repetitive process
Recently Published Documents


TOTAL DOCUMENTS

81
(FIVE YEARS 20)

H-INDEX

9
(FIVE YEARS 2)

2021 ◽  
Vol 15 (3) ◽  
pp. 1-33
Author(s):  
Charalampos Chelmis ◽  
Daphney-Stavroula Zois

The potentially detrimental effects of cyberbullying have led to the development of numerous automated, data-driven approaches, with emphasis on classification accuracy. Cyberbullying, as a form of abusive online behavior, although not well-defined, is a repetitive process, i.e., a sequence of aggressive messages sent from a bully to a victim over a period of time with the intent to harm the victim. Existing work has focused on harassment (i.e., using profanity to classify toxic comments independently) as an indicator of cyberbullying, disregarding the repetitive nature of this harassing process. However, raising a cyberbullying alert immediately after an aggressive comment is detected can lead to a high number of false positives. At the same time, two key practical challenges remain unaddressed: (i) detection timeliness, which is necessary to support victims as early as possible, and (ii) scalability to the staggering rates at which content is generated in online social networks. In this work, we introduce CONcISE , a novel approach for timely and accurate Cyberbullying detectiON in online social media SEssions. CONcISE is a two-stage online approach designed to reduce the time to raise a cyberbullying alert by sequentially examining comments as they become available over time, and minimizing the number of feature evaluations necessary for a decision to be made for each comment. Extensive experiments on a real-world Instagram dataset with users and comments demonstrate the effectiveness, scalability, and timeliness of our approach and its benefits over existing methods. Additional experiments using a Twitter dataset offer evidence in support of the potential generalizability of CONcISE to other social media platforms.


2020 ◽  
Vol 24 (1) ◽  
pp. 171-176
Author(s):  
Yu. Serhiienko ◽  

Abstract. Introduction. The article conducts research and defines the essence of the enterprise as the primary link of the economy and an independent business entity and law. The concept of “enterprise” is considered from the standpoint of different branches of knowledge and concludes that the economic essence of the enterprise, as a whole, is that its activities are aimed at making a profit, and its objective conditions are a continuous repetitive process of reproduction. Purpose. The purpose of the article is to explore the specifics of economic security of the enterprise from the standpoint of its consideration as an object of management. Results. The scheme of properties of economic security of the enterprise as an object of management such as reliability, flexibility, efficiency and controllability are constructed. In addition, there is a definition given to each of these properties and their connection is shown. It is determined that today, ensuring the economic security of the enterprise is a priority for any organizational and legal form of the enterprise. Conclusions. The practical meaning of the obtained results is that they can be the basis for further study of the problems of economic security of Ukrainian enterprises. Keywords: economic security; enterprise; threats; management.


2020 ◽  
Author(s):  
Niklas Tenhaef ◽  
Robert Stella ◽  
Julia Frunzke ◽  
Stephan Noack

Molecular cloning is the core of Synthetic Biology, as it comprises the assembly of DNA and its expression in target hosts. At present, however, cloning is most often a manual, time-consuming and repetitive process that highly benefits from automation. The automation of a complete rational cloning procedure, i.e., from DNA part creation to expression in the target host, involves the integration of different operations and machines. Examples of such workflows are sparse, especially when the design is rational (i.e., the DNA sequence design is fixed, and not based on randomized libraries) and the target host is less genetically tractable (e.g., not sensitive to heat-shock transformation). In this study, an automated workflow for the rational construction of plasmids and their subsequent conjugative transfer into the biotechnological platform organism Corynebacterium glutamicum is presented. The whole workflow is accompanied by a custom-made software tool. As an application example, a rationally designed library of transcription factor biosensors based on the regulator Lrp was constructed and characterized. A sensor with an improved dynamic range was obtained, and insights from the screening provided evidence for a dual regulator function of C. glutamicum Lrp.


2020 ◽  
Vol 10 (21) ◽  
pp. 7422
Author(s):  
Taewook Kang ◽  
Shashidhar Patil ◽  
Kyubyung Kang ◽  
Dan Koo ◽  
Jonghoon Kim

The number of scan-to-BIM projects that convert scanned data into Building Information Modeling (BIM) for facility management applications in the Mechanical, Electrical and Plumbing (MEP) fields has been increasing. This conversion features an application purpose-oriented process, so the Scan-to-BIM work parameters to be applied vary in each project. Inevitably, a modeler manually adjusts the BIM modeling parameters according to the application purpose, and repeats the Scan-to-BIM process until the desired result is achieved. This repetitive manual process has adverse consequences for project productivity and quality. If the Scan-to-BIM process can be formalized based on predefined rules, the repetitive process in various cases can be automated by re-adjusting only the parameters. In addition, the predefined rule-based Scan-to-BIM pipeline can be stored and reused as a library. This study proposes a rule-based Scan-to-BIM Mapping Pipeline to support application-oriented Scan-to-BIM process automation, variability and reusability. The application target of the proposed pipeline method is the plumbing system that occupies a large number of MEPs. The proposed method was implemented using an automatic generation algorithm, and its effectiveness was verified.


2020 ◽  
Vol 16 (3) ◽  
pp. 247
Author(s):  
Wan Aida WAN Wan Yahaya ◽  
Shamila Mohamed Shuhidan

Documentaries are a unique form of filmmaking. It allows for the comman man/woman to address large, important issues that is able to shake society. It involves a small portion of power as it addresses a wide range of subject matters such as history, anthropology, trends, as well as, social and political constructs, ethical issues and moral responsibilities. However, even though documentaries have evolved continuously, its approaches and methods remain ambiguous, and its parameters keep enlarging and changing. As students starting out to understand the process of documentary filmmaking, many struggle in terms of identifying appropriate content suited for that of a documentary. Students are unable to develop appropriate strategies towards identifying the type of stories to tell. This research seeks out explore an idea and story identification technique, specifically through the use of strategic mapping, as a means of helping students to understand the layers required in planning and constructing a documentary story. Action research is applied to guide and observe students’ responses through a number of mapping techniques that allows for the identification of the core focus/theme of the documentary. The research discovers that through a repetitive process, students’ are able to develop, change and extend their first impression responses as they begin to understand the process of documentary story and content identification.


Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1528
Author(s):  
Longhui Zhou ◽  
Hongfeng Tao ◽  
Wojciech Paszke ◽  
Vladimir Stojanovic ◽  
Huizhong Yang

This paper puts forward a PD-type iterative learning control algorithm for a class of discrete spatially interconnected systems with unstructured uncertainty. By lifting and changing the variable of discrete space model, the uncertain spatially interconnected systems is converted into equivalent singular system, and the general state space model is derived in view of singular system theory. Then, the state error and output error information are used to design the iterative learning control law, transforming the controlled system into an equivalent repetitive process model. Based on the stability theory of repetitive process, sufficient condition for the stability of the system along the trial is given in the form of linear matrix inequalities (LMIs). Finally, the effectiveness of the proposed algorithm is verified by the simulation of ladder circuits.


2020 ◽  
Vol 234 (3) ◽  
pp. 517-529 ◽  
Author(s):  
Mostafa Jabbari ◽  
Magnus Lundin ◽  
Saeed Bahadorikhalili ◽  
Mikael Skrifvars ◽  
Mohammad J. Taherzadeh

AbstractThe solvent finding step has always been a time-consuming job in chemical-involved processes. The source of difficulty mainly comes from the trial-and-errors, as a repetitive process of chosing solvents and mixing them in different proportions. Computers are good at doing repetitive processes; however, they can only deal with numerical values, rather than qulitative scales. Numerification of qualitative parameters (like solubility) has already been introduced. The most recent one is the Hansen solubility parameters (HSPs). Using the HSPs could provide a solvent or solvent-mixture. In our previous study, we introduced a computer-aided model and a software to find a solvent mixture. In this study, we have used the computer-aided solvent selection model to find some solvent mixtures for polyamide 11, a biobased polymer which has attracted enormous attention recently. Using this numerical model significantly diminished the time of solvent development experimentation by decreasing the possible/necessary trials.


2020 ◽  
Vol 137 ◽  
pp. 104625 ◽  
Author(s):  
Pavel Pakshin ◽  
Julia Emelianova ◽  
Eric Rogers ◽  
Krzysztof Gałkowski

Sign in / Sign up

Export Citation Format

Share Document