Search results for: equivalent transformation algorithms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4312

Search results for: equivalent transformation algorithms

4252 Algorithms of ABS-Plastic Extrusion

Authors: Dmitrii Starikov, Evgeny Rybakov, Denis Zhuravlev

Abstract:

Plastic for 3D printing is very necessary material part for printers. But plastic production is technological process, which implies application of different control algorithms. Possible algorithms of providing set diameter of plastic fiber are proposed and described in the article. Results of research were proved by existing unit of filament production.

Keywords: ABS-plastic, automation, control system, extruder, filament, PID-algorithm

Procedia PDF Downloads 379
4251 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 483
4250 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 534
4249 A Conceptual Approach for Evaluating the Urban Renewal Process

Authors: Muge Unal, Ahmet Cilek

Abstract:

Urban identity, having a dynamic characteristic spatial and semantic aspects, is a phenomenon in an ever-changing. Urban identity formation includes not only a process of physical nature but also development and change processes that take place in the political, economic, social and cultural values, whether national and international level. Although the concept of urban transformation is basically regarded as the spatial transformation; in fact, it reveals a holistic perspective and transformation based on dialectical relationship existing between the spatial and social relationship. For this reason, urban renewal needs to address as not only spatial but also the impact of spatial transformation on social, cultural and economic. Implementation tools used in the perception of urban transformation are varied concepts such as urban renewal, urban resettlement, urban rehabilitation, urban redevelopment, and urban revitalization. The phenomenon of urban transformation begins with the Industrial Revolution. Until the 1980s, it was interpreted as reconsidering physical fossil on urban environment factor like occurring in rapid urbanization, changing in the spatial structure of the city, concentrating of the population in urban areas. However, after the 1980s, it has resided in a conceptual structure which requires to be addressed physical, economic, social, technological and integrity of information. In conclusion, urban transformation, when it enter the literature as a practice of planning, has been up to date in terms of the conceptual structure and content and also hasn’t remained behind converting itself. Urban transformation still maintains its simplest expression, while it transforms so fast converts the contents. In this study, the relationship between urban design and components of urban transformation were discussed with strategies used as a place in the historical process of urban transformation besides a general evaluation of the concept of urban renewal.

Keywords: conceptual approach, urban identity, urban regeneration, urban renewal

Procedia PDF Downloads 396
4248 Managing Business Processes in the Age of Digital Transformation: A Literature Review

Authors: Ana-Marija Stjepić, Dalia Suša Vugec

Abstract:

Today, digital transformation is one of the leading topics that occupy the attention of scientific circles and business experts. Organizational success is most often reflected through the successful managing of business processes. Given the growing market for digital innovations and its ever-increasing impact on business, organizations need to be prepared for organizational changes that come with the digital era. In order to maintain their competitive advantage in the global market, organizations must adapt their processes to new digitalization conditions. The main goal of this study is to point out the link between the digital transformation and the business process management concept. Therefore, in order to contribute to the scientific field that explores the potential relation between business process management concept and digital transformation, a literature review has been conducted. Papers have been searched within the Business Process Management Journal by keywords related to the term digital transformation. Selected papers have been analyzed according to the topic, type of publication, year of publication, keywords, etc. The results reveal a growing number of papers published on the topic of digital transformation to the Business Process Management Journal, but the lack of case studies. This paper contributes to the extension of academic literature in this important, yet insufficiently researched, scientific field that creates the bond between two strong concepts of digital transformation and business process management.

Keywords: business process management, digital transformation, digitalization, process change

Procedia PDF Downloads 145
4247 Angular-Coordinate Driven Radial Tree Drawing

Authors: Farshad Ghassemi Toosi, Nikola S. Nikolov

Abstract:

We present a visualization technique for radial drawing of trees consisting of two slightly different algorithms. Both of them make use of node-link diagrams for visual encoding. This visualization creates clear drawings without edge crossing. One of the algorithms is suitable for real-time visualization of large trees, as it requires minimal recalculation of the layout if leaves are inserted or removed from the tree; while the other algorithm makes better utilization of the drawing space. The algorithms are very similar and follow almost the same procedure but with different parameters. Both algorithms assign angular coordinates for all nodes which are then converted into 2D Cartesian coordinates for visualization. We present both algorithms and discuss how they compare to each other.

Keywords: Radial drawing, Visualization, Algorithm, Use of node-link diagrams

Procedia PDF Downloads 306
4246 The Contemporary of the Institutional Transformation Policy in Indonesia's Islamic Higher Education Institutions: Reconsidering the Quality and Future Direction

Authors: Fauzanah Fauzan El Muhammady

Abstract:

In the recent years, the Indonesian government has made tremendous efforts to improve the quality of Indonesia’s Islamic Higher Education Institutions (IHEIs) through the implementation of the institutional transformation policy. This policy has encouraged some IHEIs, such as Islamic Collages and Islamic Institutes to shift their institution from college to Institute or from Institute to university. As one of the requirements, the IHEIs should provide non-religious curriculum and integrate it with the religious curriculum (as the core curriculum of IHEIs). As results, since the 2000s, some Islamic Collages and Islamic Institutes have successfully developed the non-religious curriculum and achieved institutional transformation. However, after 15 years, the impact of the institutional transformation to the IHEIs is still debatable. The institutional transformation policy can be questioned as to whether the goal of status transformation has truly brought significant improvement to the quality of IHEIs. Therefore, based on the situation above, this study aims to explore how far the institutional transformation has effectively brought significant impact to the quality improvement of IHEIs. This study has used literature review method to investigate the current development of the institutional transformation in Indonesia’s IHEIs context. This is a part of literature review development to support the process of doctoral research. Based on the literature review, some studies found that the institutional transformation has led pro and cons to the academic community, society, and local government. Some agreed the institutional transformation has effectively facilitated non-religious curriculum development and it has significantly improved the number of prospective students and the student admitted at Islamic Universities. Meanwhile, others argue the development of non-religious curriculum will gradually eliminate the existence of the religious curriculum itself. On the other hand, the government suggests that the institutional transformation should be based on the quality standards. As a result, recently, the government has taken an initiative to restrict the institutional transformation (moratorium) in order to ensure the quality control of the institutional transformation application and to control the increasing number of the institutional transformation demands. This study provided the current issues that related to the contemporary of the institutional transformation in IHEIs context to disclosure how far both IHEIs and government overcome the quality issues of the institutional transformation development. The study results are expected can be used to advocate government, policymakers, and academic leaders in 1) reviewing the sustainability impact of the institutional transformation to the quality improvement of higher education institutions; 2) and finding effective solutions for the continuity of the institutional transformation in the future, particularly in the IHEIs context.

Keywords: curriculum, higher education, institutional transformation, quality

Procedia PDF Downloads 151
4245 Implementation of Distributed Randomized Algorithms for Resilient Peer-to-Peer Networks

Authors: Richard Tanaka, Ying Zhu

Abstract:

This paper studies a few randomized algorithms in application-layer peer-to-peer networks. The significant gain in scalability and resilience that peer-to-peer networks provide has made them widely used and adopted in many real-world distributed systems and applications. The unique properties of peer-to-peer networks make them particularly suitable for randomized algorithms such as random walks and gossip algorithms. Instead of simulations of peer-to-peer networks, we leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and these distributed randomized algorithms running on top of them. We can thus analyze their behaviour and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations.

Keywords: distributed randomized algorithms, peer-to-peer networks, virtual container technology, resilient networks

Procedia PDF Downloads 177
4244 Designing the Maturity Model of Smart Digital Transformation through the Foundation Data Method

Authors: Mohammad Reza Fazeli

Abstract:

Nowadays, the fourth industry, known as the digital transformation of industries, is seen as one of the top subjects in the history of structural revolution, which has led to the high-tech and tactical dominance of the organization. In the face of these profits, the undefined and non-transparent nature of the after-effects of investing in digital transformation has hindered many organizations from attempting this area of this industry. One of the important frameworks in the field of understanding digital transformation in all organizations is the maturity model of digital transformation. This model includes two main parts of digital transformation maturity dimensions and digital transformation maturity stages. Mediating factors of digital maturity and organizational performance at the individual (e.g., motivations, attitudes) and at the organizational level (e.g., organizational culture) should be considered. For successful technology adoption processes, organizational development and human resources must go hand in hand and be supported by a sound communication strategy. Maturity models are developed to help organizations by providing broad guidance and a roadmap for improvement. However, as a result of a systematic review of the literature and its analysis, it was observed that none of the 18 maturity models in the field of digital transformation fully meet all the criteria of appropriateness, completeness, clarity, and objectivity. A maturity assessment framework potentially helps systematize assessment processes that create opportunities for change in processes and organizations enabled by digital initiatives and long-term improvements at the project portfolio level. Cultural characteristics reflecting digital culture are not systematically integrated, and specific digital maturity models for the service sector are less clearly presented. It is also clearly evident that research on the maturity of digital transformation as a holistic concept is scarce and needs more attention in future research.

Keywords: digital transformation, organizational performance, maturity models, maturity assessment

Procedia PDF Downloads 61
4243 The Nature of Mineralizing Fluids in the Hammam Zriba Deposit (F-Ba-Sr-Pb-Zn) in North-eastern Tunisia

Authors: Miladi Yasmine, Bouhlel Salah, David Banks

Abstract:

The Hammam Zriba (F-Ba-Sr-Pb-Zn) ore deposits of the Zaghouan district are located in northeast Tunisia, 60 Km south of Tunis. The host rocks belong to the Ressas Formation (Tithonian age) and lower Cretaceous layers. Mineralization occurs as stratiform replacement heaps and lenses. The mineral assemblage is composed of fluorite, barite, sphalerite, and galena. Primary fluid inclusions in sphalerite have homogenization temperatures ranging from 83 to 140°C, final melting temperature range from −18 to −7.0, corresponding to salinities of 5 to 21 wt % NaCl equivalent. Fluid inclusions in fluorite homogenize to the liquid phase between 132 and 178°C. Final ice melting temperatures range from −25 to −6.8 °C, corresponding to salinities between 17 and 24 wt% NaCl Equivalent. The LA-ICP-MS analyses of the fluid inclusions in fluorite show that these fluids are dominated by Na>Ca>K>Mg, with the concentration of Fe being equivalent to that of Mg. Microthermometric analyses of the fluid inclusions observed in fluorite and sphalerite show that two distinct fluids were involved in the mineralization deposition: a warmer saline fluid (132-178°C, 17-24 wt % NaCl equivalent) and cooler saline fluid (83°C-140, 5-21 wt %NaCl equivalent). The ore fluid result from highly saline and Na-Ca dominated with lower Mg concentrations come from the leaching of the dolomitic host rocks by the fluids.

Keywords: Hammam Zriba , fluid inclusions, LA-ICP-MS, Zaghouan district

Procedia PDF Downloads 62
4242 Improved Particle Swarm Optimization with Cellular Automata and Fuzzy Cellular Automata

Authors: Ramin Javadzadeh

Abstract:

The particle swarm optimization are Meta heuristic optimization method, which are used for clustering and pattern recognition applications are abundantly. These algorithms in multimodal optimization problems are more efficient than genetic algorithms. A major drawback in these algorithms is their slow convergence to global optimum and their weak stability can be considered in various running of these algorithms. In this paper, improved Particle swarm optimization is introduced for the first time to overcome its problems. The fuzzy cellular automata is used for improving the algorithm efficiently. The credibility of the proposed approach is evaluated by simulations, and it is shown that the proposed approach achieves better results can be achieved compared to the Particle swarm optimization algorithms.

Keywords: cellular automata, cellular learning automata, local search, optimization, particle swarm optimization

Procedia PDF Downloads 572
4241 Austenite Transformation in Duplex Stainless Steels under Fast Cooling Rates

Authors: L. O. Luengas, E. V. Morales, L. F. G. De Souza, I. S. Bott

Abstract:

Duplex Stainless Steels are well known for its good mechanical properties, and corrosion resistance. However, when submitted to heating, these features can be lost since the good properties are strongly dependent on the austenite-ferrite phase ratio which has to be approximately 1:1 to keep the phase balance. In a welded joint, the transformation kinetics at the heat affected zone (HAZ) is a function of the cooling rates applied which in turn are dependent on the heat input. The HAZ is usually ferritized at these temperatures, and it has been argued that small variations of the chemical composition can play a role in the solid state transformation sequence of ferrite to austenite during cooling. The δ → γ transformation has been reported to be massive and diffusionless due to the fast cooling rate, but it is also considered a diffusion controlled transformation. The aim of this work is to evaluate the effect of different heat inputs on the HAZ of two duplex stainless steels UNS S32304 and S32750, obtained by physical simulation.

Keywords: duplex stainless steels, HAZ, microstructural characterization, physical simulation

Procedia PDF Downloads 254
4240 Multishape Task Scheduling Algorithms for Real Time Micro-Controller Based Application

Authors: Ankur Jain, W. Wilfred Godfrey

Abstract:

Embedded systems are usually microcontroller-based systems that represent a class of reliable and dependable dedicated computer systems designed for specific purposes. Micro-controllers are used in most electronic devices in an endless variety of ways. Some micro-controller-based embedded systems are required to respond to external events in the shortest possible time and such systems are known as real-time embedded systems. So in multitasking system there is a need of task Scheduling,there are various scheduling algorithms like Fixed priority Scheduling(FPS),Earliest deadline first(EDF), Rate Monotonic(RM), Deadline Monotonic(DM),etc have been researched. In this Report various conventional algorithms have been reviewed and analyzed, these algorithms consists of single shape task, A new Multishape scheduling algorithms has been proposed and implemented and analyzed.

Keywords: dm, edf, embedded systems, fixed priority, microcontroller, rtos, rm, scheduling algorithms

Procedia PDF Downloads 372
4239 Research on the Efficiency and Driving Elements of Manufacturing Transformation and Upgrading in the Context of Digitization

Authors: Chen Zhang; Qiang Wang

Abstract:

With the rapid development of the new generation of digital technology, various industries have created more and more value by using digital technology, accelerating the digital transformation of various industries. The economic form of human society has evolved with the progress of technology, and in this context, the power conversion, transformation and upgrading of the manufacturing industry in terms of quality, efficiency and energy change has become a top priority. Based on the digitalization background, this paper analyzes the transformation and upgrading efficiency of the manufacturing industry and evaluates the impact of the driving factors, which have very important theoretical and practical significance. This paper utilizes qualitative research methods, entropy methods, data envelopment analysis methods and econometric models to explore the transformation and upgrading efficiency of manufacturing enterprises and driving factors. The study shows that the transformation and upgrading efficiency of the manufacturing industry shows a steady increase, and regions rich in natural resources and social resources provide certain resources for transformation and upgrading. The ability of scientific and technological innovation has been improved, but there is still much room for progress in the transformation of scientific and technological innovation achievements. Most manufacturing industries pay more attention to green manufacturing and sustainable development. In addition, based on the existing problems, this paper puts forward suggestions for improving infrastructure construction, developing the technological innovation capacity of enterprises, green production and sustainable development.

Keywords: digitization, manufacturing firms, transformation and upgrading, efficiency, driving factors

Procedia PDF Downloads 39
4238 Generalized Approach to Linear Data Transformation

Authors: Abhijith Asok

Abstract:

This paper presents a generalized approach for the simple linear data transformation, Y=bX, through an integration of multidimensional coordinate geometry, vector space theory and polygonal geometry. The scaling is performed by adding an additional ’Dummy Dimension’ to the n-dimensional data, which helps plot two dimensional component-wise straight lines on pairs of dimensions. The end result is a set of scaled extensions of observations in any of the 2n spatial divisions, where n is the total number of applicable dimensions/dataset variables, created by shifting the n-dimensional plane along the ’Dummy Axis’. The derived scaling factor was found to be dependent on the coordinates of the common point of origin for diverging straight lines and the plane of extension, chosen on and perpendicular to the ’Dummy Axis’, respectively. This result indicates the geometrical interpretation of a linear data transformation and hence, opportunities for a more informed choice of the factor ’b’, based on a better choice of these coordinate values. The paper follows on to identify the effect of this transformation on certain popular distance metrics, wherein for many, the distance metric retained the same scaling factor as that of the features.

Keywords: data transformation, dummy dimension, linear transformation, scaling

Procedia PDF Downloads 279
4237 The Transformation of Beauty and Ugliness in Art Aesthetics

Authors: Wenjin Li, Jing Sun

Abstract:

Since the mid-eighteenth century, when philosophers began to talk about aesthetic consciousness, beauty gradually became an independent system, and ugliness was often considered the opposite of beauty and neglected. Yet, ugliness itself has its self-regulation and aesthetic value. This paper explores the relationship between beauty and ugliness and the three forms of transformation between beauty and ugliness in artworks, looking at the history of ugliness in the East and the West, and giving an insight into the role of the artist in the transformation between beauty and ugliness.

Keywords: artistic aesthetics, arts theory, aesthetic of the ugly, beauty and ugliness, arts of east and west

Procedia PDF Downloads 57
4236 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 281
4235 Task Scheduling on Parallel System Using Genetic Algorithm

Authors: Jasbir Singh Gill, Baljit Singh

Abstract:

Scheduling and mapping the application task graph on multiprocessor parallel systems is considered as the most crucial and critical NP-complete problem. Many genetic algorithms have been proposed to solve such problems. In this paper, two genetic approach based algorithms have been designed and developed with or without task duplication. The proposed algorithms work on two fitness functions. The first fitness i.e. task fitness is used to minimize the total finish time of the schedule (schedule length) while the second fitness function i.e. process fitness is concerned with allocating the tasks to the available highly efficient processor from the list of available processors (load balance). Proposed genetic-based algorithms have been experimentally implemented and evaluated with other state-of-art popular and widely used algorithms.

Keywords: parallel computing, task scheduling, task duplication, genetic algorithm

Procedia PDF Downloads 313
4234 Simulation of Propagation of Cos-Gaussian Beam in Strongly Nonlocal Nonlinear Media Using Paraxial Group Transformation

Authors: A. Keshavarz, Z. Roosta

Abstract:

In this paper, propagation of cos-Gaussian beam in strongly nonlocal nonlinear media has been stimulated by using paraxial group transformation. At first, cos-Gaussian beam, nonlocal nonlinear media, critical power, transfer matrix, and paraxial group transformation are introduced. Then, the propagation of the cos-Gaussian beam in strongly nonlocal nonlinear media is simulated. Results show that beam propagation has periodic structure during self-focusing effect in this case. However, this simple method can be used for investigation of propagation of kinds of beams in ABCD optical media.

Keywords: paraxial group transformation, nonlocal nonlinear media, cos-Gaussian beam, ABCD law

Procedia PDF Downloads 307
4233 Deriving Generic Transformation Matrices for Multi-Axis Milling Machine

Authors: Alan C. Lin, Tzu-Kuan Lin, Tsong Der Lin

Abstract:

This paper proposes a new method to find the equations of transformation matrix for the rotation angles of the two rotational axes and the coordinates of the three linear axes of an orthogonal multi-axis milling machine. This approach provides intuitive physical meanings for rotation angles of multi-axis machines, which can be used to evaluate the accuracy of the conversion from CL data to NC data.

Keywords: CAM, multi-axis milling machining, transformation matrix, rotation angles

Procedia PDF Downloads 453
4232 Equivalent Electrical Model of a Shielded Pulse Planar Transformer in Isolated Gate Drivers for SiC MOSFETs

Authors: Loreine Makki, Marc Anthony Mannah, Christophe Batard, Nicolas Ginot, Julien Weckbrodt

Abstract:

Planar transformers are extensively utilized in high-frequency, high power density power electronic converters. The breakthrough of wide-bandgap technology compelled power electronic system miniaturization while inducing pivotal effects on system modeling and manufacturing within the power electronics industry. A significant consideration to simulate and model the unanticipated parasitic parameters emerges with the requirement to mitigate electromagnetic disturbances. This paper will present an equivalent circuit model of a shielded pulse planar transformer quantifying leakage inductance and resistance in addition to the interwinding capacitance of the primary and secondary windings. ANSYS Q3D Extractor was utilized to model and simulate the transformer, intending to study the immunity of the simulated equivalent model to high dv/dt occurrences. A convenient correlation between simulation and experimental results is presented.

Keywords: Planar transformers, wide-band gap, equivalent circuit model, shielded, ANSYS Q3D Extractor, dv/dt

Procedia PDF Downloads 181
4231 A Pipeline for Detecting Copy Number Variation from Whole Exome Sequencing Using Comprehensive Tools

Authors: Cheng-Yang Lee, Petrus Tang, Tzu-Hao Chang

Abstract:

Copy number variations (CNVs) have played an important role in many kinds of human diseases, such as Autism, Schizophrenia and a number of cancers. Many diseases are found in genome coding regions and whole exome sequencing (WES) is a cost-effective and powerful technology in detecting variants that are enriched in exons and have potential applications in clinical setting. Although several algorithms have been developed to detect CNVs using WES and compared with other algorithms for finding the most suitable methods using their own samples, there were not consistent datasets across most of algorithms to evaluate the ability of CNV detection. On the other hand, most of algorithms is using command line interface that may greatly limit the analysis capability of many laboratories. We create a series of simulated WES datasets from UCSC hg19 chromosome 22, and then evaluate the CNV detective ability of 19 algorithms from OMICtools database using our simulated WES datasets. We compute the sensitivity, specificity and accuracy in each algorithm for validation of the exome-derived CNVs. After comparison of 19 algorithms from OMICtools database, we construct a platform to install all of the algorithms in a virtual machine like VirtualBox which can be established conveniently in local computers, and then create a simple script that can be easily to use for detecting CNVs using algorithms selected by users. We also build a table to elaborate on many kinds of events, such as input requirement, CNV detective ability, for all of the algorithms that can provide users a specification to choose optimum algorithms.

Keywords: whole exome sequencing, copy number variations, omictools, pipeline

Procedia PDF Downloads 285
4230 Africa’s Political and Economic Transformation and the Role of the Disporas

Authors: Noah Yusuf

Abstract:

The present paper examined the current level of socio-political and economic development in Africa. Models and experiences from other regions of the world, especially, developing ones with similar historical experience with Africa, were explored. The paper concluded that recommendations emanating from past conferences, seminars and symposia on the continent’s socio-economic and political challenges have been poorly implemented because of lack of strong political will; the donor syndrome; weak resource base; capacity constraints in institutions; and lack of accountability, transparency and poor governance. It is, therefore, recommended that African countries need implement sound policies and reforms on a comprehensive basis, if they are to achieve the desired socio-economic and political transformation; and the African in Diasporas represent critical instruments in attaining the socio-economic and political objectives of the continent.

Keywords: Africa, political transformation, economic transformation, Africans in diasporas

Procedia PDF Downloads 306
4229 Prediction of the Performance of a Bar-Type Piezoelectric Vibration Actuator Depending on the Frequency Using an Equivalent Circuit Analysis

Authors: J. H. Kim, J. H. Kwon, J. S. Park, K. J. Lim

Abstract:

This paper has investigated a technique that predicts the performance of a bar-type unimorph piezoelectric vibration actuator depending on the frequency. This paper has been proposed an equivalent circuit that can be easily analyzed for the bar-type unimorph piezoelectric vibration actuator. In the dynamic analysis, rigidity and resonance frequency, which are important mechanical elements, were derived using the basic beam theory. In the equivalent circuit analysis, the displacement and bandwidth of the piezoelectric vibration actuator depending on the frequency were predicted. Also, for the reliability of the derived equations, the predicted performance depending on the shape change was compared with the result of a finite element analysis program.

Keywords: actuator, piezoelectric, performance, unimorph

Procedia PDF Downloads 444
4228 Performance Analysis of Artificial Neural Network with Decision Tree in Prediction of Diabetes Mellitus

Authors: J. K. Alhassan, B. Attah, S. Misra

Abstract:

Human beings have the ability to make logical decisions. Although human decision - making is often optimal, it is insufficient when huge amount of data is to be classified. medical dataset is a vital ingredient used in predicting patients health condition. In other to have the best prediction, there calls for most suitable machine learning algorithms. This work compared the performance of Artificial Neural Network (ANN) and Decision Tree Algorithms (DTA) as regards to some performance metrics using diabetes data. The evaluations was done using weka software and found out that DTA performed better than ANN. Multilayer Perceptron (MLP) and Radial Basis Function (RBF) were the two algorithms used for ANN, while RegTree and LADTree algorithms were the DTA models used. The Root Mean Squared Error (RMSE) of MLP is 0.3913,that of RBF is 0.3625, that of RepTree is 0.3174 and that of LADTree is 0.3206 respectively.

Keywords: artificial neural network, classification, decision tree algorithms, diabetes mellitus

Procedia PDF Downloads 379
4227 Using Greywolf Optimized Machine Learning Algorithms to Improve Accuracy for Predicting Hospital Readmission for Diabetes

Authors: Vincent Liu

Abstract:

Machine learning algorithms (ML) can achieve high accuracy in predicting outcomes compared to classical models. Metaheuristic, nature-inspired algorithms can enhance traditional ML algorithms by optimizing them such as by performing feature selection. We compare ten ML algorithms to predict 30-day hospital readmission rates for diabetes patients in the US using a dataset from UCI Machine Learning Repository with feature selection performed by Greywolf nature-inspired algorithm. The baseline accuracy for the initial random forest model was 65%. After performing feature engineering, SMOTE for class balancing, and Greywolf optimization, the machine learning algorithms showed better metrics, including F1 scores, accuracy, and confusion matrix with improvements ranging in 10%-30%, and a best model of XGBoost with an accuracy of 95%. Applying machine learning this way can improve patient outcomes as unnecessary rehospitalizations can be prevented by focusing on patients that are at a higher risk of readmission.

Keywords: diabetes, machine learning, 30-day readmission, metaheuristic

Procedia PDF Downloads 24
4226 Detection and Classification of Mammogram Images Using Principle Component Analysis and Lazy Classifiers

Authors: Rajkumar Kolangarakandy

Abstract:

Feature extraction and selection is the primary part of any mammogram classification algorithms. The choice of feature, attribute or measurements have an important influence in any classification system. Discrete Wavelet Transformation (DWT) coefficients are one of the prominent features for representing images in frequency domain. The features obtained after the decomposition of the mammogram images using wavelet transformations have higher dimension. Even though the features are higher in dimension, they were highly correlated and redundant in nature. The dimensionality reduction techniques play an important role in selecting the optimum number of features from the higher dimension data, which are highly correlated. PCA is a mathematical tool that reduces the dimensionality of the data while retaining most of the variation in the dataset. In this paper, a multilevel classification of mammogram images using reduced discrete wavelet transformation coefficients and lazy classifiers is proposed. The classification is accomplished in two different levels. In the first level, mammogram ROIs extracted from the dataset is classified as normal and abnormal types. In the second level, all the abnormal mammogram ROIs is classified into benign and malignant too. A further classification is also accomplished based on the variation in structure and intensity distribution of the images in the dataset. The Lazy classifiers called Kstar, IBL and LWL are used for classification. The classification results obtained with the reduced feature set is highly promising and the result is also compared with the performance obtained without dimension reduction.

Keywords: PCA, wavelet transformation, lazy classifiers, Kstar, IBL, LWL

Procedia PDF Downloads 314
4225 Monomial Form Approach to Rectangular Surface Modeling

Authors: Taweechai Nuntawisuttiwong, Natasha Dejdumrong

Abstract:

Geometric modeling plays an important role in the constructions and manufacturing of curve, surface and solid modeling. Their algorithms are critically important not only in the automobile, ship and aircraft manufacturing business, but are also absolutely necessary in a wide variety of modern applications, e.g., robotics, optimization, computer vision, data analytics and visualization. The calculation and display of geometric objects can be accomplished by these six techniques: Polynomial basis, Recursive, Iterative, Coefficient matrix, Polar form approach and Pyramidal algorithms. In this research, the coefficient matrix (simply called monomial form approach) will be used to model polynomial rectangular patches, i.e., Said-Ball, Wang-Ball, DP, Dejdumrong and NB1 surfaces. Some examples of the monomial forms for these surface modeling are illustrated in many aspects, e.g., construction, derivatives, model transformation, degree elevation and degress reduction.

Keywords: monomial forms, rectangular surfaces, CAGD curves, monomial matrix applications

Procedia PDF Downloads 125
4224 Logical-Probabilistic Modeling of the Reliability of Complex Systems

Authors: Sergo Tsiramua, Sulkhan Sulkhanishvili, Elisabed Asabashvili, Lazare Kvirtia

Abstract:

The paper presents logical-probabilistic methods, models, and algorithms for reliability assessment of complex systems, based on which a web application for structural analysis and reliability assessment of systems was created. It is important to design systems based on structural analysis, research, and evaluation of efficiency indicators. One of the important efficiency criteria is the reliability of the system, which depends on the components of the structure. Quantifying the reliability of large-scale systems is a computationally complex process, and it is advisable to perform it with the help of a computer. Logical-probabilistic modeling is one of the effective means of describing the structure of a complex system and quantitatively evaluating its reliability, which was the basis of our application. The reliability assessment process included the following stages, which were reflected in the application: 1) Construction of a graphical scheme of the structural reliability of the system; 2) Transformation of the graphic scheme into a logical representation and modeling of the shortest ways of successful functioning of the system; 3) Description of system operability condition with logical function in the form of disjunctive normal form (DNF); 4) Transformation of DNF into orthogonal disjunction normal form (ODNF) using the orthogonalization algorithm; 5) Replacing logical elements with probabilistic elements in ODNF, obtaining a reliability estimation polynomial and quantifying reliability; 6) Calculation of “weights” of elements of system. Using the logical-probabilistic methods, models and algorithms discussed in the paper, a special software was created, by means of which a quantitative assessment of the reliability of systems of a complex structure is produced. As a result, structural analysis of systems, research, and designing of optimal structure systems are carried out.

Keywords: complex systems, logical-probabilistic methods, orthogonalization algorithm, reliability of systems, “weights” of elements

Procedia PDF Downloads 40
4223 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 130