Search results for: network group behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18112

Search results for: network group behavior

17962 Antecedents to Leaders’ Empowering Behavior: A Study of Team Leaders and Their Subordinates

Authors: Manjari Srivastsva, Ruta Vyas

Abstract:

The research in the area of self leadership advocates employee/team empowerment. It is well understood that empowered employees would contribute more and better to their organizational outcomes. This research is a part of an ongoing larger research in the area of empowering leadership behavior. The present research aims to understand some of the antecedents to empowering behavior of leaders such that the organizations can focus on the right elements and invest in the appropriate areas during their leadership development activities. The research is exploratory field study. Sampling is purposive, employing triadic design i.e. a manager and two of his/her subordinates are selected for data collection. The total no. of respondents is 240, with 80 managers and 160 of their direct reports. Initially focus group interview was done and based on the inputs from focus group, quantitative data was collected personally by the researchers using questionnaire. The sample is drawn from seven professionally run organization including those of Indian origin as well as multi-national companies. This study proposes to explore the constituents of empowering behavior both from leaders’ and their subordinates’ perspective and also see the relationship between some of the personal variables of leaders as an antecedent to empowering behavior. Similarly, the study aims to explore the subordinates’ perspectives as an antecedent to empowering behavior. The relationship between antecedent variables and empowering behavior is tested for moderation employing organization culture. Exploratory and confirmatory factor analysis was done to establish the validity of the questionnaires. Further hierarchical regression analysis results revealed that organization based self-esteem and global self-esteem impact leaders’ empowering behavior and this relationship is further moderated by organization culture. Team members’ perspective showed higher importance for task characteristics and members' readiness from the point of view of empowerment. The relation between task characteristics and members’ readiness was not moderated by culture. The finding from this research may be utilized by professionals to guide organizations desiring rapid and sustainable growth, to develop leaders who empower their teams such that they act as leaders themselves and become stimulants for the growth of organizations.

Keywords: empowering behavior, team leaders, subordinates, self-esteem, organization culture, task characteristics, team members readiness

Procedia PDF Downloads 416
17961 Fog Computing- Network Based Computing

Authors: Navaneeth Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat

Abstract:

Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.

Keywords: cloud computing, fog computing, network devices, appstore

Procedia PDF Downloads 381
17960 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network

Authors: M. Kollar, A. Zieba

Abstract:

In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.

Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay

Procedia PDF Downloads 357
17959 Value Co-Creation Model for Relationships Management

Authors: Kolesnik Nadezda A.

Abstract:

The research aims to elaborate inter-organizational network relationships management model to maximize value co-creation. We propose a network management framework that requires evaluation of network partners with respect to their position and role in network; and elaboration of appropriate relationship development strategy with partners in network. Empirical research and approval is based on the case study method, including structured in-depth interviews with the companies from b2b market.

Keywords: inter-organizational networks, value co-creation, model, B2B market

Procedia PDF Downloads 451
17958 The Evaluation of the Safety Coefficient of Soil Slope Stability by Group Pile

Authors: Seyed Abolhassan Naeini, Hamed Yekehdehghan

Abstract:

One of the factors that affect the constructions adjacent to a slope is stability. There are various methods for the stability of the slopes, one of which is the use of concrete group piles. This study, using FLAC3D software, has tried to investigate the changes in safety coefficient because of the use of concrete group piles. In this research, furthermore, the optimal position of the piles has been investigated and the results show that the group pile does not affect the toe of the slope. In addition, the effect of the piles' burial depth on the slope has been studied. Results show that by increasing the piles burial depth on a slope, the level of stability and as a result the safety coefficient increases. In the investigation of reducing the distance between the piles and increasing the depth of underground water, it was observed that the obtained safety coefficient increased. Finally, the effect of the resistance of the lower stabilizing layer of the slope on stabilization was investigated by the pile group. The results showed that due to the behavior of the pile as a deep foundation, the stronger the soil layers are in the stable part of a stronger slope (in terms of resistance parameters), the more influential the piles are in enhancing the coefficient of safety.

Keywords: safety coefficient, group pile, slope, stability, FLAC3D software

Procedia PDF Downloads 87
17957 Convolution Neural Network Based on Hypnogram of Sleep Stages to Predict Dosages and Types of Hypnotic Drugs for Insomnia

Authors: Chi Wu, Dean Wu, Wen-Te Liu, Cheng-Yu Tsai, Shin-Mei Hsu, Yin-Tzu Lin, Ru-Yin Yang

Abstract:

Background: The results of previous studies compared the benefits and risks of receiving insomnia medication. However, the effects between hypnotic drugs used and enhancement of sleep quality were still unclear. Objective: The aim of this study is to establish a prediction model for hypnotic drugs' dosage used for insomnia subjects and associated the relationship between sleep stage ratio change and drug types. Methodologies: According to American Academy of Sleep Medicine (AASM) guideline, sleep stages were classified and transformed to hypnogram via the polysomnography (PSG) in a hospital in New Taipei City (Taiwan). The subjects with diagnosis for insomnia without receiving hypnotic drugs treatment were be set as the comparison group. Conversely, hypnotic drugs dosage within the past three months was obtained from the clinical registration for each subject. Furthermore, the collecting subjects were divided into two groups for training and testing. After training convolution neuron network (CNN) to predict types of hypnotics used and dosages are taken, the test group was used to evaluate the accuracy of classification. Results: We recruited 76 subjects in this study, who had been done PSG for transforming hypnogram from their sleep stages. The accuracy of dosages obtained from confusion matrix on the test group by CNN is 81.94%, and accuracy of hypnotic drug types used is 74.22%. Moreover, the subjects with high ratio of wake stage were correctly classified as requiring medical treatment. Conclusion: CNN with hypnogram was potentially used for adjusting the dosage of hypnotic drugs and providing subjects to pre-screening the types of hypnotic drugs taken.

Keywords: convolution neuron network, hypnotic drugs, insomnia, polysomnography

Procedia PDF Downloads 190
17956 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 365
17955 Point-of-Interest Recommender Systems for Location-Based Social Network Services

Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim

Abstract:

Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.

Keywords: location-based social network services, point-of-interest, recommender systems, business analytics

Procedia PDF Downloads 227
17954 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 416
17953 Artificial Bee Colony Based Modified Energy Efficient Predictive Routing in MANET

Authors: Akhil Dubey, Rajnesh Singh

Abstract:

In modern days there occur many rapid modifications in field of ad hoc network. These modifications create many revolutionary changes in the routing. Predictive energy efficient routing is inspired on the bee’s behavior of swarm intelligence. Predictive routing improves the efficiency of routing in the energetic point of view. The main aim of this routing is the minimum energy consumption during communication and maximized intermediate node’s remaining battery power. This routing is based on food searching behavior of bees. There are two types of bees for the exploration phase the scout bees and for the evolution phase forager bees use by this routing. This routing algorithm computes the energy consumption, fitness ratio and goodness of the path. In this paper we review the literature related with predictive routing, presenting modified routing and simulation result of this algorithm comparison with artificial bee colony based routing schemes in MANET and see the results of path fitness and probability of fitness.

Keywords: mobile ad hoc network, artificial bee colony, PEEBR, modified predictive routing

Procedia PDF Downloads 411
17952 Calling the Shots: How Others’ Mistakes May Influence Vaccine Take-up

Authors: Elizabeth Perry, Jylana Sheats

Abstract:

Scholars posit that there is an overlap between the fields of Behavioral Economics (BE) and Behavior Science (BSci)—and that consideration of concepts from both may facilitate a greater understanding of health decision-making processes. For example, the ‘intention-action gap’ is one BE concept to explain sup-optimal decision-making. It is described as having knowledge that does not translate into behavior. Complementary best BSci practices may provide insights into behavioral determinants and relevant behavior change techniques (BCT). Within the context of BSci, this exploratory study aimed to apply a BE concept with demonstrated effectiveness in financial decision-making to a health behavior: influenza (flu) vaccine uptake. Adults aged >18 years were recruited on Amazon’s Mechanical Turk, a digital labor market where anonymous users perform simple tasks at low cost. Eligible participants were randomized into 2 groups, reviewed a scenario, and then completed a survey on the likelihood of receiving a flu shot. The ‘usual care’ group’s scenario included standard CDC guidance that supported the behavior. The ‘intervention’ group’s scenario included messaging about people who did not receive the flu shot. The framing was such that participants could learn from others’ (strangers) mistakes and the subsequent health consequences: ‘Last year, other people who didn’t get the vaccine were about twice as likely to get the flu, and a number of them were hospitalized or even died. Don’t risk it.’ Descriptive statistics and chi-square analyses were performed on the sample. There were 648 participants (usual care, n=326; int., n=322). Among racial/ethnic minorities (n=169; 57% aged < 40), the intervention group was 22% more likely to report that they were ‘extremely’ or ‘moderately’ likely to get the flu vaccine (p = 0.11). While not statistically significant, findings suggest that framing messages from the perspective of learning from the mistakes of unknown others coupled with the BCT ‘knowledge about the health consequences’ may help influence flu vaccine uptake among the study population. With the widely documented disparities in vaccine uptake, exploration of the complementary application of these concepts and strategies may be critical.

Keywords: public health, decision-making, vaccination, behavioral science

Procedia PDF Downloads 34
17951 The Friendship Network Stability of Preschool Children during One Pedagogical Season

Authors: Yili Wang, Jarmo Kinos, Tuire Palonen, Tarja-Riitta Hurme

Abstract:

This longitudinal study aims to examine how five- and six-year-old children’s peer relationships are formed and fostered during one preschool year in a southwestern Finnish preschool. All 16 kindergarteners participated in the study (at dyad level N=240; i.e., 16 x 15 relationships among the children). The children were divided into four daily groups, based on the table order during the daily routines, and four intervention groups, based on the teachers’ pedagogical plan. During the intervention, one iPad was given to each group in order to stimulate interaction among peers and, thus, enable the children to form new peer relationships. In the data gathering, sociometric nomination techniques were used to investigate the nature (i.e., stability and mutuality) of the peer relationships. The data was collected five times during the year to see what kind of peer relationship changes occurred at the dyad level and the group level, i.e., in establishing and losing friendship ties among the children. Social network analyses were used to analyze the data. The results indicate that the children’s preference for gender segregation was strong compared to age preference and intervention. In all, the number of reciprocal friendship ties and the mutual absence of friendship ties increased towards the end of the year, whereas the number of unilateral friendship ties decreased. This indicates that children’s nominations narrow down; thus, the group structure becomes more crystalized. Instead of extending their friendship networks, children seek stable and mutual relationships with their peers in their middle childhood years. The intervention only had a slightly negative influence on children’s peer relationships.

Keywords: intervention study, peer relationship, preschool education, social network analysis, sociometric ratings

Procedia PDF Downloads 265
17950 The Dietary Behavior of Eating Alone in Middle-Aged Populations by Body Mass Index (BMI)

Authors: Pil Kyoo Jo, Youngmee Lee, Jee Young Kim, Yu Jin Oh, Sohyun Park, Young Ha Joo, Hye Suk Kim, Semi Kang

Abstract:

A growing number of people are living alone and eating alone. People might have different dietary behaviors between eating alone and eating with others, it can influence their weight and health. The purpose of this study was to investigate the dietary behavior of eating alone in middle-aged populations in South Korea. We used the nationally representative data from the 5th Korea National Health and Nutrition Examination Survey (KNHANES), 2010-2012 and a cross-sectional survey on the eating behaviors among adults (N=1318, 530 men, 788 women) aged from 20 to 54 years. Results showed that ‘underweight’ group ate more amount of food when eating with others compared to eating alone and ‘overweight’ and ‘obesity’ groups had opposite respondent (p<0.05). When having a meal alone, ‘underweight’ group ate food until didn’t feel hungry and ‘overweight’ and ‘obesity’ groups ate leftover food even they felt full (p<0.01). The ‘overweight’ and ‘obesity’ groups usually ate alone than ‘underweight’ group did (p<0.05). All groups had faster meal time when eating alone than eating with others and usually ate processed foods for convenience when eating alone. Younger people, aged 10-30, ate more processed food than older people did. South Koreans spend nearly 45% of their total food consumption from processed foods. This research was supported by the National Research Foundation of Korea for 2011 Korea-Japan Basic Scientific Cooperation Program (NRF-2011B00003). This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2015S1A5B6037369).

Keywords: BMI, dietary behavior, eating alone, middle-aged populations

Procedia PDF Downloads 268
17949 Web-Based Alcohol Prevention among Iranian Medical University Students: A Randomized Control Trail

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: E-interventions as a universal approach to prevent a high-risk behavior, such as alcohol drinking. This study was conducted to evaluate web-based alcohol drinking preventative intervention efficiency among medical university students in Iran. Methods: Overall, 150 freshman and sophomore male student’s college students participated in this study as intervention and control group. This was a longitudinal randomized pre- and post-test series control group design panel study to implement a behavior modification based intervention to alcohol drinking prevention among college students. Cross-tabulation, t-test, repeated measures, and GEE by using SPSS statistical package, version 21 was used for the statistical analysis. The participants were followed up for 6 months with data collection scheduled at baseline, 3 and 6 months. The primary outcomes are attitude, self-control, and sensation seeking. Furthermore, the secondary outcome is comparing alcohol drinking among the study groups. Results: It was found significant reduce in average response for an attitude towards alcohol drinking and sensation seeking among intervention group (P < 0.05). But after intervention not significant difference between intervention and control group of improve self-control and reduce alcohol drinking (P > 0.05). Conclusion: Our intervention has been accompanied with reducing alcohol use rate. These findings indicate that e-intervention may be effectiveness approach to address the alcohol prevention among college students.

Keywords: e-interventions, alcohol drinking, students, Iran

Procedia PDF Downloads 412
17948 Behavior and Obesity: The Perception of Healthcare Professionals Concerning the Role of Behavior on Obesity

Authors: Saeed Wahass

Abstract:

Objective: Obesity is epidemic, affecting all societies and cultures. Most serious medical illnesses are attributed to obesity. For this reason, all healthcare systems worldwide have focused on obesity for both intervention and prevention. However, there is scientific evidence supporting that obesity is treatable through implementing different modalities of interventions. They include biological interventions like medications and bariatric surgeries and behavioral interventions. It seems healthcare professionals may suggest the quick and the easiest interventions for obesity like surgery, ignoring other modesties that might require efforts from their sides and patients as well. Searching on the onset, progression and prevention, behavior plays a major role. As a result, psychological interventions have become increasingly core for intervention and prevention of obesity. They are effective and cost effective in dealing with obesity. Methods: A questionnaire describing the role of behavior on obesity and the way it can be prevented and treated was distributed to a group of health professionals who are dealing with obesity e.g. bariatric surgeons, bariatric physicians, psychologists, health educators, nurses and social workers. Results: 88% of healthcare professionals believed that behavior plays a major role on the onset and progression of obesity, 95% of them recognized that obesity can be prevented with consideration for behavior factors. A major proportion (87%) of the respondents see that psychological interventions are effective and cost effective in treating obesity. Conclusions: It optimistically appears that the majority of healthcare professionals believe that behavior is a key component in understanding, preventing and treating obesity. This outcome may help in developing specific training courses for healthcare professionals, who are dealing with obesity concerning the way they can treat patients behaviorally and, moreover, educating the community.

Keywords: behavior, obesity, healthcare provider, psychological interventions

Procedia PDF Downloads 487
17947 Dissocial Personality in Adolescents

Authors: Tsirekidze M., Aprasidze T.

Abstract:

Introduction: The problem of dissocial behavior is at the heart of the social sciences and psychiatry; however, it should be noted that its psychiatric aspect is little studied, and some issues of the problem are still controversial. This is complicated by the diversity of terminological concepts in defining “dissocial behavior”, “behavioral disorder”, “abnormal behavior”, “deviant behavior”, “delinquent behavior”, etc. In literature, there is no comprehensive definition of the essence of dissociative behavior. Numerous attempts to systematize dissociative disorders should also be considered unsatisfactory, which is primarily related to the lack of solid criteria for defining this group of disorders. According to the clinical classification, dissocial behavior is divided into psychotic and non-psychotic forms. Such differentiation is conditional in nature since it is not always possible to draw precise, clear distinctions between these forms, and in addition, there is a transition of a behavior disorder or so-called intermediate forms. One group of authors distinguishes two main forms of deviant behavior in terms of both theoretical and practical significance - non-pathological and pathological. In recent years, especially, the non-pathological form of behavior disorder has become topical. It refers to a large group of forms of deviant behavior, the emergence of which is associated with psychologically full-fledged reactions of children and adolescents to stressful situations and extreme conditions. According to the authors, its concept is understandable-it is difficult to draw a line between psychologically understandable reactions and psychogenically induced reactive states. In addition, the concept of "normal" child and adolescent is, to some extent, a vague concept, as in medicine, any definition of the norm. From a practical (more precisely, pragmatic) point of view, the term "abnormal behavioral disorder" undoubtedly makes sense, especially for the purpose of forensic psychiatric examination. Non-pathological deviation mainly includes transient situational reactions, microsocial-pedagogical backwardness, and character accentuation.Deviant behavior was predominantly manifested in a non-pathological form, which, in our opinion, is due to the difficult socio-economic situation of the country, moral-ethical deprivation, and expressed frustration. By itself, society is an indicator of deviation. Add to this situation complicated factors such as micro-social-pedagogical leave, unfavorable family environment, and parenting defects. Consideration is also given to the connection of acceptable deviation with the personal structural features of the adolescent. Aim: The topic of our discussion is the dissocial behavior of the non-psychotic register. Methods: We surveyed 120 adolescents with deviant behaviors. 61% of them were diagnosed with various neuropsychiatric disorders. Results: Abnormal forms of deviant behavior were observed in 13%, and non-pathological forms in -69%. A combination of non-pathological and pathological forms was present in 10% of cases. In the case of non-pathological deviation, microsocial-pedagogical acceptance was revealed in 62%, character accentuation in 22%; during the pathological forms, pathological reactions were observed in 21%, and abnormal formation of the person -21%. Conclusion: It should be emphasized that in case of any of the above defects, if the so-called family psychosis, and medical and pedagogical habilitation measures for the adolescent, it is quite possible to prevent the abnormal development of the child's personality, correct his character, regulate behavior and develop positive labor-social relations.

Keywords: dissocial personality, deviant behavior, dissocial, delinquent behavior

Procedia PDF Downloads 215
17946 Fashion Consumption for Fashion Innovators: A Study of Fashion Consumption Behavior of Innovators and Non-Innovators

Authors: Vaishali P. Joshi, Pallav Joshi

Abstract:

The objective of this study is to examine the differences fashion innovators and non-fashion innovators in their fashion consumption behavior in terms of their pre-purchase behavior, purchase behavior and post purchase behavior. The questionnaire was distributed to a female college student for data collection for achieving the objective of the first part of the study. Question-related to fashion innovativeness and fashion consumption behavior was asked. The sample was comprised of 81 college females ages 18 through 30 who were attending Business Management degree. A series of attitude questions was used to categorize respondents on the Innovativeness Scale. 32 respondents with a score of 21 and above were designated as Fashion innovators and the remainder (49) as Non-fashion innovators. Findings showed that there exist significant differences between innovators and non-innovators in their fashion consumption behavior. Data was analyzed through frequency distribution table. Many differences were found in the behavior of innovators and non-innovators in terms of their pre-purchase, actual purchase, and post-purchase behavior.

Keywords: fashion, innovativeness, consumption behavior, purchase

Procedia PDF Downloads 556
17945 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 387
17944 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 569
17943 Evaluating Portfolio Performance by Highlighting Network Property and the Sharpe Ratio in the Stock Market

Authors: Zahra Hatami, Hesham Ali, David Volkman

Abstract:

Selecting a portfolio for investing is a crucial decision for individuals and legal entities. In the last two decades, with economic globalization, a stream of financial innovations has rushed to the aid of financial institutions. The importance of selecting stocks for the portfolio is always a challenging task for investors. This study aims to create a financial network to identify optimal portfolios using network centralities metrics. This research presents a community detection technique of superior stocks that can be described as an optimal stock portfolio to be used by investors. By using the advantages of a network and its property in extracted communities, a group of stocks was selected for each of the various time periods. The performance of the optimal portfolios compared to the famous index. Their Sharpe ratio was calculated in a timely manner to evaluate their profit for making decisions. The analysis shows that the selected potential portfolio from stocks with low centrality measurement can outperform the market; however, they have a lower Sharpe ratio than stocks with high centrality scores. In other words, stocks with low centralities could outperform the S&P500 yet have a lower Sharpe ratio than high central stocks.

Keywords: portfolio management performance, network analysis, centrality measurements, Sharpe ratio

Procedia PDF Downloads 148
17942 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 450
17941 A Weighted Group EI Incorporating Role Information for More Representative Group EI Measurement

Authors: Siyu Wang, Anthony Ward

Abstract:

Emotional intelligence (EI) is a well-established personal characteristic. It has been viewed as a critical factor which can influence an individual's academic achievement, ability to work and potential to succeed. When working in a group, EI is fundamentally connected to the group members' interaction and ability to work as a team. The ability of a group member to intelligently perceive and understand own emotions (Intrapersonal EI), to intelligently perceive and understand other members' emotions (Interpersonal EI), and to intelligently perceive and understand emotions between different groups (Cross-boundary EI) can be considered as Group emotional intelligence (Group EI). In this research, a more representative Group EI measurement approach, which incorporates the information of the composition of a group and an individual’s role in that group, is proposed. To demonstrate the claim of being more representative Group EI measurement approach, this study adopts a multi-method research design, involving a combination of both qualitative and quantitative techniques to establish a metric of Group EI. From the results, it can be concluded that by introducing the weight coefficient of each group member on group work into the measurement of Group EI, Group EI will be more representative and more capable of understanding what happens during teamwork than previous approaches.

Keywords: case study, emotional intelligence, group EI, multi-method research

Procedia PDF Downloads 121
17940 A Hybrid Model of Structural Equation Modelling-Artificial Neural Networks: Prediction of Influential Factors on Eating Behaviors

Authors: Maryam Kheirollahpour, Mahmoud Danaee, Amir Faisal Merican, Asma Ahmad Shariff

Abstract:

Background: The presence of nonlinearity among the risk factors of eating behavior causes a bias in the prediction models. The accuracy of estimation of eating behaviors risk factors in the primary prevention of obesity has been established. Objective: The aim of this study was to explore the potential of a hybrid model of structural equation modeling (SEM) and Artificial Neural Networks (ANN) to predict eating behaviors. Methods: The Partial Least Square-SEM (PLS-SEM) and a hybrid model (SEM-Artificial Neural Networks (SEM-ANN)) were applied to evaluate the factors affecting eating behavior patterns among university students. 340 university students participated in this study. The PLS-SEM analysis was used to check the effect of emotional eating scale (EES), body shape concern (BSC), and body appreciation scale (BAS) on different categories of eating behavior patterns (EBP). Then, the hybrid model was conducted using multilayer perceptron (MLP) with feedforward network topology. Moreover, Levenberg-Marquardt, which is a supervised learning model, was applied as a learning method for MLP training. The Tangent/sigmoid function was used for the input layer while the linear function applied for the output layer. The coefficient of determination (R²) and mean square error (MSE) was calculated. Results: It was proved that the hybrid model was superior to PLS-SEM methods. Using hybrid model, the optimal network happened at MPLP 3-17-8, while the R² of the model was increased by 27%, while, the MSE was decreased by 9.6%. Moreover, it was found that which one of these factors have significantly affected on healthy and unhealthy eating behavior patterns. The p-value was reported to be less than 0.01 for most of the paths. Conclusion/Importance: Thus, a hybrid approach could be suggested as a significant methodological contribution from a statistical standpoint, and it can be implemented as software to be able to predict models with the highest accuracy.

Keywords: hybrid model, structural equation modeling, artificial neural networks, eating behavior patterns

Procedia PDF Downloads 148
17939 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 529
17938 Development of Sports Nation on the Way of Health Management

Authors: Beatrix Faragó, Zsolt Szakály, Ágnes Kovácsné Tóth, Csaba Konczos, Norbert Kovács, Zsófia Pápai, Tamás Kertész

Abstract:

The future of the nation is the embodiment of a healthy society. A key segment of government policy is the development of health and a health-oriented environment. As a result, sport as an activator of health is an important area for development. In Hungary, sport is a strategic sector with the aim of developing a sports nation. The function of sport in the global society is multifaceted, which is manifested in both social and economic terms. The economic importance of sport is gaining ground in the world, with implications for Central and Eastern Europe. Smaller states, such as Hungary, cannot ignore the economic effects of exploiting the effects of sport. The relationship between physical activity and health is driven by the health economy towards the nation's economic factor. In our research, we analyzed sport as a national strategy sector and its impact on age groups. By presenting the current state of health behavior, we get an idea of the directions where development opportunities require even more intervention. The foundation of the health of a nation is the young age group, whose shaping of health will shape the future generation. Our research was attended by university students from the Faculty of Health and Sports Sciences who will be experts in the field of health in the future. The other group is the elderly, who are a growing social group due to demographic change and are a key segment of the labor market and consumer society. Our study presents the health behavior of the two age groups, their differences, and similarities. The survey also identifies gaps in the development of a health management strategy that national strategies should take into account.

Keywords: competitiveness, health behavior, health economy, health management, sports nation

Procedia PDF Downloads 151
17937 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 129
17936 Changes in Behavior and Learning Ability of Rats Intoxicated with Lead

Authors: A. Goma Amira, U. E. Mahrous

Abstract:

Measuring the effect of perinatal lead exposure on learning ability of offspring is considered as a sensitive and selective index for providing an early marker for central nervous system damage produced by this toxic metal. A total of 35 Sprague-Dawley adult rats were used to investigate the effect of lead acetate toxicity on behavioral patterns of adult female rats and learning ability of offspring. Rats were allotted into 4 groups, group one received 1g/l lead acetate (n=10), group two received 1.5g/l lead acetate (n=10), group three received 2g/l lead acetate in drinking water (n=10), and control group did not receive lead acetate (n=5) from 8th day of pregnancy till weaning of pups. The obtained results revealed a dose-dependent increase in the feeding time, drinking frequency, licking frequency, scratching frequency, licking litters, nest building, and retrieving frequencies, while standing time increased significantly in rats treated with 1.5g/l lead acetate than other treated groups and control. On the contrary, lying time decreased gradually in a dose-dependent manner. Moreover, movement activities were higher in rats treated with 1g/l lead acetate than other treated groups and control. Furthermore, time spent in closed arms was significantly lower in rats given 2g/l lead acetate than other treated groups, while they spent significantly much time spent in open arms than other treated groups which could be attributed to occurrence of adaptation. Furthermore, number of entries in open arms was-dose dependent. However, the ratio between open/closed arms revealed a significant decrease in rats treated with 2g/l lead acetate than the control group.

Keywords: lead toxicity, rats, learning ability, behavior

Procedia PDF Downloads 377
17935 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 180
17934 Comparative Connectionism: Study of the Biological Constraints of Learning Through the Manipulation of Various Architectures in a Neural Network Model under the Biological Principle of the Correlation Between Structure and Function

Authors: Giselle Maggie-Fer Castañeda Lozano

Abstract:

The main objective of this research was to explore the role of neural network architectures in simulating behavioral phenomena as a potential explanation for selective associations, specifically related to biological constraints on learning. Biological constraints on learning refer to the limitations observed in conditioning procedures, where learning is expected to occur. The study involved simulations of five different experiments exploring various phenomena and sources of biological constraints in learning. These simulations included the interaction between response and reinforcer, stimulus and reinforcer, specificity of stimulus-reinforcer associations, species differences, neuroanatomical constraints, and learning in uncontrolled conditions. The overall results demonstrated that by manipulating neural network architectures, conditions can be created to model and explain diverse biological constraints frequently reported in comparative psychology literature as learning typicities. Additionally, the simulations offer predictive content worthy of experimental testing in the pursuit of new discoveries regarding the specificity of learning. The implications and limitations of these findings are discussed. Finally, it is suggested that this research could inaugurate a line of inquiry involving the use of neural networks to study biological factors in behavior, fostering the development of more ethical and precise research practices.

Keywords: comparative psychology, connectionism, conditioning, experimental analysis of behavior, neural networks

Procedia PDF Downloads 67
17933 How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions

Authors: Paula C. Ferreira, Ana Margarida Veiga Simão, Nádia Pereira, Aristides Ferreira, Alexandra Marques Pinto, Alexandra Barros, Vitor Martinho

Abstract:

Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying.

Keywords: cyberbullying, normative beliefs of perceived severity, personal moral beliefs, unpleasant emotions

Procedia PDF Downloads 211