Search results for: random graph
1745 Enhancing Fault Detection in Rotating Machinery Using Wiener-CNN Method
Authors: Mohamad R. Moshtagh, Ahmad Bagheri
Abstract:
Accurate fault detection in rotating machinery is of utmost importance to ensure optimal performance and prevent costly downtime in industrial applications. This study presents a robust fault detection system based on vibration data collected from rotating gears under various operating conditions. The considered scenarios include: (1) both gears being healthy, (2) one healthy gear and one faulty gear, and (3) introducing an imbalanced condition to a healthy gear. Vibration data was acquired using a Hentek 1008 device and stored in a CSV file. Python code implemented in the Spider environment was used for data preprocessing and analysis. Winner features were extracted using the Wiener feature selection method. These features were then employed in multiple machine learning algorithms, including Convolutional Neural Networks (CNN), Multilayer Perceptron (MLP), K-Nearest Neighbors (KNN), and Random Forest, to evaluate their performance in detecting and classifying faults in both the training and validation datasets. The comparative analysis of the methods revealed the superior performance of the Wiener-CNN approach. The Wiener-CNN method achieved a remarkable accuracy of 100% for both the two-class (healthy gear and faulty gear) and three-class (healthy gear, faulty gear, and imbalanced) scenarios in the training and validation datasets. In contrast, the other methods exhibited varying levels of accuracy. The Wiener-MLP method attained 100% accuracy for the two-class training dataset and 100% for the validation dataset. For the three-class scenario, the Wiener-MLP method demonstrated 100% accuracy in the training dataset and 95.3% accuracy in the validation dataset. The Wiener-KNN method yielded 96.3% accuracy for the two-class training dataset and 94.5% for the validation dataset. In the three-class scenario, it achieved 85.3% accuracy in the training dataset and 77.2% in the validation dataset. The Wiener-Random Forest method achieved 100% accuracy for the two-class training dataset and 85% for the validation dataset, while in the three-class training dataset, it attained 100% accuracy and 90.8% accuracy for the validation dataset. The exceptional accuracy demonstrated by the Wiener-CNN method underscores its effectiveness in accurately identifying and classifying fault conditions in rotating machinery. The proposed fault detection system utilizes vibration data analysis and advanced machine learning techniques to improve operational reliability and productivity. By adopting the Wiener-CNN method, industrial systems can benefit from enhanced fault detection capabilities, facilitating proactive maintenance and reducing equipment downtime.Keywords: fault detection, gearbox, machine learning, wiener method
Procedia PDF Downloads 811744 A Spectral Decomposition Method for Ordinary Differential Equation Systems with Constant or Linear Right Hand Sides
Authors: R. B. Ogunrinde, C. C. Jibunoh
Abstract:
In this paper, a spectral decomposition method is developed for the direct integration of stiff and nonstiff homogeneous linear (ODE) systems with linear, constant, or zero right hand sides (RHSs). The method does not require iteration but obtains solutions at any random points of t, by direct evaluation, in the interval of integration. All the numerical solutions obtained for the class of systems coincide with the exact theoretical solutions. In particular, solutions of homogeneous linear systems, i.e. with zero RHS, conform to the exact analytical solutions of the systems in terms of t.Keywords: spectral decomposition, linear RHS, homogeneous linear systems, eigenvalues of the Jacobian
Procedia PDF Downloads 3301743 Attitude of Beef Cattle Farmers toward Biosecurity Practices
Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim
Abstract:
The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.Keywords: attitude, beef cattle, biosecurity, farmers
Procedia PDF Downloads 2971742 On the Analysis of Pseudorandom Partial Quotient Sequences Generated from Continued Fractions
Authors: T. Padma, Jayashree S. Pillai
Abstract:
Random entities are an essential component in any cryptographic application. The suitability of a number theory based novel pseudorandom sequence called Pseudorandom Partial Quotient Sequence (PPQS) generated from the continued fraction expansion of irrational numbers, in cryptographic applications, is analyzed in this paper. An approach to build the algorithm around a hard mathematical problem has been considered. The PQ sequence is tested for randomness and its suitability as a cryptographic key by performing randomness analysis, key sensitivity and key space analysis, precision analysis and evaluating the correlation properties is established.Keywords: pseudorandom sequences, key sensitivity, correlation, security analysis, randomness analysis, sensitivity analysis
Procedia PDF Downloads 5941741 Resistive Switching Characteristics of Resistive Random Access Memory Devices after Furnace Annealing Processes
Authors: Chi-Yan Chu, Kai-Chi Chuang, Huang-Chung Cheng
Abstract:
In this study, the RRAM devices with the TiN/Ti/HfOx/TiN structure were fabricated, then the electrical characteristics of the devices without annealing and after 400 °C and 500 °C of the furnace annealing (FA) temperature processes were compared. The RRAM devices after the FA’s 400 °C showed the lower forming, set and reset voltages than the other devices without annealing. However, the RRAM devices after the FA’s 500 °C did not show any electrical characteristics because the TiN/Ti/HfOx/TiN device was oxidized, as shown in the XPS analysis. From these results, the RRAM devices after the FA’s 400 °C showed the best electrical characteristics.Keywords: RRAM, furnace annealing (FA), forming, set and reset voltages, XPS
Procedia PDF Downloads 3721740 The Quantum Theory of Music and Human Languages
Authors: Mballa Abanda Luc Aurelien Serge, Henda Gnakate Biba, Kuate Guemo Romaric, Akono Rufine Nicole, Zabotom Yaya Fadel Biba, Petfiang Sidonie, Bella Suzane Jenifer
Abstract:
The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original, and innovative research thesis. A contribution to the theoretical, musicological, ethno musicological, and linguistic conceptualization of languages, giving rise to the practice of interlocution between the social and cognitive sciences, the activities of artistic creation, and the question of modeling in the human sciences: mathematics, computer science, translation automation, and artificial intelligence. When you apply this theory to any text of a folksong of a world-tone language, you do not only piece together the exact melody, rhythm, and harmonies of that song as if you knew it in advance but also the exact speaking of this language. The author believes that the issue of the disappearance of tonal languages and their preservation has been structurally resolved, as well as one of the greatest cultural equations related to the composition and creation of tonal, polytonal, and random music. The experimentation confirming the theorization, I designed a semi-digital, semi-analog application that translates the tonal languages of Africa (about 2,100 languages) into blues, jazz, world music, polyphonic music, tonal and anatonal music, and deterministic and random music). To test this application, I use music reading and writing software that allows me to collect the data extracted from my mother tongue, which is already modeled in the musical staves saved in the ethnographic (semiotic) dictionary for automatic translation ( volume 2 of the book). The translation is done (from writing to writing, from writing to speech, and from writing to music). Mode of operation: you type a text on your computer, a structured song (chorus-verse), and you command the machine a melody of blues, jazz, and world music or variety, etc. The software runs, giving you the option to choose harmonies, and then you select your melody.Keywords: language, music, sciences, quantum entenglement
Procedia PDF Downloads 781739 Customer Satisfaction on Reliability Dimension of Service Quality in Indian Higher Education
Authors: Rajasekhar Mamilla, G. Janardhana, G. Anjan Babu
Abstract:
The present research studies analyses the students’ satisfaction with university performance regarding the reliability dimension, ability of professors and staff to perform the promised services with quality to students in the post-graduate courses offered by Sri Venkateswara University in India. The research is done with the notion that the student compares the perceived performance with prior expectations. Customer satisfaction is seen as the outcome of this comparison. The sample respondents were administered with the schedule based on the stratified random technique for this study. Statistical techniques such as factor analysis, t-test and correlation analysis were used to accomplish the respective objectives of the study.Keywords: satisfaction, reliability, service quality, customer
Procedia PDF Downloads 5501738 On a Transient Magnetohydrodynamics Heat Transfer Within Radiative Porous Channel Due to Convective Boundary Condition
Authors: Bashiru Abdullahi, Isah Bala Yabo, Ibrahim Yakubu Seini
Abstract:
In this paper, the steady/transient MHD heat transfer within radiative porous channel due to convective boundary conditions is considered. The solution of the steady-state and that of the transient version were conveyed by Perturbation and Finite difference methods respectively. The heat transfer mechanism of the present work ascertains the influence of Biot number〖(B〗_i1), magnetizing parameter (M), radiation parameter(R), temperature difference, suction/injection(S) Grashof number (Gr) and time (t) on velocity (u), temperature(θ), skin friction(τ), and Nusselt number (Nu). The results established were discussed with the help of a line graph. It was found that the velocity, temperature, and skin friction decay with increasing suction/injection and magnetizing parameters while the Nusselt number upsurges with suction/injection at y = 0 and falls at y =1. The steady-state solution was in perfect agreement with the transient version for a significant value of time t. It is interesting to report that the Biot number has a cogent influence consequently, as its values upsurge the result of the present work slant the extended literature.Keywords: heat transfer, thermal radiation, porous channel, MHD, transient, convective boundary condition
Procedia PDF Downloads 1211737 Reviewing Privacy Preserving Distributed Data Mining
Authors: Sajjad Baghernezhad, Saeideh Baghernezhad
Abstract:
Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.Keywords: data mining, distributed data mining, privacy protection, privacy preserving
Procedia PDF Downloads 5261736 Adaptive Analysis of Housing Policies in Development Programming After 1970s (Case Study: Kermanshah City in the Western Iran)
Authors: Zeinab. Shahrokhifar, Abolfazl Meshkini, Seyed Ali. Alavi
Abstract:
Considering the different dimensions of deprivation, housing supply is noted as a basic requirement in Iran after 1979 (coming to work of the new government). The government had built the constitution and obliged to meet this need in the form of five-year development programs in Iran’s provinces. This study focused on the adaptive analysis of housing policies in these five development programs in Kermanshah province located in western Iran. Our research is divided into two different analytical sections. In the first section, we collected the documentary information using approved plans and field studies. In the second section, a questionnaire was prepared and designed for the elite community (30) to support the documentary analysis. The results showed that various projects adopted in the form of strategic plans and implemented the policies included both quantitative and qualitative housing in Kermanshah province after 1979. The quality of housing, from the first to the fifth development plans has improved the situation in the housing indicators. The quantity of housing units for households has also been implemented through various policies that has desired results. The sequences of housing policies and plans do not overlap in the five development programs. According to the radar graph, the development programs overlapped in some policies, which shows the continuation of the previous policies, but this overlap is not perfect.Keywords: law enforcement policy, housing policy, development programs, housing indicators, the city of Kermanshah
Procedia PDF Downloads 731735 Student's Perception of Home Background and the Acquisition of English Language in Mbonge Municipality, Cameroon
Authors: Japhet Asanji
Abstract:
The bases of this research were to explore student’s perception of home background and the acquisition of English Language in Mbonge Municipality by examining how financial status, level of education, marital status and parenting styles of their parents influence English Language Acquisition. Using random sampling techniques, closed-ended questionnaires were administered to 60 students, and the data was analysed using descriptive statistical analysis. The results reaffirm the positive relationship between student’s perception of home background and the acquisition of English language. Contributions, limitations, and direction for further research are also discussed.Keywords: student, home background, English language acquisition, Cameroon
Procedia PDF Downloads 3751734 Network and Sentiment Analysis of U.S. Congressional Tweets
Authors: Chaitanya Kanakamedala, Hansa Pradhan, Carter Gilbert
Abstract:
Social media platforms, such as Twitter, are excellent datasets for understanding human interactions and sentiments. This report explores social dynamics among US Congressional members through a network analysis applied to a dataset of tweets spanning 2008 to 2017 from the ’US Congressional Tweets Dataset’. In this report, we preform network analysis where connections between users (edges) are established based on a similarity threshold: two tweets are connected if the tweets they post are similar. By utilizing the Natural Language Toolkit (NLTK) and NetworkX, we quantified tweet similarity and constructed a graph comprising various interconnected components. Each component represents a cluster of users with closely aligned content. We then preform sentiment analysis on each cluster to explore the prevalent emotions and opinions within these groups. Our findings reveal that despite the initial expectation of distinct ideological divisions typically aligning with party lines, the analysis exposed a high degree of topical convergence across tweets from different political affiliations. The analysis preformed in this report not only highlights the potential of social media as a tool for political communication but also suggests a complex layer of interaction that transcends traditional partisan boundaries, reflecting a complicated landscape of politics in the digital age.Keywords: natural language processing, sentiment analysis, centrality analysis, topic modeling
Procedia PDF Downloads 361733 Aggregation Scheduling Algorithms in Wireless Sensor Networks
Authors: Min Kyung An
Abstract:
In Wireless Sensor Networks which consist of tiny wireless sensor nodes with limited battery power, one of the most fundamental applications is data aggregation which collects nearby environmental conditions and aggregates the data to a designated destination, called a sink node. Important issues concerning the data aggregation are time efficiency and energy consumption due to its limited energy, and therefore, the related problem, named Minimum Latency Aggregation Scheduling (MLAS), has been the focus of many researchers. Its objective is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that the sink node can receive the aggregated data from all the other nodes without any collision or interference. For the problem, the two interference models, the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR), have been adopted with different power models, uniform-power and non-uniform power (with power control or without power control), and different antenna models, omni-directional antenna and directional antenna models. In this survey article, as the problem has proven to be NP-hard, we present and compare several state-of-the-art approximation algorithms in various models on the basis of latency as its performance measure.Keywords: data aggregation, convergecast, gathering, approximation, interference, omni-directional, directional
Procedia PDF Downloads 2311732 The Lexicographic Serial Rule
Authors: Thi Thao Nguyen, Andrew McLennan, Shino Takayama
Abstract:
We study the probabilistic allocation of finitely many indivisible objects to finitely many agents. Well known allocation rules for this problem include random priority, the market mechanism proposed by Hylland and Zeckhauser [1979], and the probabilistic serial rule of Bogomolnaia and Moulin [2001]. We propose a new allocation rule, which we call the lexico-graphic (serial) rule, that is tailored for situations in which each agent's primary concern is to maximize the probability of receiving her favourite object. Three axioms, lex efficiency, lex envy freeness and fairness, are proposed and fully characterize the lexicographic serial rule. We also discuss how our axioms and the lexicographic rule are related to other allocation rules, particularly the probabilistic serial rule.Keywords: Efficiency, Envy free, Lexicographic, Probabilistic Serial Rule
Procedia PDF Downloads 1491731 Application of Supervised Deep Learning-based Machine Learning to Manage Smart Homes
Authors: Ahmed Al-Adaileh
Abstract:
Renewable energy sources, domestic storage systems, controllable loads and machine learning technologies will be key components of future smart homes management systems. An energy management scheme that uses a Deep Learning (DL) approach to support the smart home management systems, which consist of a standalone photovoltaic system, storage unit, heating ventilation air-conditioning system and a set of conventional and smart appliances, is presented. The objective of the proposed scheme is to apply DL-based machine learning to predict various running parameters within a smart home's environment to achieve maximum comfort levels for occupants, reduced electricity bills, and less dependency on the public grid. The problem is using Reinforcement learning, where decisions are taken based on applying the Continuous-time Markov Decision Process. The main contribution of this research is the proposed framework that applies DL to enhance the system's supervised dataset to offer unlimited chances to effectively support smart home systems. A case study involving a set of conventional and smart appliances with dedicated processing units in an inhabited building can demonstrate the validity of the proposed framework. A visualization graph can show "before" and "after" results.Keywords: smart homes systems, machine learning, deep learning, Markov Decision Process
Procedia PDF Downloads 2051730 Using Set Up Candid Clips as Viral Marketing via New Media
Authors: P. Suparada, D. Eakapotch
Abstract:
This research’s objectives were to analyze the using of new media in the form of set up candid clip that affects the product and presenter, to study the effectiveness of using new media in the form of set up candid clip in order to increase the circulation and audience satisfaction and to use the earned information and knowledge to develop the communication for publicizing and advertising via new media. This research is qualitative research based on questionnaire from 50 random sampling representative samples and in-depth interview from experts in publicizing and advertising fields. The findings indicated the positive and negative effects to the brands’ image and presenters’ image of product named “Scotch 100” and “Snickers” that used set up candid clips via new media for publicizing and advertising in Thailand. It will be useful for fields of publicizing and advertising in the new media forms.Keywords: candid clip, effect, new media, social network
Procedia PDF Downloads 2231729 Knowledge and Eating Behavior of Teenage Pregnancy
Authors: Udomporn Yingpaisuk, Premwadee Karuhadej
Abstract:
The purposed of this research was to study the eating habit of teenage pregnancy and its relationship to the knowledge of nutrition during pregnancy. The 100 samples were derived from simple random sampling technique of the teenage pregnancy in Bangkae District. The questionnaire was used to collect data with the reliability of 0.8. The data were analyzed by SPSS for Windows with multiple regression technique. Percentage, mean and the relationship of knowledge of eating and eating behavior were obtained. The research results revealed that their knowledge in nutrition was at the average of 4.07 and their eating habit that they mentioned most was to refrain from alcohol and caffeine at 82% and the knowledge in nutrition influenced their eating habits at 54% with the statistically significant level of 0.001.Keywords: teenage pregnancy, knowledge of eating, eating behavior, alcohol, caffeine
Procedia PDF Downloads 3581728 Real Estate Trend Prediction with Artificial Intelligence Techniques
Authors: Sophia Liang Zhou
Abstract:
For investors, businesses, consumers, and governments, an accurate assessment of future housing prices is crucial to critical decisions in resource allocation, policy formation, and investment strategies. Previous studies are contradictory about macroeconomic determinants of housing price and largely focused on one or two areas using point prediction. This study aims to develop data-driven models to accurately predict future housing market trends in different markets. This work studied five different metropolitan areas representing different market trends and compared three-time lagging situations: no lag, 6-month lag, and 12-month lag. Linear regression (LR), random forest (RF), and artificial neural network (ANN) were employed to model the real estate price using datasets with S&P/Case-Shiller home price index and 12 demographic and macroeconomic features, such as gross domestic product (GDP), resident population, personal income, etc. in five metropolitan areas: Boston, Dallas, New York, Chicago, and San Francisco. The data from March 2005 to December 2018 were collected from the Federal Reserve Bank, FBI, and Freddie Mac. In the original data, some factors are monthly, some quarterly, and some yearly. Thus, two methods to compensate missing values, backfill or interpolation, were compared. The models were evaluated by accuracy, mean absolute error, and root mean square error. The LR and ANN models outperformed the RF model due to RF’s inherent limitations. Both ANN and LR methods generated predictive models with high accuracy ( > 95%). It was found that personal income, GDP, population, and measures of debt consistently appeared as the most important factors. It also showed that technique to compensate missing values in the dataset and implementation of time lag can have a significant influence on the model performance and require further investigation. The best performing models varied for each area, but the backfilled 12-month lag LR models and the interpolated no lag ANN models showed the best stable performance overall, with accuracies > 95% for each city. This study reveals the influence of input variables in different markets. It also provides evidence to support future studies to identify the optimal time lag and data imputing methods for establishing accurate predictive models.Keywords: linear regression, random forest, artificial neural network, real estate price prediction
Procedia PDF Downloads 1031727 Tourism Development Analysis According to Offer Improvements: Case of Crikvenica
Authors: Josip Arneric, Antonio Sostaric
Abstract:
Crikvenica is one of the favourite tourist destinations at the Adriatic Sea in Croatia which attracts guests with its natural beauties and is one of the top destinations with the highest number of overnights stays. The main purpose of this research is to determine which elements of tourist offer should be improved to achieve sustainable development of the town of Crikvenica. Namely, the survey results from a random sample have shown that the most common reason of the visits is relaxation and vacation, and that more attention should be given to the following categories: restaurants and the working hours of stores and banks. We have also examined whether or not there is a correlation between an average daily expenditure and the overnight stay. The paper ends with the conclusion and the recommendations on how to improve the tourist offer of Crikvenica in order to increase guest satisfaction and to keep its reputation at a high level.Keywords: tourism development, survey, Crikvenica, management sciences
Procedia PDF Downloads 3731726 Molecular Dynamics Simulation on Nanoelectromechanical Graphene Nanoflake Shuttle Device
Authors: Eunae Lee, Oh-Kuen Kwon, Ki-Sub Kim, Jeong Won Kang
Abstract:
We investigated the dynamic properties of graphene-nanoribbon (GNR) memory encapsulating graphene-nanoflake (GNF) shuttle in the potential to be applicable as a non-volatile random access memory via molecular dynamics simulations. This work explicitly demonstrates that the GNR encapsulating the GNF shuttle can be applied to nonvolatile memory. The potential well was originated by the increase of the attractive vdW energy between the GNRs when the GNF approached the edges of the GNRs. So the bistable positions were located near the edges of the GNRs. Such a nanoelectromechanical non-volatile memory based on graphene is also applicable to the development of switches, sensors, and quantum computing.Keywords: graphene nanoribbon, graphene nanoflake, shuttle memory, molecular dynamics
Procedia PDF Downloads 4611725 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1841724 A Correlational Study: Dark Triad and Self-Restraint among Criminology Students
Authors: Mary Heather Lee T. Walker, Audilon Benjamin Madamba, Mizheal Vstrechnny Vidal, Rogelio Angeles, John Rhey Banag, Lorraine Martin
Abstract:
Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this.Keywords: criminology, dark triad, self-restraint, students
Procedia PDF Downloads 2941723 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1281722 Leveraging the Power of Dual Spatial-Temporal Data Scheme for Traffic Prediction
Authors: Yang Zhou, Heli Sun, Jianbin Huang, Jizhong Zhao, Shaojie Qiao
Abstract:
Traffic prediction is a fundamental problem in urban environment, facilitating the smart management of various businesses, such as taxi dispatching, bike relocation, and stampede alert. Most earlier methods rely on identifying the intrinsic spatial-temporal correlation to forecast. However, the complex nature of this problem entails a more sophisticated solution that can simultaneously capture the mutual influence of both adjacent and far-flung areas, with the information of time-dimension also incorporated seamlessly. To tackle this difficulty, we propose a new multi-phase architecture, DSTDS (Dual Spatial-Temporal Data Scheme for traffic prediction), that aims to reveal the underlying relationship that determines future traffic trend. First, a graph-based neural network with an attention mechanism is devised to obtain the static features of the road network. Then, a multi-granularity recurrent neural network is built in conjunction with the knowledge from a grid-based model. Subsequently, the preceding output is fed into a spatial-temporal super-resolution module. With this 3-phase structure, we carry out extensive experiments on several real-world datasets to demonstrate the effectiveness of our approach, which surpasses several state-of-the-art methods.Keywords: traffic prediction, spatial-temporal, recurrent neural network, dual data scheme
Procedia PDF Downloads 1171721 Experimental Analysis of Tuned Liquid Damper (TLD) with Embossments Subject to Random Excitation
Authors: Mohamad Saberi, Arash Sohrabi
Abstract:
Tuned liquid damper is one the passive structural control ways which has been used since mid-1980 decade for seismic control in civil engineering. This system is made of one or many tanks filled with fluid, mostly water that installed on top of the high raised structure and used to prevent structure vibration. In this article we will show how to make seismic table contain TLD system and analysis the result of using this system in our structure. Results imply that when frequency ratio approaches 1 this system can perform its best in both dissipate energy and increasing structural damping. And also results of these serial experiments are proved compatible with Hunzer linear theory behaviour.Keywords: TLD, seismic table, structural system, Hunzer linear behaviour
Procedia PDF Downloads 3791720 “Self-efficacy, Task value and Metacognitive Self-regulation as Predictors of English Language Achievement”
Authors: Omar Baissane and, Hassan Zaid
Abstract:
The purpose of this study was to determine whether self-efficacy, task value, and metacognitive self-regulation predict students’ English language achievement among Vietnamese high school students. In this non-experimental quantitative study, 403 Vietnamese random participants were required to fill out the Motivated Strategies for Learning Questionnaire to measure self-efficacy, task value and metacognitive self-regulation. Criterion for English language achievement was the final grade that students themselves reported. The results revealed that, unlike metacognitive self-regulation, self-efficacy and task value were significantly correlated with language achievement. Moreover, the findings showed that self-efficacy was the only significant predictor of language achievement.Keywords: language achievement, metacognitive self-regulation, predictor, self-efficacy, task value
Procedia PDF Downloads 991719 Methylprednisolone Injection Did Not Inhibit Anti-Hbs Response Following Hepatitis B Vaccination in Mice
Authors: P. O. Ughachukwu, P. O. Okonkwo, P. C. Unekwe, J. O. Ogamba
Abstract:
Background: The prevalence of hepatitis B viral infection is high worldwide with liver cirrhosis and hepatocellular carcinoma as important complications. Cases of poor antibody response to hepatitis B vaccination abound. Immunosuppression, especially from glucocorticoids, is often cited as a cause of poor antibody response and there are documented evidences of irrational administration of glucocorticoids to children and adults. The study was, therefore, designed to find out if administration of glucocorticoids affects immune response to vaccination against hepatitis B in mice. Methods: Mice of both sexes were randomly divided into 2 groups. Daily intramuscular methylprednisolone injections, (15 mg kg-1), were given to the test group while sterile deionized water (0.1ml) was given to control mice for 30 days. On day 6 all mice were given 2 μg (0.1ml) hepatitis B vaccine and a booster dose on day 27. On day 34, blood samples were collected and analyzed for anti-HBs titres using enzyme-linked immunosorbent assay (ELISA). Statistical analysis was done using Graph Pad Prism 5.0 and the results taken as statistically significant at p value < 0.05. Results: There were positive serum anti-HBs responses in all mice groups but the differences in titres were not statistically significant. Conclusions: At the dosages and length of exposure used in this study, methylprednisolone injection did not significantly inhibit anti-HBs response in mice following immunization against hepatitis B virus. By extrapolation, methylprednisolone, when used in the usual clinical doses and duration of therapy, is not likely to inhibit immune response to hepatitis B vaccinations in man.Keywords: anti-HBs, hepatitis B vaccine, immune response, methylprednisolone, mice
Procedia PDF Downloads 3231718 ParkedGuard: An Efficient and Accurate Parked Domain Detection System Using Graphical Locality Analysis and Coarse-To-Fine Strategy
Authors: Chia-Min Lai, Wan-Ching Lin, Hahn-Ming Lee, Ching-Hao Mao
Abstract:
As world wild internet has non-stop developments, making profit by lending registered domain names emerges as a new business in recent years. Unfortunately, the larger the market scale of domain lending service becomes, the riskier that there exist malicious behaviors or malwares hiding behind parked domains will be. Also, previous work for differentiating parked domain suffers two main defects: 1) too much data-collecting effort and CPU latency needed for features engineering and 2) ineffectiveness when detecting parked domains containing external links that are usually abused by hackers, e.g., drive-by download attack. Aiming for alleviating above defects without sacrificing practical usability, this paper proposes ParkedGuard as an efficient and accurate parked domain detector. Several scripting behavioral features were analyzed, while those with special statistical significance are adopted in ParkedGuard to make feature engineering much more cost-efficient. On the other hand, finding memberships between external links and parked domains was modeled as a graph mining problem, and a coarse-to-fine strategy was elaborately designed by leverage the graphical locality such that ParkedGuard outperforms the state-of-the-art in terms of both recall and precision rates.Keywords: coarse-to-fine strategy, domain parking service, graphical locality analysis, parked domain
Procedia PDF Downloads 4091717 Angle of Arrival Estimation Using Maximum Likelihood Method
Authors: Olomon Wu, Hung Lu, Nick Wilkins, Daniel Kerr, Zekeriya Aliyazicioglu, H. K. Hwang
Abstract:
Multiple Input Multiple Output (MIMO) radar has received increasing attention in recent years. MIMO radar has many advantages over conventional phased array radar such as target detection, resolution enhancement, and interference suppression. In this paper, the results are presented from a simulation study of MIMO Uniformly-Spaced Linear Array (ULA) antennas. The performance is investigated under varied parameters, including varied array size, Pseudo Random (PN) sequence length, number of snapshots, and Signal to Noise Ratio (SNR). The results of MIMO are compared to a traditional array antenna.Keywords: MIMO radar, phased array antenna, target detection, radar signal processing
Procedia PDF Downloads 5441716 The Relationship between School Belonging, Self-Efficacy and Academic Achievement in Tabriz High School Students
Authors: F. Pari, E. Fathiazar, T. Hashemi, M. Pari
Abstract:
The present study aimed to examine the role of self-efficacy and school belonging in the academic achievement of Tabriz high school students in grade 11. Therefore, using a random cluster method, 377 subjects were selected from the whole students of Tabriz high schools. They filled in the School Belonging Questionnaire (SBQ) and General Self-Efficacy Scale. Data were analyzed using correlational as well as multiple regression methods. Findings demonstrate self-efficacy and school belonging have significant roles in the prediction of academic achievement. On the other hand, the results suggest that considering the gender variable there is no significant difference between self-efficacy and school belonging. On the whole, cognitive approaches could be effective in the explanation of academic achievement.Keywords: school belonging, self-efficacy, academic achievement, high school
Procedia PDF Downloads 300