Search results for: weak rule priority
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2441

Search results for: weak rule priority

2441 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 422
2440 The Lexicographic Serial Rule

Authors: Thi Thao Nguyen, Andrew McLennan, Shino Takayama

Abstract:

We study the probabilistic allocation of finitely many indivisible objects to finitely many agents. Well known allocation rules for this problem include random priority, the market mechanism proposed by Hylland and Zeckhauser [1979], and the probabilistic serial rule of Bogomolnaia and Moulin [2001]. We propose a new allocation rule, which we call the lexico-graphic (serial) rule, that is tailored for situations in which each agent's primary concern is to maximize the probability of receiving her favourite object. Three axioms, lex efficiency, lex envy freeness and fairness, are proposed and fully characterize the lexicographic serial rule. We also discuss how our axioms and the lexicographic rule are related to other allocation rules, particularly the probabilistic serial rule.

Keywords: Efficiency, Envy free, Lexicographic, Probabilistic Serial Rule

Procedia PDF Downloads 114
2439 Decision Tree Based Scheduling for Flexible Job Shops with Multiple Process Plans

Authors: H.-H. Doh, J.-M. Yu, Y.-J. Kwon, J.-H. Shin, H.-W. Kim, S.-H. Nam, D.-H. Lee

Abstract:

This paper suggests a decision tree based approach for flexible job shop scheduling with multiple process plans, i. e. each job can be processed through alternative operations, each of which can be processed on alternative machines. The main decision variables are: (a) selecting operation/machine pair; and (b) sequencing the jobs assigned to each machine. As an extension of the priority scheduling approach that selects the best priority rule combination after many simulation runs, this study suggests a decision tree based approach in which a decision tree is used to select a priority rule combination adequate for a specific system state and hence the burdens required for developing simulation models and carrying out simulation runs can be eliminated. The decision tree based scheduling approach consists of construction and scheduling modules. In the construction module, a decision tree is constructed using a four-stage algorithm, and in the scheduling module, a priority rule combination is selected using the decision tree. To show the performance of the decision tree based approach suggested in this study, a case study was done on a flexible job shop with reconfigurable manufacturing cells and a conventional job shop, and the results are reported by comparing it with individual priority rule combinations for the objectives of minimizing total flow time and total tardiness.

Keywords: flexible job shop scheduling, decision tree, priority rules, case study

Procedia PDF Downloads 313
2438 Corruption and the Entrenchment of the Rule of Law in Nigeria

Authors: Grace Titilayo, Kolawole-Amao

Abstract:

Influence and authority of law within society should be respected by all and sundry regardless of individual status. Rule of law implies that every citizen is subject to the law. In a society governed by the rule of law, government and its officials and agents are also held subject to and accountable under the law. Law should not be employed to suit individual tenets. Where the rule of law operates, the government is the government of law and not of men. Corruption is a factor that kills the growth of the rule of law. Where corruption flourishes, the rule of law fails, simply put, corruption is a threat to the rule of law. It bastardized and undermines the rule of law and good governance principles - where men rule at their discretion rather than the use of the rule of law which makes governance processes ineffective. Corruption is prevalent all over the world, and has extremely far reaching effects. Many of the world’s greatest challenges have been amplified by corruption, for example poverty, unequal distribution of wealth and resources, and world hunger and it weakens the application and the entrenchment of the rule of law. It saps citizens' trust in their governments and undercuts government credibility. This paper will discuss the rule of law in the present democratic system in Nigeria, the impact of corruption on the rule of law in Nigeria and how corruption undermines and subverts the entrenchment of the rule of law in the present day Nigeria.

Keywords: rule of law, corruption, Nigeria, influence, authority

Procedia PDF Downloads 525
2437 Pruning Algorithm for the Minimum Rule Reduct Generation

Authors: Sahin Emrah Amrahov, Fatih Aybar, Serhat Dogan

Abstract:

In this paper we consider the rule reduct generation problem. Rule Reduct Generation (RG) and Modified Rule Generation (MRG) algorithms, that are used to solve this problem, are well-known. Alternative to these algorithms, we develop Pruning Rule Generation (PRG) algorithm. We compare the PRG algorithm with RG and MRG.

Keywords: rough sets, decision rules, rule induction, classification

Procedia PDF Downloads 496
2436 On an Approach for Rule Generation in Association Rule Mining

Authors: B. Chandra

Abstract:

In Association Rule Mining, much attention has been paid for developing algorithms for large (frequent/closed/maximal) itemsets but very little attention has been paid to improve the performance of rule generation algorithms. Rule generation is an important part of Association Rule Mining. In this paper, a novel approach named NARG (Association Rule using Antecedent Support) has been proposed for rule generation that uses memory resident data structure named FCET (Frequent Closed Enumeration Tree) to find frequent/closed itemsets. In addition, the computational speed of NARG is enhanced by giving importance to the rules that have lower antecedent support. Comparative performance evaluation of NARG with fast association rule mining algorithm for rule generation has been done on synthetic datasets and real life datasets (taken from UCI Machine Learning Repository). Performance analysis shows that NARG is computationally faster in comparison to the existing algorithms for rule generation.

Keywords: knowledge discovery, association rule mining, antecedent support, rule generation

Procedia PDF Downloads 287
2435 Review and Comparison of Associative Classification Data Mining Approaches

Authors: Suzan Wedyan

Abstract:

Data mining is one of the main phases in the Knowledge Discovery Database (KDD) which is responsible of finding hidden and useful knowledge from databases. There are many different tasks for data mining including regression, pattern recognition, clustering, classification, and association rule. In recent years a promising data mining approach called associative classification (AC) has been proposed, AC integrates classification and association rule discovery to build classification models (classifiers). This paper surveys and critically compares several AC algorithms with reference of the different procedures are used in each algorithm, such as rule learning, rule sorting, rule pruning, classifier building, and class allocation for test cases.

Keywords: associative classification, classification, data mining, learning, rule ranking, rule pruning, prediction

Procedia PDF Downloads 502
2434 Repair Workshop Queue System Modification Using Priority Scheme

Authors: C. Okonkwo Ugochukwu, E. Sinebe Jude, N. Odoh Blessing, E. Okafor Christian

Abstract:

In this paper, a modification on repair workshop queuing system using multi priority scheme was carried out. Chi square goodness of fit test was used to determine the random distribution of the inter arrival time and service time of crankshafts that come for maintenance in the workshop. The chi square values obtained for all the prioritized classes show that the distribution conforms to Poisson distribution. The mean waiting time in queue results of non-preemptive priority for 1st, 2nd and 3rd classes show 0.066, 0.09, and 0.224 day respectively, while preemptive priority show 0.007, 0.036 and 0.258 day. However, when non priority is used, which obviously has no class distinction it amounts to 0.17 days. From the results, one can observe that the preemptive priority system provides a very dramatic improvement over the non preemptive priority as it concerns arrivals that are of higher priority. However, the improvement has a detrimental effect on the low priority class. The trend of the results is similar to the mean waiting time in the system as a result of addition of the actual service time. Even though the mean waiting time for the queue and that of the system for no priority takes the least time when compared with the least priority, urgent and semi-urgent jobs will terribly suffer which will most likely result in reneging or balking of many urgent jobs. Hence, the adoption of priority scheme in this type of scenario will result in huge profit to the Company and more customer satisfaction.

Keywords: queue, priority class, preemptive, non-preemptive, mean waiting time

Procedia PDF Downloads 349
2433 The Judge Citizens Have in Mind, Comparative Lessons about the Rule of Law Matrix

Authors: Daniela Piana

Abstract:

This work casts light on what lies underneath the rule of law. In order to do so it unfolds the arguments in three main steps. The first one is a pars destruens: the mainstreaming scholarship on judicial independence and judicial accountability is questioned under the large amount of data we have at our disposal (this step is accomplished in the first two paragraphs). The second step is the reframe of the concept of the rule of law and the consequent rise of a hidden dimension, which has been so far largely underexplored: responsiveness. The third step consists into offering the readers empirical support and drawing thereby consequences in terms of policy design and citizens engagement into the rule of law implementation (these two steps are accomplished in the third paragraph).

Keywords: rule of law, accountability, trust, citizens

Procedia PDF Downloads 214
2432 Negation of Insinuation Rule on the Ideas of Imam Khomeini (RA)

Authors: Seyed Jafar Hosseini, Rahim Vakilzadeh, Hassan Movassagi

Abstract:

‘Negation of insinuation’ or ‘negation of dominance’ Rule is considered as one of the most important principles governing the policies and external relations of Islamic and religious countries. The stable and influential role which this rule puts on the behavior and policies of the Islamic religion and foreign policies of Islamic countries shows the importance of the presented topic. Among Islamic scholars, Imam Khomeini (RA) has been paid most attention to this rule on governing issues. In the present study, we are going to investigate the nature and dimensions of Negation of insinuation rule in Imam Khomeini's ideas with an analytical and descriptive method. The obtained results show that Negation of insinuation rule is an effective and main guidance in Imam's thoughts and behavior.

Keywords: negation of insinuation Rule, Imam Khomeini (RA), cultural domination, political domination, economic domination

Procedia PDF Downloads 289
2431 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 501
2430 A Simple Recursive Framework to Generate Gray Codes for Weak Orders in Constant Amortized Time

Authors: Marsden Jacques, Dennis Wong

Abstract:

A weak order is a way to rank n objects where ties are allowed. In this talk, we present a recursive framework to generate Gray codes for weak orders. We then describe a simple algorithm based on the framework that generates 2-Gray codes for weak orders in constant amortized time per string. This framework can easily be modified to generate other Gray codes for weak orders. We provide an example on using the framework to generate the first Shift Gray code for weak orders, also in constant amortized time, where consecutive strings differ by a shift or a symbol change.

Keywords: weak order, Cayley permutation, Gray code, shift Gray code

Procedia PDF Downloads 141
2429 Optimum Dispatching Rule in Solar Ingot-Wafer Manufacturing System

Authors: Wheyming Song, Hung-Hsiang Lin, Scott Lian

Abstract:

In this research, we investigate the optimal dispatching rule for machines and manpower allocation in the solar ingot-wafer systems. The performance of the method is measured by the sales profit for each dollar paid to the operators in a one week at steady-state. The decision variables are identification-number of machines and operators when each job is required to be served in each process. We propose a rule which is a function of operator’s ability, corresponding salary, and standing location while in the factory. The rule is named ‘Multi-nominal distribution dispatch rule’. The proposed rule performs better than many traditional rules including generic algorithm and particle swarm optimization. Simulation results show that the proposed Multi-nominal distribution dispatch rule improvement on the sales profit dramatically.

Keywords: dispatching, solar ingot, simulation, flexsim

Procedia PDF Downloads 272
2428 Rings Characterized by Classes of Rad-plus-Supplemented Modules

Authors: Manoj Kumar Patel

Abstract:

In this paper, we introduce and give various properties of weak* Rad-plus-supplemented and cofinitely weak* Rad-plus-supplemented modules over some special kinds of rings, in particular, artinian serial ring and semiperfect ring. Also prove that ring R is artinian serial if and only if every right and left R-module is weak* Rad-plus-supplemented. We provide the counter example which proves that weak* Rad-plus-supplemented module is the generalization of plus-supplemented and Rad-plus-supplemented modules. Furthermore, as an application of above finding results of this research article, our main focus is to characterized the semisimple ring, artinian principal ideal ring, semilocal ring, semiperfect ring, perfect ring, commutative noetherian ring and Dedekind domain in terms of weak* Rad-plus-supplemented module.

Keywords: cofinitely weak* Rad-plus-supplemented module , Dedekind domain, Rad-plus-supplemented module, semiperfect ring

Procedia PDF Downloads 222
2427 Judicial Independence and Preservation of the Rule of Law in Africa: The Case of South Africa

Authors: Mbuzeni Mathenjwa

Abstract:

Upon their independence, most African countries adopted constitutions that proclaim respect for the rule of law. The decision to constitutionalise the rule of law is basically informed by the countries’ experience during the colonial era which was characterised by discrimination on various grounds including race, gender and religion. Despite the promise to be bound by and adhere to the rule of law, disrespect for the rule of law has become a norm in the African continent. This is evident from the reported incidence of abuse of power, failure to perform obligations imposed by law and flagrant disregard of the law by the Executive including the heads of states in the continent. In some African countries including South Africa, the courts of law have been approached to rule on the legality of the decisions of the executives, taken contrary to the prescripts of the law. South African Courts have laid down a number of decisions wherein they found that the conduct of the executive contravenes the rule of law. Consequently decisions of the executive have been declared invalid by courts. In this regard courts have become a safety net in preserving the rule of law in. Accordingly, this paper discusses the role of the courts in preserving the rule of law in Africa. This it does by explaining the notion of judicial independence and the doctrine of the rule of law. The explanation on the notion of judicial independence is relevant because only an independent judiciary can effectively review and set aside the decision of the executive including the president of a country. Furthermore, a comparative overview of the enforcement of the rule of law in African countries is done. The methods used for this research is literature review, and study of legislation and case law in selected African countries relating to the independence of the judiciary and the rule of law. Finally, a conclusion is drawn on the role of the independent judiciary to preserve the rule of law in Africa.

Keywords: Africa, constitutions, independence, judiciary

Procedia PDF Downloads 247
2426 Complex Decision Rules in the Form of Decision Trees

Authors: Avinash S. Jagtap, Sharad D. Gore, Rajendra G. Gurao

Abstract:

Decision rules become more and more complex as the number of conditions increase. As a consequence, the complexity of the decision rule also influences the time complexity of computer implementation of such a rule. Consider, for example, a decision that depends on four conditions A, B, C and D. For simplicity, suppose each of these four conditions is binary. Even then the decision rule will consist of 16 lines, where each line will be of the form: If A and B and C and D, then action 1. If A and B and C but not D, then action 2 and so on. While executing this decision rule, each of the four conditions will be checked every time until all the four conditions in a line are satisfied. The minimum number of logical comparisons is 4 whereas the maximum number is 64. This paper proposes to present a complex decision rule in the form of a decision tree. A decision tree divides the cases into branches every time a condition is checked. In the form of a decision tree, every branching eliminates half of the cases that do not satisfy the related conditions. As a result, every branch of the decision tree involves only four logical comparisons and hence is significantly simpler than the corresponding complex decision rule. The conclusion of this paper is that every complex decision rule can be represented as a decision tree and the decision tree is mathematically equivalent but computationally much simpler than the original complex decision rule

Keywords: strategic, tactical, operational, adaptive, innovative

Procedia PDF Downloads 247
2425 Feeling Sorry for Some Creditors

Authors: Hans Tjio, Wee Meng Seng

Abstract:

The interaction of contract and property has always been a concern in corporate and commercial law, where there are internal structures created that may not match the externally perceived image generated by the labels attached to those structures. We will focus, in particular, on the priority structures created by affirmative asset partitioning, which have increasingly come under challenge by those attempting to negotiate around them. The most prominent has been the AT1 bonds issued by Credit Suisse which were wiped out before its equity when the troubled bank was acquired by UBS. However, this should not have come as a surprise to those whose “bonds” had similarly been “redeemed” upon the occurrence of certain reference events in countries like Singapore, Hong Kong and Taiwan during their Minibond crisis linked to US sub-prime defaults. These were derivatives classified as debentures and sold as such. At the same time, we are again witnessing “liabilities” seemingly ranking higher up the balance sheet ladder, finding themselves lowered in events of default. We will examine the mechanisms holders of perpetual securities or preference shares have tried to use to protect themselves. This is happening against a backdrop that sees a rise in the strength of private credit and inter-creditor conflicts. The restructuring regime of the hybrid scheme in Singapore now, while adopting the absolute priority rule in Chapter 11 as the quid pro quo for creditor cramdown, does not apply to shareholders and so exempts them from cramdown. Complicating the picture further, shareholders are not exempted from cramdown in the Dutch scheme, but it adopts a relative priority rule. At the same time, the important UK Supreme Court decision in BTI 2014 LLC v Sequana [2022] UKSC 25 has held that directors’ duties to take account of creditor interests are activated only when a company is almost insolvent. All this has been complicated by digital assets created by businesses. Investors are quite happy to have them classified as property (like a thing) when it comes to their transferability, but then when the issuer defaults to have them seen as a claim on the business (as a choice in action), that puts them at the level of a creditor. But these hidden interests will not show themselves on an issuer’s balance sheet until it is too late to be considered and yet if accepted, may also prevent any meaningful restructuring.

Keywords: asset partitioning, creditor priority, restructuring, BTI v Sequana, digital assets

Procedia PDF Downloads 38
2424 Reinforcement Learning the Born Rule from Photon Detection

Authors: Rodrigo S. Piera, Jailson Sales Ara´ujo, Gabriela B. Lemos, Matthew B. Weiss, John B. DeBrota, Gabriel H. Aguilar, Jacques L. Pienaar

Abstract:

The Born rule was historically viewed as an independent axiom of quantum mechanics until Gleason derived it in 1957 by assuming the Hilbert space structure of quantum measurements [1]. In subsequent decades there have been diverse proposals to derive the Born rule starting from even more basic assumptions [2]. In this work, we demonstrate that a simple reinforcement-learning algorithm, having no pre-programmed assumptions about quantum theory, will nevertheless converge to a behaviour pattern that accords with the Born rule, when tasked with predicting the output of a quantum optical implementation of a symmetric informationally-complete measurement (SIC). Our findings support a hypothesis due to QBism (the subjective Bayesian approach to quantum theory), which states that the Born rule can be thought of as a normative rule for making decisions in a quantum world [3].

Keywords: quantum Bayesianism, quantum theory, quantum information, quantum measurement

Procedia PDF Downloads 48
2423 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 467
2422 Adaptations to Hamilton's Rule in Human Populations

Authors: Monty Vacura

Abstract:

Hamilton’s Rule is a universal law of biology expressed in protists, plants and animals. When applied to human populations, this model explains: 1) Origin of religion in society as a biopsychological need selected to increase population size; 2) Instincts of racism expressed through intergroup competition; 3) Simultaneous selection for human cooperation and conflict, love and hate; 4) Connection between sporting events and instinctive social messaging for stimulating offensive and defensive responses; 5) Pathway to reduce human sacrifice. This chapter discusses the deep psychological influences of Hamilton’s Rule. Suggestions are provided to reduce human deaths via our instinctive sacrificial behavior, by consciously monitoring Hamilton’s Rule variables highlighted throughout our media outlets.

Keywords: psychology, Hamilton’s rule, evolution, human instincts

Procedia PDF Downloads 23
2421 Unveiling Special Policy Regime, Judgment, and Taylor Rules in Tunisia

Authors: Yosra Baaziz, Moez Labidi

Abstract:

Given limited research on monetary policy rules in revolutionary countries, this paper challenges the suitability of the Taylor rule in characterizing the monetary policy behavior of the Tunisian Central Bank (BCT), especially in turbulent times. More specifically, we investigate the possibility that the Taylor rule should be formulated as a threshold process and examine the validity of such nonlinear Taylor rule as a robust rule for conducting monetary policy in Tunisia. Using quarterly data from 1998:Q4 to 2013:Q4 to analyze the movement of nominal short-term interest rate of the BCT, we find that the nonlinear Taylor rule improves its performance with the advent of special events providing thus a better description of the Tunisian interest rate setting. In particular, our results show that the adoption of an appropriate nonlinear approach leads to a reduction in the errors of 150 basis points in 1999 and 2009, and 60 basis points in 2011, relative to the linear approach.

Keywords: policy rule, central bank, exchange rate, taylor rule, nonlinearity

Procedia PDF Downloads 269
2420 Early Warning Signals: Role and Status of Risk Management in Small and Medium Enterprises

Authors: Alexander Kelíšek, Denisa Janasová, Veronika Mitašová

Abstract:

Weak signals using is often associated with early warning. It is possible to find a link between early warning, respectively early problems detection and risk management. The idea of early warning is very important in the context of crisis management because of the risk prevention possibility. Weak signals are likened to risk symptoms. Nowadays, their usefulness as a tool of proactive problems solving is emphasized. Based on it, it is possible to use weak signals not only in strategic planning, project management, or early warning system, but also as a subsidiary element in risk management. The main question is how to effectively integrate weak signals into risk management. The main aim of the paper is to point out the possibilities of weak signals using in small and medium enterprises risk management.

Keywords: early warning system, weak signals, risk management, small and medium enterprises (SMEs)

Procedia PDF Downloads 387
2419 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 232
2418 Relaxing Convergence Constraints in Local Priority Hysteresis Switching Logic

Authors: Mubarak Alhajri

Abstract:

This paper addresses certain inherent limitations of local priority hysteresis switching logic. Our main result establishes that under persistent excitation assumption, it is possible to relax constraints requiring strict positivity of local priority and hysteresis switching constants. Relaxing these constraints allows the adaptive system to reach optimality which implies the performance improvement. The unconstrained local priority hysteresis switching logic is examined and conditions for global convergence are derived.

Keywords: adaptive control, convergence, hysteresis constant, hysteresis switching

Procedia PDF Downloads 358
2417 Learning Algorithms for Fuzzy Inference Systems Composed of Double- and Single-Input Rule Modules

Authors: Hirofumi Miyajima, Kazuya Kishida, Noritaka Shigei, Hiromi Miyajima

Abstract:

Most of self-tuning fuzzy systems, which are automatically constructed from learning data, are based on the steepest descent method (SDM). However, this approach often requires a large convergence time and gets stuck into a shallow local minimum. One of its solutions is to use fuzzy rule modules with a small number of inputs such as DIRMs (Double-Input Rule Modules) and SIRMs (Single-Input Rule Modules). In this paper, we consider a (generalized) DIRMs model composed of double and single-input rule modules. Further, in order to reduce the redundant modules for the (generalized) DIRMs model, pruning and generative learning algorithms for the model are suggested. In order to show the effectiveness of them, numerical simulations for function approximation, Box-Jenkins and obstacle avoidance problems are performed.

Keywords: Box-Jenkins's problem, double-input rule module, fuzzy inference model, obstacle avoidance, single-input rule module

Procedia PDF Downloads 325
2416 Validity of Simlified Javal’s Rule in 147 Pre-Operation Cataract Eyes

Authors: Mohammad Ghandehari Motlagh

Abstract:

Purpose: To evaluate validity of simplified Javal’s rule (Total Ast=Corneal Ast-0.50@9) in 147 pre-op cataract eyes. Methods: Due to change in lens tissue and structure in a cataract crystalline lens, we conceive the simplified javal’s rule may not be valid in cataract cases.In this cross-sectional study,147 pre-op cataract eyes without oblique astigmatism were enrolled in this study. Ocular biometry (with IOL master 500)and keratometry and refraction findings were recorded. Results: Mean age of our patients was 64.95 yrs/old (SD+_9.86) that confirms on senile cataract. Mean Axial length and average keratometry were respectively 23.86 and 44.62.Prevalence of systemic diseases diabet and high blood pressure were respectively 43 (29.25%) and 44 (29.93%)and shows importance of these diseases. The Corneal astigmatism axis is correlated with refractive astigmatism in cataract eyes (R=0.493). Simplified Javal’s rule is valid in cataract eyes (P<0.001). Conclusion: Simplified Javal’s rule is a valid formula in pre-op cataract eyes and can be used for keratometry results confirmation.

Keywords: javals rule, cataract, keratometry, ocular axial length

Procedia PDF Downloads 394
2415 Comparative Regionalism: The Case of Financial Integration in Association of Southeast Asian Nations

Authors: Sharon Kun-Amornpong

Abstract:

In this paper, ASEAN financial integration will be discussed from the perspective of the rule of law. The methodology of the paper is comparative regionalism. It will compare the role of the rule of law in ASEAN financial integration with that of the European Union with particular focuses on, for example, institutions and values. The paper argues that in the realm of financial integration, the rule of law is one of the most important factors that could help strengthen and promote financial integration in ASEAN. This is despite the fact that the ‘ASEAN Way’ emphasises non-interference and utilises a consensus-based cooperation rather than formal institutions. Nevertheless, the rule of law for ASEAN financial integration should be situated in its own historical, cultural, and political contexts. In addition, in the case of ASEAN, the rule of law cannot take root if it does not come from the demand of the people in this region. For instance, a reform or creation of legal institutions should not be imposed by international financial institutions. The paper will conclude that law has a normative force. It could shape expectation of market participants and promote deeper financial integration if norms that the law generates have become a significant norm in the society or industry.

Keywords: Association of Southeast Asian Nations, ASEAN, comparative regionalism, financial integration, the rule of law

Procedia PDF Downloads 163
2414 The Causal Relationships between Educational Environments and Rule-Breaking Behavior Issues in Early Adolescence

Authors: Zhidong Zhang, Zhi-Chao Zhang

Abstract:

This study focused on early adolescent rule-breaking behavioral problems using the instrument of Achenbach System of Empirically Based Assessment (ASEBA). The purpose was to analyze the relationships between the rule-breaking behavioral problems and relevant background variables such as sports activities, hobbies, chores and the number of close friends. The stratified sampling method was used to collect data from 2532 participants. The results indicated that several background variables as predictors could significantly predict rule breaking behavior and aggressive behavior. Further, a path analysis method was used to explore the correlational and causal relationships among background variables and breaking behavior variables.

Keywords: ASEBA, rule-breaking, path analysis, early adolescent

Procedia PDF Downloads 336
2413 Factors Related to Employee Adherence to Rules in Kuwait Business Organizations

Authors: Ali Muhammad

Abstract:

The purpose of this study is to develop a theoretical framework which demonstrates the effect of four personal factors on employees rule following behavior in Kuwaiti business organizations. The model suggested in this study includes organizational citizenship behavior, affective organizational commitment, organizational trust, and procedural justice as possible predictors of rule following behavior. The study also attempts to compare the effects of the suggested factors on employees rule following behavior. The new model will, hopefully, extend previous research by adding new variables to the models used to explain employees rule following behavior. A discussion of issues related to rule-following behavior is presented, as well as recommendations for future research.

Keywords: employee adherence to rules, organizational justice, organizational commitment, organizational citizenship behavior

Procedia PDF Downloads 429
2412 Contaminated Sites Prioritization Process Promoting and Redevelopment Planning

Authors: Che-An Lin, Wan-Ying Tsai, Ying-Shin Chen, Yu-Jen Chung

Abstract:

With the number and area of contaminated sites continued to increase in Taiwan, the Government have to make a priority list of screening contaminated sites under the limited funds and information. This study investigated the announcement of Taiwan EPA land 261 contaminated sites (except the agricultural lands), after preliminary screening 211 valid data to propose a screening system, removed contaminated sites were used to check the accuracy. This system including two dimensions which can create the sequence and use the XY axis to construct four quadrants. One dimension included environmental and social priority and the other related economic. All of the evaluated items included population density, land values, traffic hub, pollutant compound, pollutant concentrations, pollutant transport pathways, land usage sites, site areas, and water conductivity. The classification results of this screening are 1. Prioritization promoting sites (10%). 2. Environmental and social priority of the sites (17%), 3. Economic priority of the sites (30%), 4. Non-priority sites (43 %). Finally, this study used three of the removed contaminated sites to check screening system verification. As the surmise each of them are in line with the priority site and Economic priority of the site.

Keywords: contaminated sites, redevelopment, environmental, economics

Procedia PDF Downloads 443