Some methods in the world university ranking institutions still have weaknesses. Among the university rankings, Webometrics focused on quantitative studies related to website and content phenomena and is considered ea...
详细信息
ISBN:
(纸本)9781450385244
Some methods in the world university ranking institutions still have weaknesses. Among the university rankings, Webometrics focused on quantitative studies related to website and content phenomena and is considered easy to measure because it bases ranking criteria on university activities on the internet. On the webometrics, the percentage of weight on the criteria of excellence which is quite high (40 %), makes the university pay attention to achieving that score. The existing method in weighting the criteria using the analytical hierarchy process (AHP) needs to include =n(n-1)/2 questions for each group of n-criteria paired comparisons. In this study, the Consistent Fuzzy Preference Relation (CFPR) method is used to study the factors/criteria to determine what strategy universities will take to improve the webometrics ranking in terms of excellence. The CFPR techniques are used to reduce expert assessment steps to only as much as n-1 to ensure consistency at the level with n criteria. Based on the calculation results, it can be concluded that the strategy for improving the excellence score is prioritized on three main criteria in sequence, namely improving scholarly rank (A), measuring the number of scientific papers (B), recognizing scholarly ranks (C). The weight of each criterion in the sequence is 0.51, 0.32, and 0.17. Some strategies to increase the excellence score based on the main priority of sub-criteria and sub-sub criteria are explained in this study.
Agile development is conventional these days and with the passage of time software developers are rapidly moving from Waterfall to Agile development. Agile methods focus on delivering executable code quickly by increa...
详细信息
Every year technology continues to develop, especially in the field of animal husbandry. As demonstrated by the 3.6% increase in chicken consumption in developing nations, it is predicted that both poultry production ...
详细信息
ISBN:
(数字)9798350372106
ISBN:
(纸本)9798350372113
Every year technology continues to develop, especially in the field of animal husbandry. As demonstrated by the 3.6% increase in chicken consumption in developing nations, it is predicted that both poultry production and consumption will rise between 2005 until 2030. As a result, the chicken business needs to be able to fulfill customer demand. Poultry, particularly chickens, are sensitive to changes in temperature, humidity, and ammonia gas inside the coop, all of which can make the chickens sick. As a result, research is being done to create a server system and develop a framework utilizing IoT technologies. By utilizing Internet of Things (IoT) technology, efficiency in monitoring and controlling chickens can increase production. There are many farmers who still use traditional methods, especially small and medium-scale farmers. This system increases the level of measurement accuracy in the chicken coop using five modules and the device used is flexible so that farmers can move it and place it anywhere. using this system, farmers can manage chicken farming more effectively and measurably, which farmers can manage simply by monitoring via a website that can be accessed anytime and anywhere.
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, imp...
详细信息
ISBN:
(纸本)9781665476621
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, implementation changes can create errors (e.g., parallelism errors), which are difficult to identify since the aggregate behavior of an incorrect implementation of a stochastic network simulation can fall within the distributions expected from correct implementations. In this paper, we propose the first approach that applies machine learning to traces of network simulations to detect errors. Our technique transforms simulation traces into images by reordering the network's adjacency matrix, and then training supervised machine learning models. Our evaluation on three simulation models shows that we can easily detect previously encountered types of errors and even confidently detect new errors. This work opens up numerous opportunities by examining other simulation models, representations (i.e., matrix reordering algorithms), or machine learning techniques.
Because of its usefulness in various fields including as safety applications, traffic control applications, and entertainment applications, VANET is an essential topic that is now being investigated intensively. VANET...
详细信息
Pulmonary arterial hypertension (PAH) is biggest preventable cause of early deaths, and hence one of the global preferences of World Health Organization for determent. PAH also induces the vast majority of patients wi...
Pulmonary arterial hypertension (PAH) is biggest preventable cause of early deaths, and hence one of the global preferences of World Health Organization for determent. PAH also induces the vast majority of patients with chronic kidney disease (CKD). Both PAH and CKD are inherently connected, but the common molecular pathways and genes of these two disorders have not yet been demonstrated. In this study, we aimed to determine the similar molecular pathways and therapeutic hub proteins in PAH and CKD that may be used to anticipate the progression of the disease. We used Limma package to conduct differential analysis of gene transcripts of PAH and CKD obtained from the Gene Expression repository. The functional annotations of the genes were determined with the use of pathway analysis. Then proteinâprotein interaction (PPI) networks were constructed to determine the hub proteins, and a clustering technique was applied to determine the most significant PPI elements. We separately evaluated the PAH and CKD gene expression-based datasets and discovered 30 differentially expressed genes (DEGs) shared by both PAH and CKD. The pathways of KEGG revealed that the most prevalent DEGs are associated with the Malaria and African trypanosomiasis. Gene ontology (GO), TF and miRNA analysis and module investigation is treated the forthcoming work of this study. Finally, various drug compounds have been suggested based on the concordant DEGs.
Lung cancer (LC), idiopathic pulmonary fibrosis (IPF) and chronic obstructive pulmonary disease (COPD) are the most fatal disorders in the globe, generating frequent human issues. Having IPF and COPD are the risk fact...
Lung cancer (LC), idiopathic pulmonary fibrosis (IPF) and chronic obstructive pulmonary disease (COPD) are the most fatal disorders in the globe, generating frequent human issues. Having IPF and COPD are the risk factors of the LC, but the molecular mechanisms that underlie among IPF, COPD, and LC are not yet elucidated. In this study, we looked for shared molecular indicators and pathways that might explain how individuals with IPF, COPD, and LC are related to one another. GSE24206, GSE76925 and GSE18842 microarray datasets are utilized for IPF, COPD and LC samples. The preprocessing of datasets has done using R language, and then concordant differentially expressed genes (DEGs) are discovered. After that the protein-protein interactions (PPIs) are built using the similar DEGs, and the hub genes are determined using topological analysis. ETS1, MSH2, SORD, RORA and NEDD9 are the PPI network’s top 5 hub genes. The pathways of KEGG demonstrated that the concordant DEGs are related to the colorectal cancer and pathways in cancer. Future work for this project will focus on miRNA, TF, and gene ontology (GO) analyses, as well as module analysis networks. Finally, based on the concordant DEGs, a number of potential medications have been suggested.
The use of collected data is a valuable source for analysis that benefits both medical research and practice. Information privacy is considered a significant challenge that hinders using such information for research ...
The use of collected data is a valuable source for analysis that benefits both medical research and practice. Information privacy is considered a significant challenge that hinders using such information for research purposes. In terms of research, releasing patients’ information for research purposes may lead to privacy breaches for patients in various cases. Individual patients may not wish to be identifiable when using information about their health for research. This work proposes a utility-aware data anonymization model for sharing patients’ health information for research purposes in a privacy-preserving manner. The proposed model is interactive and involves a number of operations that are performed on patients’ information before releasing it for research purposes according to certain requirements specified by the data user (researcher).
Identification and analysis of biological microscopy images need high focus and years of experience to master the art. The rise of deep neural networks enables analyst to achieve the desired results with reduced time ...
详细信息
software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of ...
详细信息
ISBN:
(数字)9781665488105
ISBN:
(纸本)9781665488112
software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of software source codes have opened a need for vulnerability detection methods to successfully predict malicious codes before being the prey of cyberattacks. As leveraging humans to check sources codes requires extensive time and resources and preexisting static code analyzers are unable to properly detect vulnerable codes. Thus, artificial intelligence techniques, mainly deep learning models, have gained traction to detect source code vulnerability. A systematic review is carried out to explore and understand the various deep learning methods employed for the task and their efficacy as a prediction model. Additionally, a summary of each process and its characteristics are examined and its implementation on specific data sets and their evaluation will be discussed.
暂无评论