Search results for: Attention Multiple Instance Learning
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4344

Search results for: Attention Multiple Instance Learning

1944 The Nature of Intelligence and Its Forms: An Ontological-Modeling Approach

Authors: Husam El-Asfour, Fateh Adhnouss, Kenneth McIsaac, AbdulMutalib Wahaishi, Raafat Aburukba, Idris El-Feghia

Abstract:

Although intelligence is commonly referred to as the observable behavior in various fields and domains, it must also be shown how it develops by exhibiting multiple forms and without observing the inherent behavior. There have been several official and informal definitions of intelligence in various areas; however, no scientific agreement on a definition has been agreed upon. There must be a single definition, structure, and precise modeling for articulating how intelligence is perceived by people and machines in order to comprehend intelligence. Another key challenge is defining the different environment types based on the integral elements (agents) and their possible interactions. On the basis of conceptualization, this paper proposes a formal model for defining and developing intelligence. Forms of intelligence are derived from an ontological view, and thus intelligence is defined, described, and modeled based on the various types of environments.

Keywords: Intelligence, forms, transformation, conceptualization, ontological view.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 421
1943 Performance Analysis of Certificateless Signature for IKE Authentication

Authors: Nazrul M. Ahmad, Asrul H. Yaacob, Ridza Fauzi, Alireza Khorram

Abstract:

Elliptic curve-based certificateless signature is slowly gaining attention due to its ability to retain the efficiency of identity-based signature to eliminate the need of certificate management while it does not suffer from inherent private key escrow problem. Generally, cryptosystem based on elliptic curve offers equivalent security strength at smaller key sizes compared to conventional cryptosystem such as RSA which results in faster computations and efficient use of computing power, bandwidth, and storage. This paper proposes to implement certificateless signature based on bilinear pairing to structure the framework of IKE authentication. In this paper, we perform a comparative analysis of certificateless signature scheme with a well-known RSA scheme and also present the experimental results in the context of signing and verification execution times. By generalizing our observations, we discuss the different trade-offs involved in implementing IKE authentication by using certificateless signature.

Keywords: Certificateless signature, IPSec, RSA signature, IKE authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1800
1942 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: Treaties, national security, Iran, Islamic Revolution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1439
1941 Promoting Electric Vehicles for Sustainable Urban Transport: How to Do It This Time Right

Authors: Reinhard Haas, Amela Ajanovic

Abstract:

In recent years various types of electric vehicles has gained again increasing attention as an environmentally benign technology in transport. Especially for urban areas with high local pollution this Zero-emission technology (at the point of use) is considered to provide proper solutions. Yet, the bad economics and the limited driving ranges are still major barriers for a broader market penetration of battery electric vehicles (BEV) and of fuel cell vehicles (FCV). The major result of our analyses is that the most important precondition for a further dissemination of BEV in urban areas are emission-free zones. This is an instrument which allows the promotion of BEV without providing excessive subsidies. In addition, it is important to note that the full benefits of EV can only be harvested if the electricity used is produced from renewable energy sources. That is to say, it has to be ensured that the use of BEV in urban areas is clearly linked to a green electricity purchase model. And moreover, the introduction of a CO2- emission-based tax system would support this requirement.

Keywords: Electric vehicles, economics, policies, history.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1826
1940 A Worst Case Estimation of the Inspection Rate by a Berthing Policy in a Container Terminal

Authors: K.H. Yang

Abstract:

After the terrorist attack on September 11, 2001 in U.S., the container security issue got high attention, especially by U.S. government, which deployed a lot of measures to promote or improve security systems. U.S. government not only enhances its national security system, but allies with other countries against the potential terrorist attacks in the future. For example CSI (Container Security Initiative), it encourages foreign ports outside U.S. to become CSI ports as a part of U.S. anti-terrorism network. Although promotion of the security could partly reach the goal of anti-terrorism, that will influence the efficiency of container supply chain, which is the main concern when implementing the inspection measurements. This paper proposes a quick estimation methodology for an inspection service rate by a berth allocation heuristic such that the inspection activities will not affect the original container supply chain. Theoretical and simulation results show this approach is effective.

Keywords: Berth allocation, Container, Heuristic, Inspection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1411
1939 Managing User Expectations in Information Systems Development

Authors: Linda, Sau-ling Lai

Abstract:

This paper provides new ways to explore the old problem of failure of information systems development in an organisation. Based on the theory of cognitive dissonance, information systems (IS) failure is defined as a gap between what the users expect from an information system and how well these expectations are met by the perceived performance of the delivered system. Bridging the expectation-perception gap requires that IS professionals make a radical change from being the proprietor of information systems and products to being service providers. In order to deliver systems and services that IS users perceive as valuable, IS people must become expert in determining and assessing users- expectations and perceptions. It is also suggested that the IS community, in general, has given relatively little attention to the front-end process of requirements specification for IS development. There is a simplistic belief that requirements are obtainable from users, they are then translatable into a formal specification. The process of information needs analysis is problematic and worthy of investigation.

Keywords: Information Systems Development, Cognitive Dissonance, Expectation-Perception Gap, Requirements Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3655
1938 Energy Management Techniques in Mobile Robots

Authors: G. Gurguze, I. Turkoglu

Abstract:

Today, the developing features of technological tools with limited energy resources have made it necessary to use energy efficiently. Energy management techniques have emerged for this purpose. As with every field, energy management is vital for robots that are being used in many areas from industry to daily life and that are thought to take up more spaces in the future. Particularly, effective power management in autonomous and multi robots, which are getting more complicated and increasing day by day, will improve the performance and success. In this study, robot management algorithms, usage of renewable and hybrid energy sources, robot motion patterns, robot designs, sharing strategies of workloads in multiple robots, road and mission planning algorithms are discussed for efficient use of energy resources by mobile robots. These techniques have been evaluated in terms of efficient use of existing energy resources and energy management in robots.

Keywords: Energy management, mobile robot, robot administration, robot management, robot planning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570
1937 Representing Uncertainty in Computer-Generated Forces

Authors: Ruibiao J. Guo, Brad Cain, Pierre Meunier

Abstract:

The Integrated Performance Modelling Environment (IPME) is a powerful simulation engine for task simulation and performance analysis. However, it has no high level cognition such as memory and reasoning for complex simulation. This article introduces a knowledge representation and reasoning scheme that can accommodate uncertainty in simulations of military personnel with IPME. This approach demonstrates how advanced reasoning models that support similarity-based associative process, rule-based abstract process, multiple reasoning methods and real-time interaction can be integrated with conventional task network modelling to provide greater functionality and flexibility when modelling operator performance.

Keywords: Computer-Generated Forces, Human Behaviour Representation, IPME, Modelling and Simulation, Uncertainty Reasoning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2117
1936 The Economic Lot Scheduling Problem in Flow Lines with Sequence-Dependent Setups

Authors: M. Heydari, S. A. Torabi

Abstract:

The problem of lot sizing, sequencing and scheduling multiple products in flow line production systems has been studied by several authors. Almost all of the researches in this area assumed that setup times and costs are sequence –independent even though sequence dependent setups are common in practice. In this paper we present a new mixed integer non linear program (MINLP) and a heuristic method to solve the problem in sequence dependent case. Furthermore, a genetic algorithm has been developed which applies this constructive heuristic to generate initial population. These two proposed solution methods are compared on randomly generated problems. Computational results show a clear superiority of our proposed GA for majority of the test problems.

Keywords: Economic lot scheduling problem, finite horizon, genetic algorithm, mixed zero-one nonlinear programming, sequence-dependent.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1538
1935 Proteomic Analysis of Tumor Tissue after Treatment with Ascorbic Acid

Authors: Seyeon Park, Mi Jang

Abstract:

Tumor cells have an invasive and metastatic phenotype that is the main cause of death for cancer patients. Tumor establishment and penetration consists of a series of complex processes involving multiple changes in gene expression. In this study, intraperitoneal administration of a high concentration of ascorbic acid inhibited tumor establishment and decreased tumor mass in BALB/C mice implanted with S-180 sarcoma cancer cells. To identify proteins involved in the ascorbic acid-mediated inhibition of tumor progression, changes in the tumor proteome associated with ascorbic acid treatment of BALB/C mice implanted with S-180 were investigated using two-dimensional gel electrophoresis and mass spectrometry. Twenty protein spots were identified whose expression was different between control and ascorbic acid treatment groups.

Keywords: Ascorbic acid, Proteomic analysis, S-180 implantedBALB/C mouse

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1680
1934 Sovereign Credit Risk Measures

Authors: Kristýna Pokorná, Petr Teplý

Abstract:

This paper focuses on sovereign credit risk meaning a hot topic related to the current Eurozone crisis. In the light of the recent financial crisis, market perception of the creditworthiness of individual sovereigns has changed significantly. Before the outbreak of the financial crisis, market participants did not differentiate between credit risk born by individual states despite different levels of public indebtedness. In the proceeding of the financial crisis, the market participants became aware of the worsening fiscal situation in the European countries and started to discriminate among government issuers. Concerns about the increasing sovereign risk were reflected in surging sovereign risk premium. The main of this paper is to shed light on the characteristics of the sovereign risk with the special attention paid to the mutual relation between credit spread and the CDS premium as the main measures of the sovereign risk premium.

Keywords: cointegration, credit default swap, credit risk, credit spread, sovereign risk

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1956
1933 Road Extraction Using Stationary Wavelet Transform

Authors: Somkait Udomhunsakul

Abstract:

In this paper, a novel road extraction method using Stationary Wavelet Transform is proposed. To detect road features from color aerial satellite imagery, Mexican hat Wavelet filters are used by applying the Stationary Wavelet Transform in a multiresolution, multi-scale, sense and forming the products of Wavelet coefficients at a different scales to locate and identify road features at a few scales. In addition, the shifting of road features locations is considered through multiple scales for robust road extraction in the asymmetry road feature profiles. From the experimental results, the proposed method leads to a useful technique to form the basis of road feature extraction. Also, the method is general and can be applied to other features in imagery.

Keywords: Road extraction, Multiresolution, Stationary Wavelet Transform, Multi-scale analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1878
1932 Contact Stress on the Surface of Gear Teeth with Different Profile

Authors: K. Farhangdoost, H. Heirani

Abstract:

Contact stress is an important problem in industry. This is a problem that in the first attention may be don-t appears, but disregard of these stresses cause a lot of damages in machines. These stresses occur at locations such as gear teeth, bearings, cams and between a locomotive wheel and the railroad rail. These stresses cause failure by excessive elastic deformation, yielding and fracture. In this paper we intend show the effective parameters in contact stress and ponder effect of curvature. In this paper we study contact stresses on the surface of gear teeth and compare these stresses for four popular profiles of gear teeth (involute, cycloid, epicycloids, and hypocycloid). We study this problem with mathematical and finite element methods and compare these two methods on different profile surfaces.

Keywords: Contact stress, Cycloid, Epicycloids, Finite element, Gear, Hypocycloid, Involute, Radius of curvature.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1672
1931 A Grid-based Neural Network Framework for Multimodal Biometrics

Authors: Sitalakshmi Venkataraman

Abstract:

Recent scientific investigations indicate that multimodal biometrics overcome the technical limitations of unimodal biometrics, making them ideally suited for everyday life applications that require a reliable authentication system. However, for a successful adoption of multimodal biometrics, such systems would require large heterogeneous datasets with complex multimodal fusion and privacy schemes spanning various distributed environments. From experimental investigations of current multimodal systems, this paper reports the various issues related to speed, error-recovery and privacy that impede the diffusion of such systems in real-life. This calls for a robust mechanism that caters to the desired real-time performance, robust fusion schemes, interoperability and adaptable privacy policies. The main objective of this paper is to present a framework that addresses the abovementioned issues by leveraging on the heterogeneous resource sharing capacities of Grid services and the efficient machine learning capabilities of artificial neural networks (ANN). Hence, this paper proposes a Grid-based neural network framework for adopting multimodal biometrics with the view of overcoming the barriers of performance, privacy and risk issues that are associated with shared heterogeneous multimodal data centres. The framework combines the concept of Grid services for reliable brokering and privacy policy management of shared biometric resources along with a momentum back propagation ANN (MBPANN) model of machine learning for efficient multimodal fusion and authentication schemes. Real-life applications would be able to adopt the proposed framework to cater to the varying business requirements and user privacies for a successful diffusion of multimodal biometrics in various day-to-day transactions.

Keywords: Back Propagation, Grid Services, MultimodalBiometrics, Neural Networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1917
1930 Assessment of Compaction Temperatures on Hot Mix Asphalt (HMA) Properties

Authors: Houman Saedi

Abstract:

Hot Mix Asphalt (HMA) is one of the most commonest constructed asphalts in Iran and the quality control of constructed roads with HMA have been always paid due attention by researchers. The quality control of constructed roads with this method is being usually carried out by measuring volumetric parameters of HMA marshall samples. One of the important parameters that has a critical role in changing these volumetric parameters is “compaction temperature"; which as a result of its changing, volumetric parameters of Marshall Samples and subsequently constructed asphalt is encountered with variations. In this study, considering the necessity of preservation of the compaction temperature, the effect of various temperatures on Hot Mix Asphalt (HMA) samples properties has been evaluated. As well, to evaluate the effect of this parameter on different grading, two different grading (Top coat index grading and binder index grading) have been used and samples were compacted at 5 various temperatures.

Keywords: Compaction Temperature, HMA, Volumetric Parameters, Marshall Method

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2939
1929 A New Secure Communication Model Based on Synchronization of Coupled Multidelay Feedback Systems

Authors: Thang Manh Hoang

Abstract:

Recent research result has shown that two multidelay feedback systems can synchronize each other under different schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating synchronization. There, the driving signal is significantly complex due that it is constituted by multiple nonlinear transformations of delayed state variable. In this paper, a secure communication model is proposed based on synchronization of coupled multidelay feedback systems, in which the plain signal is mixed with a complex signal at the transmitter side and it is precisely retrieved at the receiver side. The effectiveness of the proposed model is demonstrated and verified in the specific example, where the message signal is masked directly by the complex signal and security is examined under the breaking method of power spectrum analysis.

Keywords: chaos synchronization, time-delayed system, chaosbasedsecure communications

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1995
1928 Numerical Modelling of Effective Diffusivity in Bone Tissue Engineering

Authors: Ayesha Sohail, Khadija Maqbool, Anila Asif, Haroon Ahmad

Abstract:

These days, the field of tissue engineering is getting serious attention due to its usefulness. Bone tissue engineering helps to address and sort-out the critical sized and non-healing orthopedic problems by the creation of manmade bone tissue. We will design and validate an efficient numerical model, which will simulate the effective diffusivity in bone tissue engineering. Our numerical model will be based on the finite element analysis of the diffusion-reaction equations. It will have the ability to optimize the diffusivity, even at multi-scale, with the variation of time. It will also have a special feature “parametric sweep”, with which we will be able to predict the oxygen, glucose and cell density dynamics, more accurately. We will fix these problems by modifying the governing equations, by selecting appropriate spatio-temporal finite element schemes and by transient analysis.

Keywords: Bone tissue engineering, Transient Analysis, Scaffolds, fabrication techniques.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2459
1927 Sewage Sludge Management in Egypt: Current Status and Perspectives towards a Sustainable Agricultural Use

Authors: M. Ghazy, T. Dockhorn, N. Dichtl

Abstract:

The present disposal routes of sewage sludge represent a critical environmental issue in Egypt. Recently, there has been an increasing concern about sewage sludge management due to the environmental risks, which resulted from the fast expansion of wastewater treatment plants without equal attention in dealing with the produced sludge. This paper discusses the current situation of sewage sludge management in Egypt presenting a brief overview of the existing wastewater treatment plants, sludge production and characteristics as well as options of beneficial use and potential demand of sewage sludge under Egyptian conditions. The characteristics of sewage sludge are discussed considering the results of own sampling and analysis as well as previous studies. Furthermore, alternative treatment scenarios for sewage sludge, which have been recently developed in Egypt, are discussed and perspectives for a sustainable agricultural use are outlined.

Keywords: Beneficial use, Egypt, Monetary value, Stabilization processes, Sewage sludge, Sludge management

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4458
1926 The Hybrid Dimming Control System for Solar Charging Robot

Authors: A. Won-Yong Chae, B. Hyung-Nam Kim, C. Kyoung-Jun Lee, D. Hee-Je Kim

Abstract:

The renewable energy has been attracting attention as a new alternative energy due to the problem of environmental pollution and resource depletion. In particular, daylighting and PV system are regarded as the solutions. In this paper, the hybrid dimming control system supplied by solar cell and daylighting system was designed. Daylighting system is main source and PV system is spare source. PV system operates the LED lamp which supports daylighting system because daylighting system is unstable due to the variation of irradiance. In addition, PV system has a role charging batteries. Battery charging has a benefit that PV system operate LED lamp in the bad weather. However, LED lamp always can`t turn on that-s why dimming control system was designed. In particular, the solar charging robot was designed to check the interior irradiance intensity. These systems and the application of the solar charging robot are expected to contribute developing alternative energy in the near future.

Keywords: Daylighting system, PV system, LED lamp, Suntracking robot.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1807
1925 Integrated Power Saving for Multiple Relays and UEs in LTE-TDD

Authors: Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Chen-Ming Yang

Abstract:

In this paper, the design of integrated sleep scheduling for relay nodes and user equipments under a Donor eNB (DeNB) in the mode of Time Division Duplex (TDD) in LTE-A is presented. The idea of virtual time is proposed to deal with the discontinuous pattern of the available radio resource in TDD, and based on the estimation of the traffic load, three power saving schemes in the top-down strategy are presented. Associated mechanisms in each scheme including calculation of the virtual subframe capacity, the algorithm of integrated sleep scheduling, and the mapping mechanisms for the backhaul link and the access link are presented in the paper. Simulation study shows the advantage of the proposed schemes in energy saving over the standard DRX scheme.

Keywords: LTE-A, Relay, TDD, Power Saving.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1160
1924 Determinants and Perspectives of an Accounting Career. Empirical Evidence on Students' Perceptions

Authors: Maria Mădălina Gîrbină, Nadia Albu, Cătălin Nicolae Albu

Abstract:

This study realizes an empirical investigation of main factors to develop an accounting career, stereotypes on accountants and accounting and perceptions on future career path for a sample of master students in accounting. The research provides some insight into what master students consider when choosing their future career paths. The most important two reasons chosen by students were “career opportunities" and “future earnings. They see accounting as structured, governed by conformity, requiring skills in working with numbers, monotonous, accurate, more efficient than effective but also absorbing, interesting and involving a certain degree of novelty. Although these students plan to start their careers in a multinational or accounting/audit firm, most of those plan to leave after five years. It resulted that women value more flexibility and time requiring special attention in retention policies practiced by firms.

Keywords: Accounting career, students' perception, stereotypes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3364
1923 An Evaluation of a Psychotherapeutic Service for Engineering Students: The Role of Race, Gender and Language

Authors: Nazeema Ahmed

Abstract:

Mental health in higher education has received increasing attention over the past few decades. The high academic demands of the engineering degree, coupled with students’ mental health challenges, have led to higher education institutions offering psychotherapeutic services to students. This paper discusses an evaluation of the psychotherapy service at the University of Cape Town. The aim was to determine (i) the efficacy of the service; and (ii) the impact of race, gender, and language of the therapist on the students’ therapeutic process. An online survey was sent to 109 students who attended psychotherapy. The majority expressed favorable experiences of psychotherapy, with reports of increased capacity to engage with their academic work. Most students did not experience the gender, race, or language of the psychologists to be barriers to their therapy. The findings point to a need for ongoing psychological support for students.

Keywords: Psychotherapy, efficacy, engineering, education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 947
1922 Construction Procedures Evaluation of Three Adjacent Tunnels and Excavation Step Effects

Authors: M. Mahdi, N. Shariatmadari

Abstract:

Since, both the relative position of tunnels and the construction procedure affect the soil movement and internal forces in the lining, it is of major concern to study the influence of these factors on the tunnel design. Construction procedures of tunnels have considerable effects on the magnitude of surface movements and lining stresses. This paper describes numerical analysis of construction procedure of a three adjacent shallow tunnels at high groundwater levels using the commercial finite difference software (FLAC-3D). The aim of this study is to determinate the most suitable construction procedure for the three tunnels and the optimum excavation step in Tehran Metro tunnels in order to optimize the surface settlements and lining stresses.

Keywords: Shallow tunnel, multiple tunnels, construction procedure, surface movement, numerical modeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2428
1921 Elimination Noise by Adaptive Wavelet Threshold

Authors: Iman Elyasi, Sadegh Zarmehi

Abstract:

Due to some reasons, observed images are degraded which are mainly caused by noise. Recently image denoising using the wavelet transform has been attracting much attention. Waveletbased approach provides a particularly useful method for image denoising when the preservation of edges in the scene is of importance because the local adaptivity is based explicitly on the values of the wavelet detail coefficients. In this paper, we propose several methods of noise removal from degraded images with Gaussian noise by using adaptive wavelet threshold (Bayes Shrink, Modified Bayes Shrink and Normal Shrink). The proposed thresholds are simple and adaptive to each subband because the parameters required for estimating the threshold depend on subband data. Experimental results show that the proposed thresholds remove noise significantly and preserve the edges in the scene.

Keywords: Image denoising, Bayes Shrink, Modified Bayes Shrink, Normal Shrink.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2473
1920 Effect of Geometrical Parameters on Natural Frequencies of FGM Cylindrical shell with Holes Under Various Boundary Conditions

Authors: Mostafa Ghayour, Mohammad Sadegh Golabi

Abstract:

In the recent years, functionally gradient materials (FGMs) have gained considerable attention in the high temperature environment applications. In this paper, free vibration of thin functionally graded cylindrical shell with hole composed of stainless steel and zirconia is studied. The mechanical properties vary smoothly and continuously from one surface to the other according to a volume fraction power-law distribution. The Influence of shell geometrical parameters, variations of volume fractions and boundary conditions on natural frequency is considered. The equations of motion are based on strains-displacement relations from Love-s shell theory and Rayleigh method. The results have been obtained for natural frequencies of cylindrical shell with holes for different shape, number and location in this paper.

Keywords: Functionally gradient material, Vibration, various boundary conditions, cylindrical shells.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1809
1919 A Research on Inference from Multiple Distance Variables in Hedonic Regression – Focus on Three Variables

Authors: Yan Wang, Yasushi Asami, Yukio Sadahiro

Abstract:

In urban context, urban nodes such as amenity or hazard will certainly affect house price, while classic hedonic analysis will employ distance variables measured from each urban nodes. However, effects from distances to facilities on house prices generally do not represent the true price of the property. Distance variables measured on the same surface are suffering a problem called multicollinearity, which is usually presented as magnitude variance and mean value in regression, errors caused by instability. In this paper, we provided a theoretical framework to identify and gather the data with less bias, and also provided specific sampling method on locating the sample region to avoid the spatial multicollinerity problem in three distance variable’s case.

Keywords: Hedonic regression, urban node, distance variables, multicollinerity, collinearity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1994
1918 A Hybrid Particle Swarm Optimization-Nelder- Mead Algorithm (PSO-NM) for Nelson-Siegel- Svensson Calibration

Authors: Sofia Ayouche, Rachid Ellaia, Rajae Aboulaich

Abstract:

Today, insurers may use the yield curve as an indicator evaluation of the profit or the performance of their portfolios; therefore, they modeled it by one class of model that has the ability to fit and forecast the future term structure of interest rates. This class of model is the Nelson-Siegel-Svensson model. Unfortunately, many authors have reported a lot of difficulties when they want to calibrate the model because the optimization problem is not convex and has multiple local optima. In this context, we implement a hybrid Particle Swarm optimization and Nelder Mead algorithm in order to minimize by least squares method, the difference between the zero-coupon curve and the NSS curve.

Keywords: Optimization, zero-coupon curve, Nelson-Siegel- Svensson, Particle Swarm Optimization, Nelder-Mead Algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1491
1917 The Emerging Global Judicial Ethics: Issues and Problems

Authors: Caroline Foulquier-Expert

Abstract:

In many states around the world, actions to improve judicial ethics are developing significantly through the production of professional standards for judges. The quest to improve the ethics of judges is legitimate. However, as this development tends to be very important at the moment, some risks it presents must be highlighted. Indeed, if the objective of improving Judges’ Ethics is legitimate, it can also lead to banalization of justice, reinforcement of criticism against the judiciary and to broach incidentally the question of the limits of judgment, which is most perilous for the independence of the judiciary. This research, based on case studies, interviews with judges and an analysis of the literature on this topic (mainly from the United States of America and European Union Member States), tends to draw attention to the fact that the result of the development of these professional standards is that the ethical requirements of judges become ethical requirements of justice, which is an undesirable effect of which we must be aware, in order to prevent it.

Keywords: Judicial Ethics, Codes of conduct, Independence, Limits of Judgment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 903
1916 Parametric Analysis on Information Technology Adoption and Organizational Efficiency in Northern Nigeria

Authors: A. Y. Dutse, S. I. Ningi

Abstract:

The adoption and diffusion of Information Technology (IT) is one of the fastest growing trends in organizations operating within Nigeria’s economy. Public and private organizations make huge capital investments in an attempt acquire and adopt the state-of-the-art IT for improving operational efficiency. In this study the level of IT adoption is considered the primary driver of efficiency witnessed by organizations. The research gathered data on the intensity of IT usage, and resultant efficiency increase in the organizations’ operations. The data was analyzed using multiple regression analysis and reveals that high level of IT usage has enhance efficiency of private and public organizations in Northern part of Nigeria with organizations having strategic intent on IT adoption indicating higher efficiency gains.

Keywords: IT Adoption, Nigeria, Organizational efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1373
1915 A Validation Technique for Integrated Ontologies

Authors: Neli P. Zlatareva

Abstract:

Ontology validation is an important part of web applications’ development, where knowledge integration and ontological reasoning play a fundamental role. It aims to ensure the consistency and correctness of ontological knowledge and to guarantee that ontological reasoning is carried out in a meaningful way. Existing approaches to ontology validation address more or less specific validation issues, but the overall process of validating web ontologies has not been formally established yet. As the size and the number of web ontologies continue to grow, more web applications’ developers will rely on the existing repository of ontologies rather than develop ontologies from scratch. If an application utilizes multiple independently created ontologies, their consistency must be validated and eventually adjusted to ensure proper interoperability between them. This paper presents a validation technique intended to test the consistency of independent ontologies utilized by a common application.

Keywords: Knowledge engineering, ontological reasoning, ontology validation, semantic web.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1934