165 research outputs found

    How did therapy change me? – a meta-synthesis of patients’ experiences of change and mechanisms of change in individual psychotherapy

    Get PDF
    Formålet med denne metasyntesen var å undersøke hva pasienter opplevde bidro til deres endringsprosesser og hva de opplevde som endret ved deltakelse i individuell psykoterapi. Litteratursøk og kvalitetsvurdering av fagfellevurderte kvalitative undersøkelser frem til september 2020 ble gjennomført, som resulterte i 30 inkluderte artikler. Funnene understreker en terapeutisk relasjon bygget over tid og basert på tillit som sentral for utforskning av selvet og i å utvide pasienters selvforståelse. Denne fasiliterte forståelse for hva som er i behov av endring og gav retning til pasienters endringsprosesser, innenfor et samarbeidende terapeutisk miljø. Økt mental, emosjonell og fysisk stabilitet, i tillegg til økt selvaksept, økt aksept for erfaringer og for egen situasjon ble identifisert som sentrale utfall av psykoterapeutiske endringsprosesser, sett fra pasienters perspektiv. Sentrale bidrag til pasienters erfaringer av endring fra psykoterapi diskuteres i lys av eksisterende psykoterapiforskning, kliniske implikasjoner fremheves og metodologiske refleksjoner drøftes.Hovedoppgave psykologprogrammetPROPSY317PRPSY

    Damage Detection in Structural Health Monitoring using Hybrid Convolution Neural Network and Recurrent Neural Network

    Get PDF
    The process of damage identification in Structural Health Monitoring (SHM) gives us a lot of practical information about the current status of the inspected structure. The target of the process is to detect damage status by processing data collected from sensors, followed by identifying the difference between the damaged and the undamaged states. Different machine learning techniques have been applied to attempt to extract features or knowledge from vibration data, however, they need to learn prior knowledge about the factors affecting the structure. In this paper, a novel method of structural damage detection is proposed using convolution neural network and recurrent neural network. A convolution neural network is used to extract deep features while recurrent neural network is trained to learn the long-term historical dependency in time series data. This method with combining two types of features increases discrimination ability when compares with it to deep features only. Finally, the neural network is applied to categorize the time series into two states - undamaged and damaged. The accuracy of the proposed method was tested on a benchmark dataset of Z24-bridge (Switzerland). The result shows that the hybrid method provides a high level of accuracy in damage identification of the tested structure

    Effective Feature Extraction Method for SVM-Based Profiled Attacks

    Get PDF
    Nowadays, one of the most powerful side channel attacks (SCA) is profiled attack. Machine learning algorithms, for example support vector machine, are currently used for improving the effectiveness of the attack. One issue when using SVM-based profiled attack is extracting points of interest, or features from power traces. So far, studies in SCA domain have selected the points of interest (POIs) from the raw power trace for the classifiers. Our work proposes a novel method for finding POIs that based on the combining variational mode decomposition (VMD) and Gram-Schmidt orthogonalization (GSO). That is, VMD is used to decompose the power traces into sub-signals (modes) of different frequencies and POIs selection process based on GSO is conducted on these sub-signals. As a result, the selected POIs are used for SVM classifier to conduct profiled attack. This attack method outperforms other profiled attacks in the same attack scenario. Experiments were performed on a trace data set collected from the Atmega8515 smart card run on the side channel evaluation board Sakura-G/W and the data set of DPA contest v4 to verify the effectiveness of our method in reducing number of power traces for the attacks, especially with noisy power traces

    Does BLEU Score Work for Code Migration?

    Full text link
    Statistical machine translation (SMT) is a fast-growing sub-field of computational linguistics. Until now, the most popular automatic metric to measure the quality of SMT is BiLingual Evaluation Understudy (BLEU) score. Lately, SMT along with the BLEU metric has been applied to a Software Engineering task named code migration. (In)Validating the use of BLEU score could advance the research and development of SMT-based code migration tools. Unfortunately, there is no study to approve or disapprove the use of BLEU score for source code. In this paper, we conducted an empirical study on BLEU score to (in)validate its suitability for the code migration task due to its inability to reflect the semantics of source code. In our work, we use human judgment as the ground truth to measure the semantic correctness of the migrated code. Our empirical study demonstrates that BLEU does not reflect translation quality due to its weak correlation with the semantic correctness of translated code. We provided counter-examples to show that BLEU is ineffective in comparing the translation quality between SMT-based models. Due to BLEU's ineffectiveness for code migration task, we propose an alternative metric RUBY, which considers lexical, syntactical, and semantic representations of source code. We verified that RUBY achieves a higher correlation coefficient with the semantic correctness of migrated code, 0.775 in comparison with 0.583 of BLEU score. We also confirmed the effectiveness of RUBY in reflecting the changes in translation quality of SMT-based translation models. With its advantages, RUBY can be used to evaluate SMT-based code migration models.Comment: 12 pages, 5 figures, ICPC '19 Proceedings of the 27th International Conference on Program Comprehensio

    Multi-level damage detection using a combination of deep neural networks

    Get PDF
    In recent years, bridge damage identification using a convolutional neural network (CNN) has become a hot research topic and received much attention in the field of civil engineering. Although CNN is capable of categorizing damaged and undamaged states from the measured data, the level of accuracy for damage diagnosis is still insufficient due to the tendency of CNN to ignore the temporal dependency between data points. To address this problem, this paper introduces a novel hybrid damage detection method based on the combination of CNN and Long Short-Term Memory (LSTM) to classify and quantify different levels of damage in the bridge structure. In this method, the CNN model will be used to extract the spatial damage features, which will be combined with the temporal features obtained from Long Short-Term Memory (LSTM) model to create the enhanced damage features. The combination successfully strengthened the damage detection capability of the neural network. Moreover, deep learning is also improved in this paper to process the acceleration-time data, which has a different amplitude at short intervals and the same amplitude at long intervals. The empirical result on the Vang bridge shows that our hybrid CNN-LSTM can detect structural damage with a high level of accuracy

    New primitives of controlled elements F2/4 for block ciphers

    Get PDF
    This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA devices. To increase the hardware implementation efficiency of block ciphers, while using contemporary FPGA devices there is proposed an approach to synthesis of fast block ciphers, which uses the substitution-permutation network constructed on the basis of the controlled elements F2/4 implementing the 2 x 2 substitutions under control of the four-bit vector. There are proposed criteria for selecting elements F2/4 and results on investigating their main cryptographic properties. It is designed a new fast 128-bit block cipher MM-128 that uses the elements F2/4 as elementary building block. The cipher possesses higher performance and requires less hardware resources for its implementation on the bases of FPGA devices than the known block ciphers. There are presented result on differential analysis of the cipher MM-12
    corecore