Search results for: network group behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18234

Search results for: network group behavior

17244 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 543
17243 Social Network Analysis, Social Power in Water Co-Management (Case Study: Iran, Shemiranat, Jirood Village)

Authors: Fariba Ebrahimi, Mehdi Ghorbani, Ali Salajegheh

Abstract:

Comprehensively water management considers economic, environmental, technical and social and also sustainability of water resources for future generations. Grassland management implies cooperative approach and involves all stakeholders and also introduces issues to managers, decision and policy makers. Solving these issues needs integrated and system approach. According to the recognition of actors or key persons in necessary to apply cooperative management of Water. Therefore, based on stakeholder analysis and social network analysis can be used to demonstrate the most effective actors for environmental decisions. In this research, social powers according are specified to social network approach at Water utilizers’ level of Natural in Jirood catchment of Latian basin. In this paper, utilizers of water resources were recognized using field trips and then, trust and collaboration matrix produced using questionnaires. In the next step, degree centrality index were Examined. Finally, geometric position of each actor was illustrated in the network. The results of the research based on centrality index have a key role in recognition of cooperative management of Water in Jirood and also will help managers and planners of water in the case of recognition of social powers in order to organization and implementation of sustainable management of Water.

Keywords: social network analysis, water co-management, social power, centrality index, local stakeholders network, Jirood catchment

Procedia PDF Downloads 372
17242 Effectiveness of Clinical Practice Guidelines for Jellyfish Stings Treatment at the Emergency Room of Songkhla Hospital Thailand

Authors: Prataksitorn Chonlakan, Tiparat Wongsilarat

Abstract:

The traditional clinical practice guideline used at the emergency room at Songkhla Hospital in caring for patients who come in contact with jellyfish venom took a long time for the pain to reduce to the level that patients can cope with. To investigate the effectiveness of clinical practice guidelines by comparing the effectiveness of a newly developed clinical practice guideline with the traditional clinical practice guideline in the following aspects: 1) pain reduction, 2) length of pain, 3) the rate of patient’s re-visit, 4) the rate of severe complications such as anaphylactic shock, and cardiac arrest, and death, and 5) patient satisfaction. This study employed a quasi-experimental research design. Thirty subjects were selected with purposive sampling from jellyfish-sting patients who came for treatment at the Emergency Room of Songkhla Hospital. The subjects were divided using random assignment into two groups of 15 each: an experimental group, and the control group. The control group was treated using the traditional clinical practice guideline consisting of rinsing the affected area with 0.9% normal saline, using a cloth soaked with vinegar to press against the affected area, and controlling pain using tramadol or diclofenac intramuscular injection. The data were analyzed using descriptive statistics and paired t-test at the significance level p < 0.05. The results of the study revealed the following. The pain level in the experimental group was significantly lower than that of the control group (the average pain score of the experimental group was 3.46 while that of the control group was 6.33) (p < 0.05).The length of pain in the experimental group was significantly lower than that of the control group (the average length of pain in the experimental group was 48.67 minutes while that of the control group was 105.35 minutes) (p < 0.05). The rate of re-visit within 12 hours in the experimental group was significantly lower than that of the control group (the rate of re-visit within 12 hours of the experimental group was 0.07 while that of the control group was 0.00) (p < 0.05).No severe complications such as anaphylactic shock, and cardiac arrest were found in the two groups of subjects.The rate of satisfaction among the subjects in the experimental group was significantly higher than that of the control group (the rate of satisfaction among the subjects of the experimental group was 90.00 percent while that among the control group was 66.33 percent) (p < 0.05). The newly develop clinical practice guideline could reduce pain and increase satisfaction among jellyfish-sting patients better than the traditional clinical practice guideline.

Keywords: effectiveness, clinical practice guideline, jellyfish-sting patients, cardiac arrest

Procedia PDF Downloads 351
17241 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 393
17240 The Fibonacci Network: A Simple Alternative for Positional Encoding

Authors: Yair Bleiberg, Michael Werman

Abstract:

Coordinate-based Multi-Layer Perceptrons (MLPs) are known to have difficulty reconstructing high frequencies of the training data. A common solution to this problem is Positional Encoding (PE), which has become quite popular. However, PE has drawbacks. It has high-frequency artifacts and adds another hyper hyperparameter, just like batch normalization and dropout do. We believe that under certain circumstances, PE is not necessary, and a smarter construction of the network architecture together with a smart training method is sufficient to achieve similar results. In this paper, we show that very simple MLPs can quite easily output a frequency when given input of the half-frequency and quarter-frequency. Using this, we design a network architecture in blocks, where the input to each block is the output of the two previous blocks along with the original input. We call this a Fibonacci Network. By training each block on the corresponding frequencies of the signal, we show that Fibonacci Networks can reconstruct arbitrarily high frequencies.

Keywords: neural networks, positional encoding, high frequency intepolation, fully connected

Procedia PDF Downloads 98
17239 Rutin C Improve Osseointegration of Dental Implant and Healing of Soft Tissue

Authors: Noha Mohammed Ismael Awad Eladal, Aala Shoukry Emara

Abstract:

Background: Wound healing after dental implant surgery is critical to the procedure's success. The aim of this study was to explore the effects of rutin+vitamin C supplementation in wound healing following the placement of dental implants. Methodology: There were 20 participants in this randomized controlled clinical trial who needed dental implants to replace missing teeth. Patients were divided into two groups, and group A received dental implants. Group B received dental implants with vitamin C administration. Follow-up appointments were performed on day 3, day 7, and day 14 post-surgery, during which soft tissue healing and pain response scores were evaluated using the visual analog scale. Postoperative digital panoramas were taken immediately after surgery, 3 months and 6 months postoperatively. Changes in bone density along with the bone-implant interface at the mesial, distal and apical sides were assessed using the digora software. Results: An independent t-test was used to compare the means of variables between the two groups. At the same time, repeated measures were employed to compare the means of variables between two groups. ANOVA was used to compare bone density for the same group at different dates. Significant increased differences were observed at the mesial, distal and apical sides Surrounding the implants of both groups per time. However, the rate of increase was significantly higher in group B The mean difference at the mesial side after 6 months was 21.99 ± 5.48 in the group B and 14.21 ± 4.95 in group A, while it read 21.74 ± 3.56 in the group B and 10.78 ± 3.90 in group A at the distal side and was 18.90 ± 5.91 in the group B and 10.39 ± 3.49 group A at the apical side. Significance was recorded at P = 0.004, P = 0.0001, and 0.001 at the mesial, distal and apical sides respectively. The mean pain score and wound healing were significantly higher in group A as compared to group B, respectively. Conclusion: The rutin c + vitamin c group significantly promoted bone healing and speeded up the osseointegration process and improved soft tissue healing.

Keywords: osseointegration, soft tissue, rutin c, dental implant

Procedia PDF Downloads 149
17238 Developing a Model – an Application of Fuzzy Analytic Network Process Techniques for Hostels

Authors: Pin-Ju Juan, Peng-Yu Juan, Yi-Shan Chen

Abstract:

The main purpose of this paper is to present a fuzzy Analytic Network Process (ANP) model for the hostel organizational performance selection. In this article, we created 39 criteria for selecting hostel organizational performance acquired from literature's review and experts method practical investigations, and the methods of fuzzy analytic network process are used to consolidate decision-makers’ assessments about criteria weightings. Finally, we selected organizational performance of a hostel in Taiwan to determine the effectiveness of the proposed evaluation model in this paper.

Keywords: Fuzzy ANP, hostel, organizational performance, strategy management

Procedia PDF Downloads 199
17237 Detection of Keypoint in Press-Fit Curve Based on Convolutional Neural Network

Authors: Shoujia Fang, Guoqing Ding, Xin Chen

Abstract:

The quality of press-fit assembly is closely related to reliability and safety of product. The paper proposed a keypoint detection method based on convolutional neural network to improve the accuracy of keypoint detection in press-fit curve. It would provide an auxiliary basis for judging quality of press-fit assembly. The press-fit curve is a curve of press-fit force and displacement. Both force data and distance data are time-series data. Therefore, one-dimensional convolutional neural network is used to process the press-fit curve. After the obtained press-fit data is filtered, the multi-layer one-dimensional convolutional neural network is used to perform the automatic learning of press-fit curve features, and then sent to the multi-layer perceptron to finally output keypoint of the curve. We used the data of press-fit assembly equipment in the actual production process to train CNN model, and we used different data from the same equipment to evaluate the performance of detection. Compared with the existing research result, the performance of detection was significantly improved. This method can provide a reliable basis for the judgment of press-fit quality.

Keywords: keypoint detection, curve feature, convolutional neural network, press-fit assembly

Procedia PDF Downloads 228
17236 Effect of the Poisson’s Ratio on the Behavior of Epoxy Microbeam

Authors: Mohammad Tahmasebipour, Hosein Salarpour

Abstract:

Researchers suggest that variations in Poisson’s ratio affect the behavior of Timoshenko micro beam. Therefore, in this study, two epoxy Timoshenko micro beams with different dimensions were modeled using the finite element method considering all boundary conditions and initial conditions that govern the problem. The effect of Poisson’s ratio on the resonant frequency, maximum deflection, and maximum rotation of the micro beams was examined. The analyses suggest that an increased Poisson’s ratio reduces the maximum rotation and the maximum rotation and increases the resonant frequency. Results were consistent with those obtained using the couple stress, classical, and strain gradient elasticity theories.

Keywords: microbeam, microsensor, epoxy, poisson’s ratio, dynamic behavior, static behavior, finite element method

Procedia PDF Downloads 460
17235 Group Consensus of Hesitant Fuzzy Linguistic Variables for Decision-Making Problem

Authors: Chen T. Chen, Hui L. Cheng

Abstract:

Due to the different knowledge, experience and expertise of experts, they usually provide the different opinions in the group decision-making process. Therefore, it is an important issue to reach the group consensus of opinions of experts in group multiple-criteria decision-making (GMCDM) process. Because the subjective opinions of experts always are fuzziness and uncertainties, it is difficult to use crisp values to describe the real opinions of experts or decision-makers. It is reasonable for experts to use the linguistic variables to express their opinions. The hesitant fuzzy set are extended from the concept of fuzzy sets. Experts use the hesitant fuzzy sets can be flexible to describe their subjective opinions. In order to aggregate the hesitant fuzzy linguistic variables of all experts effectively, an adjustment method based on distance function will be presented in this paper. Based on the opinions adjustment method, this paper will present an effective approach to adjust the hesitant fuzzy linguistic variables of all experts to reach the group consensus. Then, a new hesitant linguistic GMCDM method will be presented based on the group consensus of hesitant fuzzy linguistic variables. Finally, an example will be implemented to illustrate the computational process to enhance the practical value of the proposed model.

Keywords: group multi-criteria decision-making, linguistic variables, hesitant fuzzy linguistic variables, distance function, group consensus

Procedia PDF Downloads 156
17234 Reduction of Patient’s Dose of I-131 Therapy by Used Local Diuretic Juice

Authors: Mosab kh. A. A. Bashir, E. Mohamed-Ahmed

Abstract:

The aim of the study is to compare the results of the external exposure and the range of the dose spread by the patients, hospitalized in two different groups of 3-5 d receiving radioiodine therapy because of thyroid cancer, and one of group were giving the local diuretic plant (barley) as local juice. The control group was 28 patients they were isolated as international precautions after taken I-131 capsule 100 mCi, and their external exposure was recorded day by day after first 24 hrs. and the distance for external measurement was 1 m at the abdominal level. The mean of external exposure values of patients at fourth day were 30.24±12.92 µSv h−1. The second group after taking I-131 capsule 100 mCi we were given barley juice (250 mL) after every meal three times on day and their external exposure was recorded day by day after first 24 hrs. The mean of external exposure values of patients of this group at third day was 26.92±9.89 (14-55) µSv h−1. It was observed that the external exposure from the second group clearly decreased to low levels which contributed to the decrease in patient dose and also to the decrease in the exposure from the patient to his/her family.

Keywords: local diuretic juice, therapy, radiation medicine, diuretic plant

Procedia PDF Downloads 314
17233 Micromechanical Modeling of Fiber-Matrix Debonding in Unidirectional Composites

Authors: M. Palizvan, M. T. Abadi, M. H. Sadr

Abstract:

Due to variations in damage mechanisms in the microscale, the behavior of fiber-reinforced composites is nonlinear and difficult to model. To make use of computational advantages, homogenization method is applied to the micro-scale model in order to minimize the cost at the expense of detail of local microscale phenomena. In this paper, the effective stiffness is calculated using the homogenization of nonlinear behavior of a composite representative volume element (RVE) containing fiber-matrix debonding. The damage modes for the RVE are considered by using cohesive elements and contacts for the cohesive behavior of the interface between fiber and matrix. To predict more realistic responses of composite materials, different random distributions of fibers are proposed besides square and hexagonal arrays. It was shown that in some cases, there is quite different damage behavior in different fiber distributions. A comprehensive comparison has been made between different graphs.

Keywords: homogenization, cohesive zone model, fiber-matrix debonding, RVE

Procedia PDF Downloads 167
17232 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 334
17231 L-Carnitine Supplementation and Exercise-Induced Muscle Damage

Authors: B. Nakhostin-Roohi, F. Khoshkhahesh, KH. Parandak, R. Ramazanzadeh

Abstract:

Introduction: The protective effect of antioxidants in diminishing the post-exercise rise of serum CK and LDH in individuals trained for competitive sports has come to light in recent years. This study was conducted to assess the effect of Two-week L-carnitine supplementation on exercise-induced muscle damage, as well as antioxidant capacity after a bout of strenuous exercise in active healthy young men. Methodology: Twenty active healthy men volunteered for this study. Participants were randomized in a double-blind placebo-controlled fashion into two groups: L-carnitine (C group; n = 10) and placebo group (P group; n = 10). The participants took supplementation (2000 mg L-carnitine) or placebo (2000 mg lactose) daily for 2weeks before the main trial. Then, participants ran 14 km. Blood samples were taken before supplementation, before exercise, immediately, 2h and 24h after exercise. Creatine kinase (CK), and lactate dehydrogenase (LDH), and total antioxidant capacity (TAC) were measured. Results: Serum CK and LDH significantly increased after exercise in both groups (p < 0.05). Serum LDH was significantly lower in C group than P group 2h and 24h after exercise (p < 0.05). Furthermore, CK was significantly lower in C group compared with P group just 24h after exercise (p < 0.05). Plasma TAC increased significantly 14 days after supplementation and 24h after exercise in C group compared with P group (p < 0.05). Discussion and conclusion: These results suggest two-week daily oral supplementation of L-carnitine has been able to promote antioxidant capacity before and after exercise and decrease muscle damage markers through possibly inhibition of exercise-induced oxidative stress.

Keywords: L-carnitine, muscle damage, creatine kinase, Lactate dehydrogenase

Procedia PDF Downloads 440
17230 Effects of Conjugated Linoleic Acid(CLA) on Some Reproductive Hormones in Ram

Authors: Behnaz Mahdavi, Hamidreza Khodaei, Leila Karshenas

Abstract:

Conjugated Linoleic Acid is a group of long-chain unsaturated fatty acids with more than one double bond and a mixture of 28 isomers of Linoleic acid (C 18:2) and it is counted as one of the essential acids. The main purpose of this study was to investigate the effect of CLA on some reproductive hormones in rams. In this study, six rams 3 to 4 years old with an average weight of 90 kg were selected. Rams were randomly divided into 3 groups and were treated by CLA treatment for 30 days. The first group (as a control group) didn’t receive CLA, The second group received 0.5 gr and the third group received 1 gram of CLA. The blood testing was done on rams every 15 days using a 20 ml syringe. Data analysis was performed by SAS software. Also mean comparison was done using Duncan's test method (p<0.05). Obtained results showed that the serum concentration of testosterone hormone was decreased numerically as well as the concentration of FSH hormone however the concentration of LH was increased. CLA in oral form can reduce the concentration of testosterone in rams.

Keywords: CLA, ram, testosterone, DHT, Conjugated Linoleic Acid

Procedia PDF Downloads 297
17229 Learning Dynamic Representations of Nodes in Temporally Variant Graphs

Authors: Sandra Mitrovic, Gaurav Singh

Abstract:

In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.

Keywords: churn prediction, dynamic networks, node2vec, auto-encoders

Procedia PDF Downloads 314
17228 Effectiveness of Dry Needling on Pain and Pressure Point Threshold in Cervicogenic Headache

Authors: Ramesh Chandra Patra, Ajay P. Gautam, Patitapaban Mohanty

Abstract:

Headache disorders are one of the 10 most disabling conditions for men and women. Headache that originated from upper cervical spine and refereed to the one side of the head and/or face is known as cervicogenic headache (CH) which constitute15% to 20% among all the headaches. In our best knowledge manual therapy is often advocated for managing CH, but very little focus given on muscle system although it is a musculoskeletal disorder. In this study, 75 patients with CH were selected and divided into two groups Group A: Manual therapy and Group B: dry needling along with manual therapy group. Assessment was done using NPRS (0-10) for pain, wide spread pressure pain threshold using an algometer at the beginning and end of the study. There is a consistent reduction in pain and tenderness in both the group but significant improvement was shown in combined group. Outcome of the study has explored that the effectiveness of dry needling along with Mulligan is more beneficial in patients with cervicogenic headaches.

Keywords: cervicogenic headaches, dry needling, NPRS, pressure point threshold

Procedia PDF Downloads 229
17227 South Asia’s Political Landscape: Precipitating Terrorism

Authors: Saroj Kumar Rath

Abstract:

India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.

Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban

Procedia PDF Downloads 617
17226 Fast Adjustable Threshold for Uniform Neural Network Quantization

Authors: Alexander Goncharenko, Andrey Denisov, Sergey Alyamkin, Evgeny Terentev

Abstract:

The neural network quantization is highly desired procedure to perform before running neural networks on mobile devices. Quantization without fine-tuning leads to accuracy drop of the model, whereas commonly used training with quantization is done on the full set of the labeled data and therefore is both time- and resource-consuming. Real life applications require simplification and acceleration of quantization procedure that will maintain accuracy of full-precision neural network, especially for modern mobile neural network architectures like Mobilenet-v1, MobileNet-v2 and MNAS. Here we present a method to significantly optimize training with quantization procedure by introducing the trained scale factors for discretization thresholds that are separate for each filter. Using the proposed technique, we quantize the modern mobile architectures of neural networks with the set of train data of only ∼ 10% of the total ImageNet 2012 sample. Such reduction of train dataset size and small number of trainable parameters allow to fine-tune the network for several hours while maintaining the high accuracy of quantized model (accuracy drop was less than 0.5%). Ready-for-use models and code are available in the GitHub repository.

Keywords: distillation, machine learning, neural networks, quantization

Procedia PDF Downloads 325
17225 An Empirical Study on Switching Activation Functions in Shallow and Deep Neural Networks

Authors: Apoorva Vinod, Archana Mathur, Snehanshu Saha

Abstract:

Though there exists a plethora of Activation Functions (AFs) used in single and multiple hidden layer Neural Networks (NN), their behavior always raised curiosity, whether used in combination or singly. The popular AFs –Sigmoid, ReLU, and Tanh–have performed prominently well for shallow and deep architectures. Most of the time, AFs are used singly in multi-layered NN, and, to the best of our knowledge, their performance is never studied and analyzed deeply when used in combination. In this manuscript, we experiment with multi-layered NN architecture (both on shallow and deep architectures; Convolutional NN and VGG16) and investigate how well the network responds to using two different AFs (Sigmoid-Tanh, Tanh-ReLU, ReLU-Sigmoid) used alternately against a traditional, single (Sigmoid-Sigmoid, Tanh-Tanh, ReLUReLU) combination. Our results show that using two different AFs, the network achieves better accuracy, substantially lower loss, and faster convergence on 4 computer vision (CV) and 15 Non-CV (NCV) datasets. When using different AFs, not only was the accuracy greater by 6-7%, but we also accomplished convergence twice as fast. We present a case study to investigate the probability of networks suffering vanishing and exploding gradients when using two different AFs. Additionally, we theoretically showed that a composition of two or more AFs satisfies Universal Approximation Theorem (UAT).

Keywords: activation function, universal approximation function, neural networks, convergence

Procedia PDF Downloads 158
17224 Dao Din Student Activists: From Hope to Victims under the Thai Society of Darkness

Authors: Siwach Sripokangkul, Autthapon Muangming

Abstract:

The Dao Din group is a gathering of students from the Faculty of Law, Khon Kaen University, a leading university in the northeast of Thailand. The Dao Din group has been one of the most prominent student movements in the past four decades since the bloody massacre of the 6th of October 1976. The group of student is a movement who gather to oppose and protest against different capitalist-run projects that have impacted upon the environment since 2009. The students have become heroes in Thai society and receive support from various groups, especially the middle class who regard the students as role models for the youth. Subsequently, the Dao Din group has received numerous awards between 2011-2013. However, the Dao Din group opposed the military coup d’état of 2014 and the subsequent military junta. Under the military dictatorship regime (2014-present), security officials have hunted, insulted, arrested, and jailed members of the group many times amidst silence from most of the from the middle class. Therefore, this article posits the question of why the Dao Din group which was once the hero and hope of Thai society, has become a political victim in only a few years. The study methods used are the analysis of documentaries, news articles, and interviews with representatives of the Dao Din group. The author argues that Thailand’s middle class previously demonstrated a positive perception of the Dao Din group precisely because that group had earlier opposed policies of the elected Yingluck Shinawatra government, which most of the middle class already despised. However, once the Dao Din group began to protest against the anti-Yingluck military government, then the middle class turned to harshly criticize the Dao Din group. So it can be concluded that the Thai middle class tends to put its partisan interests ahead of a civil society group which has been critical of elected as well as military administrations. This has led the middle class to support the demolishing of Thai democracy. Such a Thai middle-class characteristic not only poses a strong bulwark for the perpetuation of military rule but also destroys a civil society group (composed of young people) who should be the future hope of the nation rather than under the Thai society of darkness.

Keywords: Dao Din student activists, the military coup d’état of 2014, Thai politics, human rights violations

Procedia PDF Downloads 224
17223 Sustainable Design of Coastal Bridge Networks in the Presence of Multiple Flood and Earthquake Risks

Authors: Riyadh Alsultani, Ali Majdi

Abstract:

It is necessary to develop a design methodology that includes the possibility of seismic events occurring in a region, the vulnerability of the civil hydraulic structure, and the effects of the occurrence hazard on society, environment, and economy in order to evaluate the flood and earthquake risks of coastal bridge networks. This paper presents a design approach for the assessment of the risk and sustainability of coastal bridge networks under time-variant flood-earthquake conditions. The social, environmental, and economic indicators of the network are used to measure its sustainability. These consist of anticipated loss, downtime, energy waste, and carbon dioxide emissions. The design process takes into account the possibility of happening in a set of flood and earthquake scenarios that represent the local seismic activity. Based on the performance of each bridge as determined by fragility assessments, network linkages are measured. The network's connections and bridges' damage statuses after an earthquake scenario determine the network's sustainability and danger. The sustainability measures' temporal volatility and the danger of structural degradation are both highlighted. The method is shown using a transportation network in Baghdad, Iraq.

Keywords: sustainability, Coastal bridge networks, flood-earthquake risk, structural design

Procedia PDF Downloads 93
17222 A Comparative and Critical Analysis of Some Routing Protocols in Wireless Sensor Networks

Authors: Ishtiaq Wahid, Masood Ahmad, Nighat Ayub, Sajad Ali

Abstract:

Lifetime of a wireless sensor network (WSN) is directly proportional to the energy consumption of its constituent nodes. Routing in wireless sensor network is very challenging due its inherit characteristics. In hierarchal routing the sensor filed is divided into clusters. The cluster-heads are selected from each cluster, which forms a hierarchy of nodes. The cluster-heads are used to transmit the data to the base station while other nodes perform the sensing task. In this way the lifetime of the network is increased. In this paper a comparative study of hierarchal routing protocols are conducted. The simulation is done in NS-2 for validation.

Keywords: WSN, cluster, routing, sensor networks

Procedia PDF Downloads 478
17221 A Reinforcement Learning Approach for Evaluation of Real-Time Disaster Relief Demand and Network Condition

Authors: Ali Nadi, Ali Edrissi

Abstract:

Relief demand and transportation links availability is the essential information that is needed for every natural disaster operation. This information is not in hand once a disaster strikes. Relief demand and network condition has been evaluated based on prediction method in related works. Nevertheless, prediction seems to be over or under estimated due to uncertainties and may lead to a failure operation. Therefore, in this paper a stochastic programming model is proposed to evaluate real-time relief demand and network condition at the onset of a natural disaster. To address the time sensitivity of the emergency response, the proposed model uses reinforcement learning for optimization of the total relief assessment time. The proposed model is tested on a real size network problem. The simulation results indicate that the proposed model performs well in the case of collecting real-time information.

Keywords: disaster management, real-time demand, reinforcement learning, relief demand

Procedia PDF Downloads 316
17220 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
17219 Evidence of the Effect of the Structure of Social Representations on Group Identification

Authors: Eric Bonetto, Anthony Piermatteo, Fabien Girandola, Gregory Lo Monaco

Abstract:

The present contribution focuses on the effect of the structure of social representations on group identification. A social representation (SR) is defined as an organized and structured set of cognitions, produced and shared by members of a same group about a same social object. Within this framework, the central core theory establishes a structural distinction between central cognitions – or 'core' – and peripheral ones: the former are theoretically considered as more connected than the later to group members’ social identity and may play a greater role in SRs’ ability to allow group identification by means of a common vision of the object of representation. Indeed, the central core provides a reference point for the in-group as it constitutes a consensual vision that gives meaning to a social object particularly important to individuals and to the group. However, while numerous contributions clearly refer to the underlying role of SRs in group identification, there are only few empirical evidences of this aspect. Thus, we hypothesize an effect of the structure of SRs on group identification. More precisely, central cognitions (vs. peripheral ones) will lead to a stronger group identification. In addition, we hypothesize that the refutation of a cognition will lead to a stronger group identification than its activation. The SR mobilized here is that of 'studying' among a population of first-year undergraduate psychology students. Thus, a pretest (N = 82), using an Attribute-Challenge Technique, was designed in order to identify the central and the peripheral cognitions to use in the primings of our main study. The results of this pretest are in line with previous studies. Then, the main study (online; N = 184), using a social priming methodology, was based on a 2 (Structural status of the cognitions belonging to the prime: central vs. peripheral) x 2 (Type of prime: activation vs. refutation) experimental design in order to test our hypotheses. Results revealed, as expected, the main effect of the structure of the SR on group identification. Indeed, central cognitions trigger a higher level of identification than the peripheral ones. However, we observe neither effect of the type of prime, nor interaction effect. These results experimentally demonstrate for the first time the effect of the structure of SRs on group identification and indicate that central cognitions are more connected than peripheral ones to group members’ social identity. These results will be discussed considering the importance of understanding identity as a function of SRs and on their ability to potentially solve the lack of consideration of the definition of the group in Social Representations Theory.

Keywords: group identification, social identity, social representations, structural approach

Procedia PDF Downloads 191
17218 Determining Moment-Curvature Relationship of Reinforced Concrete Rectangular Shear Walls

Authors: Gokhan Dok, Hakan Ozturk, Aydin Demir

Abstract:

The behavior of reinforced concrete (RC) members is quite important in RC structures. When evaluating the performance of structures, the nonlinear properties are defined according to the cross sectional behavior of RC members. To be able to determine the behavior of RC members, its cross sectional behavior should be known well. The moment-curvature (MC) relationship is used to represent cross sectional behavior. The MC relationship of RC cross section can be best determined both experimentally and numerically. But, experimental study on RC members is very difficult. The aim of the study is to obtain the MC relationship of RC shear walls. Additionally, it is aimed to determine the parameters which affect MC relationship. While obtaining MC relationship of RC members, XTRACT which can represent robustly the MC relationship is used. Concrete quality, longitudinal and transverse reinforcing ratios, are selected as parameters which affect MC relationship. As a result of the study, curvature ductility and effective flexural stiffness are determined using this parameter. Effective flexural stiffness is compared with the values defined in design codes.

Keywords: moment-curvature, reinforced concrete, shear wall, numerical

Procedia PDF Downloads 285
17217 Poverty and Environmental Degeneration in Central City of Ibadan, Nigeria

Authors: Funmilayo Lanrewaju Amao, Amos Olusegun Amao, Odetoye Adeola Sunday, Joseph Joshua Olu

Abstract:

There is a high magnitude of housing inadequacy in urban centers in Nigeria. This is manifested in quantitative and qualitative terms. Severe overcrowding and insanitary physical environment characterize the housing in the urban centers. The culminating effect of this is the growth of slum areas. This paper takes a critical look at inter-allia history and anatomy, general characteristic, present condition, root causes, official responses and reactions, possible solution and advocacy housing in central city slum of Ibadan. It also examines slum development and consequent deviant behaviors in the inner-city neighborhoods of Ibadan, the capital city of Oyo State, Nigeria. Residing there are many underemployed and unemployed individuals, these are miscreants who are generally socially frustrated. The activities of this group of people are a cause of concern. Deleterious and anti-social behaviors such as prostitution and house burglary are commonplace in the neighborhoods. The paper examines building conditions in the neighborhoods and the nexus with the deviant behavior of the inhabitants. The paper affirms that there is monumental deficiency in housing quality, while the design and the arrangement of the buildings into spatial units significantly influence the behavior of the residents. The paper suggests a two-prong approach in dealing with the situation. This involves urban renewal and slum upgrading programmes on the one hand, and an improvement in the socio-economic circumstances of the inhabitants, especially an increase in employment opportunity on the other.

Keywords: slum, behavior, housing, poverty, environmental degeneration

Procedia PDF Downloads 404
17216 Evaluation of Durability Performance for Bio-Energy Co-Product

Authors: Bo Yang, Hali̇l Ceylan, Ali Ulvi̇ Uzer

Abstract:

This experimental study was performed to investigate the effect of biofuel co-products (BCPs) with sulfur-free lignin addition on the unconsolidated on strength and durability behavior in pavement soil stabilization subjected to freezing–thawing cycles. For strength behavior, a series of unconfined compression tests were conducted. Mass losses were also calculated after freezing–thawing cycles as criteria for durability behavior. To investigate the effect of the biofuel co-products on the durability behavior of the four type’s soils, mass losses were calculated after 12 freezing–thawing cycles. The co-products tested are promising additives for improving durability under freeze-thaw conditions, and each type has specific advantages.

Keywords: durability, mass lose, freezing–thawing test, bio-energy co-product, soil stabilization

Procedia PDF Downloads 375
17215 Juvenile Delinquency of Senior High School Students in Surabaya, Indonesia

Authors: Herdina Indrijati

Abstract:

This research aims to describe teenager delinquency behavior (Juvenile Delinquency) of senior high school students in Surabaya, Indonesia. Juvenile Delinquency is a broad range of behaviors start from socially unacceptable behavior (overreact in school), violation (escape from home) to crimes (like stealing). This research uses quantitative descriptive method using 498 students who come from 8 different schools in Surabaya as subjects. Juvenile Delinquency behavior form questionnaire has been completed by subjects and was used to measure and describe the behavior. The result of this research is presented in statistic descriptive forms. Result shows that 169 subjects skip school, 55 subjects get out of home without parent’s permission, 110 subjects engage in smoking behavior, 74 subjects damage other people properties, 32 subjects steal, 16 subjects exploit others and 7 subjects engage in drug abuse. Frequency of the top five mentioned behavior are 1-10 times. It is also found that subject’s peers are most likely to be the victim of Juvenile Delinquency. The reasons teenagers engage in Juvenile Delinquency include (1) feeling tired, bored or lazy – that contributes to their skip school behavior (2) Having a lot of problem with parents - contrives them to run away from home, (3) accidentally damage other people’s properties, (4) financial problems – force them to steal and exploit, (5) feeling like having a lot of life problems – that makes them do drugs (6) trying smoking for experience.

Keywords: juvenile delinquency, senior high school, student

Procedia PDF Downloads 224