Search results for: Common set of weights
926 On the Use of Correlated Binary Model in Social Network Analysis
Authors: Elsayed A. Habib Elamir
Abstract:
In social network analysis the mean nodal degree and density of the graph can be considered as a measure of the activity of all actors in the network and this is an important property of a graph and for making comparisons among networks. Since subjects in a family or organization are subject to common environment factors, it is prime interest to study the association between responses. Therefore, we study the distribution of the mean nodal degree and density of the graph under correlated binary units. The cross product ratio is used to capture the intra-units association among subjects. Computer program and an application are given to show the benefits of the method.Keywords: Correlated Binary data, cross product ratio, densityof the graph, multiplicative binomial distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1451925 The PARADIGMA Approach for Cooperative Work in the Medical Domain
Authors: Antonio Di Leva, Carla Reyneri, Michele Sonnessa
Abstract:
PARADIGMA (PARticipative Approach to DIsease Global Management) is a pilot project which aims to develop and demonstrate an Internet based reference framework to share scientific resources and findings in the treatment of major diseases. PARADIGMA defines and disseminates a common methodology and optimised protocols (Clinical Pathways) to support service functions directed to patients and individuals on matters like prevention, posthospitalisation support and awareness. PARADIGMA will provide a platform of information services - user oriented and optimised against social, cultural and technological constraints - supporting the Health Care Global System of the Euro-Mediterranean Community in a continuous improvement process.Keywords: Decision Support Systems, Ontology, Healt Care, Clinical Pathway
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1395924 Investigation of the Synthesis of Alcohols Byproducts in Fischer-Tropsch Synthesis on Modified Fe-Cu Catalyst: Reactivity and Mechanism
Authors: Wanyu Mao, Qiwen Sun, Weiyong Ying, Dingye Fang
Abstract:
The influence of copper promoters and reaction conditions on the formation of alcohols byproducts of a common Fischer-Tropsch synthesis used iron-based catalysts were investigated. A good compromise of 28%Cu/FeKLaSiO2 can lead to the optimization of an improved Fischer-Tropsch catalyst. The product distribution shifts towards hydrocarbons with increasing the reaction temperature, while pressure promotes the formation of alcohols. It was found that the production of either alcohols or hydrocarbons followed A-S-F distributions, and their α parameters were essentially different which indicated a competition in the growing chain between the two species. TPD after acetaldehyde adsorption gave strong evidence of the insertion of a C1 oxygen-containing species into an alkyl chain.Keywords: Fischer-Tropsch synthesis, Fe-Cu catalyst, alcohols byproducts, reaction pathways
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634923 Modeling and Simulation of Photovoltaic based LED Lighting System
Authors: Ankit R Patel, Ankit A Patel, Mahesh A Patel, Dhaval R Vyas
Abstract:
Although lighting systems powered by Photovoltaic (PV) cells have existed for many years, they are not widely used, especially in lighting for buildings, due to their high initial cost and low conversion efficiency. One of the technical challenges facing PV powered lighting systems has been how to use dc power generated by the PV module to energize common light sources that are designed to operate efficiently under ac power. Usually, the efficiency of the dc light sources is very poor compared to ac light sources. Rapid developments in LED lighting systems have made this technology a potential candidate for PV powered lighting systems. This study analyzed the efficiency of each component of PV powered lighting systems to identify optimum system configurations for different applications.Keywords: Energy Efficiency, LED, Modeling of systems, Photovoltaic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3201922 Nonstationarity Modeling of Economic and Financial Time Series
Authors: C. Slim
Abstract:
Traditional techniques for analyzing time series are based on the notion of stationarity of phenomena under study, but in reality most economic and financial series do not verify this hypothesis, which implies the implementation of specific tools for the detection of such behavior. In this paper, we study nonstationary non-seasonal time series tests in a non-exhaustive manner. We formalize the problem of nonstationary processes with numerical simulations and take stock of their statistical characteristics. The theoretical aspects of some of the most common unit root tests will be discussed. We detail the specification of the tests, showing the advantages and disadvantages of each. The empirical study focuses on the application of these tests to the exchange rate (USD/TND) and the Consumer Price Index (CPI) in Tunisia, in order to compare the Power of these tests with the characteristics of the series.Keywords: Stationarity, unit root tests, economic time series.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 864921 The Vulnerability Analysis of Java Bytecode Based on Points-to Dataflow
Authors: Tang Hong, Zhang Lufeng, Chen Hua, Zhang Jianbo
Abstract:
Today many developers use the Java components collected from the Internet as external LIBs to design and develop their own software. However, some unknown security bugs may exist in these components, such as SQL injection bug may comes from the components which have no specific check for the input string by users. To check these bugs out is very difficult without source code. So a novel method to check the bugs in Java bytecode based on points-to dataflow analysis is in need, which is different to the common analysis techniques base on the vulnerability pattern check. It can be used as an assistant tool for security analysis of Java bytecode from unknown softwares which will be used as extern LIBs.Keywords: Java bytecode, points-to dataflow, vulnerability analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763920 Minimum Fluidization Velocities of Binary-Solid Mixtures: Model Comparison
Authors: Mohammad Asif
Abstract:
An accurate prediction of the minimum fluidization velocity is a crucial hydrodynamic aspect of the design of fluidized bed reactors. Common approaches for the prediction of the minimum fluidization velocities of binary-solid fluidized beds are first discussed here. The data of our own careful experimental investigation involving a binary-solid pair fluidized with water is presented. The effect of the relative composition of the two solid species comprising the fluidized bed on the bed void fraction at the incipient fluidization condition is reported and its influence on the minimum fluidization velocity is discussed. In this connection, the capability of packing models to predict the bed void fraction is also examined.Keywords: Bed void fraction, Binary solid mixture, Minimumfluidization velocity, Packing models
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2646919 Cooperative CDD Scheme Based on Hierarchical Modulation in OFDM System
Authors: Seung-Jun Yu, Yeong-Seop Ahn, Young-Min Ko, Hyoung-Kyu Song
Abstract:
In order to achieve high data rate and increase the spectral efficiency, multiple input multiple output (MIMO) system has been proposed. However, multiple antennas are limited by size and cost. Therefore, recently developed cooperative diversity scheme, which profits the transmit diversity only with the existing hardware by constituting a virtual antenna array, can be a solution. However, most of the introduced cooperative techniques have a common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation. This scheme is free from the rate loss and allows seamless cooperative communication.Keywords: MIMO, Cooperative communication, CDD, Hierarchical modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2197918 Characterization for Post-treatment Effect of Bagasse Ash for Silica Extraction
Authors: Patcharin Worathanakul, Wisaroot Payubnop, Akhapon Muangpet
Abstract:
Utilization of bagasse ash for silica sources is one of the most common application for agricultural wastes and valuable biomass byproducts in sugar milling. The high percentage silica content from bagasse ash was used as silica source for sodium silicate solution. Different heating temperature, time and acid treatment were studies for silica extraction. The silica was characterized using various techniques including X-ray fluorescence, X-ray diffraction, Scanning electron microscopy, and Fourier Transform Infrared Spectroscopy method,. The synthesis conditions were optimized to obtain the bagasse ash with the maximum silica content. The silica content of 91.57 percent was achieved from heating of bagasse ash at 600°C for 3 hours under oxygen feeding and HCl treatment. The result can be used as value added for bagasse ash utilization and minimize the environmental impact of disposal problems.Keywords: Bagasse ash, synthesis, silica, extraction, posttreatment
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3818917 Self-Organization of Radiation Defects: Temporal Dissipative Structures
Authors: Pavlo Selyshchev
Abstract:
A theoretical approach to radiation damage evolution is developed. Stable temporal behavior taking place in solids under irradiation are examined as phenomena of self-organization in nonequilibrium systems. Experimental effects of temporal self-organization in solids under irradiation are reviewed. Their essential common properties and features are highlighted and analyzed. Dynamical model to describe development of self-oscillation of density of point defects under stationary irradiation is proposed. The emphasis is the nonlinear couplings between rate of annealing and density of defects that determine the kind and parameters of an arising self-oscillation. The field of parameters (defect generation rate and environment temperature) at which self-oscillations develop is found. Bifurcation curve and self-oscillation period near it is obtained.Keywords: Irradiation, Point Defects, Solids, Temporal Selforganization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1973916 Service Business Model Canvas: A Boundary Object Operating as a Business Development Tool
Authors: Taru Hakanen, Mervi Murtonen
Abstract:
This study aims to increase understanding of the transition of business models in servitization. The significance of service in all business has increased dramatically during the past decades. Service-dominant logic (SDL) describes this change in the economy and questions the goods-dominant logic on which business has primarily been based in the past. A business model canvas is one of the most cited and used tools in defining end developing business models. The starting point of this paper lies in the notion that the traditional business model canvas is inherently goods-oriented and best suits for product-based business. However, the basic differences between goods and services necessitate changes in business model representations when proceeding in servitization. Therefore, new knowledge is needed on how the conception of business model and the business model canvas as its representation should be altered in servitized firms in order to better serve business developers and interfirm co-creation. That is to say, compared to products, services are intangible and they are co-produced between the supplier and the customer. Value is always co-created in interaction between a supplier and a customer, and customer experience primarily depends on how well the interaction succeeds between the actors. The role of service experience is even stronger in service business compared to product business, as services are co-produced with the customer. This paper provides business model developers with a service business model canvas, which takes into account the intangible, interactive, and relational nature of service. The study employs a design science approach that contributes to theory development via design artifacts. This study utilizes qualitative data gathered in workshops with ten companies from various industries. In particular, key differences between Goods-dominant logic (GDL) and SDLbased business models are identified when an industrial firm proceeds in servitization. As the result of the study, an updated version of the business model canvas is provided based on service-dominant logic. The service business model canvas ensures a stronger customer focus and includes aspects salient for services, such as interaction between companies, service co-production, and customer experience. It can be used for the analysis and development of a current service business model of a company or for designing a new business model. It facilitates customer-focused new service design and service development. It aids in the identification of development needs, and facilitates the creation of a common view of the business model. Therefore, the service business model canvas can be regarded as a boundary object, which facilitates the creation of a common understanding of the business model between several actors involved. The study contributes to the business model and service business development disciplines by providing a managerial tool for practitioners in service development. It also provides research insight into how servitization challenges companies’ business models.Keywords: Boundary object, business model canvas, managerial tool, service-dominant logic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3351915 Parallel Querying of Distributed Ontologies with Shared Vocabulary
Authors: Sharjeel Aslam, Vassil Vassilev, Karim Ouazzane
Abstract:
Ontologies and various semantic repositories became a convenient approach for implementing model-driven architectures of distributed systems on the Web. SPARQL is the standard query language for querying such. However, although SPARQL is well-established standard for querying semantic repositories in RDF and OWL format and there are commonly used APIs which supports it, like Jena for Java, its parallel option is not incorporated in them. This article presents a complete framework consisting of an object algebra for parallel RDF and an index-based implementation of the parallel query engine capable of dealing with the distributed RDF ontologies which share common vocabulary. It has been implemented in Java, and for validation of the algorithms has been applied to the problem of organizing virtual exhibitions on the Web.
Keywords: Distributed ontologies, parallel querying, semantic indexing, shared vocabulary, SPARQL.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 659914 Analyzing the Effect of Ambient Temperature and Loads Power Factor on Electric Generator Power Rating
Authors: Ahmed Elsebaay, Maged A. Abu Adma, Mahmoud Ramadan
Abstract:
This study presents a technique clarifying the effect of ambient air temperature and loads power factor changing from standard values on electric generator power rating. The study introduces an optimized technique for selecting the correct electric generator power rating for certain application and operating site ambient temperature. The de-rating factors due to the previous effects will be calculated to be applied on a generator to select its power rating accurately to avoid unsafe operation and save its lifetime. The information in this paper provides a simple, accurate, and general method for synchronous generator selection and eliminates common errors.
Keywords: Ambient temperature, de-rating factor, electric generator, power factor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3884913 Adaptive Dynamic Time Warping for Variable Structure Pattern Recognition
Authors: S. V. Yendiyarov
Abstract:
Pattern discovery from time series is of fundamental importance. Particularly, when information about the structure of a pattern is not complete, an algorithm to discover specific patterns or shapes automatically from the time series data is necessary. The dynamic time warping is a technique that allows local flexibility in aligning time series. Because of this, it is widely used in many fields such as science, medicine, industry, finance and others. However, a major problem of the dynamic time warping is that it is not able to work with structural changes of a pattern. This problem arises when the structure is influenced by noise, which is a common thing in practice for almost every application. This paper addresses this problem by means of developing a novel technique called adaptive dynamic time warping.
Keywords: Pattern recognition, optimal control, quadratic programming, dynamic programming, dynamic time warping, sintering control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2042912 Unsteady Flow between Two Concentric Rotating Spheres along with Uniform Transpiration
Authors: O. Mahian, A. B. Rahimi, A. Kianifar, A. Jabari Moghadam
Abstract:
In this study, the numerical solution of unsteady flow between two concentric rotating spheres with suction and blowing at their boundaries is presented. The spheres are rotating about a common axis of rotation while their angular velocities are constant. The Navier-Stokes equations are solved by employing the finite difference method and implicit scheme. The resulting flow patterns are presented for various values of the flow parameters including rotational Reynolds number Re , and a blowing/suction Reynolds number Rew . Viscous torques at the inner and the outer spheres are calculated, too. It is seen that increasing the amount of suction and blowing decrease the size of eddies generated in the annulus.Keywords: Concentric spheres, numerical study, suction andblowing, unsteady flow, viscous torque.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1765911 Corruption, Economic Growth, and Income Inequality: Evidence from Ten Countries in Asia
Authors: Chiung-Ju Huang
Abstract:
This study utilizes the panel vector error correction model (PVECM) to examine the relationship among corruption, economic growth, and income inequality experienced within ten Asian countries over the 1995 to 2010 period. According to the empirical results, we do not support the common perception that corruption decreases economic growth. On the contrary, we found that corruption increases economic growth. Meanwhile, an increase in economic growth will cause an increase in income inequality, although the effect is insignificant. Similarly, an increase in income inequality will cause an increase in economic growth but a decrease in corruption, although the effect is also insignificant.Keywords: Corruption, economic growth, income inequality, panel vector error correction model
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3368910 Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing
Authors: Nagaraj V. Dharwadkar, B.B.Amberker
Abstract:
In this paper, a new secure watermarking scheme for color image is proposed. It splits the watermark into two shares using (2, 2)- threshold Visual Cryptography Scheme (V CS) with Adaptive Order Dithering technique and embeds one share into high textured subband of Luminance channel of the color image. The other share is used as the key and is available only with the super-user or the author of the image. In this scheme only the super-user can reveal the original watermark. The proposed scheme is dynamic in the sense that to maintain the perceptual similarity between the original and the watermarked image the selected subband coefficients are modified by varying the watermark scaling factor. The experimental results demonstrate the effectiveness of the proposed scheme. Further, the proposed scheme is able to resist all common attacks even with strong amplitude.Keywords: VCS, Dithering, HVS, DWT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2048909 An HCI Template for Distributed Applications
Authors: Xizhi Li
Abstract:
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. This article proposes a Human Computer Interface (HCI) template from three representative applications we have developed. These applications include a Multi-Agent System based software, a 3D Internet computer game with distributed game world logic, and a programming language environment used in constructing distributed neural network and its visualizations. HCI concepts that are common to these applications are described in abstract terms in the template. These include off-line presentation of global entities, entities inside a hierarchical namespace, communication and languages, reconfiguration of entity references in a graph, impersonation and access right, etc. We believe the metaphor that underlies an HCI concept as well as the relationships between a bunch of HCI concepts are crucial to the design of software systems and vice versa.
Keywords: HCI, MAS, computer game, programming language
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533908 Representation of Coloured Petri Net in Abductive Logic Programming (CPN-LP) and Its Application in Modeling an Intelligent Agent
Authors: T. H. Fung
Abstract:
Coloured Petri net (CPN) has been widely adopted in various areas in Computer Science, including protocol specification, performance evaluation, distributed systems and coordination in multi-agent systems. It provides a graphical representation of a system and has a strong mathematical foundation for proving various properties. This paper proposes a novel representation of a coloured Petri net using an extension of logic programming called abductive logic programming (ALP), which is purely based on classical logic. Under such a representation, an implementation of a CPN could be directly obtained, in which every inference step could be treated as a kind of equivalence preserved transformation. We would describe how to implement a CPN under such a representation using common meta-programming techniques in Prolog. We call our framework CPN-LP and illustrate its applications in modeling an intelligent agent.
Keywords: Abduction, coloured petri net, intelligent agent, logic programming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1504907 Efficiency of Floristic and Molecular Markers to Determine Diversity in Iranian Populations of T. boeoticum
Authors: M. R. Naghavi, M. Maleki, S. F. Tabatabaei
Abstract:
In order to study floristic and molecular classification of common wild wheat (Triticum boeoticum Boiss.), an analysis was conducted on populations of the Triticum boeoticum collected from different regions of Iran. Considering all floristic compositions of habitats, six floristic groups (syntaxa) within the populations were identified. A high level of variation of T. boeoticum also detected using SSR markers. Our results showed that molecular method confirmed the grouping of floristic method. In other word, the results from our study indicate that floristic classification are still useful, efficient, and economic tools for characterizing the amount and distribution of genetic variation in natural populations of T. boeoticum. Nevertheless, molecular markers appear as useful and complementary techniques for identification and for evaluation of genetic diversity in studied populations.Keywords: T. boeoticum, diversity, floristic, SSRs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1351906 Nanofibrous Ion Exchangers
Authors: Jaromír Marek, Jakub Wiener, Yan Wang
Abstract:
The main goal of this study was to find simple and industrially applicable production of ion exchangers based on nanofibrous polystyrene matrix and characterization of prepared material. Starting polystyrene nanofibers were sulfonated and crosslinked under appropriate conditions at the same time by sulfuric acid. Strongly acidic cation exchanger was obtained in such a way. The polymer matrix was made from polystyrene nanofibers prepared by NanospiderTM technology.
Various types postpolymerization reactions and other methods of crosslinking were studied. Greatly different behavior between nano- and microsize materials was observed. The final nanofibrous material was characterized and compared to common granular ion exchangers and available microfibrous ion exchangers. The sorption properties of nanofibrous ion exchangers were compared with the granular ion exchangers. For nanofibrous ion exchangers of comparable ion exchange capacity was observed considerably faster adsorption kinetics.
Keywords: Electrospinning, ion exchangers, nanofibers, polystyrene.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2030905 Improved Back Propagation Algorithm to Avoid Local Minima in Multiplicative Neuron Model
Authors: Kavita Burse, Manish Manoria, Vishnu P. S. Kirar
Abstract:
The back propagation algorithm calculates the weight changes of artificial neural networks, and a common approach is to use a training algorithm consisting of a learning rate and a momentum factor. The major drawbacks of above learning algorithm are the problems of local minima and slow convergence speeds. The addition of an extra term, called a proportional factor reduces the convergence of the back propagation algorithm. We have applied the three term back propagation to multiplicative neural network learning. The algorithm is tested on XOR and parity problem and compared with the standard back propagation training algorithm.Keywords: Three term back propagation, multiplicative neuralnetwork, proportional factor, local minima.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2815904 Investigation of Behavior on the Contact Surface of the Tire and Ground by CFD Simulation
Authors: M. F. Sung, Y.D. Kuan, R.J. Shyu, S.M. Lee
Abstract:
Tread design has evolved over the years to achieve the common tread pattern used in current vehicles. However, to meet safety and comfort requirements, tread design considers more than one design factor. Tread design must consider the grip and drainage, and the manner in which to reduce rolling noise, which is one of the main factors considered by manufacturers. The main objective of this study was the application the computational fluid dynamics (CFD) technique to simulate the contact surface of the tire and ground. The results demonstrated an air-Pumping and large pressure drop effect in the process of contact surface. The results also revealed that the pressure can be used to analyze sound pressure level (SPL).
Keywords: Air-pumping, computational fluid dynamics, sound pressure level, tire.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2376903 Instance-Based Ontology Matching Using Different Kinds of Formalism
Authors: Katrin Zaiß, Tim Schlüter, Stefan Conrad
Abstract:
Ontology Matching is a task needed in various applica-tions, for example for comparison or merging purposes. In literature,many algorithms solving the matching problem can be found, butmost of them do not consider instances at all. Mappings are deter-mined by calculating the string-similarity of labels, by recognizinglinguistic word relations (synonyms, subsumptions etc.) or by ana-lyzing the (graph) structure. Due to the facts that instances are oftenmodeled within the ontology and that the set of instances describesthe meaning of the concepts better than their meta information,instances should definitely be incorporated into the matching process.In this paper several novel instance-based matching algorithms arepresented which enhance the quality of matching results obtainedwith common concept-based methods. Different kinds of formalismsare use to classify concepts on account of their instances and finallyto compare the concepts directly.KeywordsInstances, Ontology Matching, Semantic Web
Keywords: Instances, Ontology Matching, Semantic Web
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1526902 Web Application Security, Attacks and Mitigation
Authors: Ayush Chugh, Gaurav Gupta
Abstract:
Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Keywords: Attacks, Injection, JavaScript, SQL, Vulnerability, XSS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4968901 The Strengths and Limitations of the Statistical Modeling of Complex Social Phenomenon: Focusing on SEM, Path Analysis, or Multiple Regression Models
Authors: Jihye Jeon
Abstract:
This paper analyzes the conceptual framework of three statistical methods, multiple regression, path analysis, and structural equation models. When establishing research model of the statistical modeling of complex social phenomenon, it is important to know the strengths and limitations of three statistical models. This study explored the character, strength, and limitation of each modeling and suggested some strategies for accurate explaining or predicting the causal relationships among variables. Especially, on the studying of depression or mental health, the common mistakes of research modeling were discussed.Keywords: Multiple regression, path analysis, structural equation models, statistical modeling, social and psychological phenomenon.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9251900 Inhibition of the Growth of Pathogenic Candida spp. by Salicylhydroxamic Acid
Authors: Shu-Ying Marissa Pang, Stephen Tristram, Simon Brown
Abstract:
Candida spp. are common and aggressive pathogens. Because of the growing resistance of Candida spp. to current antifungals, novel targets, found in Candida spp. but not in humans or other flora, have to be identified. The alternative oxidase (AOX) is one such possibility. This enzyme is insensitive to cyanide, but is sensitive to compounds such as salicylhydroxamic acid (SHAM), disulfiram and n-alkyl gallates. The growth each of six Candida spp. was inhibited significantly by ~13 mM SHAM or 2 mM cyanide, albeit to differing extents. In C. dubliniensis, C. krusei and C. tropicalis the rate of O2 uptake was inhibited by 18-36% by 25 mM SHAM, but this had little or no effect on C. glabrata, C. guilliermondii or C. parapsilosis. Although SHAM substantially inhibited the growth of Candida spp., it is unlikely that the inhibition of AOX was the cause. Salicylhydroxamic acid is used therapeutically in the treatment of urinary tract infections and urolithiasis, but it also has some potential in the treatment of Candida spp. infection.
Keywords: alternative oxidase, Candida spp., growth, respiration, salicylhydroxamic acid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1506899 Decision Location and Resource Requirement for Relief Goods Assembly
Authors: Glenda Minguito, Jenith Banluta
Abstract:
One of the critical aspects of humanitarian operations is the distribution of relief goods to an affected community. The common assumption is that relief goods are prepositioned during disasters which are not applicable in developing countries like the Philippines. During disasters, the on-the-ground government agencies and responders have to procure, sort, weigh and pack the relief goods. There is a need to review the relief goods preparation as it seriously affects the delivery of necessary aid for human survival. This study also identifies the ideal location of the assembly hub to minimize the distance to the affected community. This paper reveals that location and resources are dependent on the type of disasters encountered at the local level. The Center-of-Gravity method and Multiple Activity Chart were applied in the analysis.
Keywords: Humanitarian supply chain, location decision, resource allocation, local level.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 456898 Parallel Block Backward Differentiation Formulas for Solving Ordinary Differential Equations
Authors: Khairil Iskandar Othman, Zarina Bibi Ibrahim, Mohamed Suleiman
Abstract:
A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). Most common methods for solving stiff systems of ODEs are based on implicit formulae and solved using Newton iteration which requires repeated solution of systems of linear equations with coefficient matrix, I - hβJ . Here, J is the Jacobian matrix of the problem. In this paper, the matrix operations is paralleled in order to reduce the cost of the iterations. Numerical results are given to compare the speedup and efficiency of parallel algorithm and that of sequential algorithm.Keywords: Backward Differentiation Formula, block, ordinarydifferential equations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2011897 The Simulation and Experimental Investigation to Study the Strain Distribution Pattern during the Closed Die Forging Process
Authors: D. B. Gohil
Abstract:
Closed die forging is a very complex process, and measurement of actual forces for real material is difficult and time consuming. Hence, the modelling technique has taken the advantage of carrying out the experimentation with the proper model material which needs lesser forces and relatively low temperature. The results of experiments on the model material then may be correlated with the actual material by using the theory of similarity. There are several methods available to resolve the complexity involved in the closed die forging process. Finite Element Method (FEM) and Finite Difference Method (FDM) are relatively difficult as compared to the slab method. The slab method is very popular and very widely used by the people working on shop floor because it is relatively easy to apply and reasonably accurate for most of the common forging load requirement computations.Keywords: Experimentation, forging, process modeling, strain distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1365