Search results for: cluster computing
838 A Comparative Study on the Effects of Different Clustering Layouts and Geometry of Urban Street Canyons on Urban Heat Island in Residential Neighborhoods of Kolkata
Authors: Shreya Banerjee, Roshmi Sen, Subrata Chattopadhyay
Abstract:
Urbanization during the second half of the last century has created many serious environment related issues leading to global warming and climate change. India is not an exception as the country is also facing the problems of global warming and urban heat islands (UHI) in all the major metropolises. This paper discusses the effect of different housing cluster layouts, site geometry, and geometry of urban street canyons on the urban heat island profile. The study is carried out using the three dimensional microclimatic computational fluid dynamics model ENVI-met version 3.1. Simulation models are done for a typical summer day of 21st June, 2015 in four different residential neighborhoods in the city of Kolkata which predominantly belongs to Warm-Humid Monsoon Climate. The results show the changing pattern of urban heat island profile with respect to different clustering layouts, geometry, and morphology of urban street canyons. The comparison between the four neighborhoods shows that different microclimatic variables are strongly dependant on the neighborhood layout pattern and geometry. The inferences obtained from this study can be indicative towards the formulation of neighborhood design by-laws that will attenuate the urban heat island effect.Keywords: urban heat island, neighborhood morphology, site microclimate, ENVI-met, numerical analysis
Procedia PDF Downloads 368837 Students’ Perception of Effort and Emotional Costs in Chemistry Courses
Authors: Guizella Rocabado, Cassidy Wilkes
Abstract:
It is well known that chemistry is one of the most feared courses in college. Although many students enjoy learning about science, most of them perceive that chemistry is “too difficult”. These perceptions of chemistry result in many students not considering Science, Technology, Engineering, and Mathematics (STEM) majors because they require chemistry courses. Ultimately, these perceptions are also thought to be related to high attrition rates of students who begin STEM majors but do not persist. Students perceived costs of a chemistry class can be many, such as task effort, loss of valued alternatives, emotional, and others. These costs might be overcome by students’ interests and goals, yet the level of perceived costs might have a lasting impact on the students’ overall perception of chemistry and their desire to pursue chemistry and other STEM careers in the future. In this mixed methods study, we investigated task effort and emotional cost, as well as a mastery or performance goal orientation, and the impact these constructs may have on achievement in general chemistry classrooms. Utilizing cluster analysis as well as student interviews, we investigated students’ profiles of perceived cost and goal orientation as it relates to their final grades. Our results show that students who are well prepared for general chemistry, such as those who have taken chemistry in high school, display less negative perceived costs and thus believe they can master the material more fully. Other interesting results have also emerged from this research, which has the potential to have an impact on future instruction of these courses.Keywords: chemistry education, motivation, affect, perceived costs, goal orientations
Procedia PDF Downloads 90836 A Coordinated School Health Program Effect on Cardiorespiratory Fitness in Preschool Children
Authors: Zasha Romero, Roberto Trevino, Lin Wang, Elizabeth Alanis, Jesus Cuellar
Abstract:
Background: There is a strong relationship between low cardiorespiratory fitness (CRF) and high adiposity levels. The purpose of this study was to assess the effects of the Bienestar/Neema Coordinated School Health Program (BN CSHP) on the CRF of preschool children. Methods: This is a randomized cluster trial conducted in preschools of two school districts located along the Texas-Mexico border. Of 48 eligible schools, 28 were randomly selected (intervention, n=14; control, n=14). Family demographics and household health characteristics were collected from parents. CRF, as measured by the Progressive Anaerobic Capacity Endurance Run (PACER) fitness test, was collected from the children. A generalized linear mixed model (GLMM) was used to analyze the data. Results: Family demographics, household health characteristics, and children’s weight, obesity prevalence, and sedentary activity were similar among both treatment groups. After adjusting for covariates, the number of laps run by children in the control group increased by 23% (CI: -5% to 60%) per each data collection period compared with 53% (CI: 7% to 119%) in the intervention group. Conclusions: Children in the BN CSHP, compared to those in the control group, had a significantly higher increase in their CRF. This finding is important because of the health benefits of CRF in children.Keywords: coordinated school health program, cardiorespiratory fitness, obesity, border health, preschool, physical education, movement
Procedia PDF Downloads 85835 Separating Landform from Noise in High-Resolution Digital Elevation Models through Scale-Adaptive Window-Based Regression
Authors: Anne M. Denton, Rahul Gomes, David W. Franzen
Abstract:
High-resolution elevation data are becoming increasingly available, but typical approaches for computing topographic features, like slope and curvature, still assume small sliding windows, for example, of size 3x3. That means that the digital elevation model (DEM) has to be resampled to the scale of the landform features that are of interest. Any higher resolution is lost in this resampling. When the topographic features are computed through regression that is performed at the resolution of the original data, the accuracy can be much higher, and the reported result can be adjusted to the length scale that is relevant locally. Slope and variance are calculated for overlapping windows, meaning that one regression result is computed per raster point. The number of window centers per area is the same for the output as for the original DEM. Slope and variance are computed by performing regression on the points in the surrounding window. Such an approach is computationally feasible because of the additive nature of regression parameters and variance. Any doubling of window size in each direction only takes a single pass over the data, corresponding to a logarithmic scaling of the resulting algorithm as a function of the window size. Slope and variance are stored for each aggregation step, allowing the reported slope to be selected to minimize variance. The approach thereby adjusts the effective window size to the landform features that are characteristic to the area within the DEM. Starting with a window size of 2x2, each iteration aggregates 2x2 non-overlapping windows from the previous iteration. Regression results are stored for each iteration, and the slope at minimal variance is reported in the final result. As such, the reported slope is adjusted to the length scale that is characteristic of the landform locally. The length scale itself and the variance at that length scale are also visualized to aid in interpreting the results for slope. The relevant length scale is taken to be half of the window size of the window over which the minimum variance was achieved. The resulting process was evaluated for 1-meter DEM data and for artificial data that was constructed to have defined length scales and added noise. A comparison with ESRI ArcMap was performed and showed the potential of the proposed algorithm. The resolution of the resulting output is much higher and the slope and aspect much less affected by noise. Additionally, the algorithm adjusts to the scale of interest within the region of the image. These benefits are gained without additional computational cost in comparison with resampling the DEM and computing the slope over 3x3 images in ESRI ArcMap for each resolution. In summary, the proposed approach extracts slope and aspect of DEMs at the lengths scales that are characteristic locally. The result is of higher resolution and less affected by noise than existing techniques.Keywords: high resolution digital elevation models, multi-scale analysis, slope calculation, window-based regression
Procedia PDF Downloads 129834 Managers’ Mobile Information Behavior in an Openness Paradigm Era
Authors: Abd Latif Abdul Rahman, Zuraidah Arif, Muhammad Faizal Iylia, Mohd Ghazali, Asmadi Mohammed Ghazali
Abstract:
Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services.Keywords: mobile information behavior, information behavior, mobile information, mobile devices
Procedia PDF Downloads 349833 Evaluating Service Trustworthiness for Service Selection in Cloud Environment
Authors: Maryam Amiri, Leyli Mohammad-Khanli
Abstract:
Cloud computing is becoming increasingly popular and more business applications are moving to cloud. In this regard, services that provide similar functional properties are increasing. So, the ability to select a service with the best non-functional properties, corresponding to the user preference, is necessary for the user. This paper presents an Evaluation Framework of Service Trustworthiness (EFST) that evaluates the trustworthiness of equivalent services without need to additional invocations of them. EFST extracts user preference automatically. Then, it assesses trustworthiness of services in two dimensions of qualitative and quantitative metrics based on the experiences of past usage of services. Finally, EFST determines the overall trustworthiness of services using Fuzzy Inference System (FIS). The results of experiments and simulations show that EFST is able to predict the missing values of Quality of Service (QoS) better than other competing approaches. Also, it propels users to select the most appropriate services.Keywords: user preference, cloud service, trustworthiness, QoS metrics, prediction
Procedia PDF Downloads 287832 Assessment of Spatial and Vertical Distribution of Heavy Metals in the Mid Sand Bars of Brahmaputra River in Assam, India
Authors: Vijay Meena, Arup Kumar Sarma, Chandan Mahanta
Abstract:
The environment has been getting contaminated by anthropogenic processes including those that discharge heavy metals to air, soil and water. The present work emphasizes the spatial distribution and vertical profile of six heavy metals (Cu, Zn, Mn, Ni, Fe, Cr) in three layers of mid sand bars (bed surface layer, 50 cm and 100 cm depth) at 42 sampling stations covering around 600 km stretch of the Brahmaputra River, India. Heavy metal analysis was conducted on the sample collected from mid-sand bars in the river stretch to examine the impact of dredging for various hydrological operations in the future. Sediment quality was assessed by calculating six different indices viz., EF, CF, CD, PLI, Igeo, and PERI. In all sediment layers, heavy metal concentrations have been observed to be the same as listed, Fe > Mn > Zn > Ni > Cr > Cu in μg/g. The average concentration of Cu, Mn, and Fe was found in the middle layer while Zn, Ni, and Cr were in the Surface layer. EF indicates higher enrichment in reach 2 which is likely to be due to anthropogenic sources of industrial and urbanized effluents. The sediment of the mid-sand bar was generally found moderately polluted possessing low risk to aquatic lives and the environment. Suggesting, Dredging can be possible in the future. An examination of correlation matrices, principal components analysis, and cluster analyses indicated that these heavy metals possess similar anthropogenic origins for their enrichment.Keywords: heavy metal contamination, risk assessment, anthropogenic impacts, sediment
Procedia PDF Downloads 97831 Marker Assisted Selection of Rice Genotypes for Xa5 and Xa13 Bacterial Leaf Blight Resistance Genes
Authors: P. Sindhumole, K. Soumya, R. Renjimol
Abstract:
Rice (Oryza sativa L.) is the major staple food crop over the world. It is prone to a number of biotic and abiotic stresses, out of which Bacterial Leaf Blight (BLB), caused by Xanthomonas oryzae pv. oryzae, is the most rampant. Management of this disease through chemicals or any other means is very difficult. The best way to control BLB is by the development of Host Plant Resistance. BLB resistance is not an activity of a single gene but it involves a cluster of more than thirty genes reported. Among these, Xa5 and Xa13 genes are two important ones, which can be diagnosed through marker assisted selection using closely linked molecular markers. During 2014, the first phase of field screening using forty traditional rice genotypes was carried out and twenty resistant symptomless genotypes were identified. Molecular characterisation of these genotypes using RM 122 SSR marker revealed the presence of Xa5 gene in thirteen genotypes. Forty-two traditional rice genotypes were used for the second phase of field screening for BLB resistance. Among these, sixteen resistant genotypes were identified. These genotypes, along with two susceptible check genotypes, were subjected to marker assisted selection for Xa13 gene, using the linked STS marker RG-136. During this process, presence of Xa13 gene could be detected in ten resistant genotypes. In future, these selected genotypes can be directly utilised as donors in Marker assisted breeding programmes for BLB resistance in rice.Keywords: oryza sativa, SSR, STS, marker, disease, breeding
Procedia PDF Downloads 395830 Screening of the Sunflower Genotypes for Drought Stress at Seedling Stage by Polyethylene Glycol under Laboratory Conditions
Authors: Uzma Ayaz, Sanam Bashir, Shahid Iqbal Awan, Muhammad Ilyas, Muhammad Fareed Khan
Abstract:
Drought stress directly affects growth along with the productivity of plants by altering plant water status. Sunflower (Helianthus annuus L.), an oilseed crop, is adversely affected by abiotic stresses. The present study was carried out to characterize the genetic variability for seedling and morpho-physiological parameters in different sunflower genotypes under water-stressed conditions. A total of twenty-seven genotypes, including two hybrids, eight advanced lines and seventeen accessions of sunflower (Helianthus annuus L.) were tested against drought stress at Seedling stages by Polyethylene glycol (PEG). Significant means were calculated among traits using analysis of variance (ANOVA) whereas, correlation and principal component analysis also confirmed that germination percentage, root length, shoot length, chlorophyll content, stomatal frequency are positively linked with each other hence, these traits were responsible for most of the variation among genotypes. The cluster analysis results showed that genotypes Ausun, line-3, line-2, and 17578, line-1, line-7, line-6 and 17562 as more diverse among all the genotypes. These most divergent genotypes could be utilized in the development of drought-tolerant inbreed lines which could be subsequently used in future heterosis breeding programs.Keywords: sunflower, drought, stress, polyethylene- glycol, screening
Procedia PDF Downloads 126829 Multi-Scaled Non-Local Means Filter for Medical Images Denoising: Empirical Mode Decomposition vs. Wavelet Transform
Authors: Hana Rabbouch
Abstract:
In recent years, there has been considerable growth of denoising techniques mainly devoted to medical imaging. This important evolution is not only due to the progress of computing techniques, but also to the emergence of multi-resolution analysis (MRA) on both mathematical and algorithmic bases. In this paper, a comparative study is conducted between the two best-known MRA-based decomposition techniques: the Empirical Mode Decomposition (EMD) and the Discrete Wavelet Transform (DWT). The comparison is carried out in a framework of multi-scale denoising, where a Non-Local Means (NLM) filter is performed scale-by-scale to a sample of benchmark medical images. The results prove the effectiveness of the multiscaled denoising, especially when the NLM filtering is coupled with the EMD.Keywords: medical imaging, non local means, denoising, multiscaled analysis, empirical mode decomposition, wavelets
Procedia PDF Downloads 141828 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 349827 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth
Authors: Hui-Chuan Lu
Abstract:
In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster
Procedia PDF Downloads 362826 Multi-Level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment
Authors: Anju Bala, Inderveer Chana
Abstract:
Task scheduling is the key concern for the execution of performance-driven workflow applications. As efficient scheduling can have major impact on the performance of the system, task scheduling is often chosen for assigning the request to resources in an efficient way based on cloud resource characteristics. In this paper, priority based task scheduling algorithm has been proposed that prioritizes the tasks based on the length of the instructions. The proposed scheduling approach prioritize the tasks of Cloud applications according to the limits set by six sigma control charts based on dynamic threshold values. Further, the proposed algorithm has been validated through the CloudSim toolkit. The experimental results demonstrate that the proposed algorithm is effective for handling multiple task lists from workflows and in considerably reducing Makespan and Execution time.Keywords: cloud computing, priority based scheduling, task scheduling, VM allocation
Procedia PDF Downloads 517825 Automatic Number Plate Recognition System Based on Deep Learning
Authors: T. Damak, O. Kriaa, A. Baccar, M. A. Ben Ayed, N. Masmoudi
Abstract:
In the last few years, Automatic Number Plate Recognition (ANPR) systems have become widely used in the safety, the security, and the commercial aspects. Forethought, several methods and techniques are computing to achieve the better levels in terms of accuracy and real time execution. This paper proposed a computer vision algorithm of Number Plate Localization (NPL) and Characters Segmentation (CS). In addition, it proposed an improved method in Optical Character Recognition (OCR) based on Deep Learning (DL) techniques. In order to identify the number of detected plate after NPL and CS steps, the Convolutional Neural Network (CNN) algorithm is proposed. A DL model is developed using four convolution layers, two layers of Maxpooling, and six layers of fully connected. The model was trained by number image database on the Jetson TX2 NVIDIA target. The accuracy result has achieved 95.84%.Keywords: ANPR, CS, CNN, deep learning, NPL
Procedia PDF Downloads 306824 The UAV Feasibility Trajectory Prediction Using Convolution Neural Networks
Authors: Adrien Marque, Daniel Delahaye, Pierre Maréchal, Isabelle Berry
Abstract:
Wind direction and uncertainty are crucial in aircraft or unmanned aerial vehicle trajectories. By computing wind covariance matrices on each spatial grid point, these spatial grids can be defined as images with symmetric positive definite matrix elements. A data pre-processing step, a specific convolution, a specific max-pooling, and a specific flatten layers are implemented to process such images. Then, the neural network is applied to spatial grids, whose elements are wind covariance matrices, to solve classification problems related to the feasibility of unmanned aerial vehicles based on wind direction and wind uncertainty.Keywords: wind direction, uncertainty level, unmanned aerial vehicle, convolution neural network, SPD matrices
Procedia PDF Downloads 49823 Magnetization Studies and Vortex Phase Diagram of Oxygenated YBa₂Cu₃₋ₓAlₓO₆₊δ Single Crystal
Authors: Ashna Babu, Deepshikha Jaiswal Nagar
Abstract:
Cuprate high-temperature superconductors (HTSCs) have been immensely studied during the past few decades because of their structure which is described as a superlattice of superconducting CuO₂ layers. In particular, YBa₂Cu₃O₆₊δ (YBCO), with its critical temperature of 93 K, has received the most attention due to its well-defined metal stoichiometry and variable oxygen content that determines the carrier doping level. Substitution of metal ions at the Cu site is known to increase the critical current density without destroying superconductivity in YBCO. The construction of vortex phase diagrams is very important for such doped YBCO materials both from a fundamental perspective as well as from a technological perspective. By measuring field-dependent magnetization on annealed single crystals of Al-doped YBCO, YBa₂Cu₃₋ₓAlₓO₆₊δ (Al-YBCO), we were able to observe a second magnetization peak anomaly (SMP) in a very large part of the phase diagram. We were also able to observe the SMP anomaly in temperature-dependent magnetization measurements, the first observation to our knowledge. Critical current densities were calculated using Bean’s critical state model, flux jumps associated with symmetry reorientation of vortex lattice were studied, the oxygen cluster distribution was also analysed, and by incorporating all observations, we made a vortex phase diagram for oxygenated Al-YBCO single crystal.Keywords: oxygen deficient clusters, second magnetization peak anomaly, flux jumps, vortex phase diagram
Procedia PDF Downloads 70822 Application of Deep Learning in Top Pair and Single Top Quark Production at the Large Hadron Collider
Authors: Ijaz Ahmed, Anwar Zada, Muhammad Waqas, M. U. Ashraf
Abstract:
We demonstrate the performance of a very efficient tagger applies on hadronically decaying top quark pairs as signal based on deep neural network algorithms and compares with the QCD multi-jet background events. A significant enhancement of performance in boosted top quark events is observed with our limited computing resources. We also compare modern machine learning approaches and perform a multivariate analysis of boosted top-pair as well as single top quark production through weak interaction at √s = 14 TeV proton-proton Collider. The most relevant known background processes are incorporated. Through the techniques of Boosted Decision Tree (BDT), likelihood and Multlayer Perceptron (MLP) the analysis is trained to observe the performance in comparison with the conventional cut based and count approachKeywords: top tagger, multivariate, deep learning, LHC, single top
Procedia PDF Downloads 111821 An Improved Parallel Algorithm of Decision Tree
Authors: Jiameng Wang, Yunfei Yin, Xiyu Deng
Abstract:
Parallel optimization is one of the important research topics of data mining at this stage. Taking Classification and Regression Tree (CART) parallelization as an example, this paper proposes a parallel data mining algorithm based on SSP-OGini-PCCP. Aiming at the problem of choosing the best CART segmentation point, this paper designs an S-SP model without data association; and in order to calculate the Gini index efficiently, a parallel OGini calculation method is designed. In addition, in order to improve the efficiency of the pruning algorithm, a synchronous PCCP pruning strategy is proposed in this paper. In this paper, the optimal segmentation calculation, Gini index calculation, and pruning algorithm are studied in depth. These are important components of parallel data mining. By constructing a distributed cluster simulation system based on SPARK, data mining methods based on SSP-OGini-PCCP are tested. Experimental results show that this method can increase the search efficiency of the best segmentation point by an average of 89%, increase the search efficiency of the Gini segmentation index by 3853%, and increase the pruning efficiency by 146% on average; and as the size of the data set increases, the performance of the algorithm remains stable, which meets the requirements of contemporary massive data processing.Keywords: classification, Gini index, parallel data mining, pruning ahead
Procedia PDF Downloads 123820 Application of Statistical Linearized Models for Investigations of Digital Dynamic Pulse-Frequency Control Systems
Authors: B. H. Aitchanov, Sh. K. Aitchanova, O. A. Baimuratov
Abstract:
This paper is focused on dynamic pulse-frequency modulation (DPFM) control systems. Currently, the control law based on DPFM control signals is widely used in direct digital control subsystems introduced in the automated control systems of technological processes. Statistical analysis of automatic control systems is reduced to its construction of functional relationships between the statistical characteristics of the errors processes and input processes. Structural and dynamic Volterra models of digital pulse-frequency control systems can be used to develop methods for generating the dependencies, differing accuracy, requiring the amount of information about the statistical characteristics of input processes and computing labor intensity of their use.Keywords: digital dynamic pulse-frequency control systems, dynamic pulse-frequency modulation, control object, discrete filter, impulse device, microcontroller
Procedia PDF Downloads 495819 Forward Stable Computation of Roots of Real Polynomials with Only Real Distinct Roots
Authors: Nevena Jakovčević Stor, Ivan Slapničar
Abstract:
Any polynomial can be expressed as a characteristic polynomial of a complex symmetric arrowhead matrix. This expression is not unique. If the polynomial is real with only real distinct roots, the matrix can be chosen as real. By using accurate forward stable algorithm for computing eigen values of real symmetric arrowhead matrices we derive a forward stable algorithm for computation of roots of such polynomials in O(n^2 ) operations. The algorithm computes each root to almost full accuracy. In some cases, the algorithm invokes extended precision routines, but only in the non-iterative part. Our examples include numerically difficult problems, like the well-known Wilkinson’s polynomials. Our algorithm compares favorably to other method for polynomial root-finding, like MPSolve or Newton’s method.Keywords: roots of polynomials, eigenvalue decomposition, arrowhead matrix, high relative accuracy
Procedia PDF Downloads 418818 The Design of a Mixed Matrix Model for Activity Levels Extraction and Sub Processes Classification of a Work Project (Case: Great Tehran Electrical Distribution Company)
Authors: Elham Allahmoradi, Bahman Allahmoradi, Ali Bonyadi Naeini
Abstract:
Complex systems have many aspects. A variety of methods have been developed to analyze these systems. The most efficient of these methods should not only be simple, but also provide useful and comprehensive information about many aspects of the system. Matrix methods are considered the most commonly methods used to analyze and design systems. Each matrix method can examine a particular aspect of the system. If these methods are combined, managers can access to more comprehensive and broader information about the system. This study was conducted in four steps. In the first step, a process model of a real project has been extracted through IDEF3. In the second step, activity levels have been attained by writing a process model in the form of a design structure matrix (DSM) and sorting it through triangulation algorithm (TA). In the third step, sub-processes have been obtained by writing the process model in the form of an interface structure matrix (ISM) and clustering it through cluster identification algorithm (CIA). In the fourth step, a mixed model has been developed to provide a unified picture of the project structure through the simultaneous presentation of activities and sub-processes. Finally, the paper is completed with a conclusion.Keywords: integrated definition for process description capture (IDEF3) method, design structure matrix (DSM), interface structure matrix (ism), mixed matrix model, activity level, sub-process
Procedia PDF Downloads 494817 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 197816 Mean Square Responses of a Cantilever Beam with Various Damping Mechanisms
Authors: Yaping Zhao, Yimin Zhang
Abstract:
In the present paper, the stationary random vibration of a uniform cantilever beam is investigated. Two types of damping mechanism, i.e. the external and internal viscous dampings, are taken into account simultaneously. The excitation form is the support motion, and it is ideal white. Because two type of damping mechanism are considered concurrently, the product of the modal damping ratio and the natural frequency is not a constant anymore. As a result, the infinite definite integral encountered in the process of computing the mean square response is more complex than that in the existing literature. One signal progress of this work is to have calculated these definite integrals accurately. The precise solution of the mean square response is thus obtained in the infinite series form finally. Numerical examples are supplied and the numerical outcomes acquired confirm the validity of the theoretical analyses.Keywords: random vibration, cantilever beam, mean square response, white noise
Procedia PDF Downloads 384815 The Effect of Intimate Partner Violence on Child Abuse in South Korea: Focused on the Moderating Effects of Patriarchal Attitude and Informal Social Control
Authors: Hye Lin Yang, Clifton R. Emery
Abstract:
Purpose: The purpose of this study is to examine the effects of intimate partner violence on child abuse, whether patriarchal attitude and informal social control moderate the relationship between intimate partner violence and child abuse. This study was conducted with data from The Seoul Families and Neighborhoods Study (SFNS). The SFNS is a representative random probability 3-stage cluster sample of 541 cohabiting couples in Seoul, South Korea collected in 2012. To verify research models, Random effect analysis were used. All analyses were performed using the Stata program. Results: Crucial findings are the following. First, intimate partner violence showed a significantly positive relationship with Child abuse. Second, there are significant moderating effects of informal social control on intimate partner violence - child abuse. Third, there are significant moderating effects of patriarchal attitude on intimate partner violence - child abuse. In other words, Patriarchal attitude is a significant risk factor of child abuse and informal social control is a significant Protection factor of child abuse. Based on results, the policy and practical implications for preventing child abuse, promoting informal social control were discussed.Keywords: Intimate partner violence, child abuse, informal social control, patriarchal attitude
Procedia PDF Downloads 302814 Dissimilarity Measure for General Histogram Data and Its Application to Hierarchical Clustering
Authors: K. Umbleja, M. Ichino
Abstract:
Symbolic data mining has been developed to analyze data in very large datasets. It is also useful in cases when entry specific details should remain hidden. Symbolic data mining is quickly gaining popularity as datasets in need of analyzing are becoming ever larger. One type of such symbolic data is a histogram, which enables to save huge amounts of information into a single variable with high-level of granularity. Other types of symbolic data can also be described in histograms, therefore making histogram a very important and general symbolic data type - a method developed for histograms - can also be applied to other types of symbolic data. Due to its complex structure, analyzing histograms is complicated. This paper proposes a method, which allows to compare two histogram-valued variables and therefore find a dissimilarity between two histograms. Proposed method uses the Ichino-Yaguchi dissimilarity measure for mixed feature-type data analysis as a base and develops a dissimilarity measure specifically for histogram data, which allows to compare histograms with different number of bins and bin widths (so called general histogram). Proposed dissimilarity measure is then used as a measure for clustering. Furthermore, linkage method based on weighted averages is proposed with the concept of cluster compactness to measure the quality of clustering. The method is then validated with application on real datasets. As a result, the proposed dissimilarity measure is found producing adequate and comparable results with general histograms without the loss of detail or need to transform the data.Keywords: dissimilarity measure, hierarchical clustering, histograms, symbolic data analysis
Procedia PDF Downloads 162813 Hardware for Genetic Algorithm
Authors: Fariborz Ahmadi, Reza Tati
Abstract:
Genetic algorithm is a soft computing method that works on set of solutions. These solutions are called chromosome and the best one is the absolute solution of the problem. The main problem of this algorithm is that after passing through some generations, it may be produced some chromosomes that had been produced in some generations ago that causes reducing the convergence speed. From another respective, most of the genetic algorithms are implemented in software and less works have been done on hardware implementation. Our work implements genetic algorithm in hardware that doesn’t produce chromosome that have been produced in previous generations. In this work, most of genetic operators are implemented without producing iterative chromosomes and genetic diversity is preserved. Genetic diversity causes that not only do not this algorithm converge to local optimum but also reaching to global optimum. Without any doubts, proposed approach is so faster than software implementations. Evaluation results also show the proposed approach is faster than hardware ones.Keywords: hardware, genetic algorithm, computer science, engineering
Procedia PDF Downloads 506812 Identifying Neighborhoods at Potential Risk of Food Insecurity in Rural British Columbia
Authors: Amirmohsen Behjat, Aleck Ostry, Christina Miewald, Bernie Pauly
Abstract:
Substantial research has indicated that socioeconomic and demographic characteristics’ of neighborhoods are strong determinants of food security. The aim of this study was to develop a Food Insecurity Neighborhood Index (FINI) based on the associated socioeconomic and demographic variables to identify the areas at potential risk of food insecurity in rural British Columbia (BC). Principle Component Analysis (PCA) technique was used to calculate the FINI for each rural Dissemination Area (DA) using the food security determinant variables from Canadian Census data. Using ArcGIS, the neighborhoods with the top quartile FINI values were classified as food insecure. The results of this study indicated that the most food insecure neighborhood with the highest FINI value of 99.1 was in the Bulkley-Nechako (central BC) area whereas the lowest FINI with the value of 2.97 was for a rural neighborhood in the Cowichan Valley area. In total, 98.049 (19%) of the rural population of British Columbians reside in high food insecure areas. Moreover, the distribution of food insecure neighborhoods was found to be strongly dependent on the degree of rurality in BC. In conclusion, the cluster of food insecure neighbourhoods was more pronounced in Central Coast, Mount Wadington, Peace River, Kootenay Boundary, and the Alberni-Clayoqout Regional Districts.Keywords: neighborhood food insecurity index, socioeconomic and demographic determinants, principal component analysis, Canada census, ArcGIS
Procedia PDF Downloads 169811 The Employees' Classification Method in the Space of Their Job Satisfaction, Loyalty and Involvement
Authors: Svetlana Ignatjeva, Jelena Slesareva
Abstract:
The aim of the study is development and adaptation of the method to analyze and quantify the indicators characterizing the relationship between a company and its employees. Diagnostics of such indicators is one of the most complex and actual issues in psychology of labour. The offered method is based on the questionnaire; its indicators reflect cognitive, affective and connotative components of socio-psychological attitude of employees to be as efficient as possible in their professional activities. This approach allows measure not only the selected factors but also such parameters as cognitive and behavioural dissonances. Adaptation of the questionnaire includes factor structure analysis and suitability analysis of phenomena indicators measured in terms of internal consistency of individual factors. Structural validity of the questionnaire was tested by exploratory factor analysis. Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser Normalization. Factor analysis allows reduce dimension of the phenomena moving from the indicators to aggregative indexes and latent variables. Aggregative indexes are obtained as the sum of relevant indicators followed by standardization. The coefficient Cronbach's Alpha was used to assess the reliability-consistency of the questionnaire items. The two-step cluster analysis in the space of allocated factors allows classify employees according to their attitude to work in the company. The results of psychometric testing indicate possibility of using the developed technique for the analysis of employees’ attitude towards their work in companies and development of recommendations on their optimization.Keywords: involved in the organization, loyalty, organizations, method
Procedia PDF Downloads 356810 Deploying a Platform as a Service Cloud Solution to Support Student Learning
Authors: Jiangping Wang
Abstract:
This presentation describes the design and implementation of PaaS (platform as a service) cloud-based labs that are used in database-related courses to teach students practical skills. Traditionally, all labs are implemented in a desktop-based environment where students have to install heavy client software to access database servers. In order to release students from that burden, we have successfully deployed the cloud-based solution to support database-related courses, from which students and teachers can practice and learn database topics in various database courses via cloud access. With its development environment, execution runtime, web server, database server, and collaboration capability, it offers a shared pool of configurable computing resources and comprehensive environment that supports students’ needs without the complexity of maintaining the infrastructure.Keywords: PaaS, database environment, e-learning, web server
Procedia PDF Downloads 268809 An Early Detection Type 2 Diabetes Using K - Nearest Neighbor Algorithm
Authors: Ng Liang Shen, Ngahzaifa Abdul Ghani
Abstract:
This research aimed at developing an early warning system for pre-diabetic and diabetics by analyzing simple and easily determinable signs and symptoms of diabetes among the people living in Malaysia using Particle Swarm Optimized Artificial. With the skyrocketing prevalence of Type 2 diabetes in Malaysia, the system can be used to encourage affected people to seek further medical attention to prevent the onset of diabetes or start managing it early enough to avoid the associated complications. The study sought to find out the best predictive variables of Type 2 Diabetes Mellitus, developed a system to diagnose diabetes from the variables using Artificial Neural Networks and tested the system on accuracy to find out the patent generated from diabetes diagnosis result in machine learning algorithms even at primary or advanced stages.Keywords: diabetes diagnosis, Artificial Neural Networks, artificial intelligence, soft computing, medical diagnosis
Procedia PDF Downloads 336