Search results for: Research information systems (RIS)
35844 A Study of the Trade-off Energy Consumption-Performance-Schedulability for DVFS Multicore Systems
Authors: Jalil Boudjadar
Abstract:
Dynamic Voltage and Frequency Scaling (DVFS) multicore platforms are promising execution platforms that enable high computational performance, less energy consumption and flexibility in scheduling the system processes. However, the resulting interleaving and memory interference together with per-core frequency tuning make real-time guarantees hard to be delivered. Besides, energy consumption represents a strong constraint for the deployment of such systems on energy-limited settings. Identifying the system configurations that would achieve a high performance and consume less energy while guaranteeing the system schedulability is a complex task in the design of modern embedded systems. This work studies the trade-off between energy consumption, cores utilization and memory bottleneck and their impact on the schedulability of DVFS multicore time-critical systems with a hierarchy of shared memories. We build a model-based framework using Parametrized Timed Automata of UPPAAL to analyze the mutual impact of performance, energy consumption and schedulability of DVFS multicore systems, and demonstrate the trade-off on an actual case study.Keywords: time-critical systems, multicore systems, schedulability analysis, energy consumption, performance analysis
Procedia PDF Downloads 10735843 A Comprehensive Evaluation of Supervised Machine Learning for the Phase Identification Problem
Authors: Brandon Foggo, Nanpeng Yu
Abstract:
Power distribution circuits undergo frequent network topology changes that are often left undocumented. As a result, the documentation of a circuit’s connectivity becomes inaccurate with time. The lack of reliable circuit connectivity information is one of the biggest obstacles to model, monitor, and control modern distribution systems. To enhance the reliability and efficiency of electric power distribution systems, the circuit’s connectivity information must be updated periodically. This paper focuses on one critical component of a distribution circuit’s topology - the secondary transformer to phase association. This topology component describes the set of phase lines that feed power to a given secondary transformer (and therefore a given group of power consumers). Finding the documentation of this component is call Phase Identification, and is typically performed with physical measurements. These measurements can take time lengths on the order of several months, but with supervised learning, the time length can be reduced significantly. This paper compares several such methods applied to Phase Identification for a large range of real distribution circuits, describes a method of training data selection, describes preprocessing steps unique to the Phase Identification problem, and ultimately describes a method which obtains high accuracy (> 96% in most cases, > 92% in the worst case) using only 5% of the measurements typically used for Phase Identification.Keywords: distribution network, machine learning, network topology, phase identification, smart grid
Procedia PDF Downloads 29935842 Investigating the Impact of Individual Risk-Willingness and Group-Interaction Effects on Business Model Innovation Decisions
Authors: Sarah Müller-Sägebrecht
Abstract:
Today’s volatile environment challenges executives to make the right strategic decisions to gain sustainable success. Entrepreneurship scholars postulate mainly positive effects of environmental changes on entrepreneurship behavior, such as developing new business opportunities, promoting ingenuity, and the satisfaction of resource voids. A strategic solution approach to overcome threatening environmental changes and catch new business opportunities is business model innovation (BMI). Although this research stream has gained further importance in the last decade, BMI research is still insufficient. Especially BMI barriers, such as inefficient strategic decision-making processes, need to be identified. Strategic decisions strongly impact organizational future and are, therefore, usually made in groups. Although groups draw on a more extensive information base than single individuals, group-interaction effects can influence the decision-making process - in a favorable but also unfavorable way. Decisions are characterized by uncertainty and risk, whereby their intensity is perceived individually differently. Individual risk-willingness influences which option humans choose. The special nature of strategic decisions, such as in BMI processes, is that these decisions are not made individually but in groups due to their high organizational scope. These groups consist of different personalities whose individual risk-willingness can vary considerably. It is known from group decision theory that these individuals influence each other, observable in different group-interaction effects. The following research questions arise: i) Which impact has the individual risk-willingness on BMI decisions? And ii) how do group interaction effects impact BMI decisions? After conducting 26 in-depth interviews with executives from the manufacturing industry, the applied Gioia methodology reveals the following results: i) Risk-averse decision-makers have an increased need to be guided by facts. The more information available to them, the lower they perceive uncertainty and the more willing they are to pursue a specific decision option. However, the results also show that social interaction does not change the individual risk-willingness in the decision-making process. ii) Generally, it could be observed that during BMI decisions, group interaction is primarily beneficial to increase the group’s information base for making good decisions, less than for social interaction. Further, decision-makers mainly focus on information available to all decision-makers in the team but less on personal knowledge. This work contributes to strategic decision-making literature twofold. First, it gives insights into how group-interaction effects influence an organization’s strategic BMI decision-making. Second, it enriches risk-management research by highlighting how individual risk-willingness impacts organizational strategic decision-making. To date, it was known in BMI research that risk aversion would be an internal BMI barrier. However, with this study, it becomes clear that it is not risk aversion that inhibits BMI. Instead, the lack of information prevents risk-averse decision-makers from choosing a riskier option. Simultaneously, results show that risk-averse decision-makers are not easily carried away by the higher risk-willingness of their team members. Instead, they use social interaction to gather missing information. Therefore, executives need to provide sufficient information to all decision-makers to catch promising business opportunities.Keywords: business model innovation, decision-making, group biases, group decisions, group-interaction effects, risk-willingness
Procedia PDF Downloads 9635841 Evaluating the Teaching and Learning Value of Tablets
Authors: Willem J. A. Louw
Abstract:
The wave of new advanced computing technology that has been developed during the recent past has significantly changed the way we communicate, collaborate and collect information. It has created a new technology environment and paradigm in which our children and students grow-up and this impacts on their learning. Research confirmed that Generation Y students have a preference for learning in the new technology environment. The challenge or question is: How do we adjust our teaching and learning to make the most of these changes. The complexity of effective and efficient teaching and learning must not be underestimated and changes must be preceded by proper objective research to prevent any haphazard developments that could do more harm than benefit. A blended learning approach has been used in the Forestry department for a few numbers of years including the use of electronic-peer assisted learning (e-pal) in a fixed-computer set-up within a learning management system environment. It was decided to extend the investigation and do some exploratory research by using a range of different Tablet devices. For this purpose, learning activities or assignments were designed to cover aspects of communication, collaboration and collection of information. The Moodle learning management system was used to present normal module information, to communicate with students and for feedback and data collection. Student feedback was collected by using an online questionnaire and informal discussions. The research project was implemented in 2013, 2014 and 2015 amongst first and third-year students doing a forestry three-year technical tertiary qualification in commercial plantation management. In general, more than 80% of the students alluded to that the device was very useful in their learning environment while the rest indicated that the devices were not very useful. More than ninety percent of the students acknowledged that they would like to continue using the devices for all of their modules whilst the rest alluded to functioning efficiently without the devices. Results indicated that information collection (access to resources) was rated the highest advantageous factor followed by communication and collaboration. The main general advantages of using Tablets were listed by the students as being mobility (portability), 24/7 access to learning material and information of any kind on a user friendly device in a Wi-Fi environment, fast computing process speeds, saving time, effort and airtime through skyping and e-mail, and use of various applications. Ownership of the device is a critical factor while the risk was identified as a major potential constraint. Significant differences were reported between the different types and quality of Tablets. The preferred types are those with a bigger screen and the ones with overall better functionality and quality features. Tablets significantly increase the collaboration, communication and information collection needs of the students. It does, however, not replace the need of a computer/laptop because of limited storage and computation capacity, small screen size and inefficient typing.Keywords: tablets, teaching, blended learning, tablet quality
Procedia PDF Downloads 24835840 Performance of LTE Multicast Systems in the Presence of the Colored Noise Jamming
Authors: S. Malisuwan, J. Sivaraks, N. Madan, N. Suriyakrai
Abstract:
The ever going evolution of advanced wireless technologies makes it financially impossible for military operations to completely manufacture their own equipment. Therefore, Commercial-Off-The-Shelf (COTS) and Modified-Off-The-Shelf (MOTS) are being considered in military mission with low-cost modifications. In this paper, we focus on the LTE multicast systems for military communication systems under tactical environments with jamming condition. We examine the influence of the colored noise jamming on the performance of the LTE multicast systems in terms of the average throughput. The simulation results demonstrate the degradation of the average throughput for different dynamic ranges of the colored noise jamming versus average SNR.Keywords: performance, LTE, multicast, jamming, throughput
Procedia PDF Downloads 41835839 Social Media's Roles in the Change of Vietnamese Society: Emerging Public Sphere for Citizens
Authors: Ly Thi Hai Yen
Abstract:
The Internet in Vietnam has developed significantly over the last 20 years and made impressive advances, permeating into every part of daily life, changing people's habits as well as the way people's communication. Under this situation, social media have become useful tools for the citizen to get and share information. About 10 years ago, most Vietnamese people got the information through state media, but thanks to the development of the Internet, nowadays, social media have been giving them rich sources of information at any area of society. By using case study research methods, documentary research method and in-depth interviews conducted with social media users, NGO activists, and Vietnamese scholars in 2017, the paper found that social media has been bringing a cyber public sphere to whom wish to discuss social and political issues. And, more importantly, it gives them a chance to connect with the government and policy makers quickly and effectively. Moreover, people use social media to supervise activities in society to prevent social evils and corruption in Vietnam. However, besides these positive points, people also have to cope with the rising situation of fake news which causing consequences for the society, such as pulling off crimes or cheating money and others. The paper concluded that social media plays important roles in the change of Vietnamese society, giving citizens a cyber public sphere unrestrictedly to discuss social and political issues but also bringing many bad risks to citizens.Keywords: Vietnamese, social media, politics-society
Procedia PDF Downloads 14735838 The Integration Challenges of Women Refugees in Sweden from Socio-Cultural Perspective
Authors: Khadijah Saeed Khan
Abstract:
One of the major current societal issues of Swedish society is to integrate newcomer refugees well into the host society. The cultural integration issue is one of the under debated topic in the literature, and this study intends to meet this gap from the Swedish perspective. The purpose of this study is to explore the role and types of cultural landscapes of refugee women in Sweden and how these landscapes help or hinder the settlement process. The cultural landscapes are referred to as a set of multiple cultural activities or practices which refugees perform in a specific context and circumstances (i.e., being in a new country) to seek, share or use relevant information for their settlement. Information plays a vital role in various aspects of newcomers' lives in a new country. This article has an intention to highlight the importance of multiple cultural landscapes as a source of information (regarding employment, language learning, finding accommodation, immigration matters, health concerns, school and education, family matters, and other everyday matters) for refugees to settle down in Sweden. Some relevant theories, such as information landscapes and socio-cultural theories, are considered in this study. A qualitative research design is employed, including semi-structured deep interviews and participatory observation with 20 participants. The initial findings show that the refugee women encounter many information-related and integration-related challenges in Sweden and have built a network of cultural landscapes in which they practice various co-ethnic cultural and religious activities at different times of the year. These landscapes help them to build a sense of belonging with people from their own or similar land and assist them to seek and share relevant information in everyday life in Sweden.Keywords: cultural integration, cultural landscapes, information, women refugees
Procedia PDF Downloads 14235837 Egalitarianism and Social Stratification: An Overview of the Caste System among the Southern Muslims of Sri Lanka
Authors: Mohamed Faslan
Abstract:
This paper describes how caste-based differentiation functions among the Southern Muslims of Sri Lanka despite Islamic egalitarian principles. Such differences are not promoted by religious teachings, mosques, or the various Islamic religious denominations. Instead, it underpins a hereditary, hierarchical stratification in social structure. Since Islam is against social stratification and promotes egalitarianism, what are the persuasive social structures that organize the existing caste system among Southern Muslims? To answer this puzzle, this paper discusses and analyses the caste system under these five subsections: ancestry; marriage; geography; mosque ownership or trustees; and occupation. The study of caste in Sri Lanka is generally compartmentalized into separate Sinhala and Tamil systems. Most caste studies have focused on the characteristics, upward mobility, or discrimination of specific castes in relation to other castes within ethnic systems. As an operational definition, in this paper, by “southern” or the south of Sri Lanka, I refer to the Kalutara, Galle and Matara Districts. This research was conducted in these three districts, and the respondents were selected purposively. Community history interviews were used as a tool for collecting information, and grounded theory used for analysis. Caste stratification among the Southern Muslims of Sri Lanka is directly connected to whether they are descended from Arab or South Indian ancestors. Arab ancestors are considered upper caste and South Indian ancestors are considered lower caste. Endogamy is the most serious driving factor keeping caste system functioning among Muslims while the other factors—geography, mosques, and occupations—work as supporting factors.Keywords: caste, social stratification, Sri Lanka Muslims, endogamy
Procedia PDF Downloads 17335836 Building Information Modelling: A Review to Indian Scenario
Authors: P. Agnivesh, P. V. Ponambala Moorthi
Abstract:
Evolution of information modelling leads to the visualisation of well-organized built environment. Building Information Modelling (BIM) is considered as evolution in the off-site construction which essentially enhances and controls the present scenario of on-site construction paradigms. Promptness, sustainability and security are considered as the important characteristics of the building information modelling. Projects that uses BIM are tied firmly by technology but distributed organizationally. This allows different team members in the project to associate and integrate the works and work flows. This will in turn improve the efficiency of work breakdown structure. Internationally BIM had been accepted as modern computer aided way of information sharing by construction industry for efficient way of manipulation in order to avoid the on-site misperceptions. Even though, in developing countries like India BIM is in the phase of start and requires lot of mandates and policies to be brought about by the government for its widespread implementations. This paper reviews the current scenario of BIM worldwide and in India and suggests for the improved implementation of building modelling for Indian policy condition.Keywords: building information modelling, Indian polity, information modelling, information sharing, mandates and policies, sustainability.
Procedia PDF Downloads 37535835 Use of Cloud-Based Virtual Classroom in Connectivism Learning Process to Enhance Information Literacy and Self-Efficacy for Undergraduate Students
Authors: Kulachai Kultawanich, Prakob Koraneekij, Jaitip Na-Songkhla
Abstract:
The way of learning has been changed into a new paradigm since the improvement of network and communication technology, so learners have to interact with massive amount of the information. Thus, information literacy has become a critical set of abilities required by every college and university in the world. Connectivism is considered to be an alternative way to design information literacy course in online learning environment, such as Virtual Classroom (VC). With the change of learning pedagogy, VC is employed to improve the social capability by integrating cloud-based technology. This paper aims to study the use of Cloud-based Virtual Classroom (CBVC) in Connectivism learning process to enhance information literacy and self-efficacy of twenty-one undergraduate students who registered in an e-publishing course at Chulalongkorn University. The data were gathered during 6 weeks of the study by using the following instruments: (1) Information literacy test (2) Information literacy rubrics (3) Information Literacy Self-Efficacy (ILSE) Scales and (4) Questionnaire. The result indicated that students have information literacy and self-efficacy posttest mean scores higher than pretest mean scores at .05 level of significant after using CBVC in Connectivism learning process. Additionally, the study identified that the Connectivism learning process proved useful for developing information rich environment and a sense of community, and the CBVC proved useful for developing social connection.Keywords: cloud-based, virtual classroom, connectivism, information literacy
Procedia PDF Downloads 45335834 Level of Sustainability, Environmental Assessment and Life Cycle Assessment of Industrial Technology Research Projects in Carlos Hilado Memorial State College, Alijis Campus, Bacolod City, Negros Occidental, Philippines
Authors: Rene A. Salmingo
Abstract:
In pursuing higher educational institution’s transition to sustainable future, this research initiative was conducted. The study aimed to determine the level of sustainability, environmental impact and life cycle phase assessment of the industrial technology research projects at the Institute of Information Technology, Carlos Hilado Memorial State College (CHMSC), Alijis Campus, Bacolod City, Negros Occidental, Philippines. The research method was descriptive utilizing a researcher made questionnaire to assess the ten (10) industrial technology completed research projects. Mean was used to treat the data and instrument for Good and Scates’ validity through revisions and consultations from the environmental experts, technology specialists; and Cronbach Alpha was used to measure reliability. Results indicated that the level of sustainability and life cycle phase assessment was very high while the environmental impact of the industrial research projects was rated low. Moreover, the current research projects and environmental education courses in the college were relevant to support sustainable industrial technology research projects in the future. Hence, this research initiative will contribute to the transformation of CHMSC as a greening higher educational institution and as a center for sustainable development in the region.Keywords: environmental impact, industrial technology research projects, life cycle phase assessment, sustainability
Procedia PDF Downloads 19135833 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 4235832 Feasibility of On-Demand Transport Systems (ODT) in Oran Wilaya: Geomatics Study
Authors: Brahmia Nadjet
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transport systems (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria (organizational, technical, geographical, etc.). As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems (such as GIS, RDBMS), so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: ODT, geomatics, GIS, transport systems
Procedia PDF Downloads 50235831 Modeling and Simulation Frameworks for Cloud Computing Environment: A Critical Evaluation
Authors: Abul Bashar
Abstract:
The recent surge in the adoption of cloud computing systems by various organizations has brought forth the challenge of evaluating their performance. One of the major issues faced by the cloud service providers and customers is to assess the ability of cloud computing systems to provide the desired services in accordance to the QoS and SLA constraints. To this end, an opportunity exists to develop means to ensure that the desired performance levels of such systems are met under simulated environments. This will eventually minimize the service disruptions and performance degradation issues during the commissioning and operational phase of cloud computing infrastructure. However, it is observed that several simulators and modelers are available for simulating the cloud computing systems. Therefore, this paper presents a critical evaluation of the state-of-the-art modeling and simulation frameworks applicable to cloud computing systems. It compares the prominent simulation frameworks in terms of the API features, programming flexibility, operating system requirements, supported services, licensing needs and popularity. Subsequently, it provides recommendations regarding the choice of the most appropriate framework for researchers, administrators and managers of cloud computing systems.Keywords: cloud computing, modeling framework, performance evaluation, simulation tools
Procedia PDF Downloads 50235830 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 26835829 Complete Enumeration Approach for Calculation of Residual Entropy for Diluted Spin Ice
Authors: Yuriy A. Shevchenko, Konstantin V. Nefedev
Abstract:
We consider the antiferromagnetic systems of Ising spins located at the sites of the hexagonal, triangular and pyrochlore lattices. Such systems can be diluted to a certain concentration level by randomly replacing the magnetic spins with nonmagnetic ones. Quite recently we studied density of states (DOS) was calculated by the Wang-Landau method. Based on the obtained data, we calculated the dependence of the residual entropy (entropy at a temperature tending to zero) on the dilution concentration for quite large systems (more than 2000 spins). In the current study, we obtained the same data for small systems (less than 20 spins) by a complete search of all possible magnetic configurations and compared the result with the result for large systems. The shape of the curve remains unchanged in both cases, but the specific values of the residual entropy are different because of the finite size effect.Keywords: entropy, pyrochlore, spin ice, Wang-Landau algorithm
Procedia PDF Downloads 26435828 Neural Reshaping: The Plasticity of Human Brain and Artificial Intelligence in the Learning Process
Authors: Seyed-Ali Sadegh-Zadeh, Mahboobe Bahrami, Sahar Ahmadi, Seyed-Yaser Mousavi, Hamed Atashbar, Amir M. Hajiyavand
Abstract:
This paper presents an investigation into the concept of neural reshaping, which is crucial for achieving strong artificial intelligence through the development of AI algorithms with very high plasticity. By examining the plasticity of both human and artificial neural networks, the study uncovers groundbreaking insights into how these systems adapt to new experiences and situations, ultimately highlighting the potential for creating advanced AI systems that closely mimic human intelligence. The uniqueness of this paper lies in its comprehensive analysis of the neural reshaping process in both human and artificial intelligence systems. This comparative approach enables a deeper understanding of the fundamental principles of neural plasticity, thus shedding light on the limitations and untapped potential of both human and AI learning capabilities. By emphasizing the importance of neural reshaping in the quest for strong AI, the study underscores the need for developing AI algorithms with exceptional adaptability and plasticity. The paper's findings have significant implications for the future of AI research and development. By identifying the core principles of neural reshaping, this research can guide the design of next-generation AI technologies that can enhance human and artificial intelligence alike. These advancements will be instrumental in creating a new era of AI systems with unparalleled capabilities, paving the way for improved decision-making, problem-solving, and overall cognitive performance. In conclusion, this paper makes a substantial contribution by investigating the concept of neural reshaping and its importance for achieving strong AI. Through its in-depth exploration of neural plasticity in both human and artificial neural networks, the study unveils vital insights that can inform the development of innovative AI technologies with high adaptability and potential for enhancing human and AI capabilities alike.Keywords: neural plasticity, brain adaptation, artificial intelligence, learning, cognitive reshaping
Procedia PDF Downloads 5235827 An Adjusted Network Information Criterion for Model Selection in Statistical Neural Network Models
Authors: Christopher Godwin Udomboso, Angela Unna Chukwu, Isaac Kwame Dontwi
Abstract:
In selecting a Statistical Neural Network model, the Network Information Criterion (NIC) has been observed to be sample biased, because it does not account for sample sizes. The selection of a model from a set of fitted candidate models requires objective data-driven criteria. In this paper, we derived and investigated the Adjusted Network Information Criterion (ANIC), based on Kullback’s symmetric divergence, which has been designed to be an asymptotically unbiased estimator of the expected Kullback-Leibler information of a fitted model. The analyses show that on a general note, the ANIC improves model selection in more sample sizes than does the NIC.Keywords: statistical neural network, network information criterion, adjusted network, information criterion, transfer function
Procedia PDF Downloads 56635826 Selection of Qualitative Research Strategy for Bullying and Harassment in Sport
Authors: J. Vveinhardt, V. B. Fominiene, L. Jeseviciute-Ufartiene
Abstract:
Relevance of Research: Qualitative research is still regarded as highly subjective and not sufficiently scientific in order to achieve objective research results. However, it is agreed that a qualitative study allows revealing the hidden motives of the research participants, creating new theories, and highlighting the field of problem. There is enough research done to reveal these qualitative research aspects. However, each research area has its own specificity, and sport is unique due to the image of its participants, who are understood as strong and invincible. Therefore, a sport participant might have personal issues to recognize himself as a victim in the context of bullying and harassment. Accordingly, researcher has a dilemma in general making to speak a victim in sport. Thus, ethical aspects of qualitative research become relevant. The plenty fields of sport make a problem determining the sample size of research. Thus, the corresponding problem of this research is which and why qualitative research strategies are the most suitable revealing the phenomenon of bullying and harassment in sport. Object of research is qualitative research strategy for bullying and harassment in sport. Purpose of the research is to analyze strategies of qualitative research selecting suitable one for bullying and harassment in sport. Methods of research were scientific research analyses of qualitative research application for bullying and harassment research. Research Results: Four mane strategies are applied in the qualitative research; inductive, deductive, retroductive, and abductive. Inductive and deductive strategies are commonly used researching bullying and harassment in sport. The inductive strategy is applied as quantitative research in order to reveal and describe the prevalence of bullying and harassment in sport. The deductive strategy is used through qualitative methods in order to explain the causes of bullying and harassment and to predict the actions of the participants of bullying and harassment in sport and the possible consequences of these actions. The most commonly used qualitative method for the research of bullying and harassment in sports is semi-structured interviews in speech and in written. However, these methods may restrict the openness of the participants in the study when recording on the dictator or collecting incomplete answers when the participant in the survey responds in writing because it is not possible to refine the answers. Qualitative researches are more prevalent in terms of technology-defined research data. For example, focus group research in a closed forum allows participants freely interact with each other because of the confidentiality of the selected participants in the study. The moderator can purposefully formulate and submit problem-solving questions to the participants. Hence, the application of intelligent technology through in-depth qualitative research can help discover new and specific information on bullying and harassment in sport. Acknowledgement: This research is funded by the European Social Fund according to the activity ‘Improvement of researchers’ qualification by implementing world-class R&D projects of Measure No. 09.3.3-LMT-K-712.Keywords: bullying, focus group, harassment, narrative, sport, qualitative research
Procedia PDF Downloads 18035825 The Characteristics of a Fair and Efficient Tax Auditing Information System as a Tool against Tax Evasion: A Theoretical Framework
Authors: Dimitris Balios, Stefanos Tantos
Abstract:
Economic growth and social evolution are connected to trust relationships in a society. The quality of the accounting information, the tax information system and the tax audit mechanism evolve multiple benefits in an economy. Tax evasion, the illegal practice where people and companies do not pay taxes, is a crime because of the negative effect in economy and society. In this paper, we describe a theoretical framework on the characteristics of a fair and efficient tax auditing information system which could be a tool against tax evasion, a tool for an economy to grow, especially in countries that face fluctuations in economic activity. We conclude that a fair and efficient tax auditing information system increases the reliability of tax administration, improves taxpayers’ tax compliance and causes a developmental trajectory for the economy.Keywords: auditing information system, auditing mechanism, tax evasion, taxation
Procedia PDF Downloads 15435824 Application of IF Rough Data on Knowledge Towards Malaria of Rural Tribal Communities in Tripura
Authors: Chhaya Gangwal, R. N. Bhaumik, Shishir Kumar
Abstract:
Handling uncertainty and impreciseness of knowledge appears to be a challenging task in Information Systems. Intuitionistic fuzzy (IF) and rough set theory enhances databases by allowing it for the management of uncertainty and impreciseness. This paper presents a new efficient query optimization technique for the multi-valued or imprecise IF rough database. The usefulness of this technique was illustrated on malaria knowledge from the rural tribal communities of Tripura where most of the information is multi-valued and imprecise. Then, the querying about knowledge on malaria is executed into SQL server to make the implementation of IF rough data querying simpler.Keywords: intuitionistic fuzzy set, rough set, relational database, IF rough relational database
Procedia PDF Downloads 44535823 Renewable Energy Industry Trends and Its Contributions to the Development of Energy Resilience in an Era of Accelerating Climate Change
Authors: A. T. Asutosh, J. Woo, M. Kouhirostami, M. Sam, A. Khantawang, C. Cuales, W. Ryor, C. Kibert
Abstract:
Climate change and global warming vortex have grown to alarming proportions. Therefore, the need for a shift in the conceptualization of energy production is paramount. Energy practices have been created in the current situation. Fossil fuels continue their prominence, at the expense of renewable sources. Despite this abundance, a large percentage of the world population still has no access to electricity but there have been encouraging signs in global movement from nonrenewable to renewable energy but means to reverse climate change have been elusive. Worldwide, organizations have put tremendous effort into innovation. Conferences and exhibitions act as a platform that allows a broad exchange of information regarding trends in the renewable energy field. The Solar Power International (SPI) conference and exhibition is a gathering of concerned activists, and probably the largest convention of its kind. This study investigates current development in the renewable energy field, analyzing means by which industry is being applied to the issue. In reviewing the 2019 SPI conference, it was found innovations in recycling and assessing the environmental impacts of the solar products that need critical attention. There is a huge movement in the electrical storage but there exists a large gap in the development of security systems. This research will focus on solar energy, but impacts will be relevant to the entire renewable energy market.Keywords: climate change, renewable energy, solar, trends, research, solar power international, SPI
Procedia PDF Downloads 10935822 Directional Implicit Functions in Nonsmooth Analysis
Authors: Murzabekova Gulden
Abstract:
Directional implicit functions for underdetermined nonsmooth systems in terms of the new tool of the Nonsmooth analysis - exhausters are considered. A method for finding an implicit function for underdetermined nonsmooth systems is proposed.Keywords: implicit function, exhauster, nonsmooth systems
Procedia PDF Downloads 24535821 Living Wall Systems: An Approach for Reducing Energy Consumption in Curtain Wall Façades
Authors: Salma Maher, Ahmed Elseragy, Sally Eldeeb
Abstract:
Nowadays, Urbanism and climate change lead to the rapid growth in energy consumption and the increase of using air-conditioning for cooling. In a hot climate area, there is a need for a new sustainable alternative that is more convenient for an existing situation. The Building envelope controls the heat transfer between the outside and inside the building. While the building façade is the most critical part, types of façade material play a vital role in influences of the energy demand for heating and cooling due to exposure to direct solar radiation throughout the day. Since the beginning of the twentieth century, the use of curtain walls in office buildings façades started to increase rapidly, which lead to more cooling loads in energy consumption. Integrating the living wall system in urban areas as a sustainable renovation and energy-saving method for the built environment will reduce the energy demand of buildings and will also provide environmental benefits. Also, it will balance the urban ecology and enhance urban life quality. The results show that the living wall systems reduce the internal temperature up to 4.0 °C. This research carries on an analytical study by highlighting the different types of living wall systems and verifying their thermal performance, energy-saving, and life potential on the building. These assessing criteria include the reason for using the Living wall systems in the building façade as well as the effect it has upon the surrounding environment. Finally, the paper ends with concluding the effect of using living wall systems on building. And, it suggests a system as long-lasting, and energy-efficient solution to be applied in curtain wall façades in a hot climate area.Keywords: living wall systems, energy consumption, curtain walls, energy-saving, sustainability, urban life quality
Procedia PDF Downloads 14135820 Unmanned Systems in Urban Areas
Authors: Abdullah Beyazkurk, Onur Ozdemir
Abstract:
The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations.Keywords: technology, warfare, urban warfare, unmanned systems, unmanned ground vehicles, unmanned aerial vehicles
Procedia PDF Downloads 35435819 Direct Growth Rates of the Information Model for Traffic at the Service of Sustainable Development of Tourism in Dubrovacko-Neretvanska County 2014-2020
Authors: Vinko Viducic, Jelena Žanic Mikulicic, Maja Racic, Kristina Sladojevic
Abstract:
The research presented in this paper has been focused on analyzing the impact of traffic on the sustainable development of tourism in Croatia's Dubrovacko-Neretvanska County by the year 2020, based on the figures and trends reported in 2014 and using the relevant variables that characterise the synergy of traffic and tourism in, speaking from the geographic viewpoint, the most problematic county in the Republic of Croatia. The basic hypothesis has been confirmed through scientifically obtained research results, through the quantification of the model's variables and the direct growth rates of the designed model. On the basis of scientific insights into the sustainable development of traffic and tourism in Dubrovacko-Neretvanska County, it is possible to propose a new information model for traffic at the service of the sustainable development of tourism in the County for the period 2014-2020.Keywords: environment protection, hotel industry, private sector, quantification
Procedia PDF Downloads 28035818 Cognitive Model of Analogy Based on Operation of the Brain Cells: Glial, Axons and Neurons
Authors: Ozgu Hafizoglu
Abstract:
Analogy is an essential tool of human cognition that enables connecting diffuse and diverse systems with attributional, deep structural, casual relations that are essential to learning, to innovation in artificial worlds, and to discovery in science. Cognitive Model of Analogy (CMA) leads and creates information pattern transfer within and between domains and disciplines in science. This paper demonstrates the Cognitive Model of Analogy (CMA) as an evolutionary approach to scientific research. The model puts forward the challenges of deep uncertainty about the future, emphasizing the need for flexibility of the system in order to enable reasoning methodology to adapt to changing conditions. In this paper, the model of analogical reasoning is created based on brain cells, their fractal, and operational forms within the system itself. Visualization techniques are used to show correspondences. Distinct phases of the problem-solving processes are divided thusly: encoding, mapping, inference, and response. The system is revealed relevant to brain activation considering each of these phases with an emphasis on achieving a better visualization of the brain cells: glial cells, axons, axon terminals, and neurons, relative to matching conditions of analogical reasoning and relational information. It’s found that encoding, mapping, inference, and response processes in four-term analogical reasoning are corresponding with the fractal and operational forms of brain cells: glial, axons, and neurons.Keywords: analogy, analogical reasoning, cognitive model, brain and glials
Procedia PDF Downloads 18535817 Nursing Students' Experience of Using Electronic Health Record System in Clinical Placements
Authors: Nurten Tasdemir, Busra Baloglu, Zeynep Cingoz, Can Demirel, Zeki Gezer, Barıs Efe
Abstract:
Student nurses are increasingly exposed to technology in the workplace after graduation with the growing numbers of electric health records (EHRs), handheld computers, barcode scanner medication dispensing systems, and automatic capture of patient data such as vital signs. Internationally, electronic health records (EHRs) systems are being implemented and evaluated. Students will inevitably encounter EHRs in the clinical learning environment and their professional practice. Nursing students must develop competency in the use of EHR. Aim: The study aimed to examine nursing students’ experiences of learning to use electronic health records (EHR) in clinical placements. Method: This study adopted a descriptive approach. The study population consisted of second and third-year nursing students at the Zonguldak School of Health in the West Black Sea Region of Turkey; the study was conducted during the 2015–2016 academic year. The sample consisted of 315 (74.1% of 425 students) nursing students who volunteered to participate. The students, who were involved in clinical practice, were invited to participate in the study Data were collected by a questionnaire designed by the researchers based on the relevant literature. Data were analyzed descriptively using the Statistical Package for Social Sciences (SPSS) for Windows version 16.0. The data are presented as means, standard deviations, and percentages. Approval for the study was obtained from the Ethical Committee of the University (Reg. Number: 29/03/2016/112) and the director of Nursing Department. Findings: A total of 315 students enrolled in this study, for a response rate of 74.1%. The mean age of the sample was 22.24 ± 1.37 (min: 19, max: 32) years, and most participants (79.7%) were female. Most of the nursing students (82.3%) stated that they use information technologies in clinical practice. Nearly half of the students (42.5%) reported that they have not accessed to EHR system. In addition, 61.6% of the students reported that insufficient computers available in clinical placement. Of the students, 84.7% reported that they prefer to have patient information from EHR system, and 63.8% of them found more effective to preparation for the clinical reporting. Conclusion: This survey indicated that nursing students experience to learn about EHR systems in clinical placements. For more effective learning environment nursing education should prepare nursing students for EHR systems in their educational life.Keywords: electronic health record, clinical placement, nursing student, nursing education
Procedia PDF Downloads 29135816 Necessary Condition to Utilize Adaptive Control in Wind Turbine Systems to Improve Power System Stability
Authors: Javad Taherahmadi, Mohammad Jafarian, Mohammad Naser Asefi
Abstract:
The global capacity of wind power has dramatically increased in recent years. Therefore, improving the technology of wind turbines to take different advantages of this enormous potential in the power grid, could be interesting subject for scientists. The doubly-fed induction generator (DFIG) wind turbine is a popular system due to its many advantages such as the improved power quality, high energy efficiency and controllability, etc. With an increase in wind power penetration in the network and with regard to the flexible control of wind turbines, the use of wind turbine systems to improve the dynamic stability of power systems has been of significance importance for researchers. Subsynchronous oscillations are one of the important issues in the stability of power systems. Damping subsynchronous oscillations by using wind turbines has been studied in various research efforts, mainly by adding an auxiliary control loop to the control structure of the wind turbine. In most of the studies, this control loop is composed of linear blocks. In this paper, simple adaptive control is used for this purpose. In order to use an adaptive controller, the convergence of the controller should be verified. Since adaptive control parameters tend to optimum values in order to obtain optimum control performance, using this controller will help the wind turbines to have positive contribution in damping the network subsynchronous oscillations at different wind speeds and system operating points. In this paper, the application of simple adaptive control in DFIG wind turbine systems to improve the dynamic stability of power systems is studied and the essential condition for using this controller is considered. It is also shown that this controller has an insignificant effect on the dynamic stability of the wind turbine, itself.Keywords: almost strictly positive real (ASPR), doubly-fed induction generator (DIFG), simple adaptive control (SAC), subsynchronous oscillations, wind turbine
Procedia PDF Downloads 37635815 Intelligent Indoor Localization Using WLAN Fingerprinting
Authors: Gideon C. Joseph
Abstract:
The ability to localize mobile devices is quite important, as some applications may require location information of these devices to operate or deliver better services to the users. Although there are several ways of acquiring location data of mobile devices, the WLAN fingerprinting approach has been considered in this work. This approach uses the Received Signal Strength Indicator (RSSI) measurement as a function of the position of the mobile device. RSSI is a quantitative technique of describing the radio frequency power carried by a signal. RSSI may be used to determine RF link quality and is very useful in dense traffic scenarios where interference is of major concern, for example, indoor environments. This research aims to design a system that can predict the location of a mobile device, when supplied with the mobile’s RSSIs. The developed system takes as input the RSSIs relating to the mobile device, and outputs parameters that describe the location of the device such as the longitude, latitude, floor, and building. The relationship between the Received Signal Strengths (RSSs) of mobile devices and their corresponding locations is meant to be modelled; hence, subsequent locations of mobile devices can be predicted using the developed model. It is obvious that describing mathematical relationships between the RSSIs measurements and localization parameters is one option to modelling the problem, but the complexity of such an approach is a serious turn-off. In contrast, we propose an intelligent system that can learn the mapping of such RSSIs measurements to the localization parameters to be predicted. The system is capable of upgrading its performance as more experiential knowledge is acquired. The most appealing consideration to using such a system for this task is that complicated mathematical analysis and theoretical frameworks are excluded or not needed; the intelligent system on its own learns the underlying relationship in the supplied data (RSSI levels) that corresponds to the localization parameters. These localization parameters to be predicted are of two different tasks: Longitude and latitude of mobile devices are real values (regression problem), while the floor and building of the mobile devices are of integer values or categorical (classification problem). This research work presents artificial neural network based intelligent systems to model the relationship between the RSSIs predictors and the mobile device localization parameters. The designed systems were trained and validated on the collected WLAN fingerprint database. The trained networks were then tested with another supplied database to obtain the performance of trained systems on achieved Mean Absolute Error (MAE) and error rates for the regression and classification tasks involved therein.Keywords: indoor localization, WLAN fingerprinting, neural networks, classification, regression
Procedia PDF Downloads 347