Search results for: bridging theory and applications
9415 Efficient Frequent Itemset Mining Methods over Real-Time Spatial Big Data
Authors: Hamdi Sana, Emna Bouazizi, Sami Faiz
Abstract:
In recent years, there is a huge increase in the use of spatio-temporal applications where data and queries are continuously moving. As a result, the need to process real-time spatio-temporal data seems clear and real-time stream data management becomes a hot topic. Sliding window model and frequent itemset mining over dynamic data are the most important problems in the context of data mining. Thus, sliding window model for frequent itemset mining is a widely used model for data stream mining due to its emphasis on recent data and its bounded memory requirement. These methods use the traditional transaction-based sliding window model where the window size is based on a fixed number of transactions. Actually, this model supposes that all transactions have a constant rate which is not suited for real-time applications. And the use of this model in such applications endangers their performance. Based on these observations, this paper relaxes the notion of window size and proposes the use of a timestamp-based sliding window model. In our proposed frequent itemset mining algorithm, support conditions are used to differentiate frequents and infrequent patterns. Thereafter, a tree is developed to incrementally maintain the essential information. We evaluate our contribution. The preliminary results are quite promising.Keywords: real-time spatial big data, frequent itemset, transaction-based sliding window model, timestamp-based sliding window model, weighted frequent patterns, tree, stream query
Procedia PDF Downloads 1629414 Usability in E-Commerce Websites: Results of Eye Tracking Evaluations
Authors: Beste Kaysı, Yasemin Topaloğlu
Abstract:
Usability is one of the most important quality attributes for web-based information systems. Specifically, for e-commerce applications, usability becomes more prominent. In this study, we aimed to explore the features that experienced users seek in e-commerce applications. We used eye tracking method in evaluations. Eye movement data are obtained from the eye-tracking method and analyzed based on task completion time, number of fixations, as well as heat map and gaze plot measures. The results of the analysis show that the eye movements of participants' are too static in certain areas and their areas of interest are scattered in many different places. It has been determined that this causes users to fail to complete their transactions. According to the findings, we outlined the issues to improve the usability of e-commerce websites. Then we propose solutions to identify the issues. In this way, it is expected that e-commerce sites will be developed which will make experienced users more satisfied.Keywords: e-commerce websites, eye tracking method, usability, website evaluations
Procedia PDF Downloads 1829413 The Effects of Cross-Border Use of Drones in Nigerian National Security
Authors: H. P. Kerry
Abstract:
Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.Keywords: armed drones, drones, cross-border, national security
Procedia PDF Downloads 1589412 Prediction of the Regioselectivity of 1,3-Dipolar Cycloaddition Reactions of Nitrile Oxides with 2(5H)-Furanones Using Recent Theoretical Reactivity Indices
Authors: Imad Eddine Charif, Wafaa Benchouk, Sidi Mohamed Mekelleche
Abstract:
The regioselectivity of a series of 16 1,3-dipolar cycloaddition reactions of nitrile oxides with 2(5H)-furanones has been analysed by means of global and local electrophilic and nucleophilic reactivity indices using density functional theory at the B3LYP level together with the 6-31G(d) basis set. The local electrophilicity and nucleophilicity indices, based on Fukui and Parr functions, have been calculated for the terminal sites, namely the C1 and O3 atoms of the 1,3-dipole and the C4 and C5 atoms of the dipolarophile. These local indices were calculated using both Mulliken and natural charges and spin densities. The results obtained show that the C5 atom of the 2(5H)-furanones is the most electrophilic site whereas the O3 atom of the nitrile oxides is the most nucleophilic centre. It turns out that the experimental regioselectivity is correctly reproduced, indicating that both Fukui- and Parr-based indices are efficient tools for the prediction of the regiochemistry of the studied reactions and could be used for the prediction of newly designed reactions of the same kind.Keywords: 1, 3-dipolar cycloaddition, density functional theory, nitrile oxides, regioselectivity, reactivity indices
Procedia PDF Downloads 1669411 Learning And Teaching Conditions For Students With Special Needs: Asset-Oriented Perspectives And Approaches
Authors: Dr. Luigi Iannacci
Abstract:
This research critically explores the current educational landscape with respect to special education and dominant deficit/medical model discourses that continue to forward unresponsive problematic approaches to teaching students with disabilities. Asset-oriented perspectives and social/critical models of disability are defined and explicated in order to offer alternatives to these dominant discourses. To that end, a framework that draws on Brian Camborne’s conditions of learning and applications of his work in relation to instruction conceptualize learning conditions and their significance to students with special needs. Methodologically, the research is designed as Critical Narrative Inquiry (CNI). Critical incidents, interviews, documents, artefacts etc. are drawn on and narratively constructed to explore how disability is presently configured in language, discourses, pedagogies and interactions with students deemed disabled. This data was collected using ethnographic methods and as such, through participant-observer field work that occurred directly in classrooms. This narrative approach aims to make sense of complex classroom interactions and ways of reconceptualizing approaches to students with special needs. CNI is situated in the critical paradigm and primarily concerned with culture, language and participation as issues of power in need of critique with the intent of change in the direction of social justice. Research findings highlight the ways in which Cambourne’s learning conditions, such as demonstration, approximation, engagement, responsibility, immersion, expectation, employment (transfer, use), provide a clear understanding of what is central to and constitutes a responsive and inclusive this instructional frame. Examples of what each of these conditions look like in practice are therefore offered in order to concretely demonstrate the ways in which various pedagogical choices and questions can enable classroom spaces to be responsive to the assets and challenges students with special needs have and experience. These particular approaches are also illustrated through an exploration of multiliteracies theory and pedagogy and what this research and approach allows educators to draw on, facilitate and foster in terms of the ways in which students with special needs can make sense of and demonstrate their understanding of skills, content and knowledge. The contextual information, theory, research and instructional frame focused on throughout this inquiry ultimately demonstrate what inclusive classroom spaces and practice can look like. These perspectives and conceptualizations are in stark contrast to dominant deficit driven approaches that ensure current pedagogically impoverished teaching focused on narrow, limited and limiting understandings of special needs learners and their ways of knowing and acquiring/demonstrating knowledge.Keywords: asset-oriented approach, social/critical model of disability, conditions for learning and teaching, students with special needs
Procedia PDF Downloads 699410 Extending Theory of Planned Behavior to Modelling Chronic Patients’ Acceptance of Health Information: An Information Overload Perspective
Authors: Shu-Lien Chou, Chung-Feng Liu
Abstract:
Self-health management of chronic illnesses plays an important part in chronic illness treatments. However, various kinds of health information (health education materials) which government or healthcare institutions provide for patients may not achieve the expected outcome. One of the critical reasons affecting patients’ use intention could be patients’ perceived Information overload regarding the health information. This study proposed an extended model of Theory of Planned Behavior, which integrating perceived information overload as another construct to explore patients’ use intention of the health information for self-health management. The independent variables are attitude, subject norm, perceived behavior control and perceived information overload while the dependent variable is behavior intention to use the health information. The cross-sectional study used a structured questionnaire for data collection, focusing on the chronic patients with coronary artery disease (CAD), who are the potential users of the health information, in a medical center in Taiwan. Data were analyzed using descriptive statistics of the basic information distribution of the questionnaire respondents, and the Partial Least Squares (PLS) structural equation model to study the reliability and construct validity for testing our hypotheses. A total of 110 patients were enrolled in this study and 106 valid questionnaires were collected. The PLS analysis result indicates that the patients’ perceived information overload of health information contributes the most critical factor influencing the behavioral intention. Subjective norm and perceived behavioral control of TPB constructs had significant effects on patients’ intentions to use health information also, whereas the attitude construct did not. This study demonstrated a comprehensive framework, which extending perceived information overload into TPB model to predict patients’ behavioral intention of using heath information. We expect that the results of this study will provide useful insights for studying health information from the perspectives of academia, governments, and healthcare providers.Keywords: chronic patients, health information, information overload, theory of planned behavior
Procedia PDF Downloads 4369409 Nonlinear Analysis of Shear Deformable Deep Beam Resting on Nonlinear Two-Parameter Random Soil
Authors: M. Seguini, D. Nedjar
Abstract:
In this paper, the nonlinear analysis of Timoshenko beam undergoing moderate large deflections and resting on nonlinear two-parameter random foundation is presented, taking into account the effects of shear deformation, beam’s properties variation and the spatial variability of soil characteristics. The finite element probabilistic analysis has been performed by using Timoshenko beam theory with the Von Kàrmàn nonlinear strain-displacement relationships combined to Vanmarcke theory and Monte Carlo simulations, which is implemented in a Matlab program. Numerical examples of the newly developed model is conducted to confirm the efficiency and accuracy of this later and the importance of accounting for the foundation second parameter (Winkler-Pasternak). Thus, the results obtained from the developed model are presented and compared with those available in the literature to examine how the consideration of the shear and spatial variability of soil’s characteristics affects the response of the system.Keywords: nonlinear analysis, soil-structure interaction, large deflection, Timoshenko beam, Euler-Bernoulli beam, Winkler foundation, Pasternak foundation, spatial variability
Procedia PDF Downloads 3239408 Voltage Controlled Ring Oscillator for RF Applications in 0.18 µm CMOS Technology
Authors: Mohammad Arif Sobhan Bhuiyan, Zainal Abidin Nordin, Mamun Bin Ibne Reaz
Abstract:
A compact and power efficient high performance Voltage Controlled Oscillator (VCO) is a must in analog and digital circuits especially in the communication system, but the best trade-off among the performance parameters is a challenge for researchers. In this paper, a design of a compact 3-stage differential voltage controlled ring oscillator (VCRO) with low phase noise, low power and higher tuning bandwidth is proposed in 0.18 µm CMOS technology. The VCRO is designed with symmetric load and positive feedback techniques to achieve higher gain and minimum delay. The proposed VCRO can operate at tuning range of 3.9-5.0 GHz at 1.6 V supply voltage. The circuit consumes only 1.0757 mW of power and produces -129 dbc/Hz. The total active area of the proposed VCRO is only 11.74 x 37.73 µm2. Such a VCO can be the best choice for compact and low-power RF applications.Keywords: CMOS, VCO, VCRO, oscillator
Procedia PDF Downloads 4769407 Synthesis and Characterization of Model Amines for Corrosion Applications
Authors: John Vergara, Giuseppe Palmese
Abstract:
Fundamental studies aimed at elucidating the key contributions to corrosion performance are needed to make progress toward effective and environmentally compliant corrosion control. Epoxy/amine systems are typically employed as barrier coatings for corrosion control. However, the hardening agents used for coating applications can be very complex, making fundamental studies of water and oxygen permeability challenging to carry out. Creating model building blocks for epoxy/amine coatings is the first step in carrying out these studies. We will demonstrate the synthesis and characterization of model amine building blocks from saturated fatty acids and simple amines such as diethylenetriamine (DETA) and Bis(3-aminopropyl)amine. The structure-property relationship of thermosets made from these model amines and Diglycidyl ether of bisphenol A (DGBEA) will be discussed.Keywords: building block, amine, synthesis, characterization
Procedia PDF Downloads 5419406 Determinants of the Users Intention of Social-Local-Mobile Applications
Authors: Chia-Chen Chen, Mu-Yen Chen
Abstract:
In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality
Procedia PDF Downloads 5289405 Human Resources and Business Result: An Empirical Approach Based on RBV Theory
Authors: Xhevrie Mamaqi
Abstract:
Organization capacity learning is a process referring to the sum total of individual and collective learning through training programs, experience and experimentation, among others. Today, in-business ongoing training is one of the most important strategies for human capital development and it is crucial to sustain and improve workers’ knowledge and skills. Many organizations, firms and business are adopting a strategy of continuous learning, encouraging employees to learn new skills continually to be innovative and to try new processes and work in order to achieve a competitive advantage and superior business results. This paper uses the Resource Based View and Capacities (RBV) approach to construct a hypothetical relationships model between training and business results. The test of the model is applied on transversal data. A sample of 266 business of Spanish sector service has been selected. A Structural Equation Model (SEM) is used to estimate the relationship between ongoing training, represented by two latent dimension denominated Human and Social Capital resources and economic business results. The coefficients estimated have shown the efficient of some training aspects explaining the variation in business results.Keywords: business results, human and social capital resources, training, RBV theory, SEM
Procedia PDF Downloads 3009404 Multiscale Cohesive Zone Modeling of Composite Microstructure
Authors: Vincent Iacobellis, Kamran Behdinan
Abstract:
A finite element cohesive zone model is used to predict the temperature dependent material properties of a polyimide matrix composite with unidirectional carbon fiber arrangement. The cohesive zone parameters have been obtained from previous research involving an atomistic-to-continuum multiscale simulation of the fiber-matrix interface using the bridging cell multiscale method. The goal of the research was to both investigate the effect of temperature change on the composite behavior with respect to transverse loading as well as the validate the use of cohesive parameters obtained from atomistic-to-continuum multiscale modeling to predict fiber-matrix interfacial cracking. From the multiscale model cohesive zone parameters (i.e. maximum traction and energy of separation) were obtained by modeling the interface between the coarse-grained polyimide matrix and graphite based carbon fiber. The cohesive parameters from this simulation were used in a cohesive zone model of the composite microstructure in order to predict the properties of the macroscale composite with respect to changes in temperature ranging from 21 ˚C to 316 ˚C. Good agreement was found between the microscale RUC model and experimental results for stress-strain response, stiffness, and material strength at low and high temperatures. Examination of the deformation of the composite through localized crack initiation at the fiber-matrix interface also agreed with experimental observations of similar phenomena. Overall, the cohesive zone model was shown to be both effective at modeling the composite properties with respect to transverse loading as well as validated the use of cohesive zone parameters obtained from the multiscale simulation.Keywords: cohesive zone model, fiber-matrix interface, microscale damage, multiscale modeling
Procedia PDF Downloads 4879403 A Systematic Review of Situational Awareness and Cognitive Load Measurement in Driving
Authors: Aly Elshafei, Daniela Romano
Abstract:
With the development of autonomous vehicles, a human-machine interaction (HMI) system is needed for a safe transition of control when a takeover request (TOR) is required. An important part of the HMI system is the ability to monitor the level of situational awareness (SA) of any driver in real-time, in different scenarios, and without any pre-calibration. Presenting state-of-the-art machine learning models used to measure SA is the purpose of this systematic review. Investigating the limitations of each type of sensor, the gaps, and the most suited sensor and computational model that can be used in driving applications. To the author’s best knowledge this is the first literature review identifying online and offline classification methods used to measure SA, explaining which measurements are subject or session-specific, and how many classifications can be done with each classification model. This information can be very useful for researchers measuring SA to identify the most suited model to measure SA for different applications.Keywords: situational awareness, autonomous driving, gaze metrics, EEG, ECG
Procedia PDF Downloads 1199402 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 3499401 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls
Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.Keywords: android, information security, intrusion detection systems, malware, mobile devices
Procedia PDF Downloads 3049400 Theory of Gyrotron Amplifier in a Vane-Loaded Waveguide with Inner Dielectric Material
Authors: Reyhaneh Hashemi, Shahrooz Saviz
Abstract:
In his study, we have survey the theory of gyrotron amplifier in a vane-loaded waveguide with inner dielectric material. Dispersion relation for electromagnetic waves emitted by a cylindrical waveguide that provided with wedge-shaped metal vanes projecting radially inward from the wall of the guide and exited in the transverse-electric mode was analysed. From numerical analysis of this dispersion relation, it is shown that the stability behavior of the fast-wave mode is dependent of the dielectric constant. With a small axial momentum spreed, a super bandwidth is shown to be attainable by a mixed mode operation. Also, with the utilization from the numeric analysis of relation dispersion. We show that in the –speed mode, the constant is independent de-electric. With the ratio of dispersion of smell, high –bandwith was obtained for the combined mode. And at the end, we were comparing the result of our work (vane-loaded) by the waveguide with a smooth wall.Keywords: gyrotron amplifier, waveguide, vane-loaded waveguide, dielectric material, dispersion relation, cylindrical waveguide, fast-wave mode, mixed mode operation
Procedia PDF Downloads 1029399 The Evaluation of Shear Modulus (Go) Consistency State of Consolidation Cohesive Soils and Seismic Reflection Survey Using Degree of Soil Consolidation
Authors: Abdul Halim Abdul, Wan Ismail Wan Yusoff
Abstract:
The geological formation at Limau Manis Besar area, are consist of low grade metamorphic rock and undulating mountaineers, rugged terrain and the quite steeply 45 degree slope gradient. The objectives of this paper are present the methods and devices used in measurement of P-wave velocity to estimate the initial Shear Modulus (Go) in steady state and critical state soil consolidation. The relationship between SPT-N values and the Shear Modulus (Go) at very small strain is widely considered to be evaluated. Based on the seismic reflection survey, the constant (K) poroelastic theory, mean effectives stress and primer wave velocity (Vs) increase as the soil depth increase. The steady state and critical state, Degree of Soil Consolidation(U) concept is used to interpret the behavior of Shear Modulus (Go). The relationship between Consolidation Test and Seismic Reflection Survey is also discussed.Keywords: geological setting, shear modulus, poroelastic theory, steady state and none steady state degree of soil consolidation, consolidation test
Procedia PDF Downloads 4749398 Flexibility Cost and Its Application for Construction Projects
Authors: Rashmi Shahu
Abstract:
Flexibility is becoming a more widely accepted aspect of project management. Although contingency theory in project management states that the unknowns are controllable, complexity theory believes that the best way to handle the unknowns would be to have a flexible approach rather than rigidity. Designing a flexible system is a method of managing uncertainty. The present research work aims to evaluate flexibility in the initial design phase of projects taking examples of construction projects. Flexibility in the initial design phase is modeled in order to know the advantage in future. The comparison between the extra cost of flexibility in the initial design phase and the discount that can be achieved in future due to this premium will help the developers in making strategic decisions. This research uses a methodology for valuing flexibility by developing a mathematical formula for predicting future saving of cost. Two case studies were considered in this research to validate the mathematical formula. This research explains three case studies of an educational institution 28 years old for explaining the concept and giving benefits of flexible design for modification/renovation work of building.Keywords: flexibility, future saving, flexibility cost, construction projects
Procedia PDF Downloads 3579397 Contagion of the Global Financial Crisis and Its Impact on Systemic Risk in the Banking System: Extreme Value Theory Analysis in Six Emerging Asia Economies
Authors: Ratna Kuswardani
Abstract:
This paper aims to study the impact of recent Global Financial Crisis (GFC) on 6 selected emerging Asian economies (Indonesia, Malaysia, Thailand, Philippines, Singapore, and South Korea). We first figure out the contagion of GFC from the US and Europe to the selected emerging Asian countries by studying the tail dependence of market stock returns between those countries. We apply the concept of Extreme Value Theory (EVT) to model the dependence between multiple returns series of variables under examination. We explore the factors causing the contagion between the regions. We find dependencies between markets that are influenced by their size, especially for large markets in emerging Asian countries that tend to have a higher dependency to the market in the more advanced country such as the U.S. and some countries in Europe. The results also suggest that the dependencies between market returns and bank stock returns in the same region tend to be higher than dependencies between these returns across two different regions. We extend our analysis by studying the impact of GFC on the systemic in the banking system. We also find that larger institution has more dependencies with the market stock, suggesting that larger size bank can cause disruption in the market. Further, the higher probability of extreme loss can be seen during the crisis period, which is shown by the non-linear dependency between the pre-crisis and the post-crisis period. Finally, our analysis suggests that systemic risk appears in the domestic banking systems in emerging Asia, as shown by the extreme dependencies within banks in the system. Overall, our results provide caution to policy makers and investors alike on the possible contagion of the impact of global financial crisis across different markets.Keywords: contagion, extreme value theory, global financial crisis, systemic risk
Procedia PDF Downloads 1519396 Stresses Induced in Saturated Asphalt Pavement by Moving Loads
Authors: Yang Zhong, Meijie Xue
Abstract:
The purpose of this paper is to investigate the stresses and excess pore fluid pressure induced by the moving wheel pressure on saturated asphalt pavements, which is one of the reasons for a damage phenomenon in flexible pavement denoted stripping. The saturated asphalt pavement is modeled as multilayered poroelastic half space exerted by a wheel pressure, which is moving at a constant velocity along the surface of the pavement. The governing equations for the proposed analysis are based on the Biot’s theory of dynamics in saturated poroelastic medium. The governing partial differential equations are solved by using Laplace and Hankel integral transforms. The solutions for the stresses and excess pore pressure are expressed in the forms of numerical inversion Laplace and Hankel integral transforms. The numerical simulation results clearly demonstrate the induced deformation and water flow in the asphalt pavement.Keywords: saturated asphalt pavements, moving loads, excess pore fluid pressure, stress of pavement, biot theory, stress and strain of pavement
Procedia PDF Downloads 2889395 Empirical Evaluation of Gradient-Based Training Algorithms for Ordinary Differential Equation Networks
Authors: Martin K. Steiger, Lukas Heisler, Hans-Georg Brachtendorf
Abstract:
Deep neural networks and their variants form the backbone of many AI applications. Based on the so-called residual networks, a continuous formulation of such models as ordinary differential equations (ODEs) has proven advantageous since different techniques may be applied that significantly increase the learning speed and enable controlled trade-offs with the resulting error at the same time. For the evaluation of such models, high-performance numerical differential equation solvers are used, which also provide the gradients required for training. However, whether classical gradient-based methods are even applicable or which one yields the best results has not been discussed yet. This paper aims to redeem this situation by providing empirical results for different applications.Keywords: deep neural networks, gradient-based learning, image processing, ordinary differential equation networks
Procedia PDF Downloads 1689394 Meta-Instruction Theory in Mathematics Education and Critique of Bloom’s Theory
Authors: Abdollah Aliesmaeili
Abstract:
The purpose of this research is to present a different perspective on the basic math teaching method called meta-instruction, which reverses the learning path. Meta-instruction is a method of teaching in which the teaching trajectory starts from brain education into learning. This research focuses on the behavior of the mind during learning. In this method, students are not instructed in mathematics, but they are educated. Another goal of the research is to "criticize Bloom's classification in the cognitive domain and reverse it", because it cannot meet the educational and instructional needs of the new generation and "substituting math education instead of math teaching". This is an indirect method of teaching. The method of research is longitudinal through four years. Statistical samples included students ages 6 to 11. The research focuses on improving the mental abilities of children to explore mathematical rules and operations by playing only with eight measurements (any years 2 examinations). The results showed that there is a significant difference between groups in remembering, understanding, and applying. Moreover, educating math is more effective than instructing in overall learning abilities.Keywords: applying, Bloom's taxonomy, brain education, mathematics teaching method, meta-instruction, remembering, starmath method, understanding
Procedia PDF Downloads 239393 Laser Shock Peening of Additively Manufactured Nickel-Based Superalloys
Authors: Michael Munther, Keivan Davami
Abstract:
One significant roadblock for additively manufactured (AM) parts is the buildup of residual tensile stresses during the fabrication process. These residual stresses are formed due to the intense localized thermal gradients and high cooling rates that cause non-uniform material expansion/contraction and mismatched strain profiles during powder-bed fusion techniques, such as direct metal laser sintering (DMLS). The residual stresses adversely affect the fatigue life of the AM parts. Moreover, if the residual stresses become higher than the material’s yield strength, they will lead to acute geometric distortion. These are limiting the applications and acceptance of AM components for safety-critical applications. Herein, we discuss laser shock peening method as an advanced technique for the manipulation of the residual stresses in AM parts. An X-ray diffraction technique is used for the measurements of the residual stresses before and after the laser shock peening process. Also, the hardness of the structures is measured using a nanoindentation technique. Maps of nanohardness and modulus are obtained from the nanoindentation, and a correlation is made between the residual stresses and the mechanical properties. The results indicate that laser shock peening is able to induce compressive residual stresses in the structure that mitigate the tensile residual stresses and increase the hardness of AM IN718, a superalloy, almost 20%. No significant changes were observed in the modulus after laser shock peening. The results strongly suggest that laser shock peening can be used as an advanced post-processing technique to optimize the service lives of critical components for various applications.Keywords: additive manufacturing, Inconel 718, laser shock peening, residual stresses
Procedia PDF Downloads 1279392 Global Mittag-Leffler Stability of Fractional-Order Bidirectional Associative Memory Neural Network with Discrete and Distributed Transmission Delays
Authors: Swati Tyagi, Syed Abbas
Abstract:
Fractional-order Hopfield neural networks are generally used to model the information processing among the interacting neurons. To show the constancy of the processed information, it is required to analyze the stability of these systems. In this work, we perform Mittag-Leffler stability for the corresponding Caputo fractional-order bidirectional associative memory (BAM) neural networks with various time-delays. We derive sufficient conditions to ensure the existence and uniqueness of the equilibrium point by using the theory of topological degree theory. By applying the fractional Lyapunov method and Mittag-Leffler functions, we derive sufficient conditions for the global Mittag-Leffler stability, which further imply the global asymptotic stability of the network equilibrium. Finally, we present two suitable examples to show the effectiveness of the obtained results.Keywords: bidirectional associative memory neural network, existence and uniqueness, fractional-order, Lyapunov function, Mittag-Leffler stability
Procedia PDF Downloads 3659391 Energy Efficiency Analysis of Crossover Technologies in Industrial Applications
Authors: W. Schellong
Abstract:
Industry accounts for one-third of global final energy demand. Crossover technologies (e.g. motors, pumps, process heat, and air conditioning) play an important role in improving energy efficiency. These technologies are used in many applications independent of the production branch. Especially electrical power is used by drives, pumps, compressors, and lightning. The paper demonstrates the algorithm of the energy analysis by some selected case studies for typical industrial processes. The energy analysis represents an essential part of energy management systems (EMS). Generally, process control system (PCS) can support EMS. They provide information about the production process, and they organize the maintenance actions. Combining these tools into an integrated process allows the development of an energy critical equipment strategy. Thus, asset and energy management can use the same common data to improve the energy efficiency.Keywords: crossover technologies, data management, energy analysis, energy efficiency, process control
Procedia PDF Downloads 2109390 Multi-Level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment
Authors: Anju Bala, Inderveer Chana
Abstract:
Task scheduling is the key concern for the execution of performance-driven workflow applications. As efficient scheduling can have major impact on the performance of the system, task scheduling is often chosen for assigning the request to resources in an efficient way based on cloud resource characteristics. In this paper, priority based task scheduling algorithm has been proposed that prioritizes the tasks based on the length of the instructions. The proposed scheduling approach prioritize the tasks of Cloud applications according to the limits set by six sigma control charts based on dynamic threshold values. Further, the proposed algorithm has been validated through the CloudSim toolkit. The experimental results demonstrate that the proposed algorithm is effective for handling multiple task lists from workflows and in considerably reducing Makespan and Execution time.Keywords: cloud computing, priority based scheduling, task scheduling, VM allocation
Procedia PDF Downloads 5189389 Coherencing a Diametrical Interests between the State, Adat Community and Private Interests in Utilising the Land for Investment in Indonesia
Authors: L. M. Hayyan ul Haq, Lalu Sabardi
Abstract:
This research is aimed at exploring an appropriate regulatory model in coherencing a diametrical interest between the state, Adat legal community, and private interests in utilising and optimizing land in Indonesia. This work is also highly relevant to coherencing the obligation of the state to respect, to fulfill and to protect the fundamental rights of people, especially to protect the communal or adat community rights to the land. In visualizing those ideas, this research will use the normative legal research to elaborate the normative problem in land use, as well as redesigning and creating an appropriate regulatory model in bridging and protecting all interest parties, especially, the state, Adat legal community, and private parties. In addition, it will also employ an empirical legal research for identifying some operational problems in protecting and optimising the land. In detail, this research will not only identify the problems at the normative level, such as conflicted norms, the absence of the norms, and the unclear norm in land law, but also the problems at operational level, such as institutional relationship in managing the land use. At the end, this work offers an appropriate regulatory model at the systems level, which covers value and norms in land use, as well as the appropriate mechanism in managing the utilization of the land for the state, Adat legal community, and private sector. By manifesting this objective, the government will not only fulfill its obligation to regulate the land for people and private, but also to protect the fundamental rights of people, as mandated by the Indonesian 1945 Constitution.Keywords: adat community rights, fundamental rights, investment, land law, private sector
Procedia PDF Downloads 5149388 Thermal Performance of Radial Heat Sinks for LED Applications
Authors: Jongchul Park, Chan Byon
Abstract:
In this study, the thermal performance of radial heat sinks for LED applications is investigated numerically and experimentally. The effect of geometrical parameters such as inner radius, fin height, fin length, and fin spacing, as well as the Elenbaas number, is considered. In addition, the effects of augmentation of concentric ring, perforation, and duct are extensively explored in order to enhance the thermal performance of conventional radial heat sink. The results indicate that the Elenbaas number and the fin radius have a significant effect on the thermal performance of the heat sink. The concentric ring affects the performance much, but the degree of affection is highly dependent on the orientation. The perforation always brings about higher thermal performance. The duct can effectively prevent the bypass of the natural convection flow, which in turn reduces the thermal resistance of the radial heat sink significantly.Keywords: heat transfer, radial heat sink, LED, Elenbaas
Procedia PDF Downloads 4059387 Scientific Development as Diffusion on a Social Network: An Empirical Case Study
Authors: Anna Keuchenius
Abstract:
Broadly speaking, scientific development is studied in either a qualitative manner with a focus on the behavior and interpretations of academics, such as the sociology of science and science studies or in a quantitative manner with a focus on the analysis of publications, such as scientometrics and bibliometrics. Both come with a different set of methodologies and few cross-references. This paper contributes to the bridging of this divide, by on the on hand approaching the process of scientific progress from a qualitative sociological angle and using on the other hand quantitative and computational techniques. As a case study, we analyze the diffusion of Granovetter's hypothesis from his 1973 paper 'On The Strength of Weak Ties.' A network is constructed of all scientists that have referenced this particular paper, with directed edges to all other researchers that are concurrently referenced with Granovetter's 1973 paper. Studying the structure and growth of this network over time, it is found that Granovetter's hypothesis is used by distinct communities of scientists, each with their own key-narrative into which the hypothesis is fit. The diffusion within the communities shares similarities with the diffusion of an innovation in which innovators, early adopters, and an early-late majority can clearly be distinguished. Furthermore, the network structure shows that each community is clustered around one or few hub scientists that are disproportionately often referenced and seem largely responsible for carrying the hypothesis into their scientific subfield. The larger implication of this case study is that the diffusion of scientific hypotheses and ideas are not the spreading of well-defined objects over a network. Rather, the diffusion is a process in which the object itself dynamically changes in concurrence with its spread. Therefore it is argued that the methodology presented in this paper has potential beyond the scientific domain, in the study of diffusion of other not well-defined objects, such as opinions, behavior, and ideas.Keywords: diffusion of innovations, network analysis, scientific development, sociology of science
Procedia PDF Downloads 3079386 SEC-MALLS Study of Hyaluronic Acid and BSA Thermal Degradation in Powder and in Solution
Authors: Vasile Simulescu, Jakub Mondek, Miloslav Pekař
Abstract:
Hyaluronic acid (HA) is an anionic glycosaminoglycan distributed throughout connective, epithelial and neural tissues. The importance of hyaluronic acid increased in the last decades. It has many applications in medicine and cosmetics. Hyaluronic acid has been used in attempts to treat osteoarthritis of the knee via injecting it into the joint. Bovine serum albumin (also known as BSA) is a protein derived from cows, which has many biochemical applications. The aim of our research work was to compare the thermal degradation of hyaluronic acid and BSA in powder and in solution, by determining changes in molar mass and conformation, by using SEC-MALLS (size exclusion chromatography -multi angle laser light scattering). The aim of our research work was to observe the degradation in powder and in solution of different molar mass hyaluronic acid samples, at different temperatures for certain periods. The degradation of the analyzed samples was mainly observed by modifications in molar mass.Keywords: thermal degradation, hyaluronic acid, BSA, SEC-MALLS
Procedia PDF Downloads 505