Search results for: Bayes’ rule
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 879

Search results for: Bayes’ rule

759 Judicial Institutions in a Post-Conflict Society: Gaining Legitimacy through a Holistic Reform

Authors: Abdul Salim Amin

Abstract:

This paper focuses on how judiciaries in post-conflict society gain legitimacy through reformation. Legitimacy plays a pivotal role in shaping peoples’ behavior to submit to the law and verifies the rightfulness of an organ for taking binding decisions. Among various dynamics, judicial independence, access to justice and behavioral changes of the judicial officials broadly contribute in legitimation of judiciary in general, and the court in particular. Increasing the independence of judiciary through reform limits the interference of governmental branches in judicial issues and protects basic rights of the citizens. Judicial independence does not only matter in institutional terms, individual independence also influences the impartiality and integrity of judges, which can be increased through education and better administration of justice. Finally, access to justice as an intertwined concept both at the legal and moral spectrum of judicial reform avails justice to the citizen and increases the level of public trust and confidence. Efficient legal decisions on fostering such elements through holistic reform create a rule of law atmosphere. Citizens do not accept illegitimate judiciary and do not trust its decisions. Lack of such tolerance and confidence deters the rule of law and, thus, undermines the democratic development of a society.

Keywords: legitimacy, judicial reform, judicial independence, access to justice, legal training, informal justice, rule of law

Procedia PDF Downloads 475
758 Chinese Event Detection Technique Based on Dependency Parsing and Rule Matching

Authors: Weitao Lin

Abstract:

To quickly extract adequate information from large-scale unstructured text data, this paper studies the representation of events in Chinese scenarios and performs the regularized abstraction. It proposes a Chinese event detection technique based on dependency parsing and rule matching. The method first performs dependency parsing on the original utterance, then performs pattern matching at the word or phrase granularity based on the results of dependent syntactic analysis, filters out the utterances with prominent non-event characteristics, and obtains the final results. The experimental results show the effectiveness of the method.

Keywords: natural language processing, Chinese event detection, rules matching, dependency parsing

Procedia PDF Downloads 108
757 An Enhanced MEIT Approach for Itemset Mining Using Levelwise Pruning

Authors: Tanvi P. Patel, Warish D. Patel

Abstract:

Association rule mining forms the core of data mining and it is termed as one of the well-known methodologies of data mining. Objectives of mining is to find interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. For efficient targeted query processing, finding frequent patterns and itemset mining, there is an efficient way to generate an itemset tree structure named Memory Efficient Itemset Tree. Memory efficient IT is efficient for storing itemsets, but takes more time as compare to traditional IT. The proposed strategy generates maximal frequent itemsets from memory efficient itemset tree by using levelwise pruning. For that firstly pre-pruning of items based on minimum support count is carried out followed by itemset tree reconstruction. By having maximal frequent itemsets, less number of patterns are generated as well as tree size is also reduced as compared to MEIT. Therefore, an enhanced approach of memory efficient IT proposed here, helps to optimize main memory overhead as well as reduce processing time.

Keywords: association rule mining, itemset mining, itemset tree, meit, maximal frequent pattern

Procedia PDF Downloads 341
756 Improved FP-Growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FP-growth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy.

Keywords: association rules, FP-growth, multiple minimum supports, Weka tool

Procedia PDF Downloads 448
755 Ontology-Based Representation of Islamic Rules to Perform Salah

Authors: Hamza Zafar, Quratulain Rajput

Abstract:

Salah (نماز ) is one of five pillars of Islam and obligatory for every Muslims. However, due to the lack of Islamic knowledge it might be very difficult for a layperson to perform it correctly. This paper presents an ontology based representation of Islamic rules to perform Salah. The Salah ontology has been built under the guidance of domain expert in light of Quran and Hadith. The ontology consists of basic concepts as well as relationship among concepts and constraints on them. The basic concepts include cleanness, body cover, Salah timing and steps to perform Salah. The SWRL rule language has been used to represent rule to determine whether the Salah performed correctly or it should be repeated. Finally, we evaluate the use of the Salat ontology through user’s example queries using SPARQL queries.

Keywords: prayer, salah, ontology, SPARQL queries, reasoning

Procedia PDF Downloads 384
754 Development of a French to Yorùbá Machine Translation System

Authors: Benjamen Nathaniel, Eludiora Safiriyu Ijiyemi, Egume Oneme Lucky

Abstract:

A review on machine translation systems shows that a lot of computational artefacts has been carried out to translate written or spoken texts from a source language to Yorùbá language through Machine Translation systems. However, there are no work on French to Yorùbá language machine translation system; hence, the study investigated the process involved in the translation of French-to-Yorùbá language equivalent with the view to adopting a rule- based MT approach to build a Machine Translation framework from simple sentences administered through questionnaire. Articles and relevant textbooks were reviewed with key speakers of both languages interviewed to find out the processes involved in the translation of French language and their equivalent in Yorùbálanguage simple sentences using home domain terminologies. Achieving this, a model was formulated using phrase grammar structure, re-write rule, parse tree, automata theory- based techniques, designed and implemented respectively with unified modeling language (UML) and python programming language. Analysing the result, it was observed when carrying out the result that, the Machine Translation system performed 18.45% above Experimental Subject Respondent and 2.7% below Linguistics Expert when analysed with word orthography, sentence syntax and semantic correctness of the sentences. And, when compared with Google Machine Translation system, it was noticed that the developed system performed better on lexicons of the target language.

Keywords: machine translation (MT), rule-based, French language, Yoru`ba´ language

Procedia PDF Downloads 17
753 An Adaptive Distributed Incremental Association Rule Mining System

Authors: Adewale O. Ogunde, Olusegun Folorunso, Adesina S. Sodiya

Abstract:

Most existing Distributed Association Rule Mining (DARM) systems are still facing several challenges. One of such challenges that have not received the attention of many researchers is the inability of existing systems to adapt to constantly changing databases and mining environments. In this work, an Adaptive Incremental Mining Algorithm (AIMA) is therefore proposed to address these problems. AIMA employed multiple mobile agents for the entire mining process. AIMA was designed to adapt to changes in the distributed databases by mining only the incremental database updates and using this to update the existing rules in order to improve the overall response time of the DARM system. In AIMA, global association rules were integrated incrementally from one data site to another through Results Integration Coordinating Agents. The mining agents in AIMA were made adaptive by defining mining goals with reasoning and behavioral capabilities and protocols that enabled them to either maintain or change their goals. AIMA employed Java Agent Development Environment Extension for designing the internal agents’ architecture. Results from experiments conducted on real datasets showed that the adaptive system, AIMA performed better than the non-adaptive systems with lower communication costs and higher task completion rates.

Keywords: adaptivity, data mining, distributed association rule mining, incremental mining, mobile agents

Procedia PDF Downloads 366
752 Federalism, Dual Sovereignty, and the Supreme Court of Nigeria

Authors: Edoba Bright Omoregie

Abstract:

Nigeria became a federation in 1954 six years before it gained independence away from British colonial rule. The country has remained a federation since then despite the challenging circumstances of military rule and civil strife which have tasked its federal credentials. Since 1961, when it first decided a federalism dispute, cases over vertical and horizontal powers have inundated the country’s Supreme Court. In its current practice of federalism after democratic rule was resumed in 1999, the country has witnessed a spell of intergovernmental disputes over a good number of federalism issues. Such conflicts have eventually found their way to the Supreme Court for resolution, not as a final appellate court (which it is in other non-federal matters) but as a court of first and final instance following the constitutional provision granting the court such power. However, in April 2014 one of such disputes was denied hearing by the court when it declined original jurisdiction to determine the matter. The suit was instituted by one state of the federation against the federal government and the other 35 states challenging the collection of value added tax (a consumption tax)on certain goods and services within the state. The paper appraises the rationale of the court’s decision and reason that its decision to decline jurisdiction is the result of an avoidable misunderstanding of the dual sovereignty instituted by the federal system of Nigeria as well as a misconception of the role which the court is constitutionally assigned to play in resolving intergovernmental schisms in the federal system.

Keywords: dual sovereignty, federalism, intergovernmental conflict, Supreme Court

Procedia PDF Downloads 522
751 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 308
750 Exploring the Role of Data Mining in Crime Classification: A Systematic Literature Review

Authors: Faisal Muhibuddin, Ani Dijah Rahajoe

Abstract:

This in-depth exploration, through a systematic literature review, scrutinizes the nuanced role of data mining in the classification of criminal activities. The research focuses on investigating various methodological aspects and recent developments in leveraging data mining techniques to enhance the effectiveness and precision of crime categorization. Commencing with an exposition of the foundational concepts of crime classification and its evolutionary dynamics, this study details the paradigm shift from conventional methods towards approaches supported by data mining, addressing the challenges and complexities inherent in the modern crime landscape. Specifically, the research delves into various data mining techniques, including K-means clustering, Naïve Bayes, K-nearest neighbour, and clustering methods. A comprehensive review of the strengths and limitations of each technique provides insights into their respective contributions to improving crime classification models. The integration of diverse data sources takes centre stage in this research. A detailed analysis explores how the amalgamation of structured data (such as criminal records) and unstructured data (such as social media) can offer a holistic understanding of crime, enriching classification models with more profound insights. Furthermore, the study explores the temporal implications in crime classification, emphasizing the significance of considering temporal factors to comprehend long-term trends and seasonality. The availability of real-time data is also elucidated as a crucial element in enhancing responsiveness and accuracy in crime classification.

Keywords: data mining, classification algorithm, naïve bayes, k-means clustering, k-nearest neigbhor, crime, data analysis, sistematic literature review

Procedia PDF Downloads 26
749 Externalizing Behavior Problems Influencing Social Behavior in Early Adolescence

Authors: Zhidong Zhang, Zhi-Chao Zhang

Abstract:

This study focuses on early adolescent externalizing behavioral problems which specifically concentrate on rule breaking behavior and aggressive behavior using the instrument of Achenbach System of Empirically Based Assessment (ASEBA). The purpose was to analyze the relationships between the externalizing behavioral problems and relevant background variables such as sports activities, hobbies, chores and the number of close friends. The stratified sampling method was used to collect data from 1975 participants. The results indicated that several background variables as predictors could significantly predict rule breaking behavior and aggressive behavior. Further, a hierarchical modeling method was used to explore the causal relations among background variables, breaking behavior variables and aggressive behavior variables.

Keywords: aggressive behavior, breaking behavior, early adolescence, externalizing problem

Procedia PDF Downloads 470
748 Hybrid Artificial Bee Colony and Least Squares Method for Rule-Based Systems Learning

Authors: Ahcene Habbi, Yassine Boudouaoui

Abstract:

This paper deals with the problem of automatic rule generation for fuzzy systems design. The proposed approach is based on hybrid artificial bee colony (ABC) optimization and weighted least squares (LS) method and aims to find the structure and parameters of fuzzy systems simultaneously. More precisely, two ABC based fuzzy modeling strategies are presented and compared. The first strategy uses global optimization to learn fuzzy models, the second one hybridizes ABC and weighted least squares estimate method. The performances of the proposed ABC and ABC-LS fuzzy modeling strategies are evaluated on complex modeling problems and compared to other advanced modeling methods.

Keywords: automatic design, learning, fuzzy rules, hybrid, swarm optimization

Procedia PDF Downloads 409
747 A Segmentation Method for Grayscale Images Based on the Firefly Algorithm and the Gaussian Mixture Model

Authors: Donatella Giuliani

Abstract:

In this research, we propose an unsupervised grayscale image segmentation method based on a combination of the Firefly Algorithm and the Gaussian Mixture Model. Firstly, the Firefly Algorithm has been applied in a histogram-based research of cluster means. The Firefly Algorithm is a stochastic global optimization technique, centered on the flashing characteristics of fireflies. In this context it has been performed to determine the number of clusters and the related cluster means in a histogram-based segmentation approach. Successively these means are used in the initialization step for the parameter estimation of a Gaussian Mixture Model. The parametric probability density function of a Gaussian Mixture Model is represented as a weighted sum of Gaussian component densities, whose parameters are evaluated applying the iterative Expectation-Maximization technique. The coefficients of the linear super-position of Gaussians can be thought as prior probabilities of each component. Applying the Bayes rule, the posterior probabilities of the grayscale intensities have been evaluated, therefore their maxima are used to assign each pixel to the clusters, according to their gray-level values. The proposed approach appears fairly solid and reliable when applied even to complex grayscale images. The validation has been performed by using different standard measures, more precisely: the Root Mean Square Error (RMSE), the Structural Content (SC), the Normalized Correlation Coefficient (NK) and the Davies-Bouldin (DB) index. The achieved results have strongly confirmed the robustness of this gray scale segmentation method based on a metaheuristic algorithm. Another noteworthy advantage of this methodology is due to the use of maxima of responsibilities for the pixel assignment that implies a consistent reduction of the computational costs.

Keywords: clustering images, firefly algorithm, Gaussian mixture model, meta heuristic algorithm, image segmentation

Procedia PDF Downloads 188
746 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 376
745 Lateral Torsional Buckling of an Eccentrically Loaded Channel Section Beam

Authors: L. Dahmani, S. Drizi, M. Djemai, A. Boudjemia, M. O. Mechiche

Abstract:

Channel sections are widely used in practice as beams. However, design rules for eccentrically loaded (not through shear center) beams with channel cross- sections are not available in Eurocode 3. This paper compares the ultimate loads based on the adjusted design rules for lateral torsional buckling of eccentrically loaded channel beams in bending to the ultimate loads obtained with Finite Element (FE) simulations on the basis of a parameter study. Based on the proposed design rule, this study has led to a new design rule which conforms to Eurocode 3.

Keywords: ANSYS, Eurocode 3, finite element method, lateral torsional buckling, steel channel beam

Procedia PDF Downloads 362
744 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 376
743 A New Assessment of the Chronology of the Vouni Palace

Authors: Seren Sevim Öğmen, Ömer Özyiğit

Abstract:

Vouni Palace is a Persian palace built on a rocky hill in the Lefke district of Cyprus. The palace is one of the limited number of architectures identified, which prove the existence of a Persian period on the island. Since the excavations on the palace were held a very long time ago, there is a need to re-date the cultural layers within the palace using new archaeological evidence and recent studies. The existing chronology has been reviewed and a new chronology has been created according to its architectural structure, floor findings such as ceramics and sculptures and the stratigraphic layer of Room 59 where the Vouni Treasure was found. This work dates the palace in Vouni between the periods of c. 520 BC, deduced from the early period sculptures, and c. 330 BC by the late period floor ceramics. Some earlier dated archaic sculptures are identified in Room 122 – which takes part in the temenos area of the palace, and correspondingly the construction of the palace is dated c. 520 BC. The comparison between Vouni Palace and Persian palaces built in Iran, shows similarities with palaces built during the rule of Darius. It is evident that two main building periods of the palace which are previously identified, represent Persian influence according to its architectural structure and findings. Several floor potteries show that there must be other layer or layers after Vouni Treasure dated 390/380 BC, which was considered as the destruction date of the palace. At this point the forenamed date can indicate the end of a stage, not the end of the period because the palace was still in use until c. 330 BC. The results of the study, in addition to dating the layers of Vouni Palace, enlightens the administrative function of the Palace within the Persian rule in Cyprus.

Keywords: administrative, chronology, cyprus, persian rule, vouni palace

Procedia PDF Downloads 92
742 A Study on the Nostalgia Contents Analysis of Hometown Alumni in the Online Community

Authors: Heejin Yun, Juanjuan Zang

Abstract:

This study aims to analyze the text terms posted on an online community of people from the same hometown and to understand the topic and trend of nostalgia composed online. For this purpose, this study collected 144 writings which the natives of Yeongjong Island, Incheon, South-Korea have posted on an online community. And it analyzed association relations. As a result, online community texts means that just defining nostalgia as ‘a mind longing for hometown’ is not an enough explanation. Second, texts composed online have abstractness rather than persons’ individual stories. This study figured out the relationship that had the most critical and closest mutual association among the terms that constituted nostalgia through literature research and association rule concerning nostalgia. The result of this study has a characteristic that it summed up the core terms and emotions related to nostalgia.

Keywords: nostalgia, cultural memory, data mining, association rule

Procedia PDF Downloads 208
741 Commodity Price Shocks and Monetary Policy

Authors: Faisal Algosair

Abstract:

We examine the role of monetary policy in the presence of commodity price shocks using a Dynamic stochastic general equilibrium (DSGE) model with price and wage rigidities. The model characterizes a commodity exporter by its degree of export diversification, and explores the following monetary regimes: flexible domestic inflation targeting; flexible Consumer Price Index inflation targeting; exchange rate peg; and optimal rule. An increase in the degree of diversification is found to mitigate responses to commodity shocks. The welfare comparison suggests that a flexible exchange rate regime under the optimal rule is preferred to an exchange rate peg. However, monetary policy provides limited stabilization effects in an economy with low degree of export diversification.

Keywords: business cycle, commodity price, exchange rate, global financial cycle

Procedia PDF Downloads 63
740 Data Mining Model for Predicting the Status of HIV Patients during Drug Regimen Change

Authors: Ermias A. Tegegn, Million Meshesha

Abstract:

Human Immunodeficiency Virus and Acquired Immunodeficiency Syndrome (HIV/AIDS) is a major cause of death for most African countries. Ethiopia is one of the seriously affected countries in sub Saharan Africa. Previously in Ethiopia, having HIV/AIDS was almost equivalent to a death sentence. With the introduction of Antiretroviral Therapy (ART), HIV/AIDS has become chronic, but manageable disease. The study focused on a data mining technique to predict future living status of HIV/AIDS patients at the time of drug regimen change when the patients become toxic to the currently taking ART drug combination. The data is taken from University of Gondar Hospital ART program database. Hybrid methodology is followed to explore the application of data mining on ART program dataset. Data cleaning, handling missing values and data transformation were used for preprocessing the data. WEKA 3.7.9 data mining tools, classification algorithms, and expertise are utilized as means to address the research problem. By using four different classification algorithms, (i.e., J48 Classifier, PART rule induction, Naïve Bayes and Neural network) and by adjusting their parameters thirty-two models were built on the pre-processed University of Gondar ART program dataset. The performances of the models were evaluated using the standard metrics of accuracy, precision, recall, and F-measure. The most effective model to predict the status of HIV patients with drug regimen substitution is pruned J48 decision tree with a classification accuracy of 98.01%. This study extracts interesting attributes such as Ever taking Cotrim, Ever taking TbRx, CD4 count, Age, Weight, and Gender so as to predict the status of drug regimen substitution. The outcome of this study can be used as an assistant tool for the clinician to help them make more appropriate drug regimen substitution. Future research directions are forwarded to come up with an applicable system in the area of the study.

Keywords: HIV drug regimen, data mining, hybrid methodology, predictive model

Procedia PDF Downloads 110
739 An Ontology for Investment in Chinese Steel Company

Authors: Liming Chen, Baoxin Xu, Zhaoyun Ding, Bin Liu, Xianqiang Zhu

Abstract:

In the era of big data, public investors are faced with more complicated information related to investment decisions than ever before. To survive in the fierce competition, it has become increasingly urgent for investors to combine multi-source knowledge and evaluate the companies’ true value efficiently. For this, a rule-based ontology reasoning method is proposed to support steel companies’ value assessment. Considering the delay in financial disclosure and based on cost-benefit analysis, this paper introduces the supply chain enterprises financial analysis and constructs the ontology model used to value the value of steel company. In addition, domain knowledge is formally expressed with the help of Web Ontology Language (OWL) language and SWRL (Semantic Web Rule Language) rules. Finally, a case study on a steel company in China proved the effectiveness of the method we proposed.

Keywords: financial ontology, steel company, supply chain, ontology reasoning

Procedia PDF Downloads 99
738 Confessors in Im Sun-dŭk’s Short Stories: Interiority of Korean Women under the End of Japanese Colonial Rule

Authors: Min Koo Choi

Abstract:

The paper will examine Im Sun-dŭk’s two short stories, 'Iryoil' (Sunday, 1937) and 'Nazuoya' (A Godmother, 1942), which illuminate the subjects of Korean intellectuals going through the later period of a harsh and oppressive Japanese colonial rule. When Japan went to war against China in 1937, Korea, a colony of Japan since 1910, became an outpost for Japanese expansionism into China, and the Korean people were mobilized into the war effort. Nationalist movements and radical ideas that posed a threat and opposition to Japanese colonial rule in Korea and its colonial expansionism were ruthlessly suppressed, and Koreans were forcibly assimilated into becoming Japanese citizens without political rights. Racial discrimination between Koreans and Japanese was prevalent. Im Sun-dŭk, who participated in the Socialist movement in the 1930s, had his debut as a literary writer and a critic in the late 1930s, when Korean literary society was reincorporated in order to collaborate with the Japanese war effort through writing and public speech. Sun-duk's writing illuminates the unique internal landscape of a female subject who strives to live on while preserving her commitment and dignity under the circumstances that force Korean intellectuals either to collaborate with or acquiesce to Japanese colonial rule. 'Iryoil' (Sunday, 1937) foregrounds an educated intellectual, Hyeyŏng, who supplies her fiancé in prison for political involvement in resistance against Japan. On Sundays, she turns down her friends’ suggestion for enjoying holidays outside, due to her indebtedness to her fiancé. Her fiancé's imprisonment indicates the social conscience that still remains, and she seeks to share the commitment and suffering with her fiancé. The short story 'Nazuoya' (A Godmother, 1942), written in Japanese due to the suppression of Korean language publications at the time, also problematizes Japanese policy that forces Koreans to change their names into Japanese. Through the narrator I, who struggles to find a meaningful name for her cousin brother’s baby, she highlights how meaningful one’s name is for one’s life and identity. What makes her two stories unique is that her writing draws other people’s confessions into its own narrative through fragmentary forms, such as part of letter or reflection. The voices of others are intersected with the main character in 'Iryoil' (Sunday, 1937) and a narrator in 'Nazuoya' (A Godmother, 1942). In many ways, the narrator and main character provide the confessional voices who display the characters' gloomy interiorities. Even though these confessional voices do not share the commitment and values, both the main character and I in the stories reveal a more open set of viewpoints to them. In this way, they seek to form bonds and encouragement and acquire a more resilient sensibility that embraces those who strive to survive and endure in the gloomy days of the later period of Japanese colonial rule.

Keywords: Im Sun-dŭk, Japanese colonial rule, Korean literature, socialist movement

Procedia PDF Downloads 242
737 A Hybrid Approach for Thread Recommendation in MOOC Forums

Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard

Abstract:

Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.

Keywords: association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis

Procedia PDF Downloads 262
736 A Comparative Analysis of Classification Models with Wrapper-Based Feature Selection for Predicting Student Academic Performance

Authors: Abdullah Al Farwan, Ya Zhang

Abstract:

In today’s educational arena, it is critical to understand educational data and be able to evaluate important aspects, particularly data on student achievement. Educational Data Mining (EDM) is a research area that focusing on uncovering patterns and information in data from educational institutions. Teachers, if they are able to predict their students' class performance, can use this information to improve their teaching abilities. It has evolved into valuable knowledge that can be used for a wide range of objectives; for example, a strategic plan can be used to generate high-quality education. Based on previous data, this paper recommends employing data mining techniques to forecast students' final grades. In this study, five data mining methods, Decision Tree, JRip, Naive Bayes, Multi-layer Perceptron, and Random Forest with wrapper feature selection, were used on two datasets relating to Portuguese language and mathematics classes lessons. The results showed the effectiveness of using data mining learning methodologies in predicting student academic success. The classification accuracy achieved with selected algorithms lies in the range of 80-94%. Among all the selected classification algorithms, the lowest accuracy is achieved by the Multi-layer Perceptron algorithm, which is close to 70.45%, and the highest accuracy is achieved by the Random Forest algorithm, which is close to 94.10%. This proposed work can assist educational administrators to identify poor performing students at an early stage and perhaps implement motivational interventions to improve their academic success and prevent educational dropout.

Keywords: classification algorithms, decision tree, feature selection, multi-layer perceptron, Naïve Bayes, random forest, students’ academic performance

Procedia PDF Downloads 131
735 Land Use Change Modeling Using Cellular Automata, Case Study: Karawang City, West Java Province, Indonesia

Authors: Bagus Indrawan Hardi

Abstract:

Cellular Automata are widely used in land use modeling, it has been proven powerful to simulate land use change for small scale in many large cities in the world. In this paper, we try to implement CA for land use modeling in unique city in Indonesia, Karawang. Instead the complex numerical implementation, CA are simple, and it is accurate and also highly dependable on the on the rules (rule based). The most important to do in CA is how we form and calculate the neighborhood effect. The neighborhood effect represents the environment and relationship situation between the occupied cell and others. We adopted 196 cells of circular neighborhood with 8 cells of radius. For the results, CA works well in this study, we exhibit several analyzed and proceed of zoomed part in Karawang region. The rule set can handle the complexity in land use modeling. However, we cannot strictly believe of the result, many non-technical parameters, such as politics, natural disaster activities, etc. may change the results dramatically.

Keywords: cellular automata (CA), land use change, spatial dynamics, urban sprawl

Procedia PDF Downloads 213
734 The Effect of Explicit Focus on Form on Second Language Learning Writing Performance

Authors: Keivan Seyyedi, Leila Esmaeilpour, Seyed Jamal Sadeghi

Abstract:

Investigating the effectiveness of explicit focus on form on the written performance of the EFL learners was the aim of this study. To provide empirical support for this study, sixty male English learners were selected and randomly assigned into two groups of explicit focus on form and meaning focused. Narrative writing was employed for data collection. To measure writing performance, participants were required to narrate a story. They were given 20 minutes to finish the task and were asked to write at least 150 words. The participants’ output was coded then analyzed utilizing Independent t-test for grammatical accuracy and fluency of learners’ performance. Results indicated that learners in explicit focus on form group appear to benefit from error correction and rule explanation as two pedagogical techniques of explicit focus on form with respect to accuracy, but regarding fluency they did not yield any significant differences compared to the participants of meaning-focused group.

Keywords: explicit focus on form, rule explanation, accuracy, fluency

Procedia PDF Downloads 478
733 Efficient Recommendation System for Frequent and High Utility Itemsets over Incremental Datasets

Authors: J. K. Kavitha, D. Manjula, U. Kanimozhi

Abstract:

Mining frequent and high utility item sets have gained much significance in the recent years. When the data arrives sporadically, incremental and interactive rule mining and utility mining approaches can be adopted to handle user’s dynamic environmental needs and avoid redundancies, using previous data structures, and mining results. The dependence on recommendation systems has exponentially risen since the advent of search engines. This paper proposes a model for building a recommendation system that suggests frequent and high utility item sets over dynamic datasets for a cluster based location prediction strategy to predict user’s trajectories using the Efficient Incremental Rule Mining (EIRM) algorithm and the Fast Update Utility Pattern Tree (FUUP) algorithm. Through comprehensive evaluations by experiments, this scheme has shown to deliver excellent performance.

Keywords: data sets, recommendation system, utility item sets, frequent item sets mining

Procedia PDF Downloads 271
732 FCNN-MR: A Parallel Instance Selection Method Based on Fast Condensed Nearest Neighbor Rule

Authors: Lu Si, Jie Yu, Shasha Li, Jun Ma, Lei Luo, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Instance selection (IS) technique is used to reduce the data size to improve the performance of data mining methods. Recently, to process very large data set, several proposed methods divide the training set into some disjoint subsets and apply IS algorithms independently to each subset. In this paper, we analyze the limitation of these methods and give our viewpoint about how to divide and conquer in IS procedure. Then, based on fast condensed nearest neighbor (FCNN) rule, we propose a large data sets instance selection method with MapReduce framework. Besides ensuring the prediction accuracy and reduction rate, it has two desirable properties: First, it reduces the work load in the aggregation node; Second and most important, it produces the same result with the sequential version, which other parallel methods cannot achieve. We evaluate the performance of FCNN-MR on one small data set and two large data sets. The experimental results show that it is effective and practical.

Keywords: instance selection, data reduction, MapReduce, kNN

Procedia PDF Downloads 231
731 Subspace Rotation Algorithm for Implementing Restricted Hopfield Network as an Auto-Associative Memory

Authors: Ci Lin, Tet Yeap, Iluju Kiringa

Abstract:

This paper introduces the subspace rotation algorithm (SRA) to train the Restricted Hopfield Network (RHN) as an auto-associative memory. Subspace rotation algorithm is a gradient-free subspace tracking approach based on the singular value decomposition (SVD). In comparison with Backpropagation Through Time (BPTT) on training RHN, it is observed that SRA could always converge to the optimal solution and BPTT could not achieve the same performance when the model becomes complex, and the number of patterns is large. The AUTS case study showed that the RHN model trained by SRA could achieve a better structure of attraction basin with larger radius(in general) than the Hopfield Network(HNN) model trained by Hebbian learning rule. Through learning 10000 patterns from MNIST dataset with RHN models with different number of hidden nodes, it is observed that an several components could be adjusted to achieve a balance between recovery accuracy and noise resistance.

Keywords: hopfield neural network, restricted hopfield network, subspace rotation algorithm, hebbian learning rule

Procedia PDF Downloads 88
730 Improving the Performance of Proton Exchange Membrane Using Fuzzy Logic

Authors: Sadık Ata, Kevser Dincer

Abstract:

In this study, the performance of proton exchange membrane (PEM) fuel cell was experimentally investigated and modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Coating on the anode side of the PEM fuel cell was accomplished with the spin method by using Yttria-stabilized zirconia (YSZ). Input-output parameters were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6),High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between experimental data and RBMTF is done by using statistical methods like absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of performance PEM fuel cell.

Keywords: proton exchange membrane (PEM), fuel cell, rule-based mamdani-type fuzzy (RMBTF) modelling, Yttria-stabilized zirconia (YSZ)

Procedia PDF Downloads 204