Search results for: social networks sites (SNSs)
12701 Alveolar Ridge Preservation in Post-extraction Sockets Using Concentrated Growth Factors: A Split-Mouth, Randomized, Controlled Clinical Trial
Authors: Sadam Elayah
Abstract:
Background: One of the most critical competencies in advanced dentistry is alveolar ridge preservation after exodontia. The aim of this clinical trial was to assess the impact of autologous concentrated growth factor (CGF) as a socket-filling material and its ridge preservation properties following the lower third molar extraction. Materials and Methods: A total of 60 sides of 30 participants who had completely symmetrical bilateral impacted lower third molars were enrolled. The short-term outcome variables were wound healing, swelling and pain, clinically assessed at different time intervals (1st, 3rd & 7th days). While the long-term outcome variables were bone height & width, bone density and socket surface area in the coronal section. Cone beam computed tomography images were obtained immediately after surgery and three months after surgery as a temporal measure. Randomization was achieved by opaque, sealed envelopes. Follow-up data were compared to baseline using Paired & Unpaired t-tests. Results: The wound healing index was significantly better in the test sides (P =0.001). Regarding the facial swelling, the test sides had significantly fewer values than the control sides, particularly on the 1st (1.01±.57 vs 1.55 ±.56) and 3rd days (1.42±0.8 vs 2.63±1.2) postoperatively. Nonetheless, the swelling disappeared within the 7th day on both sides. The pain scores of the visual analog scale were not a statistically significant difference between both sides on the 1st day; meanwhile, the pain scores were significantly lower on the test sides compared with the control sides, especially on the 3rd (P=0.001) and 7th days (P˂0.001) postoperatively. Regarding long-term outcomes, CGF sites had higher values in height and width when compared to Control sites (Buccal wall 32.9±3.5 vs 29.4±4.3 mm, Lingual wall 25.4±3.5 vs 23.1±4 mm, and Alveolar bone width 21.07±1.55vs19.53±1.90 mm) respectively. Bone density showed significantly higher values in CGF sites than in control sites (Coronal half 200±127.3 vs -84.1±121.3, Apical half 406.5±103 vs 64.2±158.6) respectively. There was a significant difference between both sites in reducing periodontal pockets. Conclusion: CGF application following surgical extraction provides an easy, low-cost, and efficient option for alveolar ridge preservation. Thus, dentists may encourage using CGF during dental extractions, particularly when alveolar ridge preservation is required.Keywords: platelet, extraction, impacted teeth, alveolar ridge, regeneration, CGF
Procedia PDF Downloads 6712700 Science of Social Work: Recognizing Its Existence as a Scientific Discipline by a Method Triangulation
Authors: Sandra Mendes
Abstract:
Social Work has encountered over time with multivariate requests in the field of its action, provisioning frameworks of knowledge and praxis. Over the years, we have observed a transformation of society and, consequently, of the public who deals with the social work practitioners. Both, training and profession have had need to adapt and readapt the ways of doing, bailing up theories to action, while action unfolds emancipation of new theories. The theoretical questioning of this subject lies on classical authors from social sciences, and contemporary authors of Social Work. In fact, both enhance, in the design of social work, an integration and social cohesion function, creating a culture of action and theory, attributing to its method a relevant function, which shall be promoter of social changes in various dimensions of both individual and collective life, as well as scientific knowledge. On the other hand, it is assumed that Social Work, through its professionalism and through the academy, is now closer to distinguish itself from other Social Sciences as an autonomous scientific field, being, however, in the center of power struggles. This paper seeks to fill the gap in social work literature about the study of the scientific field of this area of knowledge.Keywords: field theory, knowledge, science, social work
Procedia PDF Downloads 35512699 Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for Wireless Sensor Networks
Authors: Alamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas
Abstract:
Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with a minimum hop count. Load-balancing of data traffic over multiple paths is achieved for a better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves a higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio when compared with eminent WSN routing protocols.Keywords: energy efficiency, load-balancing, hierarchical clustering, multipath routing, wireless sensor networks
Procedia PDF Downloads 8512698 Social Media as a Tool for Political Communication: A Case Study of India
Authors: Srikanth Bade
Abstract:
This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.Keywords: collective action and social capital, political communication, political discourse, social media
Procedia PDF Downloads 15812697 Bayesian Networks Scoping the Climate Change Impact on Winter Wheat Freezing Injury Disasters in Hebei Province, China
Authors: Xiping Wang,Shuran Yao, Liqin Dai
Abstract:
Many studies report the winter is getting warmer and the minimum air temperature is obviously rising as the important climate warming evidences. The exacerbated air temperature fluctuation tending to bring more severe weather variation is another important consequence of recent climate change which induced more disasters to crop growth in quite a certain regions. Hebei Province is an important winter wheat growing province in North of China that recently endures more winter freezing injury influencing the local winter wheat crop management. A winter wheat freezing injury assessment Bayesian Network framework was established for the objectives of estimating, assessing and predicting winter wheat freezing disasters in Hebei Province. In this framework, the freezing disasters was classified as three severity degrees (SI) among all the three types of freezing, i.e., freezing caused by severe cold in anytime in the winter, long extremely cold duration in the winter and freeze-after-thaw in early season after winter. The factors influencing winter wheat freezing SI include time of freezing occurrence, growth status of seedlings, soil moisture, winter wheat variety, the longitude of target region and, the most variable climate factors. The climate factors included in this framework are daily mean and range of air temperature, extreme minimum temperature and number of days during a severe cold weather process, the number of days with the temperature lower than the critical temperature values, accumulated negative temperature in a potential freezing event. The Bayesian Network model was evaluated using actual weather data and crop records at selected sites in Hebei Province using real data. With the multi-stage influences from the various factors, the forecast and assessment of the event-based target variables, freezing injury occurrence and its damage to winter wheat production, were shown better scoped by Bayesian Network model.Keywords: bayesian networks, climatic change, freezing Injury, winter wheat
Procedia PDF Downloads 40812696 Analysis of Q-Learning on Artificial Neural Networks for Robot Control Using Live Video Feed
Authors: Nihal Murali, Kunal Gupta, Surekha Bhanot
Abstract:
Training of artificial neural networks (ANNs) using reinforcement learning (RL) techniques is being widely discussed in the robot learning literature. The high model complexity of ANNs along with the model-free nature of RL algorithms provides a desirable combination for many robotics applications. There is a huge need for algorithms that generalize using raw sensory inputs, such as vision, without any hand-engineered features or domain heuristics. In this paper, the standard control problem of line following robot was used as a test-bed, and an ANN controller for the robot was trained on images from a live video feed using Q-learning. A virtual agent was first trained in simulation environment and then deployed onto a robot’s hardware. The robot successfully learns to traverse a wide range of curves and displays excellent generalization ability. Qualitative analysis of the evolution of policies, performance and weights of the network provide insights into the nature and convergence of the learning algorithm.Keywords: artificial neural networks, q-learning, reinforcement learning, robot learning
Procedia PDF Downloads 37212695 A Hybrid System of Hidden Markov Models and Recurrent Neural Networks for Learning Deterministic Finite State Automata
Authors: Pavan K. Rallabandi, Kailash C. Patidar
Abstract:
In this paper, we present an optimization technique or a learning algorithm using the hybrid architecture by combining the most popular sequence recognition models such as Recurrent Neural Networks (RNNs) and Hidden Markov models (HMMs). In order to improve the sequence or pattern recognition/ classification performance by applying a hybrid/neural symbolic approach, a gradient descent learning algorithm is developed using the Real Time Recurrent Learning of Recurrent Neural Network for processing the knowledge represented in trained Hidden Markov Models. The developed hybrid algorithm is implemented on automata theory as a sample test beds and the performance of the designed algorithm is demonstrated and evaluated on learning the deterministic finite state automata.Keywords: hybrid systems, hidden markov models, recurrent neural networks, deterministic finite state automata
Procedia PDF Downloads 38812694 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks
Authors: Mehmet Karaata
Abstract:
Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security
Procedia PDF Downloads 44212693 Estimating Solar Irradiance on a Tilted Surface Using Artificial Neural Networks with Differential Outputs
Authors: Hsu-Yung Cheng, Kuo-Chang Hsu, Chi-Chang Chan, Mei-Hui Tseng, Chih-Chang Yu, Ya-Sheng Liu
Abstract:
Photovoltaics modules are usually not installed horizontally to avoid water or dust accumulation. However, the measured irradiance data on tilted surfaces are rarely available since installing pyranometers with various tilt angles induces high costs. Therefore, estimating solar irradiance on tilted surfaces is an important research topic. In this work, artificial neural networks (ANN) are utilized to construct the transfer model to estimate solar irradiance on tilted surfaces. Instead of predicting tilted irradiance directly, the proposed method estimates the differences between the horizontal irradiance and the irradiance on a tilted surface. The outputs of the ANNs in the proposed design are differential values. The experimental results have shown that the proposed ANNs with differential outputs can substantially improve the estimation accuracy compared to ANNs that estimate the titled irradiance directly.Keywords: photovoltaics, artificial neural networks, tilted irradiance, solar energy
Procedia PDF Downloads 39712692 Game-Theory-Based on Downlink Spectrum Allocation in Two-Tier Networks
Authors: Yu Zhang, Ye Tian, Fang Ye Yixuan Kang
Abstract:
The capacity of conventional cellular networks has reached its upper bound and it can be well handled by introducing femtocells with low-cost and easy-to-deploy. Spectrum interference issue becomes more critical in peace with the value-added multimedia services growing up increasingly in two-tier cellular networks. Spectrum allocation is one of effective methods in interference mitigation technology. This paper proposes a game-theory-based on OFDMA downlink spectrum allocation aiming at reducing co-channel interference in two-tier femtocell networks. The framework is formulated as a non-cooperative game, wherein the femto base stations are players and frequency channels available are strategies. The scheme takes full account of competitive behavior and fairness among stations. In addition, the utility function reflects the interference from the standpoint of channels essentially. This work focuses on co-channel interference and puts forward a negative logarithm interference function on distance weight ratio aiming at suppressing co-channel interference in the same layer network. This scenario is more suitable for actual network deployment and the system possesses high robustness. According to the proposed mechanism, interference exists only when players employ the same channel for data communication. This paper focuses on implementing spectrum allocation in a distributed fashion. Numerical results show that signal to interference and noise ratio can be obviously improved through the spectrum allocation scheme and the users quality of service in downlink can be satisfied. Besides, the average spectrum efficiency in cellular network can be significantly promoted as simulations results shown.Keywords: femtocell networks, game theory, interference mitigation, spectrum allocation
Procedia PDF Downloads 15612691 A Relational Approach to Adverb Use in Interactions
Authors: Guillaume P. Fernandez
Abstract:
Individual language use is a matter of choice in particular interactions. The paper proposes a conceptual and theoretical framework with methodological consideration to develop how language produced in dyadic relations is to be considered and situated in the larger social configuration the interaction is embedded within. An integrated and comprehensive view is taken: social interactions are expected to be ruled by a normative context, defined by the chain of interdependences that structures the personal network. In this approach, the determinants of discursive practices are not only constrained by the moment of production and isolated from broader influences. Instead, the position the individual and the dyad have in the personal network influences the discursive practices in a twofold manner: on the one hand, the network limits the access to linguistic resources available within it, and, on the other hand, the structure of the network influences the agency of the individual, by the social control inherent to particular network characteristics. Concretely, we investigate how and to what extent consistent ego is from one interaction to another in his or her use of adverbs. To do so, social network analysis (SNA) methods are mobilized. Participants (N=130) are college students recruited in the french speaking part of Switzerland. The personal network of significant ones of each individual is created using name generators and edge interpreters, with a focus on social support and conflict. For the linguistic parts, respondents were asked to record themselves with five of their close relations. From the recordings, we computed an average similarity score based on the adverb used across interactions. In terms of analyses, two are envisaged: First, OLS regressions including network-level measures, such as density and reciprocity, and individual-level measures, such as centralities, are performed to understand the tenets of linguistic similarity from one interaction to another. The second analysis considers each social tie as nested within ego networks. Multilevel models are performed to investigate how the different types of ties may influence the likelihood to use adverbs, by controlling structural properties of the personal network. Primary results suggest that the more cohesive the network, the less likely is the individual to change his or her manner of speaking, and social support increases the use of adverbs in interactions. While promising results emerge, further research should consider a longitudinal approach to able the claim of causality.Keywords: personal network, adverbs, interactions, social influence
Procedia PDF Downloads 6712690 Application of Artificial Neural Network for Prediction of High Tensile Steel Strands in Post-Tensioned Slabs
Authors: Gaurav Sancheti
Abstract:
This study presents an impacting approach of Artificial Neural Networks (ANNs) in determining the quantity of High Tensile Steel (HTS) strands required in post-tensioned (PT) slabs. Various PT slab configurations were generated by varying the span and depth of the slab. For each of these slab configurations, quantity of required HTS strands were recorded. ANNs with backpropagation algorithm and varying architectures were developed and their performance was evaluated in terms of Mean Square Error (MSE). The recorded data for the quantity of HTS strands was used as a feeder database for training the developed ANNs. The networks were validated using various validation techniques. The results show that the proposed ANNs have a great potential with good prediction and generalization capability.Keywords: artificial neural networks, back propagation, conceptual design, high tensile steel strands, post tensioned slabs, validation techniques
Procedia PDF Downloads 22112689 War and the Battle of Lebanese Television over Gender
Authors: Natalie M. Khazaal
Abstract:
The effects of the civil war on Lebanese women have been challenging to conceptualize. For some, war is a liberating and empowering force for women, while for others it is one that subjugates women and disempowers them in new ways. Scholars have explored the impact on the Lebanese civil war (1975-1990) on women in the fields of labor history, political activism and literary production. In all these arenas, women’s role and visibility were contested and negotiated in diverse ways. But probably the most visible arena where this contestation took place was television. Dramatized entertainment series were crucial sites where fictional women battled out the gender question, and which reflected and participated in the negotiations of gender politics. Even more stunningly, actual television stations became part of this battle through the plots and portrayals of women that they created. The state-backed Tele-Liban (TL) peddled patriarchal articulations of gender that directly competed with the edgy vision of liberated, independent women on the pirate Lebanese Broadcasting Corporation (LBC). This presentation explores how LBC used gender to distinguish its brand against the retrograde TL programing. Television series are an important medium for creating, testing and reenacting gender politics. They are even more consequential in another way. They are the sites where a dramatic shift in the relationship between Arab television and Arab publics—from benign neglect of public concerns towards engagement with audiences—took place for the first time. As this shift is at the heart of why Arab media was seen as a participant in the Arab uprisings, it is important to explore the roots of the shift in the dramas and comedy series of the mid-1980s Lebanese television. This presentation argues that television battles over gender were consequential and need serious consideration as sites of unexpected meaning.Keywords: gender, Lebanon, television, war, women
Procedia PDF Downloads 63712688 Conceptualizing Notions of Poverty in Graduate Social Work Education: Contextualizing the Formation of the ‘Social Worker’ Subjectivity
Authors: Emily Carrothers
Abstract:
This research takes a critical look at the development of the social worker subjectivity, particularly in Canada. Through an interrogation of required graduate course texts, this paper explicates the discursive formation, orientation, and maintenance of the social worker subject and the conceptualizations of poverty in graduate social work education. This research aims to advance understandings of power and ideology in social work graduate texts and formations of particular dominant constructions of poverty and social worker subjectivity. Guiding questions for this inquiry include: What are social workers being oriented to? What are social workers being oriented away from? How is poverty theorized, discussed and/or attached to social location in social work education? And, how are social workers implicated in contesting or reinforcing poverty? Using critical discourse analysis, 6 texts were analyzed with a particular focus on ways in which notions of poverty are discursively represented and ways in which notions of the formation of the social worker were approached. This revealed that discursively underpinning social work in anti-oppressive practice (AOP) can work to reify hierarchal structures of power that orient social workers away from structural poverty reduction strategies and towards punitive interactions with those that experience poverty and multiple forms of marginalization. This highlights that the social worker subjectivity is formed in opposition to the client, with graduate texts constructing the social worker as an expert in client’s lives and experiences even more so than the client.Keywords: Canada, education, social work, subjectivity
Procedia PDF Downloads 16112687 Predicting Global Solar Radiation Using Recurrent Neural Networks and Climatological Parameters
Authors: Rami El-Hajj Mohamad, Mahmoud Skafi, Ali Massoud Haidar
Abstract:
Several meteorological parameters were used for the prediction of monthly average daily global solar radiation on horizontal using recurrent neural networks (RNNs). Climatological data and measures, mainly air temperature, humidity, sunshine duration, and wind speed between 1995 and 2007 were used to design and validate a feed forward and recurrent neural network based prediction systems. In this paper we present our reference system based on a feed-forward multilayer perceptron (MLP) as well as the proposed approach based on an RNN model. The obtained results were promising and comparable to those obtained by other existing empirical and neural models. The experimental results showed the advantage of RNNs over simple MLPs when we deal with time series solar radiation predictions based on daily climatological data.Keywords: recurrent neural networks, global solar radiation, multi-layer perceptron, gradient, root mean square error
Procedia PDF Downloads 44412686 Effects of Social Media on Class Layers in Kuwait
Authors: Bashaiar Al-Sanaa
Abstract:
Class has always been a vital distinguishing factor among people within any society. Clear borders between social layers; such as royals, nobles, aristocrats, the bourgeoisie, and working class; have been minimized and blurred due to the advent of social media. Unprecedented access to information has played a significant role in teaching different individuals about the nature of other social layers, hence, allowing for imitation and integration. This study aims to fill the void in research conducted on such topic. The research explores how social media may be slowly but surely dissolving apparent and rigid borderlines of social class. In order to present an overview of the topic, the study surveys individuals in Kuwait to measure how using social media changed their views and style of social class. It also draws a framework through which implications and suggestions for future research may be discussed to better serve the advancement of human communication.Keywords: class, communication, Kuwait, social media
Procedia PDF Downloads 19012685 Pinch Technology for Minimization of Water Consumption at a Refinery
Authors: W. Mughees, M. Alahmad
Abstract:
Water is the most significant entity that controls local and global development. For the Gulf region, especially Saudi Arabia, with its limited potable water resources, the potential of the fresh water problem is highly considerable. In this research, the study involves the design and analysis of pinch-based water/wastewater networks. Multiple water/wastewater networks were developed using pinch analysis involving direct recycle/material recycle method. Property-integration technique was adopted to carry out direct recycle method. Particularly, a petroleum refinery was considered as a case study. In direct recycle methodology, minimum water discharge and minimum fresh water resource targets were estimated. Re-design (or retrofitting) of water allocation in the networks was undertaken. Chemical Oxygen Demand (COD) and hardness properties were taken as pollutants. This research was based on single and double contaminant approach for COD and hardness and the amount of fresh water was reduced from 340.0 m3/h to 149.0 m3/h (43.8%), 208.0 m3/h (61.18%) respectively. While regarding double contaminant approach, reduction in fresh water demand was 132.0 m3/h (38.8%). The required analysis was also carried out using mathematical programming technique. Operating software such as LINGO was used for these studies which have verified the graphical method results in a valuable and accurate way. Among the multiple water networks, the one possible water allocation network was developed based on mass exchange.Keywords: minimization, water pinch, water management, pollution prevention
Procedia PDF Downloads 47712684 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks
Authors: Shidrokh Goudarzi, Wan Haslina Hassan
Abstract:
Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms
Procedia PDF Downloads 39312683 Uncertainty Estimation in Neural Networks through Transfer Learning
Authors: Ashish James, Anusha James
Abstract:
The impressive predictive performance of deep learning techniques on a wide range of tasks has led to its widespread use. Estimating the confidence of these predictions is paramount for improving the safety and reliability of such systems. However, the uncertainty estimates provided by neural networks (NNs) tend to be overconfident and unreasonable. Ensemble of NNs typically produce good predictions but uncertainty estimates tend to be inconsistent. Inspired by these, this paper presents a framework that can quantitatively estimate the uncertainties by leveraging the advances in transfer learning through slight modification to the existing training pipelines. This promising algorithm is developed with an intention of deployment in real world problems which already boast a good predictive performance by reusing those pretrained models. The idea is to capture the behavior of the trained NNs for the base task by augmenting it with the uncertainty estimates from a supplementary network. A series of experiments with known and unknown distributions show that the proposed approach produces well calibrated uncertainty estimates with high quality predictions.Keywords: uncertainty estimation, neural networks, transfer learning, regression
Procedia PDF Downloads 13512682 Ta(l)king Pictures: Development of an Educational Program (SELVEs) for Adolescents Combining Social-Emotional Learning and Photography Taking
Authors: Adi Gielgun-Katz, Alina S. Rusu
Abstract:
In the last two decades, education systems worldwide have integrated new pedagogical methods and strategies in lesson plans, such as innovative technologies, social-emotional learning (SEL), gamification, mixed learning, multiple literacies, and many others. Visual language, such as photographs, is known to transcend cultures and languages, and it is commonly used by youth to express positions and affective states in social networks. Therefore, visual language needs more educational attention as a linguistic and communicative component that can create connectedness among the students and their teachers. Nowadays, when SEL is gaining more and more space and meaning in the area of academic improvement in relation to social well-being, and taking and sharing pictures is part of the everyday life of the majority of people, it becomes natural to add the visual language to SEL approach as a reinforcement strategy for connecting education to the contemporary culture and language of the youth. This article presents a program conducted in a high school class in Israel, which combines the five SEL with photography techniques, i.e., Social-Emotional Learning Visual Empowerments (SELVEs) program (experimental group). Another class of students from the same institution represents the control group, which is participating in the SEL program without the photography component. The SEL component of the programs addresses skills such as: troubleshooting, uncertainty, personal strengths and collaboration, accepting others, control of impulses, communication, self-perception, and conflict resolution. The aim of the study is to examine the effects of programs on the level of the five SEL aspects in the two groups of high school students: Self-Awareness, Social Awareness, Self-Management, Responsible Decision Making, and Relationship Skills. The study presents a quantitative assessment of the SEL programs’ impact on the students. The main hypothesis is that the students’ questionnaires' analysis will reveal a better understanding and improvement of the five aspects of the SEL in the group of students involved in the photography-enhanced SEL program.Keywords: social-emotional learning, photography, education program, adolescents
Procedia PDF Downloads 8412681 Performance of Neural Networks vs. Radial Basis Functions When Forming a Metamodel for Residential Buildings
Authors: Philip Symonds, Jon Taylor, Zaid Chalabi, Michael Davies
Abstract:
With the world climate projected to warm and major cities in developing countries becoming increasingly populated and polluted, governments are tasked with the problem of overheating and air quality in residential buildings. This paper presents the development of an adaptable model of these risks. Simulations are performed using the EnergyPlus building physics software. An accurate metamodel is formed by randomly sampling building input parameters and training on the outputs of EnergyPlus simulations. Metamodels are used to vastly reduce the amount of computation time required when performing optimisation and sensitivity analyses. Neural Networks (NNs) are compared to a Radial Basis Function (RBF) algorithm when forming a metamodel. These techniques were implemented using the PyBrain and scikit-learn python libraries, respectively. NNs are shown to perform around 15% better than RBFs when estimating overheating and air pollution metrics modelled by EnergyPlus.Keywords: neural networks, radial basis functions, metamodelling, python machine learning libraries
Procedia PDF Downloads 44712680 MIMIC: A Multi Input Micro-Influencers Classifier
Authors: Simone Leonardi, Luca Ardito
Abstract:
Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media
Procedia PDF Downloads 18312679 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 11312678 Comparison of Fuel Cell Installation Methods at Large Commercial and Industrial Sites
Authors: Masood Sattari
Abstract:
Using fuel cell technology to generate electricity for large commercial and industrial sites is a growing segment in the fuel cell industry. The installation of these systems involves design, permitting, procurement of long-lead electrical equipment, and construction involving multiple utilities. The installation of each fuel cell system requires the same amount of coordination as the construction of a new structure requiring a foundation, gas, water, and electricity. Each of these components provide variables that can delay and possibly eliminate a new project. As the manufacturing process and efficiency of fuel cell systems improves, so must the installation methods to prevent a ‘bottle-neck’ in the installation phase of the deployment. Installation methodologies to install the systems vary among companies and this paper will examine the methodologies, describe the benefits and drawbacks for each, and provide guideline for the industry to improve overall installation efficiency.Keywords: construction, installation, methodology, procurement
Procedia PDF Downloads 19612677 From Ondoy to Habagat: Comparison of the Community Coping Strategies between Barangay Tumana and Provident Village, Marikina City
Authors: Dinnah Feye H. Andal, Ann Laurice V. Salonga
Abstract:
The paper investigates the flooding event that was experienced by Marikina City residents during the onslaught of Tropical Storm Ondoy on September 26, 2009 and during the heavy downpour caused by the southwest monsoon (Habagat) on August 1-8, 2012. Typhoon Ketsana, locally known as Tropical Storm Ondoy, devastated the whole of Marikina City, displacing a lot of people from their homes and damages properties as well, as flood rose at a very short period of time. Meanwhile, the massive amount of rain water brought by the southwest monsoon lasted for a week that also caused flooding to different parts of Metro Manila including Marikina City. This paper examines how the respondents’ experiences of the flooding caused by Tropical Storm Ondoy informed the coping strategies that the households in Barangay Tumana and Provident Village employed during the flooding brought by the southwest monsoon rains. Specifically, the research compares the coping strategies to flood hazards between residents of Barangay Tumana and Provident Village before, during and after the flooding caused by the southwest monsoon rains. Both study sites have relatively low elevation and are located along rivers and creeks which make them highly susceptible to flood. Interviews with affected residents were undertaken to understand how a household's coping strategies contribute to the development of community coping strategies at the respective neighborhood level. Based from the findings, income levels, local politics, religion and social relations between and among neighbors affect the way household and community coping strategies differ in the two case study sites.Keywords: community coping strategies, Habagat, Marikina, Ondoy
Procedia PDF Downloads 31512676 Study of a Crude Oil Desalting Plant of the National Iranian South Oil Company in Gachsaran by Using Artificial Neural Networks
Authors: H. Kiani, S. Moradi, B. Soltani Soulgani, S. Mousavian
Abstract:
Desalting/dehydration plants (DDP) are often installed in crude oil production units in order to remove water-soluble salts from an oil stream. In order to optimize this process, desalting unit should be modeled. In this research, artificial neural network is used to model efficiency of desalting unit as a function of input parameter. The result of this research shows that the mentioned model has good agreement with experimental data.Keywords: desalting unit, crude oil, neural networks, simulation, recovery, separation
Procedia PDF Downloads 45012675 Spectrum Assignment Algorithms in Optical Networks with Protection
Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad
Abstract:
In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks
Procedia PDF Downloads 16912674 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things
Authors: James Kaweesa
Abstract:
The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.Keywords: cyber-threats, iot, intrusion detection system, networks
Procedia PDF Downloads 8012673 A Survey on Important Factors of the Ethereum Network Performance
Authors: Ali Mohammad Mobaser Azad, Alireza Akhlaghinia
Abstract:
Blockchain is changing our world and launching a new generation of decentralized networks. Meanwhile, Blockchain-based networks like Ethereum have been created and they will facilitate these processes using tools like smart contracts. The Ethereum has fundamental structures, each of which affects the activity of the nodes. Our purpose in this paper is to review similar research and examine various components to demonstrate the performance of the Ethereum network and to do this, and we used the data published by the Ethereum Foundation in different time spots to examine the number of changes that determine the status of network performance. This will help other researchers understand better Ethereum in different situations.Keywords: blockchain, ethereum, smart contract, decentralization consensus algorithm
Procedia PDF Downloads 22512672 Indigenous Knowledge and Archaeological Heritage Resources in Lawra, Upper West Region, Ghana
Authors: Christiana Wulty Diku
Abstract:
This research mapped and documented archaeological heritage resources with associated indigenous knowledge in Lawra, an understudied Municipality in the Upper West Region of Ghana. Since the inception of Archaeology as a discipline in the 1930s at the University of Ghana, the Lawra Municipality has rarely been investigated archaeologically. Consequently, the unconsciousness and ignorance of indigenes on the relevance of these resources to national development has destroyed many significant archaeological sites, with agriculture and infrastructural developmental activities endangering countless of them. Drawing from a community archaeological approach, a collaborative archaeological investigation between local groups, communities and professionals (archaeologists) was conducted to recover these lost histories of settlements in the municipality, salvage and protect endangered archaeological heritage resources and sites from agricultural, exploitative and developmental activities. This was geared towards expanding on the limited research on northern Ghana and deepening our understanding on the existing symbiotic relationship between people and their heritage resources in past and present times. The study deploying ethnographic, archaeological and physical survey techniques as methods in six field seasons beginning from August 2013 to April 2023. This resulted in the reconstruction of the settlement history of Lawra with chronological dates, compilation of inventory on significant archaeological heritage resources with associated indigenous knowledge, mitigation of endangered archaeological sites and heritage resources through surface collections and the development of a photographic record, with associated metadata for purposes of preservation and future research.Keywords: archaeological heritage resources, indigenous knowledge, lawra municipality, community archaeology
Procedia PDF Downloads 69