Search results for: privacy problem
3028 Modelling Sudoku Puzzles as Block-world Problems
Authors: Cecilia Nugraheni, Luciana Abednego
Abstract:
Sudoku is a kind of logic puzzles. Each puzzle consists of a board, which is a 9×9 cells, divided into nine 3×3 subblocks and a set of numbers from 1 to 9. The aim of this puzzle is to fill in every cell of the board with a number from 1 to 9 such that in every row, every column, and every subblock contains each number exactly one. Sudoku puzzles belong to combinatorial problem (NP complete). Sudoku puzzles can be solved by using a variety of techniques/algorithms such as genetic algorithms, heuristics, integer programming, and so on. In this paper, we propose a new approach for solving Sudoku which is by modelling them as block-world problems. In block-world problems, there are a number of boxes on the table with a particular order or arrangement. The objective of this problem is to change this arrangement into the targeted arrangement with the help of two types of robots. In this paper, we present three models for Sudoku. We modellized Sudoku as parameterized multi-agent systems. A parameterized multi-agent system is a multi-agent system which consists of several uniform/similar agents and the number of the agents in the system is stated as the parameter of this system. We use Temporal Logic of Actions (TLA) for formalizing our models.
Keywords: Sudoku puzzle, block world problem, parameterized multi agent systems modelling, Temporal Logic of Actions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24373027 Reducing Variation of Dyeing Process in Textile Manufacturing Industry
Abstract:
This study deals with a multi-criteria optimization problem which has been transformed into a single objective optimization problem using Response Surface Methodology (RSM), Artificial Neural Network (ANN) and Grey Relational Analyses (GRA) approach. Grey-RSM and Grey-ANN are hybrid techniques which can be used for solving multi-criteria optimization problem. There have been two main purposes of this research as follows. 1. To determine optimum and robust fiber dyeing process conditions by using RSM and ANN based on GRA, 2. To obtain the best suitable model by comparing models developed by different methodologies. The design variables for fiber dyeing process in textile are temperature, time, softener, anti-static, material quantity, pH, retarder, and dispergator. The quality characteristics to be evaluated are nominal color consistency of fiber, maximum strength of fiber, minimum color of dyeing solution. GRA-RSM with exact level value, GRA-RSM with interval level value and GRA-ANN models were compared based on GRA output value and MSE (Mean Square Error) performance measurement of outputs with each other. As a result, GRA-ANN with interval value model seems to be suitable reducing the variation of dyeing process for GRA output value of the model.Keywords: Artificial Neural Network, Grey Relational Analysis, Optimization, Response Surface Methodology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35553026 Strategy Analysis and Creation by Simulation in the General Game
Authors: Gábor Szűcs, Gábor Neszveda, Xin Fang
Abstract:
In this paper the General Game problem is described. In this problem the competition or cooperation dilemma occurs as the two basic types of strategies. The strategy possibilities have been analyzed for finding winning strategy in uncertain situations (no information about the number of players and their strategy types). The winning strategy is missing, but a good solution can be found by simulation by varying the ratio of the two types of strategies. This new method has been used in a real contest with human players, where the created strategies by simulation have reached very good ranks. This construction can be applied in other real social games as well.Keywords: competition, cooperation, finding good strategy, General Game
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12343025 The Competence of Solving Mathematical Problems in the Formation of Ethical Values
Authors: Veronica Diaz Quezada
Abstract:
A study and its preliminary results are presented. The research is descriptive and exploratory and it is still in process. Its objective is to develop an assessment method in the field of fostering values using competence mathematics problem solving. This is part of a more extensive research that aims at contributing to educational integration in Latin America, particularly to the development of proposals to link education for citizenship and the mathematics lessons. This is being carried out by research teams of University of Barcelona-España; University Nacional of Costa Rica; University Autónoma of Querétaro-México; Pontificia University Católica of Perú, University Nacional of Villa María- Argentina and University of Los Lagos-Chile, in the context of Andrés Bello Chair for the Association of Latin American Universities. This research was developed and implemented in Chile in 2016, using mixed research methods. It included interviews and a problem-solving math test with ethical values that was administered to students of the secondary education of the regions of Los Ríos and of the Lakes of Chile. The results show the lack of integration between the teaching of values and science discipline.
Keywords: Citizenship, ethical values, mathematics, secondary school, solving problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7353024 Beginner Physical Sciences Teacher’s Implementation of Problem-Based Learning in Promoting Creativity as a 21st-Century Skill on Learners: A Case Study
Authors: Motlhale Judicial Sebatana, Washington Takawira Dudu
Abstract:
This study investigated how one beginner Physical Sciences teacher implemented Problem-Based Learning (PBL) strategy in the teaching and learning of Particulate Nature of Matter (PNM) in the Grade 10 classroom. PBL was implemented to explore how it can promote a 21st-century skill of creativity and enhance understanding of PNM. This study was guided by theoretical framework of Social Interdependence Theory (SIT). This exploratory qualitative case study was conveniently conducted in the North West province, South Africa, where one Physical Sciences teacher was purposefully sampled. A self-developed open-ended questionnaire, portfolio and individual semi-structured interview were used as the methods of generating data for this study. The results show that the participant of this study had no prior knowledge of utilising PBL in the teaching and learning of PNM before the Teacher Professional Development (TPD) programme, no knowledge of creativity as a 21st-century skill, and a successful PBL implementation post TPD to promote creativity.
Keywords: Beginner teachers, physical sciences teachers, problem-based learning, 21st-century skills, creativity skill, particulate nature of matter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4313023 Modeling Methodologies for Optimization and Decision Support on Coastal Transport Information System (Co.Tr.I.S.)
Authors: Vassilios Moussas, Dimos N. Pantazis, Panagiotis Stratakis
Abstract:
The aim of this paper is to present the optimization methodology developed in the frame of a Coastal Transport Information System. The system will be used for the effective design of coastal transportation lines and incorporates subsystems that implement models, tools and techniques that may support the design of improved networks. The role of the optimization and decision subsystem is to provide the user with better and optimal scenarios that will best fulfill any constrains, goals or requirements posed. The complexity of the problem and the large number of parameters and objectives involved led to the adoption of an evolutionary method (Genetic Algorithms). The problem model and the subsystem structure are presented in detail, and, its support for simulation is also discussed.
Keywords: Coastal transport, modeling, optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20033022 Stability of Fractional Differential Equation
Authors: Rabha W. Ibrahim
Abstract:
We study a Dirichlet boundary value problem for Lane-Emden equation involving two fractional orders. Lane-Emden equation has been widely used to describe a variety of phenomena in physics and astrophysics, including aspects of stellar structure, the thermal history of a spherical cloud of gas, isothermal gas spheres,and thermionic currents. However, ordinary Lane-Emden equation does not provide the correct description of the dynamics for systems in complex media. In order to overcome this problem and describe dynamical processes in a fractalmedium, numerous generalizations of Lane-Emden equation have been proposed. One such generalization replaces the ordinary derivative by a fractional derivative in the Lane-Emden equation. This gives rise to the fractional Lane-Emden equation with a single index. Recently, a new type of Lane-Emden equation with two different fractional orders has been introduced which provides a more flexible model for fractal processes as compared with the usual one characterized by a single index. The contraction mapping principle and Krasnoselskiis fixed point theorem are applied to prove the existence of solutions of the problem in a Banach space. Ulam-Hyers stability for iterative Cauchy fractional differential equation is defined and studied.
Keywords: Fractional calculus, fractional differential equation, Lane-Emden equation, Riemann-Liouville fractional operators, Volterra integral equation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37173021 Multiple Regression based Graphical Modeling for Images
Authors: Pavan S., Sridhar G., Sridhar V.
Abstract:
Super resolution is one of the commonly referred inference problems in computer vision. In the case of images, this problem is generally addressed using a graphical model framework wherein each node represents a portion of the image and the edges between the nodes represent the statistical dependencies. However, the large dimensionality of images along with the large number of possible states for a node makes the inference problem computationally intractable. In this paper, we propose a representation wherein each node can be represented as acombination of multiple regression functions. The proposed approach achieves a tradeoff between the computational complexity and inference accuracy by varying the number of regression functions for a node.
Keywords: Belief propagation, Graphical model, Regression, Super resolution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15473020 An Augmented Beam-search Based Algorithm for the Strip Packing Problem
Authors: Hakim Akeb, Mhand Hifi
Abstract:
In this paper, the use of beam search and look-ahead strategies for solving the strip packing problem (SPP) is investigated. Given a strip of fixed width W, unlimited length L, and a set of n circular pieces of known radii, the objective is to determine the minimum length of the initial strip that packs all the pieces. An augmented algorithm which combines beam search and a look-ahead strategies is proposed. The look-ahead is used in order to evaluate the nodes at each level of the tree search. The best nodes are then retained for branching. The computational investigation showed that the proposed augmented algorithm is able to improve the best known solutions of the literature on most instances used.
Keywords: Combinatorial optimization, cutting and packing, beam search, heuristic, look-ahead strategy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13573019 A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor
Authors: Asim Kumar Pal, Debabrata Nath, Sumit Chakraborty
Abstract:
This paper presents an economic game for sybil detection in a distributed computing environment. Cost parameters reflecting impacts of different sybil attacks are introduced in the sybil detection game. The optimal strategies for this game in which both sybil and non-sybil identities are expected to participate are devised. A cost sharing economic mechanism called Discriminatory Rewarding Mechanism for Sybil Detection is proposed based on this game. A detective accepts a security deposit from each active agent, negotiates with the agents and offers rewards to the sybils if the latter disclose their identity. The basic objective of the detective is to determine the optimum reward amount for each sybil which will encourage the maximum possible number of sybils to reveal themselves. Maintaining privacy is an important issue for the mechanism since the participants involved in the negotiation are generally reluctant to share their private information. The mechanism has been applied to Tor by introducing a reputation scoring function.Keywords: Game theory, Incentive mechanism, Reputation, Sybil Attack
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17173018 Comparative Analysis of Classical and Parallel Inpainting Algorithms Based on Affine Combinations of Projections on Convex Sets
Authors: Irina Maria Artinescu, Costin Radu Boldea, Eduard-Ionut Matei
Abstract:
The paper is a comparative study of two classical vari-ants of parallel projection methods for solving the convex feasibility problem with their equivalents that involve variable weights in the construction of the solutions. We used a graphical representation of these methods for inpainting a convex area of an image in order to investigate their effectiveness in image reconstruction applications. We also presented a numerical analysis of the convergence of these four algorithms in terms of the average number of steps and execution time, in classical CPU and, alternativaly, in parallel GPU implementation.
Keywords: convex feasibility problem, convergence analysis, ınpainting, parallel projection methods
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4483017 Technology of Thermal Spray Coating Machining
Authors: Jana Petrů, Tomáš Zlámal, Robert Čep, Lenka Čepová
Abstract:
This article is focused on the thermal spray coating machining issue. Those are irreplaceable in many areas of nowadays industrial branches such as aerospace industry, mostly thanks to their excellent qualities in production and also in renovation of machinery parts. The principals of thermal spraying and elementary diversification are described in introduction. Plasma coating method of composite materials – cermets – is described more thoroughly. The second part describes thermal spray coating machining and grinding in detail. This part contains suggestion of appropriate grinding tool and assessment of cutting conditions used for grinding a given part. Conclusion describes a problem which occurred while grinding a cermet thermal spray coating with a specially designed grindstone and a way to solve this problem.
Keywords: Coating, aerospace, plasma, grinding.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 38033016 Addressing the Oracle Problem: Decentralized Authentication in Blockchain-Based Green Hydrogen Certification
Authors: Volker Wannack
Abstract:
The aim of this paper is to present a concept for addressing the Oracle Problem in the context of hydrogen production using renewable energy sources. The proposed approach relies on the authentication of the electricity used for hydrogen production by multiple surrounding actors with similar electricity generation facilities, which attest to the authenticity of the electricity production. The concept introduces an Authenticity Score assigned to each certificate, as well as a Trust Score assigned to each witness. Each certificate must be attested by different actors with a sufficient Trust Score to achieve an Authenticity Score above a predefined threshold, thereby demonstrating that the produced hydrogen is indeed "green."
Keywords: Hydrogen, blockchain, sustainability, structural change.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 723015 An Output Oriented Super-Efficiency Model for Considering Time Lag Effect
Authors: Yanshuang Zhang, Byungho Jeong
Abstract:
There exists some time lag between the consumption of inputs and the production of outputs. This time lag effect should be considered in calculating efficiency of decision making units (DMU). Recently, a couple of DEA models were developed for considering time lag effect in efficiency evaluation of research activities. However, these models can’t discriminate efficient DMUs because of the nature of basic DEA model in which efficiency scores are limited to ‘1’. This problem can be resolved a super-efficiency model. However, a super efficiency model sometimes causes infeasibility problem. This paper suggests an output oriented super-efficiency model for efficiency evaluation under the consideration of time lag effect. A case example using a long term research project is given to compare the suggested model with the MpO model.
Keywords: DEA, Super-efficiency, Time Lag.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26823014 Creating or Destroying Objects Plan in the Graphplan Framework
Authors: Wen-xiang Gu, Zeng-yu Cai, Xin-mei Zhang, Gui-dong Jiang
Abstract:
At present, intelligent planning in the Graphplan framework is a focus of artificial intelligence. While the Creating or Destroying Objects Planning (CDOP) is one unsolved problem of this field, one of the difficulties, too. In this paper, we study this planning problem and bring forward the idea of transforming objects to propositions, based on which we offer an algorithm, Creating or Destroying Objects in the Graphplan framework (CDOGP). Compared to Graphplan, the new algorithm can solve not only the entire problems that Graphplan do, but also a part of CDOP. It is for the first time that we introduce the idea of object-proposition, and we emphasize the discussion on the representations of creating or destroying objects operator and an algorithm in the Graphplan framework. In addition, we analyze the complexity of this algorithm.
Keywords: Graphplan, object_proposition, Creating or destroying objects, CDOGP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12403013 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 743012 Diffusion of Mobile Entertainment in Malaysia: Drivers and Barriers
Authors: C. C. Wong, P. L. Hiew
Abstract:
This research aims to examine the key success factors for the diffusion of mobile entertainment services in Malaysia. The drivers and barriers observed in this research include perceived benefit; concerns pertaining to pricing, product and technological standardization, privacy and security; as well as influences from peers and community. An analysis of a Malaysian survey of 384 respondents between 18 to 25 years shows that subscribers placed greater importance on perceived benefit of mobile entertainment services compared to other factors. Results of the survey also show that there are strong positive correlations between all the factors, with pricing issue–perceived benefit showing the strongest relationship. This paper aims to provide an extensive study on the drivers and barriers that could be used to derive architecture for entertainment service provision to serve as a guide for telcos to outline suitable approaches in order to encourage mass market adoption of mobile entertainment services in Malaysia.Keywords: Barriers, Correlations, Diffusion, Drivers, Mobile Entertainment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22843011 Testing of Electronic Control Unit Communication Interface
Authors: Petr Šimek, Kamil Kostruk
Abstract:
This paper deals with the problem of testing the Electronic Control Unit (ECU) for the specified function validation. Modern ECUs have many functions which need to be tested. This process requires tracking between the test and the specification. The technique discussed in this paper explores the system for automating this process. The paper focuses on the introduction to the problem in general, then it describes the proposed test system concept and its principle. It looks at how the process of the ECU interface specification file for automated interface testing and test tracking works. In the end, the future possible development of the project is discussed.
Keywords: Electronic control unit testing, embedded system, test generate, test automation, process automation, CAN bus, Ethernet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2723010 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.
Keywords: Cloud storage security, sharing storage, attributes, Hash algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10373009 Finite Element Approximation of the Heat Equation under Axisymmetry Assumption
Authors: Raphael Zanella
Abstract:
This works deals with the finite element approximation of axisymmetric problems. The weak formulation of the heat equation under axisymmetry assumption is established for continuous finite elements. The weak formulation is implemented in a C++ solver with implicit time marching. The code is verified by space and time convergence tests using a manufactured solution. An example problem is solved with an axisymmetric formulation and with a 3D formulation. Both formulations lead to the same result but the code based on the axisymmetric formulation is mush faster due to the lower number of degrees of freedom. This confirms the correctness of our approach and the interest of using an axisymmetric formulation when it is possible.
Keywords: Axisymmetric problem, continuous finite elements, heat equation, weak formulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3523008 The Social Area Disclosure to Reduce Conflicts between Community and the State: A Case of Mahakan Fortress, Bangkok
Authors: Saowapa Phaithayawat
Abstract:
The purposes of this study are 1) to study the over 20-year attempt of Mahakan fort community to negotiate with Bangkok Metropolitan Administration (BMA) to remain in their residential area belonging to the state, and 2) to apply the new social and cultural dimension between the state and the community as an alternative for local participation in keeping their residential area. This is a qualitative research, and the findings reveal that the community claimed their ancestors’ right as owners of this piece of land for over 200 years. The community, therefore, requested to take part in the preservation of land, culture and local intellect and the area management in terms of being a learning resource on the cultural road in Rattanakosin Island. However, BMA imposed the law concerning the community area relocation in Rattanakosin Island. The result of law enforcement led to the failure of the area relocation, and the hard hit on physical structure of the area including the overall deterioration of the cultural road renovated in the year 1982, the 200 years’ celebration of Bangkok. The enforcement of law by the state required the move of the community, and the landscape improvement based on the capital city plan. However, this enforcement resulted in the unending conflicts between the community and the state, and the solution of this problem was unclear. At the same time the community has spent a long time opposing the state’s action, and preparing themselves by administrating the community behind Mahakan fortress with community administrative committee under the suggestion of external organization by registering all community members, providing funds for community administration. At the meantime the state lacked the continuation of the enforcement due to political problem and BMA’s administration problem. It is, therefore, suggested that an alternative solution to this problem lie at the negotiation between the state and the community with the purpose of the collaboration between the two to develop the area under the protective law of each side.
Keywords: Pom-Mahakan Community, The Reduction of Conflicts, The Social Area Disclosure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17613007 Multiresolution Approach to Subpixel Registration by Linear Approximation of PSF
Authors: Erol Seke, Kemal Özkan
Abstract:
Linear approximation of point spread function (PSF) is a new method for determining subpixel translations between images. The problem with the actual algorithm is the inability of determining translations larger than 1 pixel. In this paper a multiresolution technique is proposed to deal with the problem. Its performance is evaluated by comparison with two other well known registration method. In the proposed technique the images are downsampled in order to have a wider view. Progressively decreasing the downsampling rate up to the initial resolution and using linear approximation technique at each step, the algorithm is able to determine translations of several pixels in subpixel levels.
Keywords: Point Spread Function, Subpixel translation, Superresolution, Multiresolution approach.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16633006 Complex Energy Signal Model for Digital Human Fingerprint Matching
Authors: Jason Zalev, Reza Sedaghat
Abstract:
This paper describes a complex energy signal model that is isomorphic with digital human fingerprint images. By using signal models, the problem of fingerprint matching is transformed into the signal processing problem of finding a correlation between two complex signals that differ by phase-rotation and time-scaling. A technique for minutiae matching that is independent of image translation, rotation and linear-scaling, and is resistant to missing minutiae is proposed. The method was tested using random data points. The results show that for matching prints the scaling and rotation angles are closely estimated and a stronger match will have a higher correlation.Keywords: Affine Invariant, Fingerprint Recognition, Matching, Minutiae.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13183005 On Estimating the Headcount Index by Using the Logistic Regression Estimator
Authors: Encarnación Álvarez, Rosa M. García-Fernández, Juan F. Muñoz, Francisco J. Blanco-Encomienda
Abstract:
The problem of estimating a proportion has important applications in the field of economics, and in general, in many areas such as social sciences. A common application in economics is the estimation of the headcount index. In this paper, we define the general headcount index as a proportion. Furthermore, we introduce a new quantitative method for estimating the headcount index. In particular, we suggest to use the logistic regression estimator for the problem of estimating the headcount index. Assuming a real data set, results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the traditional estimator of the headcount index.
Keywords: Poverty line, poor, risk of poverty, sample, Monte Carlo simulations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20943004 Emotion Dampening Strategy and Internalizing Problem Behavior: Affect Intensity as Control Variables
Authors: Jia-Ru Li, Chia-Jung Li, Ching-Wen Lin
Abstract:
Contrary to negative emotion regulation, coping with positive moods have received less attention in adolescent adjustment. However, some research has found that everyone is different on dealing with their positive emotions, which affects their adaptation and well-being. The purpose of the present study was to investigate the relationship between positive emotions dampening and internalizing behavior problems of adolescent in Taiwan. A survey was conducted and 208 students (12 to14 years old) completed the strengths and difficulties questionnaire (SDQ), the Affect Intensity Measure, and the positive emotions dampening scale. Analysis methods such as descriptive statistics, t-test, Pearson correlations and multiple regression were adapted. The results were as follows: Emotionality and internalizing problem behavior have significant gender differences. Compared to boys, girls have a higher score on negative emotionality and are at a higher risk for internalizing symptoms. However, there are no gender differences on positive emotion dampening. Additionally, in the circumstance that negative emotionality acted as the control variable, positive emotion dampening strategy was (positive) related to internalizing behavior problems. Given the results of this study, it is suggested that coaching deconstructive positive emotion strategies is to assist adolescents with internalizing behavior problems is encouraged.Keywords: Emotion dampening strategies, internalizing problem behaviors, affect intensity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20193003 Fuzzy Fingerprint Vault using Multiple Polynomials
Authors: Daesung Moon, Woo-Yong Choi, Kiyoung Moon
Abstract:
Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Keywords: Fuzzy vault, fingerprint recognition multiple polynomials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15473002 Training Undergraduate Engineering Students in Robotics and Automation through Model-Based Design Training: A Case Study at Assumption University of Thailand
Authors: Sajed A. Habib
Abstract:
Problem-based learning (PBL) is a student-centered pedagogy that originated in the medical field and has also been used extensively in other knowledge disciplines with recognized advantages and limitations. PBL has been used in various undergraduate engineering programs with mixed outcomes. The current fourth industrial revolution (digital era or Industry 4.0) has made it essential for many science and engineering students to receive effective training in advanced courses such as industrial automation and robotics. This paper presents a case study at Assumption University of Thailand, where a PBL-like approach was used to teach some aspects of automation and robotics to selected groups of undergraduate engineering students. These students were given some basic level training in automation prior to participating in a subsequent training session in order to solve technical problems with increased complexity. The participating students’ evaluation of the training sessions in terms of learning effectiveness, skills enhancement, and incremental knowledge following the problem-solving session was captured through a follow-up survey consisting of 14 questions and a 5-point scoring system. From the most recent training event, an overall 70% of the respondents indicated that their skill levels were enhanced to a much greater level than they had had before the training, whereas 60.4% of the respondents from the same event indicated that their incremental knowledge following the session was much greater than what they had prior to the training. The instructor-facilitator involved in the training events suggested that this method of learning was more suitable for senior/advanced level students than those at the freshmen level as certain skills to effectively participate in such problem-solving sessions are acquired over a period of time, and not instantly.
Keywords: Automation, industry 4.0, model-based design training, problem-based learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10993001 Finite Element Analysis of Sheet Metal Airbending Using Hyperform LS-DYNA
Authors: Himanshu V. Gajjar, Anish H. Gandhi, Harit K. Raval
Abstract:
Air bending is one of the important metal forming processes, because of its simplicity and large field application. Accuracy of analytical and empirical models reported for the analysis of bending processes is governed by simplifying assumption and do not consider the effect of dynamic parameters. Number of researches is reported on the finite element analysis (FEA) of V-bending, Ubending, and air V-bending processes. FEA of bending is found to be very sensitive to many physical and numerical parameters. FE models must be computationally efficient for practical use. Reported work shows the 3D FEA of air bending process using Hyperform LSDYNA and its comparison with, published 3D FEA results of air bending in Ansys LS-DYNA and experimental results. Observing the planer symmetry and based on the assumption of plane strain condition, air bending problem was modeled in 2D with symmetric boundary condition in width. Stress-strain results of 2D FEA were compared with 3D FEA results and experiments. Simplification of air bending problem from 3D to 2D resulted into tremendous reduction in the solution time with only marginal effect on stressstrain results. FE model simplification by studying the problem symmetry is more efficient and practical approach for solution of more complex large dimensions slow forming processes.Keywords: Air V-bending, Finite element analysis, HyperformLS-DYNA, Planner symmetry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32093000 Heat and Mass Transfer in a Saturated Porous Medium Confined in Cylindrical Annular Geometry
Authors: A. Ja, J. Belabid, A. Cheddadi
Abstract:
This paper reports the numerical simulation of doublediffusive natural convection flows within a horizontal annular filled with a saturated porous medium. The analysis concerns the influence of the different parameters governing the problem, namely, the Rayleigh number Ra, the Lewis number Le and the buoyancy ratio N, on the heat and mass transfer and on the flow structure, in the case of a fixed radius ratio R = 2. The numerical model used for the discretization of the dimensionless equations governing the problem is based on the finite difference method, using the ADI scheme. The study is focused on steady-state solutions in the cooperation situation.
Keywords: Natural convection, double-diffusion, porous medium, annular geometry, finite differences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22142999 Mathematical Determination of Tall Square Building Height under Peak Wind Loads
Authors: Debojyoti Mitra
Abstract:
The present study concentrates on solving the along wind oscillation problem of a tall square building from first principles and across wind oscillation problem of the same from empirical relations obtained by experiments. The criterion for human comfort at the worst condition at the top floor of the building is being considered and a limiting value of height of a building for a given cross section is predicted. Numerical integrations are carried out as and when required. The results show severeness of across wind oscillations in comparison to along wind oscillation. The comfort criterion is combined with across wind oscillation results to determine the maximum allowable height of a building for a given square cross-section.
Keywords: Tall Building, Along-wind Response, Across-wind Response, Human Comfort.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1478