3,701 research outputs found

    Prediction distribution of generalized geometric series distribution and its different forms

    Get PDF
    The prediction distribution of generalized geometric series distribution (GGSD) and of its truncated and size-biased forms is derived and studied under the non-informative and beta prior distributions. The prediction distributions for all the models are beta distribution, but the parameters of the prediction distributions depend on the choice of the prior distribution as well as the model under consideration

    Time-Domain Data Fusion Using Weighted Evidence and Dempster–Shafer Combination Rule: Application in Object Classification

    Get PDF
    To apply data fusion in time-domain based on Dempster–Shafer (DS) combination rule, an 8-step algorithm with novel entropy function is proposed. The 8-step algorithm is applied to time-domain to achieve the sequential combination of time-domain data. Simulation results showed that this method is successful in capturing the changes (dynamic behavior) in time-domain object classification. This method also showed better anti-disturbing ability and transition property compared to other methods available in the literature. As an example, a convolution neural network (CNN) is trained to classify three different types of weeds. Precision and recall from confusion matrix of the CNN are used to update basic probability assignment (BPA) which captures the classification uncertainty. Real data of classified weeds from a single sensor is used test time-domain data fusion. The proposed method is successful in filtering noise (reduce sudden changes—smoother curves) and fusing conflicting information from the video feed. Performance of the algorithm can be adjusted between robustness and fast-response using a tuning parameter which is number of time-steps(ts)

    Paradox Elimination in Dempster–Shafer Combination Rule with Novel Entropy Function: Application in Decision-Level Multi-Sensor Fusion

    Get PDF
    Multi-sensor data fusion technology in an important tool in building decision-making applications. Modified Dempster–Shafer (DS) evidence theory can handle conflicting sensor inputs and can be applied without any prior information. As a result, DS-based information fusion is very popular in decision-making applications, but original DS theory produces counterintuitive results when combining highly conflicting evidences from multiple sensors. An effective algorithm offering fusion of highly conflicting information in spatial domain is not widely reported in the literature. In this paper, a successful fusion algorithm is proposed which addresses these limitations of the original Dempster–Shafer (DS) framework. A novel entropy function is proposed based on Shannon entropy, which is better at capturing uncertainties compared to Shannon and Deng entropy. An 8-step algorithm has been developed which can eliminate the inherent paradoxes of classical DS theory. Multiple examples are presented to show that the proposed method is effective in handling conflicting information in spatial domain. Simulation results showed that the proposed algorithm has competitive convergence rate and accuracy compared to other methods presented in the literature

    Comparative analysis of conventional versus modern appraisal systems: an empirical evidence from telecom sector of Pakistan

    Get PDF
    Current study aims at investigating the comparison of online performance appraisal system in relation with Traditional paper and pencil based performance appraisal system on employees’ work outcome and behavior. In this way, the contemporary study will focus on major areas of online performance appraisal system and paper and pencil based performance appraisal system. The universe selected for this study is telecommunication industry of Pakistan and two stage sampling is used to conduct the study. First all the telecommunication and cellular companies were the population and then PTCL was finally selected for study purpose. The results showed that there is a significance difference between the responses of the manual and online respondents and it is very clear that the employees consider online based performance appraisal system to be more beneficial and accurate with respect to the above mentioned six constructs

    The Impact of Women Empowerment on Their Lives: Bangladesh Context

    Get PDF
    Women empowerment is the most common phenomena not only Bangladesh but also across the whole world. Women are encouraged to see and bring forth the beauty and strength within themselves, to be inspired to be the best they can be and let their spirit shine through. Most of the researches have been done about women empowerment. But this research paper is trying to find out the present scenario of women empowerment in Bangladesh. This study also focuses on those problems which are associated with women empowerment. The study conducted 10 sample units (of Dhaka City) to find out the problems. This study concludes that, Bangladesh has a huge success in women empowerment but there also be some problems associated with it. This study suggested that, some problems can be solved from government level; some are solved by our business organization. And some problems will be solved in case of changing the general values and perceptions about women. Keywords: Empowerment, Women Empowerment

    Advancing security information and event management frameworks in managed enterprises using geolocation

    Get PDF
    Includes bibliographical referencesSecurity Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources. Through the retrieval of mass feedback from many components and security systems within a computing environment, SIEMs are able to correlate and analyse events with a view to incident detection. The hypothesis of this study is that existing Security Information and Event Management techniques and solutions can be complemented by location-based information provided by feeder systems. In addition, and associated with the introduction of location information, it is hypothesised that privacy-enforcing procedures on geolocation data in SIEMs and meta- systems alike are necessary and enforceable. The method for the study was to augment a SIEM, established for the collection of events in an enterprise service management environment, with geo-location data. Through introducing the location dimension, it was possible to expand the correlation rules of the SIEM with location attributes and to see how this improved security confidence. An important co-consideration is the effect on privacy, where location information of an individual or system is propagated to a SIEM. With a theoretical consideration of the current privacy directives and regulations (specifically as promulgated in the European Union), privacy supporting techniques are introduced to diminish the accuracy of the location information - while still enabling enhanced security analysis. In the context of a European Union FP7 project relating to next generation SIEMs, the results of this work have been implemented based on systems, data, techniques and resilient features of the MASSIF project. In particular, AlienVault has been used as a platform for augmentation of a SIEM and an event set of several million events, collected over a three month period, have formed the basis for the implementation and experimentation. A "brute-force attack" misuse case scenario was selected to highlight the benefits of geolocation information as an enhancement to SIEM detection (and false-positive prevention). With respect to privacy, a privacy model is introduced for SIEM frameworks. This model utilises existing privacy legislation, that is most stringent in terms of privacy, as a basis. An analysis of the implementation and testing is conducted, focusing equally on data security and privacy, that is, assessing location-based information in enhancing SIEM capability in advanced security detection, and, determining if privacy-enforcing procedures on geolocation in SIEMs and other meta-systems are achievable and enforceable. Opportunities for geolocation enhancing various security techniques are considered, specifically for solving misuse cases identified as existing problems in enterprise environments. In summary, the research shows that additional security confidence and insight can be achieved through the augmentation of SIEM event information with geo-location information. Through the use of spatial cloaking it is also possible to incorporate location information without com- promising individual privacy. Overall the research reveals that there are significant benefits for SIEMs to make use of geo-location in their analysis calculations, and that this can be effectively conducted in ways which are acceptable to privacy considerations when considered against prevailing privacy legislation and guidelines

    Characterization of chitinase activities, and cloning, analysis, and expression of genes encoding pathogenesis-related proteins in strawberry

    Get PDF
    The goal of this dissertation research is to investigate the defense systems of strawberry plant by characterizing the genes and their products involved in plant disease-resistance. Pathogenesis-related proteins, including hydrolytic enzymes chitinases and â-1,3- glucanases, have been known to be induced in plants upon infection with various pathogens. Highest total chitinase activity was found in strawberry crown, whereas root, petiole, fruit, leaf, and runner showed successively lower activities. Chitinase isoform analysis showed that up to six acidic and two basic isoforms were present in various organs. The total chitinase activity was stable at 50oC. The pH optimum for chitinase activity was 5. Total chitinase activity was inducible in leaves when plants were treated with fungal spores, salicylic acid, ethephon, or injury. Genes encoding a class III chitinase and two class II chitinases (designated as FaChi2-1 and FaChi2-2) were cloned and their complete nucleotide sequences were obtained. Of the two class II chitinase genes, FaChi2-1 contains one intron whereas FaChi2-2 contains two introns. cDNA clones, containing the complete protein coding regions, for the two class II chitinase genes were obtained to establish the exact intron splice junctions. All cloned genes were found to be expressed constitutively in the strawberry leaves. Southern blot analyses for the two class II chitinase genes showed that these genes belong to small multi-gene families with no more than two members per haploid genome. Transcription start site for FaChi2-1 was mapped to –87 and –102 positions from the putative translation start site by primer extension analysis. FaChi2-2’s transcription start site was mapped to –52 position upstream of the putative translation start site. Induction of total chitinase activity, pattern of acidic and basic isoforms, and expression of two class II chitinase genes were analyzed at 2, 6, 12, 24, and 48 h after fungal inoculation of plants with Colletotrichum fragariae or C. acutatum. The chitinase activity was inducible up to five fold. The expression of FaChi2-1 and FaChi2-2 was quantified by real-time PCR. FaChi2-1 was induced early within 2 h whereas FaChi2-2 was induced only at 24-48 h post-infection

    Management and Sharing of the Ganges

    Get PDF
    • …
    corecore