Model: A Self-Sufficient State like Entity Masquerading as a Company
Authors: Nikita Koradia
Abstract:
Hyundai Motor Company, which started off as a small fish in a big sea, paved its way out successfully and established itself as an independent group from the conglomerate. Hyundai, with its officious power across the globe and particularly in South Korea in the automobile industry, has one the most complex yet fascinating governance structure. Being the second largest contributor to the Gross Domestic Product of South Korea after Samsung and having a market share of 51.3% domestically in automobile industry, Hyundai has faced its part of criticism owing to its anti-labor union approach and owing to its internalization of supply chain management. The censure has been coming from across jurisdictions like China, India, Canada, the EU, etc. The paper focuses on the growth of Hyundai and its inward and outward investment structure. The paper questions the ability of Hyundai to become a mini-state in itself by focusing on its governance structure. The paper further elaborates on its compliance and disclosure regime in the field of Corporate social responsibility and explores how far the business structure adopted by Hyundai works in its favor to become one of the leading automobile contenders in the market.Keywords: compliance regime, disclosure regime, Hyundai motor company, supply-chain management
Procedia PDF Downloads 1201137 Studyt on New Strategies of Sustainable Neighbourhood Design Based on the 2014 Waf
Authors: Zhou Xiaowen China, Zhang Sanming China
Abstract:
Neighbourhood space as a very important part of city spaces, is an organic combination of material environment and spiritual achievement in people’ daily life, and has a real impact upon the sustainable development of the whole city. Looking back on the past 2014 World Architecture Festival (WAF), 4 out of 35winning buildings were neighbourhood designs, and all of them mentioned about space-sharing and sustainable development. In this paper, three award-winning cases were studied, including the world building of the year—the chapel (Vietnam, A21 studio), The Carve (Norway, A-Lab) and House for Trees (Vietnam, Vo Trong Nghia Architects). Urban context, planning, space construction and sustainable technology were discussed. Based on those, it was discovered that passive energy-saving technologies have been paid more and more attention, sharing space has been designed ingeniously, and the architectural forms of them reflect social inclusion and equity. This paper is aimed at summarizing the excellent works on the Festival and providing reference for the future design.Keywords: neighbourhood design, 2014 World Architecture Festival (WAF), sustainable development, space-sharing
Procedia PDF Downloads 4441136 Understanding the Roots of Third World Problems: A Historical and Philosophical Sociology
Authors: Yaser Riki
Abstract:
There are plenty of considerations about the Third World and developing countries, but one of the main issues regarding these areas is how we can study them. This article makes attention to a fundamental way of approaching this subject through the convergence of history, philosophy, and sociology in order to understand the complexity of the Third World countries. These three disciplines are naturally connected and integrated, but they have gradually separated. While sociology has originated from philosophy, this work is an attempt to generate a sociology that incorporates philosophy as well as history at its heart. This is descriptive-analytical research that searches the history of sociology to find works and theories that provide ideas for this purpose, including the sociology of knowledge and science, The German Ideology (Karl Marx and Friedrich Engels), The Protestant Ethic (Max Weber), Ideology and Utopia (Karl Mannheim) and Dialectic of Enlightenment (Horkheimer and Adorno) provide ideas needed for this purpose. The paper offers a methodological and theoretical vision (historical-philosophical sociology) to identify a few factors, such as the system of thought, that are usually invisible and cause problems in societies, especially third-world counties. This is similar to what some of the founders of sociology did in the first world.Keywords: the third world, methodology, sociology, philosophy, history, social change, development, social movements
Procedia PDF Downloads 1061135 Historical Studies on Gilt Decorations on Glazed Surfaces
Authors: Sabra Saeidi
Abstract:
This research focuses on the historical techniques associated with the lajevardina and Haft-Rangi production methods in creating tiles, with emphasis on the identification of the techniques of inserting gold sheets on the surface of such historical glazed tiles. In this regard, firstly, the history of the production of enamel, gold plated, and Lajevardina glazed pottery work made during the Khwarizmanshahid and Mongol era (eleventh to the thirteenth century) have been assessed to reach a better understanding of the background and the history associated with historical glazing methods. After the historical overview of the production technique of glazed pottery work and introductions of the civilizations using those techniques, we focused on the niches production methods of enamel and Lajevardina glazing, which are two categories of decorations usually found in tiles. Next, a general classification method for various types of gilt tiles has been introduced, which is applicable to the tile works up to Safavid period (Sixteenth to the seventeenth century). Gilded lajevardina glazed tiles, gilt Haft-Rangi tiles, monolithic glazed gilt tiles, and gilt mosaic tiles are included in the categories.Keywords: gilt tiles, Islamic art, Iranian art, historical studies, gilding
Procedia PDF Downloads 1231134 Five-Phase Induction Motor Drive System Driven by Five-Phase Packed U Cell Inverter: Its Modeling and Performance Evaluation
Authors: Mohd Tariq
Abstract:
The three phase system drives produce the problem of more torque pulsations and harmonics. This issue prevents the smooth operation of the drives and it also induces the amount of heat generated thus resulting in an increase in power loss. Higher phase system offers smooth operation of the machines with greater power capacity. Five phase variable-speed induction motor drives are commonly used in various industrial and commercial applications like tractions, electrical vehicles, ship propulsions and conveyor belt drive system. In this work, a comparative analysis of the different modulation schemes applied on the five-level five-phase Packed U Cell (PUC) inverter fed induction motor drives is presented. The performance of the inverter is greatly affected with the modulation schemes applied. The system is modeled, designed, and implemented in MATLAB®/Simulink environment. Experimental validation is done for the prototype of single phase, whereas five phase experimental validation is proposed in the future works.Keywords: Packed U-Cell (PUC) inverter, five-phase system, pulse width modulation (PWM), induction motor (IM)
Procedia PDF Downloads 1831133 Experimental Verification of On-Board Power Generation System for Vehicle Application
Authors: Manish Kumar, Krupa Shah
Abstract:
The usage of renewable energy sources is increased day by day to overcome the dependency on fossil fuels. The wind energy is considered as a prominent source of renewable energy. This paper presents an approach for utilizing wind energy obtained from moving the vehicle for cell-phone charging. The selection of wind turbine, blades, generator, etc. is done to have the most efficient system. The calculation procedure for power generated and drag force is shown to know the effectiveness of the proposal. The location of the turbine is selected such that the system remains symmetric, stable and has the maximum induced wind. The calculation of the generated power at different velocity is presented. The charging is achieved for the speed 30 km/h and the system works well till 60 km/h. The model proposed seems very useful for the people traveling long distances in the absence of mobile electricity. The model is very economical and easy to fabricate. It has very less weight and area that makes it portable and comfortable to carry along. The practical results are shown by implementing the portable wind turbine system on two-wheeler.Keywords: cell-phone charging, on-board power generation, wind energy, vehicle
Procedia PDF Downloads 2961132 Compressible Lattice Boltzmann Method for Turbulent Jet Flow Simulations
Authors: K. Noah, F.-S. Lien
Abstract:
In Computational Fluid Dynamics (CFD), there are a variety of numerical methods, of which some depend on macroscopic model representatives. These models can be solved by finite-volume, finite-element or finite-difference methods on a microscopic description. However, the lattice Boltzmann method (LBM) is considered to be a mesoscopic particle method, with its scale lying between the macroscopic and microscopic scales. The LBM works well for solving incompressible flow problems, but certain limitations arise from solving compressible flows, particularly at high Mach numbers. An improved lattice Boltzmann model for compressible flow problems is presented in this research study. A higher-order Taylor series expansion of the Maxwell equilibrium distribution function is used to overcome limitations in LBM when solving high-Mach-number flows. Large eddy simulation (LES) is implemented in LBM to simulate turbulent jet flows. The results have been validated with available experimental data for turbulent compressible free jet flow at subsonic speeds.Keywords: compressible lattice Boltzmann method, multiple relaxation times, large eddy simulation, turbulent jet flows
Procedia PDF Downloads 2751131 Sino-Russian Cooperation in the Arctic (Based on the Materials of the Russian Press)
Authors: Cui Long (Allen)
Abstract:
The role of the Arctic in world politics and international relations has increased significantly over the past decades. With its large natural resources, the Arctic region has important geopolitical, strategic, and economic significance. All this determines the interest in it not only of the Arctic states but also of states located far from the Arctic. One of these states is the People's Republic of China. Relations between China and Russia in recent decades have been built on the basis of strategic partnership. Joint projects in the Arctic have become the most important priority area of this partnership. These are projects in the transport and energy fields. A large number of works by Russian scientists are devoted to the Sino-Russian Arctic cooperation. Most authors consider cooperation as a guarantee of stability for China and Russia in a globalized world. However, there are authors who believe that there are separate contradictions in the relations between the Arctic and non-Arctic countries. In their opinion, China sometimes acts as a competitor, and its activities become expansionist. In general, according to the Russian authors, Sino-Russian cooperation is mutually beneficial and is under development. China and Russia have a long way to go in the issue of sustainable development of the Arctic.Keywords: People’s Republic of China, Russian Federation, Arctic, historiography
Procedia PDF Downloads 701130 Performance Evaluation of Refinement Method for Wideband Two-Beams Formation
Authors: C. Bunsanit
Abstract:
This paper presents the refinement method for two beams formation of wideband smart antenna. The refinement method for weighting coefficients is based on Fully Spatial Signal Processing by taking Inverse Discrete Fourier Transform (IDFT), and its simulation results are presented using MATLAB. The radiation pattern is created by multiplying the incoming signal with real weights and then summing them together. These real weighting coefficients are computed by IDFT method; however, the range of weight values is relatively wide. Therefore, for reducing this range, the refinement method is used. The radiation pattern concerns with five input parameters to control. These parameters are maximum weighting coefficient, wideband signal, direction of mainbeam, beamwidth, and maximum of minor lobe level. Comparison of the obtained simulation results between using refinement method and taking only IDFT shows that the refinement method works well for wideband two beams formation.Keywords: fully spatial signal processing, beam forming, refinement method, smart antenna, weighting coefficient, wideband
Procedia PDF Downloads 2261129 Convergence Analysis of Training Two-Hidden-Layer Partially Over-Parameterized ReLU Networks via Gradient Descent
Authors: Zhifeng Kong
Abstract:
Over-parameterized neural networks have attracted a great deal of attention in recent deep learning theory research, as they challenge the classic perspective of over-fitting when the model has excessive parameters and have gained empirical success in various settings. While a number of theoretical works have been presented to demystify properties of such models, the convergence properties of such models are still far from being thoroughly understood. In this work, we study the convergence properties of training two-hidden-layer partially over-parameterized fully connected networks with the Rectified Linear Unit activation via gradient descent. To our knowledge, this is the first theoretical work to understand convergence properties of deep over-parameterized networks without the equally-wide-hidden-layer assumption and other unrealistic assumptions. We provide a probabilistic lower bound of the widths of hidden layers and proved linear convergence rate of gradient descent. We also conducted experiments on synthetic and real-world datasets to validate our theory.Keywords: over-parameterization, rectified linear units ReLU, convergence, gradient descent, neural networks
Procedia PDF Downloads 1431128 Investigation of a Hybrid Process: Multipoint Incremental Forming
Authors: Safa Boudhaouia, Mohamed Amen Gahbiche, Eliane Giraud, Wacef Ben Salem, Philippe Dal Santo
Abstract:
Multi-point forming (MPF) and asymmetric incremental forming (ISF) are two flexible processes for sheet metal manufacturing. To take advantages of these two techniques, a hybrid process has been developed: The Multipoint Incremental Forming (MPIF). This process accumulates at once the advantages of each of these last mentioned forming techniques, which makes it a very interesting and particularly an efficient process for single, small, and medium series production. In this paper, an experimental and a numerical investigation of this technique are presented. To highlight the flexibility of this process and its capacity to manufacture standard and complex shapes, several pieces were produced by using MPIF. The forming experiments are performed on a 3-axis CNC machine. Moreover, a numerical model of the MPIF process has been implemented in ABAQUS and the analysis showed a good agreement with experimental results in terms of deformed shape. Furthermore, the use of an elastomeric interpolator allows avoiding classical local defaults like dimples, which are generally caused by the asymmetric contact and also improves the distribution of residual strain. Future works will apply this approach to other alloys used in aeronautic or automotive applications.Keywords: incremental forming, numerical simulation, MPIF, multipoint forming
Procedia PDF Downloads 3581127 Turbulence Modeling of Source and Sink Flows
Authors: Israt Jahan Eshita
Abstract:
Flows developed between two parallel disks have many engineering applications. Two types of non-swirling flows can be generated in such a domain. One is purely source flow in disc type domain (outward flow). Other is purely sink flow in disc type domain (inward flow). This situation often appears in some turbo machinery components such as air bearings, heat exchanger, radial diffuser, vortex gyroscope, disc valves, and viscosity meters. The main goal of this paper is to show the mesh convergence, because mesh convergence saves time, and economical to run and increase the efficiency of modeling for both sink and source flow. Then flow field is resolved using a very fine mesh near-wall, using enhanced wall treatment. After that we are going to compare this flow using standard k-epsilon, RNG k-epsilon turbulence models. Lastly compare some experimental data with numerical solution for sink flow. The good agreement of numerical solution with the experimental works validates the current modeling.Keywords: hydraulic diameter, k-epsilon model, meshes convergence, Reynolds number, RNG model, sink flow, source flow, wall y+
Procedia PDF Downloads 5381126 A New Heuristic Algorithm for Maximization Total Demands of Nodes and Number of Covered Nodes Simultaneously
Authors: Ehsan Saghehei, Mahdi Eghbali
Abstract:
The maximal covering location problem (MCLP) was originally developed to determine a set of facility locations which would maximize the total customers' demand serviced by the facilities within a predetermined critical service criterion. However, on some problems that differences between the demand nodes are covered or the number of nodes each node is large, the method of solving MCLP may ignore these differences. In this paper, Heuristic solution based on the ranking of demands in each node and the number of nodes covered by each node according to a predetermined critical value is proposed. The output of this method is to maximize total demands of nodes and number of covered nodes, simultaneously. Furthermore, by providing an example, the solution algorithm is described and its results are compared with Greedy and Lagrange algorithms. Also, the results of the algorithm to solve the larger problem sizes that compared with other methods are provided. A summary and future works conclude the paper.Keywords: heuristic solution, maximal covering location problem, ranking, set covering
Procedia PDF Downloads 5731125 Influence of Radio Frequency Identification Technology at Cost of Supply Chain as a Driver for the Generation of Competitive Advantage
Authors: Mona Baniahmadi, Saied Haghanifar
Abstract:
Radio Frequency Identification (RFID) is regarded as a promising technology for the optimization of supply chain processes since it improves manufacturing and retail operations from forecasting demand for planning, managing inventory, and distribution. This study precisely aims at learning to know the RFID technology and at explaining how it can concretely be used for supply chain management and how it can help improving it in the case of Hejrat Company which is located in Iran and works on the distribution of medical drugs and cosmetics. This study uses some statistical analysis to calculate the expected benefits of an integrated RFID system on supply chain obtained through competitive advantages increases with decreasing cost factor. The study investigates how the cost of storage process, labor cost, the cost of missing goods, inventory management optimization, on-time delivery, order cost, lost sales and supply process optimization affect the performance of the integrated RFID supply chain regarding cost factors and provides a competitive advantage.Keywords: cost, competitive advantage, radio frequency identification, supply chain
Procedia PDF Downloads 2771124 Polymorphism in Myostatin Gene and Its Association with Growth Traits in Kurdi Sheep of Northern Khorasan
Authors: Masoud Alipanah, Sekineh Akbari, Gholamreza Dashab
Abstract:
Myostatin genes or factor 8 affecting on growth and making differentiation works (GDF8) as a moderator in the development of skeletal muscle inhibitor. If mutations occurs in the coding region of myostatin, alter its inhibitory role and the muscle growth is increased. In this study, blood samples were collected randomly from 60 Kurdish sheep in northern Khorasan and DNA extraction was performed using a modified salt. A fragment 337 bp from exon 3 myostatin gene and-specific primers by using a polymerase chain reaction (PCR) were amplified. In order to detect different forms of an allele at this locus HaeΙΙΙ restriction enzymes and PCR-RFLP analysis were used. Band patterns clarification was performed using agarose gel electrophoresis. The frequency of genotypes mm, Mm, and MM, were respectively detected, 0, 0.15 and 0.85. The allele frequency for alleles m and M, were respectively, 0.07 and 0.93. The statistical analyses indicated that m allele was significantly associated with body weight. The results of this study suggest that the Myostatin gene possibly is a candidate gene that affects growth traits in Kurdish sheep.Keywords: GDF8 gene, Kurdi Sheep of Northern Khorasan, polymorphism, weight traits
Procedia PDF Downloads 3411123 A Comparison of Short- and Long-Haul Vacation Tourists on Evaluation of Attractiveness: The Case of Hong Kong
Authors: Zhaoyu Chen
Abstract:
In this study, an attempt was made to find reasons why tourists go to particular attractions. Tourists may be either motivated by the attractions or simply make the choice to satisfy their needs and desires. Based on the attractions in Hong Kong, this research was conducted to explore the attraction-related concepts to discuss how the attraction system works. Due to the limited studies on exploring the attractiveness of attractions through tourist movement patterns, the study aims to evaluate such indicators to determine whether tourists are motivated by attractiveness or their own needs. The investigation is conducted through the comparison of different source markets - Mainland China, short haul markets (excluding Mainland China) and long haul markets. The latest finding of Departing Visitor Survey (DVS) implemented by the Hong Kong Tourism Board (HKTB) is employed for the analysis. Various tourist movement patterns are drawn from the practical data. The managerial implication to destination management organizations (DMOs) is suggested to better allocate attractions according to the needs of tourists.Keywords: attractions, attraction system, Hong Kong, tourist movement patterns
Procedia PDF Downloads 5151122 Intrusion Detection System Using Linear Discriminant Analysis
Authors: Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou
Abstract:
Most of the existing intrusion detection systems works on quantitative network traffic data with many irrelevant and redundant features, which makes detection process more time’s consuming and inaccurate. A several feature extraction methods, such as linear discriminant analysis (LDA), have been proposed. However, LDA suffers from the small sample size (SSS) problem which occurs when the number of the training samples is small compared with the samples dimension. Hence, classical LDA cannot be applied directly for high dimensional data such as network traffic data. In this paper, we propose two solutions to solve SSS problem for LDA and apply them to a network IDS. The first method, reduce the original dimension data using principal component analysis (PCA) and then apply LDA. In the second solution, we propose to use the pseudo inverse to avoid singularity of within-class scatter matrix due to SSS problem. After that, the KNN algorithm is used for classification process. We have chosen two known datasets KDDcup99 and NSLKDD for testing the proposed approaches. Results showed that the classification accuracy of (PCA+LDA) method outperforms clearly the pseudo inverse LDA method when we have large training data.Keywords: LDA, Pseudoinverse, PCA, IDS, NSL-KDD, KDDcup99
Procedia PDF Downloads 228