CINXE.COM
Search results for: beep belief net-works
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: beep belief net-works</title> <meta name="description" content="Search results for: beep belief net-works"> <meta name="keywords" content="beep belief net-works"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="beep belief net-works" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="beep belief net-works"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3263</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: beep belief net-works</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3263</span> Gender Recognition with Deep Belief Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqi%20Jia">Xiaoqi Jia</a>, <a href="https://publications.waset.org/abstracts/search?q=Qing%20Zhu"> Qing Zhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Hao%20Zhang"> Hao Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Su%20Yang"> Su Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender%20recognition" title="gender recognition">gender recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works" title=" beep belief net-works"> beep belief net-works</a>, <a href="https://publications.waset.org/abstracts/search?q=semi-supervised%20learning" title=" semi-supervised learning"> semi-supervised learning</a>, <a href="https://publications.waset.org/abstracts/search?q=greedy-layer%20wise%20RBMs" title=" greedy-layer wise RBMs"> greedy-layer wise RBMs</a> </p> <a href="https://publications.waset.org/abstracts/56147/gender-recognition-with-deep-belief-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56147.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">452</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3262</span> A Critical Analysis of Cognitive Explanations of Afterlife Belief</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahdi%20Biabanaki">Mahdi Biabanaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Religion is present in all human societies and has been for tens of thousands of years. What is noteworthy is that although religious traditions vary in different societies, there are considerable similarities in their religious beliefs. In all human cultures, for example, there is a widespread belief in the afterlife. Cognitive science of Religion (CSR), an emerging branch of cognitive science, searches for the root of these widespread similarities and the widespread prevalence of beliefs such as beliefs in the afterlife in common mental structures among humans. Accordingly, the cognitive architecture of the human mind has evolved to produce such beliefs automatically and non-reflectively. For CSR researchers, belief in the afterlife is an intuitive belief resulting from the functioning of mental tools. Our purpose in this article is to extract and evaluate the cognitive explanations presented in the CSR field for explaining beliefs in the afterlife. Our research shows that there are two basic theories in this area of CSR, namely "intuitive dualism" and "simulation constraint" theory. We show that these two theories face four major challenges and limitations in explaining belief in the afterlife: inability to provide a causal explanation, inability to explain cultural/religious differences in afterlife belief, the lack of distinction between the natural and the rational foundations of belief in the afterlife and disregarding the supernatural foundations of the afterlife belief. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=afterlife" title="afterlife">afterlife</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20science%20of%20religion" title=" cognitive science of religion"> cognitive science of religion</a>, <a href="https://publications.waset.org/abstracts/search?q=intuitive%20dualism" title=" intuitive dualism"> intuitive dualism</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation%20constraint" title=" simulation constraint"> simulation constraint</a> </p> <a href="https://publications.waset.org/abstracts/129437/a-critical-analysis-of-cognitive-explanations-of-afterlife-belief" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129437.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3261</span> Changes in Religious Belief after Flood Disasters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sapora%20Sipon">Sapora Sipon</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Fo%E2%80%99ad%20Sakdan"> Mohd Fo’ad Sakdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Che%20Su%20Mustaffa"> Che Su Mustaffa</a>, <a href="https://publications.waset.org/abstracts/search?q=Najib%20Ahmad%20Marzuki"> Najib Ahmad Marzuki</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamad%20Sukeri%20Khalid"> Mohamad Sukeri Khalid</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Taib%20Ariffin"> Mohd Taib Ariffin</a>, <a href="https://publications.waset.org/abstracts/search?q=Husni%20Mohd%20Radzi"> Husni Mohd Radzi</a>, <a href="https://publications.waset.org/abstracts/search?q=Salhah%20Abdullah"> Salhah Abdullah </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Flood disasters occur throughout the world including Malaysia. The major flood disaster that hit Malaysia in the 2014-2015 episodes proved the psychosocial and mental health consequences such as vivid images of destruction, upheaval, death and loss of lives. Flood, flood survivors reported that flood has changed one looks at their religious belief. The main objective of this paper is to investigate the changes in religious belief after the 2014-2015 Malaysia flood disaster. The total population of 1300 respondents who experienced the 2014-2015 Malaysia flood were surveyed a month after the disaster. The questionnaires were used to measure religiosity and stress. The results provide compelling evidence that religion played an important role in the lives of Malaysia flood disasters’ survivor where more than half of the respondents (>75%) experiencing the strengthening of their religious belief. It was also reported the victims’ strengthening of their religious belief proved to be a powerful factor in reducing stress in the aftermath of the flood. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=religious%20belief" title="religious belief">religious belief</a>, <a href="https://publications.waset.org/abstracts/search?q=flood%20disaster" title=" flood disaster"> flood disaster</a>, <a href="https://publications.waset.org/abstracts/search?q=humanity" title=" humanity"> humanity</a>, <a href="https://publications.waset.org/abstracts/search?q=society" title=" society"> society</a> </p> <a href="https://publications.waset.org/abstracts/30104/changes-in-religious-belief-after-flood-disasters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30104.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3260</span> A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Moalla">H. Moalla</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Frikha"> A. Frikha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=belief%20function%20theory" title="belief function theory">belief function theory</a>, <a href="https://publications.waset.org/abstracts/search?q=incomplete%20information" title=" incomplete information"> incomplete information</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20criteria%20analysis" title=" multiple criteria analysis"> multiple criteria analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=PROMETHEE%20method" title=" PROMETHEE method"> PROMETHEE method</a> </p> <a href="https://publications.waset.org/abstracts/96791/a-promethee-belief-approach-for-multi-criteria-decision-making-problems-with-incomplete-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96791.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3259</span> Performance Enrichment of Deep Feed Forward Neural Network and Deep Belief Neural Networks for Fault Detection of Automobile Gearbox Using Vibration Signal</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Praveenkumar">T. Praveenkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Kulpreet%20Singh"> Kulpreet Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Divy%20Bhanpuriya"> Divy Bhanpuriya</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Saimurugan"> M. Saimurugan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study analysed the classification accuracy for gearbox faults using Machine Learning Techniques. Gearboxes are widely used for mechanical power transmission in rotating machines. Its rotating components such as bearings, gears, and shafts tend to wear due to prolonged usage, causing fluctuating vibrations. Increasing the dependability of mechanical components like a gearbox is hampered by their sealed design, which makes visual inspection difficult. One way of detecting impending failure is to detect a change in the vibration signature. The current study proposes various machine learning algorithms, with aid of these vibration signals for obtaining the fault classification accuracy of an automotive 4-Speed synchromesh gearbox. Experimental data in the form of vibration signals were acquired from a 4-Speed synchromesh gearbox using Data Acquisition System (DAQs). Statistical features were extracted from the acquired vibration signal under various operating conditions. Then the extracted features were given as input to the algorithms for fault classification. Supervised Machine Learning algorithms such as Support Vector Machines (SVM) and unsupervised algorithms such as Deep Feed Forward Neural Network (DFFNN), Deep Belief Networks (DBN) algorithms are used for fault classification. The fusion of DBN & DFFNN classifiers were architected to further enhance the classification accuracy and to reduce the computational complexity. The fault classification accuracy for each algorithm was thoroughly studied, tabulated, and graphically analysed for fused and individual algorithms. In conclusion, the fusion of DBN and DFFNN algorithm yielded the better classification accuracy and was selected for fault detection due to its faster computational processing and greater efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20belief%20networks" title="deep belief networks">deep belief networks</a>, <a href="https://publications.waset.org/abstracts/search?q=DBN" title=" DBN"> DBN</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20feed%20forward%20neural%20network" title=" deep feed forward neural network"> deep feed forward neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=DFFNN" title=" DFFNN"> DFFNN</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20diagnosis" title=" fault diagnosis"> fault diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=fusion%20of%20algorithm" title=" fusion of algorithm"> fusion of algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=vibration%20signal" title=" vibration signal"> vibration signal</a> </p> <a href="https://publications.waset.org/abstracts/126562/performance-enrichment-of-deep-feed-forward-neural-network-and-deep-belief-neural-networks-for-fault-detection-of-automobile-gearbox-using-vibration-signal" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126562.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3258</span> Belief-Based Games: An Appropriate Tool for Uncertain Strategic Situation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saied%20Farham-Nia">Saied Farham-Nia</a>, <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Ghaffari-Hadigheh"> Alireza Ghaffari-Hadigheh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Game theory is a mathematical tool to study the behaviors of a rational and strategic decision-makers, that analyze existing equilibrium in interest conflict situation and provides an appropriate mechanisms for cooperation between two or more player. Game theory is applicable for any strategic and interest conflict situation in politics, management and economics, sociology and etc. Real worlds’ decisions are usually made in the state of indeterminacy and the players often are lack of the information about the other players’ payoffs or even his own, which leads to the games in uncertain environments. When historical data for decision parameters distribution estimation is unavailable, we may have no choice but to use expertise belief degree, which represents the strength with that we believe the event will happen. To deal with belief degrees, we have use uncertainty theory which is introduced and developed by Liu based on normality, duality, subadditivity and product axioms to modeling personal belief degree. As we know, the personal belief degree heavily depends on the personal knowledge concerning the event and when personal knowledge changes, cause changes in the belief degree too. Uncertainty theory not only theoretically is self-consistent but also is the best among other theories for modeling belief degree on practical problem. In this attempt, we primarily reintroduced Expected Utility Function in uncertainty environment according to uncertainty theory axioms to extract payoffs. Then, we employed Nash Equilibrium to investigate the solutions. For more practical issues, Stackelberg leader-follower Game and Bertrand Game, as a benchmark models are discussed. Compared to existing articles in the similar topics, the game models and solution concepts introduced in this article can be a framework for problems in an uncertain competitive situation based on experienced expert’s belief degree. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title="game theory">game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty%20theory" title=" uncertainty theory"> uncertainty theory</a>, <a href="https://publications.waset.org/abstracts/search?q=belief%20degree" title=" belief degree"> belief degree</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertain%20expected%20value" title=" uncertain expected value"> uncertain expected value</a>, <a href="https://publications.waset.org/abstracts/search?q=Nash%20equilibrium" title=" Nash equilibrium"> Nash equilibrium</a> </p> <a href="https://publications.waset.org/abstracts/42359/belief-based-games-an-appropriate-tool-for-uncertain-strategic-situation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42359.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3257</span> Comparing Community Detection Algorithms in Bipartite Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ehsan%20Khademi">Ehsan Khademi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahdi%20Jalili"> Mahdi Jalili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite the special features of bipartite networks, they are common in many systems. Real-world bipartite networks may show community structure, similar to what one can find in one-mode networks. However, the interpretation of the community structure in bipartite networks is different as compared to one-mode networks. In this manuscript, we compare a number of available methods that are frequently used to discover community structure of bipartite networks. These networks are categorized into two broad classes. One class is the methods that, first, transfer the network into a one-mode network, and then apply community detection algorithms. The other class is the algorithms that have been developed specifically for bipartite networks. These algorithms are applied on a model network with prescribed community structure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20detection" title="community detection">community detection</a>, <a href="https://publications.waset.org/abstracts/search?q=bipartite%20networks" title=" bipartite networks"> bipartite networks</a>, <a href="https://publications.waset.org/abstracts/search?q=co-clustering" title=" co-clustering"> co-clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=modularity" title=" modularity"> modularity</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20projection" title=" network projection"> network projection</a>, <a href="https://publications.waset.org/abstracts/search?q=complex%20networks" title=" complex networks"> complex networks</a> </p> <a href="https://publications.waset.org/abstracts/14451/comparing-community-detection-algorithms-in-bipartite-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14451.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">625</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3256</span> Evil Eye's Effects on Individual's Mental Health</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikolaos%20Souvlakis">Nikolaos Souvlakis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the prominent phenomena that have survived even in the 21st century, when science is gaining more and more space in the scientific world, is the evil eye within non-Westernized societies and more specifically in Greek culture. The presentation is based on the Christian Orthodox beliefs and folklore about the evil eye. Evil eye occupies an important role in individuals' everyday life and it is fuelled by Satanic powers. Satanic powers and the belief on them have an immense effect on individual's well-being and mental health causing spiritual suffering. The present paper examines the psychological manifestations of the belief of evil eye in individuals' mental health and the ways to protect from it according to the Greek Orthodox tradition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spirituality" title="spirituality">spirituality</a>, <a href="https://publications.waset.org/abstracts/search?q=belief" title=" belief"> belief</a>, <a href="https://publications.waset.org/abstracts/search?q=evil%20eye" title=" evil eye"> evil eye</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=well-being" title=" well-being"> well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=healing" title=" healing"> healing</a> </p> <a href="https://publications.waset.org/abstracts/13774/evil-eyes-effects-on-individuals-mental-health" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">504</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3255</span> Assessing the Attitude and Belief towards Online Advertisement in Pakistan and China Mainland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prih%20Bukhari">Prih Bukhari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the proposed paper is to determine if the perception of online advertisement formed due to attitude and belief vary among two different countries or not. Specifically, it seeks to find out how people from China and Pakistan perceive online advertisement. Public attitude and belief towards advertising have been a focus of attention to explore a path to a better strategy of advertising. The ‘belief’ factor was analyzed through 4 items, i.e., product information, entertainment, and increase in economy’ whereas, the ‘attitude’ factor was analyzed thorough questions based on 4 items, i.e. ‘overall, I consider online advertising a good thing’; 'overall, I like online advertising’; ‘'I consider online advertising very essential’; and 'I would describe my overall attitude toward online advertising very favorably’. As such, it provides theoretical basis to explain similarities and differences of beliefs and attitude towards advertising across the two countries. Given its mixed method approach, both quantitative and qualitative method is used to carry out research. A questionnaire-based survey and focus group interviews were conducted. The sample size was of 500 participants. For analysis survey copies were then collected from which 497 were received whereas focus group interviews were collected from both nations. The findings showed that the belief factor among both countries had no significant relation with the perception of online advertisement. However, the attitude had a significant relation with the perception about online advertisement. Also it was observed that despite of different backgrounds, perception about online advertisement based on beliefs and attitude were found largely to be similar. Implications and future studies are provided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=belief" title=" belief"> belief</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20advertisement" title=" online advertisement"> online advertisement</a>, <a href="https://publications.waset.org/abstracts/search?q=perception" title=" perception"> perception</a> </p> <a href="https://publications.waset.org/abstracts/100938/assessing-the-attitude-and-belief-towards-online-advertisement-in-pakistan-and-china-mainland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3254</span> The Effect of Technology on Legal Securities and Privacy Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nancy%20Samuel%20Reyad%20Farhan">Nancy Samuel Reyad Farhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> even though international crook law has grown considerably inside the ultimate decades, it still remains fragmented and lacks doctrinal cohesiveness. Its idea is defined within the doctrine as pretty disputable. there is no concrete definition of the term. in the home doctrine, the hassle of crook law troubles that rise up within the worldwide setting, and international troubles that get up in the national crook regulation, is underdeveloped each theoretically and nearly. To the exceptional of writer’s know-how, there aren't any studies describing worldwide elements of crook law in a complete way, taking a more expansive view of the difficulty. This paper provides consequences of a part of the doctoral studies, assignment a theoretical framework of the worldwide crook law. It ambitions at checking out the present terminology on international components of criminal law. It demonstrates differences among the notions of global crook regulation, criminal regulation international and law worldwide crook. It confronts the belief of crook regulation with associated disciplines and indicates their interplay. It specifies the scope of international criminal regulation. It diagnoses the contemporary criminal framework of global components of criminal regulation, referring to each crook law issues that rise up inside the international setting, and international problems that rise up within the context of national criminal law. ultimately, de lege lata postulates had been formulated and route of modifications in global criminal law turned into proposed. The followed studies hypothesis assumed that the belief of international criminal regulation became inconsistent, not understood uniformly, and there has been no conformity as to its location inside the system of regulation, objective and subjective scopes, while the domestic doctrine did not correspond with international requirements and differed from the global doctrine. applied research strategies covered inter alia a dogmatic and legal technique, an analytical technique, a comparative approach, in addition to desk studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20issues" title="social networks privacy issues">social networks privacy issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20issues" title=" social networks security issues"> social networks security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20precautions%20measures" title=" social networks privacy precautions measures"> social networks privacy precautions measures</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20precautions%20measures" title=" social networks security precautions measures"> social networks security precautions measures</a> </p> <a href="https://publications.waset.org/abstracts/190040/the-effect-of-technology-on-legal-securities-and-privacy-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190040.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">30</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3253</span> Dynamic Risk Model for Offshore Decommissioning Using Bayesian Belief Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20O.%20Babaleye">Ahmed O. Babaleye</a>, <a href="https://publications.waset.org/abstracts/search?q=Rafet%20E.%20Kurt"> Rafet E. Kurt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The global oil and gas industry is beginning to witness an increase in the number of installations moving towards decommissioning. Decommissioning of offshore installations is a complex, costly and hazardous activity, making safety one of the major concerns. Among existing removal options, complete and partial removal options pose the highest risks. Therefore, a dynamic risk model of the accidents from the two options is important to assess the risks on an overall basis. In this study, a risk-based safety model is developed to conduct quantitative risk analysis (QRA) for jacket structure systems failure. Firstly, bow-tie (BT) technique is utilised to model the causal relationship between the system failure and potential accident scenarios. Subsequently, to relax the shortcomings of BT, Bayesian Belief Networks (BBNs) were established to dynamically assess associated uncertainties and conditional dependencies. The BBN is developed through a similitude mapping of the developed bow-tie. The BBN is used to update the failure probabilities of the contributing elements through diagnostic analysis, thus, providing a case-specific and realistic safety analysis method when compared to a bow-tie. This paper presents the application of dynamic safety analysis to guide the allocation of risk control measures and consequently, drive down the avoidable cost of remediation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20belief%20network" title="Bayesian belief network">Bayesian belief network</a>, <a href="https://publications.waset.org/abstracts/search?q=offshore%20decommissioning" title=" offshore decommissioning"> offshore decommissioning</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20safety%20model" title=" dynamic safety model"> dynamic safety model</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20risk%20analysis" title=" quantitative risk analysis"> quantitative risk analysis</a> </p> <a href="https://publications.waset.org/abstracts/90041/dynamic-risk-model-for-offshore-decommissioning-using-bayesian-belief-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">280</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3252</span> Social Semiotics in the Selected Films of Chito S. Roño</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hannah%20Jennica%20P.%20Ello">Hannah Jennica P. Ello</a>, <a href="https://publications.waset.org/abstracts/search?q=Regina%20Via%20G.%20Garcia"> Regina Via G. Garcia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Films are famous expressions of art in the country. As an expression of art, it serves as a medium in which a culture is reflected. This paper studied how films reflected the Filipino culture. In this study, social semiotics was used to analyze the semiotic resources identified in the film. The films studied were 'Feng Shui', 'Sukob', and 'The Healing', which were three of the highest grossing horror films of Chito S. Roño. The objectives of the paper were (1) to identify the semiotic resources in the film, (2) to extract their meanings, and (3) to determine how these resources were perceived in the Filipino culture. The semiotic resources identified in each film are organized into three categories: color, practices and supernatural occurrences. Each semiotic resource is analyzed through the four dimensions of social semiotics, genre, style, modality, and discourse. For color, some of the semiotic resources identified are red, white and blue; for practices, Hagiolatry, and Mariolatry, faith healing and the belief in superstitions; and for supernatural occurrences, haunting ghosts, doppelganger attacks and returning from the dead were identified. The practices that are prominent in the films are Hagiolatry and Mariolatry, belief in feng shui and belief in faith healers and albularyos. The belief of these practices shows that Filipinos have a dual faith; belief in religion and a belief in superstitions. In short, Filipinos highly practice folk Catholicism and because of this, a mixture of different cultures can be seen, as having molded the Filipino culture to what it is today. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culture" title="culture">culture</a>, <a href="https://publications.waset.org/abstracts/search?q=film" title=" film"> film</a>, <a href="https://publications.waset.org/abstracts/search?q=semiotics" title=" semiotics"> semiotics</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20semiotics" title=" social semiotics"> social semiotics</a> </p> <a href="https://publications.waset.org/abstracts/76923/social-semiotics-in-the-selected-films-of-chito-s-rono" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76923.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3251</span> Inferential Reasoning for Heterogeneous Multi-Agent Mission</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sagir%20M.%20Yusuf">Sagir M. Yusuf</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Baber"> Chris Baber</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We describe issues bedeviling the coordination of heterogeneous (different sensors carrying agents) multi-agent missions such as belief conflict, situation reasoning, etc. We applied Bayesian and agents' presumptions inferential reasoning to solve the outlined issues with the heterogeneous multi-agent belief variation and situational-base reasoning. Bayesian Belief Network (BBN) was used in modeling the agents' belief conflict due to sensor variations. Simulation experiments were designed, and cases from agents’ missions were used in training the BBN using gradient descent and expectation-maximization algorithms. The output network is a well-trained BBN for making inferences for both agents and human experts. We claim that the Bayesian learning algorithm prediction capacity improves by the number of training data and argue that it enhances multi-agents robustness and solve agents’ sensor conflicts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20constraint%20optimization%20problem" title="distributed constraint optimization problem">distributed constraint optimization problem</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent%20system" title=" multi-agent system"> multi-agent system</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-robot%20coordination" title=" multi-robot coordination"> multi-robot coordination</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20system" title=" autonomous system"> autonomous system</a>, <a href="https://publications.waset.org/abstracts/search?q=swarm%20intelligence" title=" swarm intelligence"> swarm intelligence</a> </p> <a href="https://publications.waset.org/abstracts/116896/inferential-reasoning-for-heterogeneous-multi-agent-mission" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116896.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3250</span> Health Trajectory Clustering Using Deep Belief Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farshid%20Hajati">Farshid Hajati</a>, <a href="https://publications.waset.org/abstracts/search?q=Federico%20Girosi"> Federico Girosi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shima%20Ghassempour"> Shima Ghassempour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We present a Deep Belief Network (DBN) method for clustering health trajectories. Deep Belief Network (DBN) is a deep architecture that consists of a stack of Restricted Boltzmann Machines (RBM). In a deep architecture, each layer learns more complex features than the past layers. The proposed method depends on DBN in clustering without using back propagation learning algorithm. The proposed DBN has a better a performance compared to the deep neural network due the initialization of the connecting weights. We use Contrastive Divergence (CD) method for training the RBMs which increases the performance of the network. The performance of the proposed method is evaluated extensively on the Health and Retirement Study (HRS) database. The University of Michigan Health and Retirement Study (HRS) is a nationally representative longitudinal study that has surveyed more than 27,000 elderly and near-elderly Americans since its inception in 1992. Participants are interviewed every two years and they collect data on physical and mental health, insurance coverage, financial status, family support systems, labor market status, and retirement planning. The dataset is publicly available and we use the RAND HRS version L, which is easy to use and cleaned up version of the data. The size of sample data set is 268 and the length of the trajectories is equal to 10. The trajectories do not stop when the patient dies and represent 10 different interviews of live patients. Compared to the state-of-the-art benchmarks, the experimental results show the effectiveness and superiority of the proposed method in clustering health trajectories. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=health%20trajectory" title="health trajectory">health trajectory</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=DBN" title=" DBN"> DBN</a> </p> <a href="https://publications.waset.org/abstracts/37834/health-trajectory-clustering-using-deep-belief-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">369</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3249</span> Health Belief Model on Smoking Behaviors Causing Lung Cancer: A Cross-Sectional Study in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dujrudee%20Chinwong">Dujrudee Chinwong</a>, <a href="https://publications.waset.org/abstracts/search?q=Chanida%20Prompantakorn"> Chanida Prompantakorn</a>, <a href="https://publications.waset.org/abstracts/search?q=Ubonphan%20Chaichana"> Ubonphan Chaichana</a>, <a href="https://publications.waset.org/abstracts/search?q=Surarong%20Chinwong"> Surarong Chinwong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: Understanding the university students’ perceptions on smoking caused lung cancer based on the Health Belief Model should help health care providers in assisting them to quit smoking. Thus, this study aimed to investigate the University students’ health belief in smoking behaviors caused lung cancer, which based on the Health Belief Model. Methods: Data were collected from voluntary participants using a self-administered questionnaire. Participants were students studying at a University in northern Thailand who were current smokers; they were selected using snowball sampling. Results: Of 361 students, 84% were males; 78% smoked not more than 10 cigarettes a day; 68% intended to quit smoking. Our findings, based on the health belief model, showed that 1) perceived susceptibility: participants strongly believed that if they did not stop smoking, they were at high risk of lung cancer (88%); 2) perceived severity: they strongly believed that they had a high chance of death from lung cancer if they continued smoking (84%); 3) perceived benefits: they strongly believed that quitting smoking could reduce the chance of developing lung cancer; 4) perceived barriers of quitting smoking: they strongly believed in the difficulty of quitting smoking because it needed a high effort and strong intention (69%); 5) perceived self-efficacy: however, they strongly believed that they can quit smoking right away if they had a strong intention to quit smoking (70%); 6) cues to action: they strongly believed in the support of parents (85%) and lovers (78%) in helping them to quit smoking. Further, they believed that limitation on smoking area in the University and smoking cessation services provided by the University can assist them to quit smoking. Conclusion: The Health Belief Model helps us to understand students’ smoking behaviors caused lung cancer. This could lead to designing a smoking cessation program to assist students to quit smoking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=health%20belief%20model" title="health belief model">health belief model</a>, <a href="https://publications.waset.org/abstracts/search?q=lung%20cancer" title=" lung cancer"> lung cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=smoking" title=" smoking"> smoking</a>, <a href="https://publications.waset.org/abstracts/search?q=Thailand" title=" Thailand"> Thailand</a> </p> <a href="https://publications.waset.org/abstracts/70354/health-belief-model-on-smoking-behaviors-causing-lung-cancer-a-cross-sectional-study-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70354.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3248</span> Factors Related with Self-Care Behaviors among Iranian Type 2 Diabetic Patients: An Application of Health Belief Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Soroush">Ali Soroush</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehdi%20Mirzaei%20Alavijeh"> Mehdi Mirzaei Alavijeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Touraj%20Ahmadi%20Jouybari"> Touraj Ahmadi Jouybari</a>, <a href="https://publications.waset.org/abstracts/search?q=Fazel%20Zinat-Motlagh"> Fazel Zinat-Motlagh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abbas%20Aghaei"> Abbas Aghaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Mari%20Ataee"> Mari Ataee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Diabetes is a disease with long cardiovascular, renal, ophthalmic and neural complications. It is prevalent all around the world including Iran, and its prevalence is increasing. The aim of this study was to determine the factors related to self-care behavior based on health belief model among sample of Iranian diabetic patients. This cross-sectional study was conducted among 301 type 2 diabetic patients in Gachsaran, Iran. Data collection was based on an interview and the data were analyzed by SPSS version 20 using ANOVA, t-tests, Pearson correlation, and linear regression statistical tests at 95% significant level. Linear regression analyses showed the health belief model variables accounted for 29% of the variation in self-care behavior; and perceived severity and perceived self-efficacy are more influential predictors on self-care behavior among diabetic patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diabetes" title="diabetes">diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=patients" title=" patients"> patients</a>, <a href="https://publications.waset.org/abstracts/search?q=self-care%20behaviors" title=" self-care behaviors"> self-care behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20belief%20model" title=" health belief model"> health belief model</a> </p> <a href="https://publications.waset.org/abstracts/11263/factors-related-with-self-care-behaviors-among-iranian-type-2-diabetic-patients-an-application-of-health-belief-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11263.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">468</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3247</span> Impact of FACTS Devices on Power Networks Reliability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Alesaadi">Alireza Alesaadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Flexible AC transmission system (FACTS) devices have an important rule on expnded electrical transmission networks. In this paper, the effect of these diveces on reliability of electrical networks is studied and it is shown that using of FACTS devices can improve the relibiability of power networks, significantly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=FACTS%20devices" title="FACTS devices">FACTS devices</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20networks" title=" power networks"> power networks</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability "> reliability </a> </p> <a href="https://publications.waset.org/abstracts/14821/impact-of-facts-devices-on-power-networks-reliability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14821.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3246</span> A Bibliographical Research on the Use of Social Media Websites by the Deaf in Brazil</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juliana%20Guimar%C3%A3es%20Faria">Juliana Guimarães Faria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article focus on social networks and deaf people. It aims to analyze the studies done about this topic published in journals, as well as the ones done through dissertations and theses. It also aims to identify the thematic focus of the studies produced and to identify how the deaf relates to social networks, more specifically, trying to identify, starting with those productions, what are the benefits, or not, of social networks for the deaf and if there is some reflection about the way the deaf community has been organizing politically in search of bilingual education and inclusion, making use of the softwares of social networks. After reading, description and analysis of the eleven works identified about social networks and the deaf, we detected three thematic groups: four studies presented discussions about social networks and the socialization of the deaf; four works presented discussions about the contribution of social networks to the linguistic and cognitive development of the deaf; and three works presented discussions about the political bias of the use of social networks in favor of the deaf. We also identified that the works presented an optimistic view of social networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title="social networks">social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=deaf" title=" deaf"> deaf</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=Brazil" title=" Brazil"> Brazil</a> </p> <a href="https://publications.waset.org/abstracts/69113/a-bibliographical-research-on-the-use-of-social-media-websites-by-the-deaf-in-brazil" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69113.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3245</span> Effects of Initial State on Opinion Formation in Complex Social Networks with Noises</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi%20Yu">Yi Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Vu%20Xuan%20Nguyen"> Vu Xuan Nguyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaoxi%20Xiao"> Gaoxi Xiao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Opinion formation in complex social networks may exhibit complex system dynamics even when based on some simplest system evolution models. An interesting and important issue is the effects of the initial state on the final steady-state opinion distribution. By carrying out extensive simulations and providing necessary discussions, we show that, while different initial opinion distributions certainly make differences to opinion evolution in social systems without noises, in systems with noises, given enough time, different initial states basically do not contribute to making any significant differences in the final steady state. Instead, it is the basal distribution of the preferred opinions that contributes to deciding the final state of the systems. We briefly explain the reasons leading to the observed conclusions. Such an observation contradicts with a long-term belief on the roles of system initial state in opinion formation, demonstrating the dominating role that opinion mutation can play in opinion formation given enough time. The observation may help to better understand certain observations of opinion evolution dynamics in real-life social networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=opinion%20formation" title="opinion formation">opinion formation</a>, <a href="https://publications.waset.org/abstracts/search?q=Deffuant%20model" title=" Deffuant model"> Deffuant model</a>, <a href="https://publications.waset.org/abstracts/search?q=opinion%20mutation" title=" opinion mutation"> opinion mutation</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus%20making" title=" consensus making"> consensus making</a> </p> <a href="https://publications.waset.org/abstracts/94023/effects-of-initial-state-on-opinion-formation-in-complex-social-networks-with-noises" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94023.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3244</span> Implementation of Distributed Randomized Algorithms for Resilient Peer-to-Peer Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Richard%20Tanaka">Richard Tanaka</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Zhu"> Ying Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studies a few randomized algorithms in application-layer peer-to-peer networks. The significant gain in scalability and resilience that peer-to-peer networks provide has made them widely used and adopted in many real-world distributed systems and applications. The unique properties of peer-to-peer networks make them particularly suitable for randomized algorithms such as random walks and gossip algorithms. Instead of simulations of peer-to-peer networks, we leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and these distributed randomized algorithms running on top of them. We can thus analyze their behaviour and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20randomized%20algorithms" title="distributed randomized algorithms">distributed randomized algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer%20networks" title=" peer-to-peer networks"> peer-to-peer networks</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20container%20technology" title=" virtual container technology"> virtual container technology</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20networks" title=" resilient networks"> resilient networks</a> </p> <a href="https://publications.waset.org/abstracts/133527/implementation-of-distributed-randomized-algorithms-for-resilient-peer-to-peer-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133527.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3243</span> Communication in a Heterogeneous Ad Hoc Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20Benjbara">C. Benjbara</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Habbani"> A. Habbani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ad%20hoc" title="Ad hoc">Ad hoc</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous" title=" heterogeneous"> heterogeneous</a>, <a href="https://publications.waset.org/abstracts/search?q=ID-Node" title=" ID-Node"> ID-Node</a>, <a href="https://publications.waset.org/abstracts/search?q=OLSR" title=" OLSR"> OLSR</a> </p> <a href="https://publications.waset.org/abstracts/105018/communication-in-a-heterogeneous-ad-hoc-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105018.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3242</span> Impact of Social Media on Content of Saudi Television News Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Majed%20Alshaibani">Majed Alshaibani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media has emerged as a serious contender to TV news networks in Saudi Arabia. The growing usage of social media as a source of news and information has led to significant impact on the content presented by the news networks in Saudi Arabia. This study explored the various ways in which social media has influenced content aired on Saudi news networks. Data were collected by using semi structured interviews with 13 journalists and content editors working for four Saudi TV news networks and six senior academic experts on TV and media teaching in Saudi universities. The findings of the study revealed that social media has affected four aspects of the content on Saudi TV news networks. As a result the content aired on Saudi news networks is more neutral, real time, diverse in terms of sources and includes content on broader subjects and from different parts of the world. This research concludes that social media has contributed positively and significantly to improving the content on Saudi TV news networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=TV%20news%20networks" title="TV news networks">TV news networks</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20content" title=" media content"> media content</a> </p> <a href="https://publications.waset.org/abstracts/125622/impact-of-social-media-on-content-of-saudi-television-news-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125622.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">236</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3241</span> Supernatural Beliefs Impact Pattern Perception</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Silvia%20Boschetti">Silvia Boschetti</a>, <a href="https://publications.waset.org/abstracts/search?q=Jakub%20Binter"> Jakub Binter</a>, <a href="https://publications.waset.org/abstracts/search?q=Robin%20Kopeck%C3%BD"> Robin Kopecký</a>, <a href="https://publications.waset.org/abstracts/search?q=Lenka%20P%C5%99%C3%ADPlatov%C3%A1"> Lenka PříPlatová</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaroslav%20Flegr"> Jaroslav Flegr</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A strict dichotomy was present between religion and science, but recently, cognitive science focusses on the impact of supernatural beliefs on cognitive processes such as pattern recognition. It has been hypothesized that cognitive and perceptual processes have been under evolutionary pressures that ensured amplified perception of patterns, especially when in stressful and harsh conditions. The pattern detection in religious and non-religious individuals after induction of negative, anxious mood shall constitute a cornerstone of the general role of anxiety, cognitive bias, leading towards or against the by-product hypothesis, one of the main theories on the evolutionary studies of religion. The apophenia (tendencies to perceive connection and meaning on unrelated events) and perception of visual patterns (or pateidolia) are of utmost interest. To capture the impact of culture and upbringing, a comparative study of two European countries, the Czech Republic (low organized religion participation, high esoteric belief) and Italy (high organized religion participation, low esoteric belief), are currently in the data collection phase. Outcomes will be presented at the conference. A battery of standardized questionnaires followed by pattern recognition tasks (the patterns involve color, shape, and are of artificial and natural origin) using an experimental method involving the conditioning of (controlled, laboratory-induced) stress is taking place. We hypothesize to find a difference between organized religious belief and personal (esoteric) belief that will be alike in both of the cultural environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culture" title="culture">culture</a>, <a href="https://publications.waset.org/abstracts/search?q=esoteric%20belief" title=" esoteric belief"> esoteric belief</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20perception" title=" pattern perception"> pattern perception</a>, <a href="https://publications.waset.org/abstracts/search?q=religiosity" title=" religiosity"> religiosity</a> </p> <a href="https://publications.waset.org/abstracts/139635/supernatural-beliefs-impact-pattern-perception" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139635.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3240</span> Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eman%20I.%20Raslan">Eman I. Raslan</a>, <a href="https://publications.waset.org/abstracts/search?q=Haitham%20S.%20Hamza"> Haitham S. Hamza</a>, <a href="https://publications.waset.org/abstracts/search?q=Reda%20A.%20El-Khoribi"> Reda A. El-Khoribi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fiber-wireless%20%28FiWi%29" title="fiber-wireless (FiWi)">fiber-wireless (FiWi)</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20bandwidth%20allocation%20%28DBA%29" title=" dynamic bandwidth allocation (DBA)"> dynamic bandwidth allocation (DBA)</a>, <a href="https://publications.waset.org/abstracts/search?q=passive%20optical%20networks%20%28PON%29" title=" passive optical networks (PON)"> passive optical networks (PON)</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20access%20control%20%28MAC%29" title=" media access control (MAC)"> media access control (MAC)</a> </p> <a href="https://publications.waset.org/abstracts/43649/dynamic-bandwidth-allocation-in-fiber-wireless-fiwi-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43649.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">531</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3239</span> Connections among Personality, Teacher-Student Relationship, Belief in a Just World for Others and Teacher Bullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hui-Yu%20Peng">Hui-Yu Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsiu-I%20Hsueh"> Hsiu-I Hsueh</a>, <a href="https://publications.waset.org/abstracts/search?q=Li-Ming%20Chen"> Li-Ming Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most studies focused on bullying behaviors among students, however few research concerns about teachers’ bullying behaviors against students. In order to have more understandings and reduce teacher bullying, it is important to examine what factors may affect teachers’ bullying behaviors. This study aimed to explore the connections between different psychological variables and teacher bullying. Four variables, neuroticism, extraversion, teacher-student relationship, and belief in a just world for others (BJW-others), were selected in this study. Four hundred and five elementary and secondary school teachers in Taiwan endorsed the self-reported surveys. Multiple regression method was used to analyze data. Results revealed that teachers’ BJW-others and extraversion did not have significant correlations with teacher bullying scores. However, closed teacher-student relationship and neuroticism can negatively and positively predict teachers’ bullying behaviors against students, respectively. Implications for preventing teacher bullying were discussed at the end of this study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=belief%20in%20a%20just%20world%20for%20others" title="belief in a just world for others">belief in a just world for others</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20five%20personality%20traits" title=" big five personality traits"> big five personality traits</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20bullying" title=" teacher bullying"> teacher bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher-student%20relationship" title=" teacher-student relationship"> teacher-student relationship</a> </p> <a href="https://publications.waset.org/abstracts/100838/connections-among-personality-teacher-student-relationship-belief-in-a-just-world-for-others-and-teacher-bullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3238</span> e-Learning Security: A Distributed Incident Response Generator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bel%20G%20Raggad">Bel G Raggad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-Learning%20security" title=" e-Learning security"> e-Learning security</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20response" title=" incident response"> incident response</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection" title=" intrusion detection"> intrusion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20risk" title=" security risk"> security risk</a>, <a href="https://publications.waset.org/abstracts/search?q=statefull%20inspection" title=" statefull inspection"> statefull inspection</a> </p> <a href="https://publications.waset.org/abstracts/23292/e-learning-security-a-distributed-incident-response-generator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3237</span> Effect of Education Based-on the Health Belief Model on Preventive Behaviors of Exposure to Secondhand Smoke among Women</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arezoo%20Fallahi">Arezoo Fallahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Exposure to second-hand smoke is an important global health problem and threatens the health of people, especially children and women. The aim of this study was to determine the effect of education based on the Health Belief Model on preventive behaviors of exposure to second-hand smoke in women. Materials and Methods: This experimental study was performed in 2022 in Sanandaj, west of Iran. Seventy-four people were selected by simple random sampling and divided into an intervention group (37 people) and a control group (37 people). Data collection tools included demographic characteristics and a second-hand smoke exposure questionnaire based on the Health Beliefs Model. The training in the intervention group was conducted in three one-hour sessions in the comprehensive health service centers in the form of lectures, pamphlets, and group discussions. Data were analyzed using SPSS software version 21 and statistical tests such as correlation, paired t-test, and independent t-test. Results: The intervention and control groups were homogeneous before education. They were similar in terms of mean scores of the Health Belief Model. However, after an educational intervention, some of the scores increased, including the mean perceived sensitivity score (from 17.62±2.86 to 19.75±1.23), perceived severity score (28.40±4.45 to 31.64±2), perceived benefits score (27.27±4.89 to 31.94±2.17), practice score (32.64±4.68 to 36.91±2.32) perceived barriers from 26.62±5.16 to 31.29±3.34, guide for external action (from 17.70±3.99 to 22/89 ±1.67), guide for internal action from (16.59±2.95 to 1.03±18.75), and self-efficacy (from 19.83 ±3.99 to 23.37±1.43) (P <0.05). Conclusion: The educational intervention designed based on the Health Belief Model in women was effective in performing preventive behaviors against exposure to second-hand smoke. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education" title="education">education</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=exposure%20to%20secondhand%20smoke" title=" exposure to secondhand smoke"> exposure to secondhand smoke</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20belief%20model" title=" health belief model"> health belief model</a> </p> <a href="https://publications.waset.org/abstracts/167547/effect-of-education-based-on-the-health-belief-model-on-preventive-behaviors-of-exposure-to-secondhand-smoke-among-women" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3236</span> Enhanced Image Representation for Deep Belief Network Classification of Hyperspectral Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khitem%20Amiri">Khitem Amiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Farah"> Mohamed Farah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Image classification is a challenging task and is gaining lots of interest since it helps us to understand the content of images. Recently Deep Learning (DL) based methods gave very interesting results on several benchmarks. For Hyperspectral images (HSI), the application of DL techniques is still challenging due to the scarcity of labeled data and to the curse of dimensionality. Among other approaches, Deep Belief Network (DBN) based approaches gave a fair classification accuracy. In this paper, we address the problem of the curse of dimensionality by reducing the number of bands and replacing the HSI channels by the channels representing radiometric indices. Therefore, instead of using all the HSI bands, we compute the radiometric indices such as NDVI (Normalized Difference Vegetation Index), NDWI (Normalized Difference Water Index), etc, and we use the combination of these indices as input for the Deep Belief Network (DBN) based classification model. Thus, we keep almost all the pertinent spectral information while reducing considerably the size of the image. In order to test our image representation, we applied our method on several HSI datasets including the Indian pines dataset, Jasper Ridge data and it gave comparable results to the state of the art methods while reducing considerably the time of training and testing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hyperspectral%20images" title="hyperspectral images">hyperspectral images</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20belief%20network" title=" deep belief network"> deep belief network</a>, <a href="https://publications.waset.org/abstracts/search?q=radiometric%20indices" title=" radiometric indices"> radiometric indices</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20classification" title=" image classification"> image classification</a> </p> <a href="https://publications.waset.org/abstracts/93458/enhanced-image-representation-for-deep-belief-network-classification-of-hyperspectral-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93458.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">280</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3235</span> On the Performance Analysis of Coexistence between IEEE 802.11g and IEEE 802.15.4 Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chompunut%20Jantarasorn">Chompunut Jantarasorn</a>, <a href="https://publications.waset.org/abstracts/search?q=Chutima%20Prommak"> Chutima Prommak </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an intensive measurement studying of the network performance analysis when IEEE 802.11g Wireless Local Area Networks (WLAN) coexisting with IEEE 802.15.4 Wireless Personal Area Network (WPAN). The measurement results show that the coexistence between both networks could increase the Frame Error Rate (FER) of the IEEE 802.15.4 networks up to 60% and it could decrease the throughputs of the IEEE 802.11g networks up to 55%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20performance%20analysis" title="wireless performance analysis">wireless performance analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=coexistence%20analysis" title=" coexistence analysis"> coexistence analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.11g" title=" IEEE 802.11g"> IEEE 802.11g</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.15.4" title=" IEEE 802.15.4"> IEEE 802.15.4</a> </p> <a href="https://publications.waset.org/abstracts/9834/on-the-performance-analysis-of-coexistence-between-ieee-80211g-and-ieee-802154-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">552</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3234</span> A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maleh%20Yassine">Maleh Yassine</a>, <a href="https://publications.waset.org/abstracts/search?q=Ezzati%20Abdellah"> Ezzati Abdellah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title="wireless sensor networks">wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20attack" title=" security attack"> security attack</a>, <a href="https://publications.waset.org/abstracts/search?q=denial%20of%20service" title=" denial of service"> denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=IDS" title=" IDS"> IDS</a>, <a href="https://publications.waset.org/abstracts/search?q=cluster-based%20model" title=" cluster-based model"> cluster-based model</a>, <a href="https://publications.waset.org/abstracts/search?q=signature%20based%20IDS" title=" signature based IDS"> signature based IDS</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20IDS" title=" hybrid IDS"> hybrid IDS</a> </p> <a href="https://publications.waset.org/abstracts/5249/a-review-of-security-attacks-and-intrusion-detection-schemes-in-wireless-sensor-networks-a-survey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5249.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=108">108</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=109">109</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=beep%20belief%20net-works&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>