CINXE.COM
Search results for: discovery
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: discovery</title> <meta name="description" content="Search results for: discovery"> <meta name="keywords" content="discovery"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="discovery" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="discovery"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 622</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: discovery</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">622</span> Knowledge Discovery from Production Databases for Hierarchical Process Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pavol%20Tanuska">Pavol Tanuska</a>, <a href="https://publications.waset.org/abstracts/search?q=Pavel%20Vazan"> Pavel Vazan</a>, <a href="https://publications.waset.org/abstracts/search?q=Michal%20Kebisek"> Michal Kebisek</a>, <a href="https://publications.waset.org/abstracts/search?q=Dominika%20Jurovata"> Dominika Jurovata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper gives the results of the project that was oriented on the usage of knowledge discoveries from production systems for needs of the hierarchical process control. One of the main project goals was the proposal of knowledge discovery model for process control. Specifics data mining methods and techniques was used for defined problems of the process control. The gained knowledge was used on the real production system, thus, the proposed solution has been verified. The paper documents how it is possible to apply new discovery knowledge to be used in the real hierarchical process control. There are specified the opportunities for application of the proposed knowledge discovery model for hierarchical process control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hierarchical%20process%20control" title="hierarchical process control">hierarchical process control</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20from%20databases" title=" knowledge discovery from databases"> knowledge discovery from databases</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20control" title=" process control"> process control</a> </p> <a href="https://publications.waset.org/abstracts/2816/knowledge-discovery-from-production-databases-for-hierarchical-process-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">621</span> Network Word Discovery Framework Based on Sentence Semantic Vector Similarity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ganfeng%20Yu">Ganfeng Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuefeng%20Ma"> Yuefeng Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Shanliang%20Yang"> Shanliang Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The word discovery is a key problem in text information retrieval technology. Methods in new word discovery tend to be closely related to words because they generally obtain new word results by analyzing words. With the popularity of social networks, individual netizens and online self-media have generated various network texts for the convenience of online life, including network words that are far from standard Chinese expression. How detect network words is one of the important goals in the field of text information retrieval today. In this paper, we integrate the word embedding model and clustering methods to propose a network word discovery framework based on sentence semantic similarity (S³-NWD) to detect network words effectively from the corpus. This framework constructs sentence semantic vectors through a distributed representation model, uses the similarity of sentence semantic vectors to determine the semantic relationship between sentences, and finally realizes network word discovery by the meaning of semantic replacement between sentences. The experiment verifies that the framework not only completes the rapid discovery of network words but also realizes the standard word meaning of the discovery of network words, which reflects the effectiveness of our work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=text%20information%20retrieval" title="text information retrieval">text information retrieval</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20word%20discovery" title=" new word discovery"> new word discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20extraction" title=" information extraction"> information extraction</a> </p> <a href="https://publications.waset.org/abstracts/153917/network-word-discovery-framework-based-on-sentence-semantic-vector-similarity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153917.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">620</span> CERD: Cost Effective Route Discovery in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anuradha%20Banerjee">Anuradha Banerjee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence, we require energy efficient route discovery technique to enhance their lifetime and network performance. In this paper, we propose an energy-efficient route discovery technique CERD that greatly reduces the number of route requests flooded into the network and also gives priority to the route request packets sent from the routers that has communicated with the destination very recently, in single or multi-hop paths. This does not only enhance the lifetime of nodes but also decreases the delay in tracking the destination. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc%20network" title="ad hoc network">ad hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency" title=" energy efficiency"> energy efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding" title=" flooding"> flooding</a>, <a href="https://publications.waset.org/abstracts/search?q=node%20lifetime" title=" node lifetime"> node lifetime</a>, <a href="https://publications.waset.org/abstracts/search?q=route%20discovery" title=" route discovery"> route discovery</a> </p> <a href="https://publications.waset.org/abstracts/20336/cerd-cost-effective-route-discovery-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20336.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">347</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">619</span> Intuitional Insight in Islamic Mysticism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Bakhtyar">Maryam Bakhtyar</a>, <a href="https://publications.waset.org/abstracts/search?q=Pegah%20Akrami"> Pegah Akrami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intuition" title="intuition">intuition</a>, <a href="https://publications.waset.org/abstracts/search?q=discovery" title=" discovery"> discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=mystical%20insight" title=" mystical insight"> mystical insight</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20knowledge" title=" personal knowledge"> personal knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=superficial%20discovery" title=" superficial discovery"> superficial discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=spiritual%20discovery" title=" spiritual discovery"> spiritual discovery</a> </p> <a href="https://publications.waset.org/abstracts/155560/intuitional-insight-in-islamic-mysticism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">618</span> Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chothmal">Chothmal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc%20networks" title="ad hoc networks">ad hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service" title=" quality of service"> quality of service</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20streaming" title=" video streaming"> video streaming</a>, <a href="https://publications.waset.org/abstracts/search?q=H.264%2FSVC" title=" H.264/SVC"> H.264/SVC</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20routes" title=" multiple routes"> multiple routes</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20traces" title=" video traces"> video traces</a> </p> <a href="https://publications.waset.org/abstracts/46573/signal-strength-based-multipath-routing-for-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">617</span> Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjed%20Sid%20Ahmed">Amjed Sid Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Rosilah%20Hassan"> Rosilah Hassan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nor%20Effendy%20Othman"> Nor Effendy Othman </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CGA" title="CGA">CGA</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=NDP" title=" NDP"> NDP</a>, <a href="https://publications.waset.org/abstracts/search?q=SEND" title=" SEND"> SEND</a> </p> <a href="https://publications.waset.org/abstracts/31309/lightweight-cryptographically-generated-address-for-ipv6-neighbor-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31309.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">616</span> Research on Fuzzy Test Framework Based on Concolic Execution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiong%20Xie">Xiong Xie</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuhang%20Chen"> Yuhang Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=concolic%20execution" title="concolic execution">concolic execution</a>, <a href="https://publications.waset.org/abstracts/search?q=constraint%20solving" title=" constraint solving"> constraint solving</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20test" title=" fuzzy test"> fuzzy test</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20discovery" title=" vulnerability discovery"> vulnerability discovery</a> </p> <a href="https://publications.waset.org/abstracts/78029/research-on-fuzzy-test-framework-based-on-concolic-execution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78029.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">615</span> Tuberculosis Massive Active Case Discovery in East Jakarta 2016-2017: The Role of Ketuk Pintu Layani Dengan Hati and Juru Pemantau Batuk (Jumantuk) Cadre Programs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ngabilas%20Salama">Ngabilas Salama</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Indonesia has the 2nd highest number of incidents of tuberculosis (TB). It accounts for 1.020.000 new cases per year, only 30% of which has been reported. To find the lost 70%, a massive active case discovery was conducted through two programs: Ketuk Pintu Layani Dengan Hati (KPLDH) and Kader Juru Pemantau Batuk (Jumantuk cadres), who also plays a role in child TB screening. Methods: Data was collected and analyzed through Tuberculosis Integrated Online System from 2014 to 2017 involving 129 DOTS facility with 86 primary health centers in East Jakarta. Results: East Jakarta consists of 2.900.722 people. KPLDH program started in February 2016 consisting of 84 teams (310 people). Jumantuk cadres was formed 4 months later (218 orang). The number of new TB cases in East Jakarta (primary health center) from 2014 to June 2017 respectively is as follows: 6.499 (2.637), 7.438 (2.651), 8.948 (3.211), 5.701 (1.830). Meanwhile, the percentage of child TB case discovery in primary health center was 8,5%, 9,8%, 12,1% from 2014 to 2016 respectively. In 2017, child TB case discovery was 13,1% for the first 3 months and 16,5% for the next 3 months. Discussion: Increased TB incidence rate from 2014 to 2017 was 14,4%, 20,3%, and 27,4% respectively in East Jakarta, and 0,5%, 21,1%, and 14% in primary health center. This reveals the positive role of KPLDH and Jumantuk in TB detection and reporting. Likewise, these programs were responsible for the increase in child TB case discovery, especially in the first 3 months of 2017 (Ketuk Pintu TB Day program) and the next 3 months (active TB screening). Conclusion: KPLDH dan Jumantuk are actively involved in increasing TB case discovery in both adults and children. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tuberculosis" title="tuberculosis">tuberculosis</a>, <a href="https://publications.waset.org/abstracts/search?q=case%20discovery%20program" title=" case discovery program"> case discovery program</a>, <a href="https://publications.waset.org/abstracts/search?q=primary%20health%20center" title=" primary health center"> primary health center</a>, <a href="https://publications.waset.org/abstracts/search?q=cadre" title=" cadre"> cadre</a> </p> <a href="https://publications.waset.org/abstracts/82501/tuberculosis-massive-active-case-discovery-in-east-jakarta-2016-2017-the-role-of-ketuk-pintu-layani-dengan-hati-and-juru-pemantau-batuk-jumantuk-cadre-programs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">614</span> Intrapreneurship Discovery: Standard Strategy to Boost Innovation inside Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chiara%20Mansanta">Chiara Mansanta</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniela%20Sani"> Daniela Sani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studies the concept of intrapreneurship discovery for innovation and technology development related to the manufacturing industries set up in the center of Italy, in Marche Region. The study underlined the key drivers of the innovation process and the main factors that influence innovation. Starting from a literature study on open innovation, this paper examines the role of human capital to support company’s development. The empirical part of the study is based on a survey to 151 manufacturing companies that represent the 34% of that universe at the regional level. The survey underlined the main KPI’s that influence companies in their decision processes; then tools for these decision processes are presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20model" title="business model">business model</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making" title=" decision making"> decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=intrapreneurship%20discovery" title=" intrapreneurship discovery"> intrapreneurship discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=standard%20methodology" title=" standard methodology"> standard methodology</a> </p> <a href="https://publications.waset.org/abstracts/102072/intrapreneurship-discovery-standard-strategy-to-boost-innovation-inside-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102072.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">613</span> Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=June-Jei%20Kuo">June-Jei Kuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yi-Chuan%20Hsieh"> Yi-Chuan Hsieh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=web-scale%20discovery%20system" title="web-scale discovery system">web-scale discovery system</a>, <a href="https://publications.waset.org/abstracts/search?q=discovery%20system" title=" discovery system"> discovery system</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20system%20success%20model" title=" information system success model"> information system success model</a>, <a href="https://publications.waset.org/abstracts/search?q=flow%20theory" title=" flow theory"> flow theory</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20library" title=" academic library"> academic library</a> </p> <a href="https://publications.waset.org/abstracts/119923/study-of-evaluation-model-based-on-information-system-success-model-and-flow-theory-using-web-scale-discovery-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119923.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">612</span> Application of Data Mining Techniques for Tourism Knowledge Discovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teklu%20Urgessa">Teklu Urgessa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wookjae%20Maeng"> Wookjae Maeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Joong%20Seek%20Lee"> Joong Seek Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification%20algorithms" title="classification algorithms">classification algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery" title=" knowledge discovery"> knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism" title=" tourism"> tourism</a> </p> <a href="https://publications.waset.org/abstracts/59419/application-of-data-mining-techniques-for-tourism-knowledge-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">611</span> Enhancing Students’ Achievement, Interest and Retention in Chemistry through an Integrated Teaching/Learning Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20V.%20F.%20Fatokun">K. V. F. Fatokun</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20A.%20Eniayeju"> P. A. Eniayeju</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study concerns the effects of concept mapping-guided discovery integrated teaching approach on the learning style and achievement of chemistry students. The sample comprised 162 senior secondary school (SS 2) students drawn from two science schools in Nasarawa State which have equivalent mean scores of 9.68 and 9.49 in their pre-test. Five instruments were developed and validated while the sixth was purely adopted by the investigator for the study, Four null hypotheses were tested at α = 0.05 level of significance. Chi square analysis showed that there is a significant shift in students’ learning style from accommodating and diverging to converging and assimilating when exposed to concept mapping- guided discovery approach. Also t-test and ANOVA that those in experimental group achieve and retain content learnt better. Results of the Scheffe’s test for multiple comparisons showed that boys in the experimental group performed better than girls. It is therefore concluded that the concept mapping-guided discovery integrated approach should be used in secondary schools to successfully teach electrochemistry. It is strongly recommended that chemistry teachers should be encouraged to adopt this method for teaching difficult concepts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=integrated%20teaching%20approach" title="integrated teaching approach">integrated teaching approach</a>, <a href="https://publications.waset.org/abstracts/search?q=concept%20mapping-guided%20discovery" title=" concept mapping-guided discovery"> concept mapping-guided discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=achievement" title=" achievement"> achievement</a>, <a href="https://publications.waset.org/abstracts/search?q=retention" title=" retention"> retention</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20styles%20and%20interest" title=" learning styles and interest"> learning styles and interest</a> </p> <a href="https://publications.waset.org/abstracts/11521/enhancing-students-achievement-interest-and-retention-in-chemistry-through-an-integrated-teachinglearning-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">610</span> Knowledge-Driven Decision Support System Based on Knowledge Warehouse and Data Mining by Improving Apriori Algorithm with Fuzzy Logic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pejman%20Hosseinioun">Pejman Hosseinioun</a>, <a href="https://publications.waset.org/abstracts/search?q=Hasan%20Shakeri"> Hasan Shakeri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghasem%20Ghorbanirostam"> Ghasem Ghorbanirostam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, we have seen an increasing importance of research and study on knowledge source, decision support systems, data mining and procedure of knowledge discovery in data bases and it is considered that each of these aspects affects the others. In this article, we have merged information source and knowledge source to suggest a knowledge based system within limits of management based on storing and restoring of knowledge to manage information and improve decision making and resources. In this article, we have used method of data mining and Apriori algorithm in procedure of knowledge discovery one of the problems of Apriori algorithm is that, a user should specify the minimum threshold for supporting the regularity. Imagine that a user wants to apply Apriori algorithm for a database with millions of transactions. Definitely, the user does not have necessary knowledge of all existing transactions in that database, and therefore cannot specify a suitable threshold. Our purpose in this article is to improve Apriori algorithm. To achieve our goal, we tried using fuzzy logic to put data in different clusters before applying the Apriori algorithm for existing data in the database and we also try to suggest the most suitable threshold to the user automatically. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery" title=" knowledge discovery"> knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20discovery" title=" data discovery"> data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a> </p> <a href="https://publications.waset.org/abstracts/48155/knowledge-driven-decision-support-system-based-on-knowledge-warehouse-and-data-mining-by-improving-apriori-algorithm-with-fuzzy-logic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48155.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">609</span> Zika Virus NS5 Protein Potential Inhibitors: An Enhanced in silico Approach in Drug Discovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pritika%20Ramharack">Pritika Ramharack</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20E.%20S.%20Soliman"> Mahmoud E. S. Soliman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The re-emerging Zika virus is an arthropod-borne virus that has been described to have explosive potential as a worldwide pandemic. The initial transmission of the virus was through a mosquito vector, however, evolving modes of transmission has allowed the spread of the disease over continents. The virus already been linked to irreversible chronic central nervous system (CNS) conditions. The concerns of the scientific and clinical community are the consequences of Zika viral mutations, thus suggesting the urgent need for viral inhibitors. There have been large strides in vaccine development against the virus but there are still no FDA-approved drugs available. Rapid rational drug design and discovery research is fundamental in the production of potent inhibitors against the virus that will not just mask the virus, but destroy it completely. In silico drug design allows for this prompt screening of potential leads, thus decreasing the consumption of precious time and resources. This study demonstrates an optimized and proven screening technique in the discovery of two potential small molecule inhibitors of Zika virus Methyltransferase and RNA-dependent RNA polymerase. This in silico “per-residue energy decomposition pharmacophore” virtual screening approach will be critical in aiding scientists in the discovery of not only effective inhibitors of Zika viral targets, but also a wide range of anti-viral agents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NS5%20protein%20inhibitors" title="NS5 protein inhibitors">NS5 protein inhibitors</a>, <a href="https://publications.waset.org/abstracts/search?q=per-residue%20decomposition" title=" per-residue decomposition"> per-residue decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmacophore%20model" title=" pharmacophore model"> pharmacophore model</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20screening" title=" virtual screening"> virtual screening</a>, <a href="https://publications.waset.org/abstracts/search?q=Zika%20virus" title=" Zika virus"> Zika virus</a> </p> <a href="https://publications.waset.org/abstracts/59456/zika-virus-ns5-protein-potential-inhibitors-an-enhanced-in-silico-approach-in-drug-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">608</span> Modeling Optimal Lipophilicity and Drug Performance in Ligand-Receptor Interactions: A Machine Learning Approach to Drug Discovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jay%20Ananth">Jay Ananth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The drug discovery process currently requires numerous years of clinical testing as well as money just for a single drug to earn FDA approval. For drugs that even make it this far in the process, there is a very slim chance of receiving FDA approval, resulting in detrimental hurdles to drug accessibility. To minimize these inefficiencies, numerous studies have implemented computational methods, although few computational investigations have focused on a crucial feature of drugs: lipophilicity. Lipophilicity is a physical attribute of a compound that measures its solubility in lipids and is a determinant of drug efficacy. This project leverages Artificial Intelligence to predict the impact of a drug’s lipophilicity on its performance by accounting for factors such as binding affinity and toxicity. The model predicted lipophilicity and binding affinity in the validation set with very high R² scores of 0.921 and 0.788, respectively, while also being applicable to a variety of target receptors. The results expressed a strong positive correlation between lipophilicity and both binding affinity and toxicity. The model helps in both drug development and discovery, providing every pharmaceutical company with recommended lipophilicity levels for drug candidates as well as a rapid assessment of early-stage drugs prior to any testing, eliminating significant amounts of time and resources currently restricting drug accessibility. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drug%20discovery" title="drug discovery">drug discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=lipophilicity" title=" lipophilicity"> lipophilicity</a>, <a href="https://publications.waset.org/abstracts/search?q=ligand-receptor%20interactions" title=" ligand-receptor interactions"> ligand-receptor interactions</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=drug%20development" title=" drug development"> drug development</a> </p> <a href="https://publications.waset.org/abstracts/163127/modeling-optimal-lipophilicity-and-drug-performance-in-ligand-receptor-interactions-a-machine-learning-approach-to-drug-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">607</span> Application of Causal Inference and Discovery in Curriculum Evaluation and Continuous Improvement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lunliang%20Zhong">Lunliang Zhong</a>, <a href="https://publications.waset.org/abstracts/search?q=Bin%20Duan"> Bin Duan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The undergraduate graduation project is a vital part of the higher education curriculum, crucial for engineering accreditation. Current evaluations often summarize data without identifying underlying issues. This study applies the Peter-Clark algorithm to analyze causal relationships within the graduation project data of an Electronics and Information Engineering program, creating a causal model. Structural equation modeling confirmed the model's validity. The analysis reveals key teaching stages affecting project success, uncovering problems in the process. Introducing causal discovery and inference into project evaluation helps identify issues and propose targeted improvement measures. The effectiveness of these measures is validated by comparing the learning outcomes of two student cohorts, stratified by confounding factors, leading to improved teaching quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=causal%20discovery" title="causal discovery">causal discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=causal%20inference" title=" causal inference"> causal inference</a>, <a href="https://publications.waset.org/abstracts/search?q=continuous%20improvement" title=" continuous improvement"> continuous improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter-Clark%20algorithm" title=" Peter-Clark algorithm"> Peter-Clark algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20equation%20modeling" title=" structural equation modeling"> structural equation modeling</a> </p> <a href="https://publications.waset.org/abstracts/191014/application-of-causal-inference-and-discovery-in-curriculum-evaluation-and-continuous-improvement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">18</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">606</span> Research of Data Cleaning Methods Based on Dependency Rules</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Bao">Yang Bao</a>, <a href="https://publications.waset.org/abstracts/search?q=Shi%20Wei%20Deng"> Shi Wei Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=WangQun%20Lin"> WangQun Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20cleaning" title="data cleaning">data cleaning</a>, <a href="https://publications.waset.org/abstracts/search?q=dependency%20rules" title=" dependency rules"> dependency rules</a>, <a href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery" title=" violation data discovery"> violation data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20repair" title=" data repair"> data repair</a> </p> <a href="https://publications.waset.org/abstracts/31348/research-of-data-cleaning-methods-based-on-dependency-rules" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">564</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">605</span> Data Mining As A Tool For Knowledge Management: A Review </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maram%20Saleh">Maram Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Data%20Mining" title="Data Mining">Data Mining</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20management" title=" Knowledge management"> Knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20discovery" title=" Knowledge discovery"> Knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20creation." title=" Knowledge creation."> Knowledge creation.</a> </p> <a href="https://publications.waset.org/abstracts/137030/data-mining-as-a-tool-for-knowledge-management-a-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137030.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">604</span> Open educational Resources' Metadata: Towards the First Star to Quality of Open Educational Resources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Audrey%20Romero-Pelaez">Audrey Romero-Pelaez</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20Carlos%20Morocho-Yunga"> Juan Carlos Morocho-Yunga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The increasing amount of open educational resources (OER) published on the web for consumption in teaching and learning environments also generates a growing need to ensure the quality of these resources. The low level of OER discovery is one of the most significant drawbacks when faced with its reuse, and as a consequence, high-quality educational resources can go unnoticed. Metadata enables the discovery of resources on the web. The purpose of this study is to lay the foundations for open educational resources to achieve their first quality star within the Quality4OER Framework. In this study, we evaluate the quality of OER metadata and establish the main guidelines on metadata quality in this context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=open%20educational%20resources" title="open educational resources">open educational resources</a>, <a href="https://publications.waset.org/abstracts/search?q=OER%20quality" title=" OER quality"> OER quality</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20metadata" title=" quality metadata"> quality metadata</a> </p> <a href="https://publications.waset.org/abstracts/129865/open-educational-resources-metadata-towards-the-first-star-to-quality-of-open-educational-resources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129865.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">603</span> Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boon%20Yih%20Mah">Boon Yih Mah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WeCWI" title="WeCWI">WeCWI</a>, <a href="https://publications.waset.org/abstracts/search?q=literacy%20discovery" title=" literacy discovery"> literacy discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20discovery" title=" language discovery"> language discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20discovery" title=" cognitive discovery"> cognitive discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20discovery" title=" psychological discovery"> psychological discovery</a> </p> <a href="https://publications.waset.org/abstracts/16074/web-based-cognitive-writing-instruction-wecwi-a-theoretical-and-pedagogical-e-framework-for-language-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16074.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">561</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">602</span> Screening for Hit Identification against Mycobacterium abscessus </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jichan%20Jang">Jichan Jang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mycobacterium abscessus is a rapidly growing life-threatening mycobacterium with multiple drug-resistance mechanisms. In this study, we screened the library to identify active molecules targeting Mycobacterium abscessus using resazurin live/dead assays. In this screening assay, the Z-factor was 0.7, as an indication of the statistical confidence of the assay. A cut-off of 80% growth inhibition in the screening resulted in the identification of four different compounds at a single concentration (20 μM). Dose-response curves identified three different hit candidates, which generated good inhibitory curves. All hit candidates were expected to have different molecular targets. Thus, we found that compound X, identified, may be a promising candidate in the M. abscessus drug discovery pipeline. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mycobacterium%20abscessus" title="Mycobacterium abscessus">Mycobacterium abscessus</a>, <a href="https://publications.waset.org/abstracts/search?q=antibiotics" title=" antibiotics"> antibiotics</a>, <a href="https://publications.waset.org/abstracts/search?q=drug%20discovery" title=" drug discovery"> drug discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=emerging%20Pathogen" title=" emerging Pathogen"> emerging Pathogen</a> </p> <a href="https://publications.waset.org/abstracts/91908/screening-for-hit-identification-against-mycobacterium-abscessus" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91908.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">601</span> Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Moslehpour">M. Moslehpour</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Khorsandi"> S. Khorsandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CGA" title="CGA">CGA</a>, <a href="https://publications.waset.org/abstracts/search?q=ICMPv6" title=" ICMPv6"> ICMPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20node" title=" malicious node"> malicious node</a>, <a href="https://publications.waset.org/abstracts/search?q=modifier" title=" modifier"> modifier</a>, <a href="https://publications.waset.org/abstracts/search?q=NDP" title=" NDP"> NDP</a>, <a href="https://publications.waset.org/abstracts/search?q=overall%20load" title=" overall load"> overall load</a>, <a href="https://publications.waset.org/abstracts/search?q=SEND" title=" SEND"> SEND</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20management" title=" trust management"> trust management</a> </p> <a href="https://publications.waset.org/abstracts/41739/improving-cryptographically-generated-address-algorithm-in-ipv6-secure-neighbor-discovery-protocol-through-trust-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41739.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">600</span> Proposing an Architecture for Drug Response Prediction by Integrating Multiomics Data and Utilizing Graph Transformers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nishank%20Raisinghani">Nishank Raisinghani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Efficiently predicting drug response remains a challenge in the realm of drug discovery. To address this issue, we propose four model architectures that combine graphical representation with varying positions of multiheaded self-attention mechanisms. By leveraging two types of multi-omics data, transcriptomics and genomics, we create a comprehensive representation of target cells and enable drug response prediction in precision medicine. A majority of our architectures utilize multiple transformer models, one with a graph attention mechanism and the other with a multiheaded self-attention mechanism, to generate latent representations of both drug and omics data, respectively. Our model architectures apply an attention mechanism to both drug and multiomics data, with the goal of procuring more comprehensive latent representations. The latent representations are then concatenated and input into a fully connected network to predict the IC-50 score, a measure of cell drug response. We experiment with all four of these architectures and extract results from all of them. Our study greatly contributes to the future of drug discovery and precision medicine by looking to optimize the time and accuracy of drug response prediction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drug%20discovery" title="drug discovery">drug discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=transformers" title=" transformers"> transformers</a>, <a href="https://publications.waset.org/abstracts/search?q=graph%20neural%20networks" title=" graph neural networks"> graph neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multiomics" title=" multiomics"> multiomics</a> </p> <a href="https://publications.waset.org/abstracts/169926/proposing-an-architecture-for-drug-response-prediction-by-integrating-multiomics-data-and-utilizing-graph-transformers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">599</span> Ontology-Driven Knowledge Discovery and Validation from Admission Databases: A Structural Causal Model Approach for Polytechnic Education in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bernard%20Igoche%20Igoche">Bernard Igoche Igoche</a>, <a href="https://publications.waset.org/abstracts/search?q=Olumuyiwa%20Matthew"> Olumuyiwa Matthew</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Bednar"> Peter Bednar</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Gegov"> Alexander Gegov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study presents an ontology-driven approach for knowledge discovery and validation from admission databases in Nigerian polytechnic institutions. The research aims to address the challenges of extracting meaningful insights from vast amounts of admission data and utilizing them for decision-making and process improvement. The proposed methodology combines the knowledge discovery in databases (KDD) process with a structural causal model (SCM) ontological framework. The admission database of Benue State Polytechnic Ugbokolo (Benpoly) is used as a case study. The KDD process is employed to mine and distill knowledge from the database, while the SCM ontology is designed to identify and validate the important features of the admission process. The SCM validation is performed using the conditional independence test (CIT) criteria, and an algorithm is developed to implement the validation process. The identified features are then used for machine learning (ML) modeling and prediction of admission status. The results demonstrate the adequacy of the SCM ontological framework in representing the admission process and the high predictive accuracies achieved by the ML models, with k-nearest neighbors (KNN) and support vector machine (SVM) achieving 92% accuracy. The study concludes that the proposed ontology-driven approach contributes to the advancement of educational data mining and provides a foundation for future research in this domain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=admission%20databases" title="admission databases">admission databases</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20data%20mining" title=" educational data mining"> educational data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology-driven%20knowledge%20discovery" title=" ontology-driven knowledge discovery"> ontology-driven knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=polytechnic%20education" title=" polytechnic education"> polytechnic education</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20causal%20model" title=" structural causal model"> structural causal model</a> </p> <a href="https://publications.waset.org/abstracts/184064/ontology-driven-knowledge-discovery-and-validation-from-admission-databases-a-structural-causal-model-approach-for-polytechnic-education-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184064.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">598</span> Discovery the Relics of Buddhist Stupa at Thanesar, Kurukshetra</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chander%20Shekhar">Chander Shekhar</a>, <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Kumar"> Manoj Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Present paper deal with the discovery of the stupa’s relics which belongs to the Kushana period. These remains were found during the scientific clearance work at a mound near Brahma-SarovarThanesar, Kurukshetra. This archaeological work was done by Department of Archaeology & Museums Haryana Government. The relics of stupa show that it would have been similar to Assandh and Damekhstupa. As per-Buddhist literature, GoutamBudhha reached Thanesar. In memory of Buddh’s Journey, King Ashoka built a big Stupa at Thanesar on the bank of Sarasvati River. Chinese pilgrim Yuan Chuang also referred a Monastery and stupa near Aujas-ghatof Brahma-sarovar. It may be part of that settlement which was mentioned by Yuan Chuang. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=archaeology" title="archaeology">archaeology</a>, <a href="https://publications.waset.org/abstracts/search?q=stupa" title=" stupa"> stupa</a>, <a href="https://publications.waset.org/abstracts/search?q=buddhism" title=" buddhism"> buddhism</a>, <a href="https://publications.waset.org/abstracts/search?q=excavtoin" title=" excavtoin"> excavtoin</a> </p> <a href="https://publications.waset.org/abstracts/145977/discovery-the-relics-of-buddhist-stupa-at-thanesar-kurukshetra" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">193</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">597</span> Review and Comparison of Associative Classification Data Mining Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Suzan%20Wedyan">Suzan Wedyan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data mining is one of the main phases in the Knowledge Discovery Database (KDD) which is responsible of finding hidden and useful knowledge from databases. There are many different tasks for data mining including regression, pattern recognition, clustering, classification, and association rule. In recent years a promising data mining approach called associative classification (AC) has been proposed, AC integrates classification and association rule discovery to build classification models (classifiers). This paper surveys and critically compares several AC algorithms with reference of the different procedures are used in each algorithm, such as rule learning, rule sorting, rule pruning, classifier building, and class allocation for test cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=associative%20classification" title="associative classification">associative classification</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=rule%20ranking" title=" rule ranking"> rule ranking</a>, <a href="https://publications.waset.org/abstracts/search?q=rule%20pruning" title=" rule pruning"> rule pruning</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/4191/review-and-comparison-of-associative-classification-data-mining-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">596</span> Identification of Arglecins B and C and Actinofuranosin A from a Termite Gut-Associated Streptomyces Species</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christian%20A.%20Romero">Christian A. Romero</a>, <a href="https://publications.waset.org/abstracts/search?q=Tanja%20Grkovic"> Tanja Grkovic</a>, <a href="https://publications.waset.org/abstracts/search?q=John.%20R.%20J.%20French"> John. R. J. French</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20%C4%B0pek%20Kurtb%C3%B6ke"> D. İpek Kurtböke</a>, <a href="https://publications.waset.org/abstracts/search?q=Ronald%20J.%20Quinn"> Ronald J. Quinn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A high-throughput and automated 1H NMR metabolic fingerprinting dereplication approach was used to accelerate the discovery of unknown bioactive secondary metabolites. The applied dereplication strategy accelerated the discovery of natural products, provided rapid and competent identification and quantification of the known secondary metabolites and avoided time-consuming isolation procedures. The effectiveness of the technique was demonstrated by the isolation and elucidation of arglecins B (1), C (2) and actinofuranosin A (3) from a termite-gut associated Streptomyces sp. (USC 597) grown under solid state fermentation. The structures of these compounds were elucidated by extensive interpretation of 1H, 13C and 2D NMR spectroscopic data. These represent the first report of arglecin analogs isolated from a termite gut-associated Streptomyces species. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=actinomycetes" title="actinomycetes">actinomycetes</a>, <a href="https://publications.waset.org/abstracts/search?q=actinofuranosin" title=" actinofuranosin"> actinofuranosin</a>, <a href="https://publications.waset.org/abstracts/search?q=antibiotics" title=" antibiotics"> antibiotics</a>, <a href="https://publications.waset.org/abstracts/search?q=arglecins" title=" arglecins"> arglecins</a>, <a href="https://publications.waset.org/abstracts/search?q=NMR%20spectroscopy" title=" NMR spectroscopy"> NMR spectroscopy</a> </p> <a href="https://publications.waset.org/abstracts/181957/identification-of-arglecins-b-and-c-and-actinofuranosin-a-from-a-termite-gut-associated-streptomyces-species" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181957.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">595</span> Discovery of Two-dimensional Hexagonal MBene HfBO</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nanxi%20Miao">Nanxi Miao</a>, <a href="https://publications.waset.org/abstracts/search?q=Junjie%20Wang"> Junjie Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The discovery of 2D materials with distinct compositions and properties has been a research aim since the report of graphene. One of the latest members of the 2D material family is MXene, which is produced from the topochemical deintercalation of the A layer from a laminate MAX phase. Recently, analogous 2D MBenes (transitional metal borides) have been predicted by theoretical calculations as excellent alternatives in applications such as metal-ion batteries, magnetic devices, and catalysts. However, the practical applications of two-dimensional (2D) transition-metal borides (MBenes) have been severely hindered by the lack of accessible MBenes because of the difficulties in the selective etching of traditional ternary MAB phases with orthorhombic symmetry (ort-MAB). Here, we discover a family of ternary hexagonal MAB (h-MAB) phases and 2D hexagonal MBenes (h-MBenes) by ab initio predictions and experiments. Calculations suggest that the ternary h-MAB phases are more suitable precursors for MBenes than the ort-MAB phases. Based on the prediction, we report the experimental synthesis of h-MBene HfBO by selective removal of in from h-MAB Hf2InB2. The synthesized 2D HfBO delivered a specific capacity of 420 mAh g-1 as an anode material in lithium-ion batteries, demonstrating the potential for energy-storage applications. The discovery of this h-MBene HfBO added a new member to the growing family of 2D materials and provided opportunities for a wide range of novel applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=2D%20materials" title="2D materials">2D materials</a>, <a href="https://publications.waset.org/abstracts/search?q=DFT%20calculations" title=" DFT calculations"> DFT calculations</a>, <a href="https://publications.waset.org/abstracts/search?q=high-throughput%20screening" title=" high-throughput screening"> high-throughput screening</a>, <a href="https://publications.waset.org/abstracts/search?q=lithium-ion%20batteries" title=" lithium-ion batteries"> lithium-ion batteries</a> </p> <a href="https://publications.waset.org/abstracts/181936/discovery-of-two-dimensional-hexagonal-mbene-hfbo" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181936.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">594</span> A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Moslehpour">M. Moslehpour</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Khorsandi"> S. Khorsandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NDP" title="NDP">NDP</a>, <a href="https://publications.waset.org/abstracts/search?q=IPsec" title=" IPsec"> IPsec</a>, <a href="https://publications.waset.org/abstracts/search?q=SEND" title=" SEND"> SEND</a>, <a href="https://publications.waset.org/abstracts/search?q=CGA" title=" CGA"> CGA</a>, <a href="https://publications.waset.org/abstracts/search?q=modifier" title=" modifier"> modifier</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20node" title=" malicious node"> malicious node</a>, <a href="https://publications.waset.org/abstracts/search?q=self-computing" title=" self-computing"> self-computing</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed-computing" title=" distributed-computing"> distributed-computing</a> </p> <a href="https://publications.waset.org/abstracts/45747/a-distributed-cryptographically-generated-address-computing-algorithm-for-secure-neighbor-discovery-protocol-in-ipv6" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45747.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">593</span> Whole Coding Genome Inter-Clade Comparison to Predict Global Cancer-Protecting Variants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lamis%20Naddaf">Lamis Naddaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Tabach"> Yuval Tabach</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this research, we identified the missense genetic variants that have the potential to enhance resistance against cancer. Such field has not been widely explored, as researchers tend to investigate mutations that cause diseases, in response to the suffering of patients, rather than those mutations that protect from them. In conjunction with the genomic revolution, and the advances in genetic engineering and synthetic biology, identifying the protective variants will increase the power of genotype-phenotype predictions and can have significant implications on improved risk estimation, diagnostics, prognosis and even for personalized therapy and drug discovery. To approach our goal, we systematically investigated the sites of the coding genomes and picked up the alleles that showed a correlation with the species’ cancer resistance. We predicted 250 protecting variants (PVs) with a 0.01 false discovery rate and more than 20 thousand PVs with a 0.25 false discovery rate. Cancer resistance in Mammals and reptiles was significantly predicted by the number of PVs a species has. Moreover, Genes enriched with the protecting variants are enriched in pathways relevant to tumor suppression like pathways of Hedgehog signaling and silencing, which its improper activation is associated with the most common form of cancer malignancy. We also showed that the PVs are more abundant in healthy people compared to cancer patients within different human races. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20genomics" title="comparative genomics">comparative genomics</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer%20resistance" title=" cancer resistance"> cancer resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer-protecting%20alleles" title="cancer-protecting alleles">cancer-protecting alleles</a> </p> <a href="https://publications.waset.org/abstracts/150807/whole-coding-genome-inter-clade-comparison-to-predict-global-cancer-protecting-variants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=20">20</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=21">21</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=discovery&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>