165 research outputs found
How did therapy change me? – a meta-synthesis of patients’ experiences of change and mechanisms of change in individual psychotherapy
Formålet med denne metasyntesen var å undersøke hva pasienter opplevde bidro til deres endringsprosesser og hva de opplevde som endret ved deltakelse i individuell psykoterapi. Litteratursøk og kvalitetsvurdering av fagfellevurderte kvalitative undersøkelser frem til september 2020 ble gjennomført, som resulterte i 30 inkluderte artikler. Funnene understreker en terapeutisk relasjon bygget over tid og basert på tillit som sentral for utforskning av selvet og i å utvide pasienters selvforståelse. Denne fasiliterte forståelse for hva som er i behov av endring og gav retning til pasienters endringsprosesser, innenfor et samarbeidende terapeutisk miljø. Økt mental, emosjonell og fysisk stabilitet, i tillegg til økt selvaksept, økt aksept for erfaringer og for egen situasjon ble identifisert som sentrale utfall av psykoterapeutiske endringsprosesser, sett fra pasienters perspektiv. Sentrale bidrag til pasienters erfaringer av endring fra psykoterapi diskuteres i lys av eksisterende psykoterapiforskning, kliniske implikasjoner fremheves og metodologiske refleksjoner drøftes.Hovedoppgave psykologprogrammetPROPSY317PRPSY
Asymptotically unbiased and consistent estimation of motif counts in biological networks from noisy subnetwork data
Ph.DDOCTOR OF PHILOSOPH
Damage Detection in Structural Health Monitoring using Hybrid Convolution Neural Network and Recurrent Neural Network
The process of damage identification in Structural Health Monitoring (SHM) gives us a lot of practical information about the current status of the inspected structure. The target of the process is to detect damage status by processing data collected from sensors, followed by identifying the difference between the damaged and the undamaged states. Different machine learning techniques have been applied to attempt to extract features or knowledge from vibration data, however, they need to learn prior knowledge about the factors affecting the structure. In this paper, a novel method of structural damage detection is proposed using convolution neural network and recurrent neural network. A convolution neural network is used to extract deep features while recurrent neural network is trained to learn the long-term historical dependency in time series data. This method with combining two types of features increases discrimination ability when compares with it to deep features only. Finally, the neural network is applied to categorize the time series into two states - undamaged and damaged. The accuracy of the proposed method was tested on a benchmark dataset of Z24-bridge (Switzerland). The result shows that the hybrid method provides a high level of accuracy in damage identification of the tested structure
Effective Feature Extraction Method for SVM-Based Profiled Attacks
Nowadays, one of the most powerful side channel attacks (SCA) is profiled attack. Machine learning algorithms, for example support vector machine, are currently used for improving the effectiveness of the attack. One issue when using SVM-based profiled attack is extracting points of interest, or features from power traces. So far, studies in SCA domain have selected the points of interest (POIs) from the raw power trace for the classifiers. Our work proposes a novel method for finding POIs that based on the combining variational mode decomposition (VMD) and Gram-Schmidt orthogonalization (GSO). That is, VMD is used to decompose the power traces into sub-signals (modes) of different frequencies and POIs selection process based on GSO is conducted on these sub-signals. As a result, the selected POIs are used for SVM classifier to conduct profiled attack. This attack method outperforms other profiled attacks in the same attack scenario. Experiments were performed on a trace data set collected from the Atmega8515 smart card run on the side channel evaluation board Sakura-G/W and the data set of DPA contest v4 to verify the effectiveness of our method in reducing number of power traces for the attacks, especially with noisy power traces
Does BLEU Score Work for Code Migration?
Statistical machine translation (SMT) is a fast-growing sub-field of
computational linguistics. Until now, the most popular automatic metric to
measure the quality of SMT is BiLingual Evaluation Understudy (BLEU) score.
Lately, SMT along with the BLEU metric has been applied to a Software
Engineering task named code migration. (In)Validating the use of BLEU score
could advance the research and development of SMT-based code migration tools.
Unfortunately, there is no study to approve or disapprove the use of BLEU score
for source code. In this paper, we conducted an empirical study on BLEU score
to (in)validate its suitability for the code migration task due to its
inability to reflect the semantics of source code. In our work, we use human
judgment as the ground truth to measure the semantic correctness of the
migrated code. Our empirical study demonstrates that BLEU does not reflect
translation quality due to its weak correlation with the semantic correctness
of translated code. We provided counter-examples to show that BLEU is
ineffective in comparing the translation quality between SMT-based models. Due
to BLEU's ineffectiveness for code migration task, we propose an alternative
metric RUBY, which considers lexical, syntactical, and semantic representations
of source code. We verified that RUBY achieves a higher correlation coefficient
with the semantic correctness of migrated code, 0.775 in comparison with 0.583
of BLEU score. We also confirmed the effectiveness of RUBY in reflecting the
changes in translation quality of SMT-based translation models. With its
advantages, RUBY can be used to evaluate SMT-based code migration models.Comment: 12 pages, 5 figures, ICPC '19 Proceedings of the 27th International
Conference on Program Comprehensio
Multi-level damage detection using a combination of deep neural networks
In recent years, bridge damage identification using a convolutional neural network (CNN) has become a hot research topic and received much attention in the field of civil engineering. Although CNN is capable of categorizing damaged and undamaged states from the measured data, the level of accuracy for damage diagnosis is still insufficient due to the tendency of CNN to ignore the temporal dependency between data points. To address this problem, this paper introduces a novel hybrid damage detection method based on the combination of CNN and Long Short-Term Memory (LSTM) to classify and quantify different levels of damage in the bridge structure. In this method, the CNN model will be used to extract the spatial damage features, which will be combined with the temporal features obtained from Long Short-Term Memory (LSTM) model to create the enhanced damage features. The combination successfully strengthened the damage detection capability of the neural network. Moreover, deep learning is also improved in this paper to process the acceleration-time data, which has a different amplitude at short intervals and the same amplitude at long intervals. The empirical result on the Vang bridge shows that our hybrid CNN-LSTM can detect structural damage with a high level of accuracy
New primitives of controlled elements F2/4 for block ciphers
This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA devices. To increase the hardware implementation efficiency of block ciphers, while using contemporary FPGA devices there is proposed an approach to synthesis of fast block ciphers, which uses the substitution-permutation network constructed on the basis of the controlled elements F2/4 implementing the 2 x 2 substitutions under control of the four-bit vector. There are proposed criteria for selecting elements F2/4 and results on investigating their main cryptographic properties. It is designed a new fast 128-bit block cipher MM-128 that uses the elements F2/4 as elementary building block. The cipher possesses higher performance and requires less hardware resources for its implementation on the bases of FPGA devices than the known block ciphers. There are presented result on differential analysis of the cipher MM-12
- …