Irrational crowds tend to adapt herd mentality, having group behaviour and high suggestion through interaction. It is important to see how an irrational crowd can be controlled to prevent undesirable crowd attitude. This paper reviews existing models and the controllers to provide a comprehensive study for crowd control. It focuses on a comprehensive analysis of the control of psychological crowd, modelled using LeBon’s theory; which defines the crowd behaviour in terms of crowd attitude. The crowd attitude is defined in terms of suggestibility and prestige and the crowd interaction is defined in terms of the interaction of prestige and suggestibility, which is naturally unstable. A controller is required to achieve stability. In this paper several control approaches are described and the best control approach is highlighted. The results conclude, the best control approach is using multiple control agents, since the control effort is reduced and the stabilizing time is improved.
Journal of Community & Applied Social PsychologyJ. Communi.docxtawnyataylor528
Journal of Community & Applied Social Psychology
J. Community Appl. Soc. Psychol., 13: 426–438 (2003)
Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/casp.748
The Emancipatory Character of Action Research,
its History and the Present State of the Art
BEN W. M. BOOG*
Department of Adult Education and Social Intervention, University of Groningen, Grote Rozenstraat 38,
9712 TJ Groningen, The Netherlands
ABSTRACT
Right from the start, action research was intended to be emancipatory research, and it still is. This
article will underpin this by outlining its history and the present state of the art. Though a variety of
action research approaches have developed along divergent theoretical pathways, it will be stressed
that these approaches share the most important characteristics of action research and are basically
different applications of different action theories. They are all supported by a participatory
worldview and are meant to be a double-sided process of research, self research and education direc-
ted at individual empowerment and collective empowerment and/or emancipation. Since the rela-
tionship between the researcher and the subjects being researched is crucial for the success of action
research as an emancipatory or empowering activity, this article will maintain that the most impor-
tant task of action researchers is to develop refined heuristics concerning this communication.
The article will end by making some recommendations for the improvement of action research as
an emancipatory practice. Copyright # 2003 John Wiley & Sons, Ltd.
Key words: emancipatory action research; action theory; emancipation; empowerment; participatory
worldview; relationship between researchers and researched subjects
INTRODUCTION
The historical development of action research reveals that it had emancipatory intentions
from the very beginning, and that this basis has become increasingly sophisticated with the
refinement of action research into different approaches. Action research is designed to
improve the researched subjects’ capacities to solve problems, develop skills (including
professional skills), increase their chances of self-determination, and to have more influ-
ence on the functioning and decision-making processes of organizations and institutions
from the context in which they act. Emancipation implies that the generated results of
action research are two-sided. On the one hand are the specific improved action competen-
cies of the researched subjects in the local situation in the specific research project. On the
other hand are the general enhanced action competencies in other comparable problematic
situations in the future, sometimes even in broader contexts. In addition, every action
* Correspondence to: Ben W. M. Boog, Department of Adult Education and Social Intervention, University of
Groningen, Grote Rozenstraat 38, 9712 TJ Groningen, The Netherlands. E-mail: [email pr ...
MAX WEBER Key Concepts I Sociology is a science which at.docxandreecapon
MAX WEBER: Key Concepts I
Sociology is a “science which attempts the interpretive understanding of social action to arrive
at a causal explanation of its course and effects.” While the subject matter of sociology
may overlap with history, it focuses on generalizable uniformities in social action
rather than the explanation of particular events, actions, and personalities.
Verstehen, meaning “understanding” in German, is the name Weber gives to the method of
interpretive sociology. He advocates studying social life by way of understanding the
subjective meanings that people give to their own social actions and those of others.
In fact, he considered this method of understanding the subjective states of mind of
individuals the basis for a scientific sociology. He identifies two kinds of understanding:
1) direct observational understanding of the subjective meaning of any given
individual act, its intention and 2) explanatory understanding, which looks at the
context of actions to discover the complex sets of meanings that comprise the
motivation behind individual actions in particular circumstances. He calls this complex
set of meanings a motive. Though this method of understanding is continuous with
the ways we constantly interpret other people’s behavior in our everyday lives,
sociology aims to do so in a more rigorous and systematic way—and often on a larger
scale. As it’s not feasible to interpret what’s in many heads all at once, to approximate
this method for understanding collective social life, Weber believes we need to employ
ideal types to classify different kinds of social action and their results according to the
similarities of individuals’ meanings and motivations.
Ideal Types are idealized concepts formulated by sociologists to capture a part of social reality,
which is much too complex to be understood in its entirety. Since actual situations
vary more or less in innumerable different ways from case to case, ideal types simplify
a messy reality by isolating certain aspects of institutions or social practices that are
relevant to a particular study and allow for analysis and comparison. Due to their
complexity, you should not expect to find ideal types in their pure form in real
situations. Rather, they act as simplifications that are useful for classifying and
comprehending significant parts of social reality. They can offer a window onto reality
that helps us understand the patterns within the messiness. For instance, Weber’s
notions of traditional, charismatic, and legal-rational forms of authority are ideal types:
SOC 260 Classical Social Theory Drexel University
Fall 2015 Professor Howard
authority figures will rarely fall neatly in any one of these categories but will probably
fall somewhere in between (in a grey area). Still, by constructing these ideal types,
Weber hopes to generalize about how authority ope ...
ViewpointsSocial work and social problemsA contribution f.docxlillie234567
Viewpoints
Social work and social problems:
A contribution from systems theory
and constructionism
Michailakis D., Schirmer W. Social work and social problems:
A contribution from systems theory and constructionism
Social work builds its identity on social problems. The goal is
to generate knowledge about causes, consequences and solu-
tions. However, there is a lack of theory of social problems.
We suggest that research on social problems can benefit
by ‘bringing the observer in’: Loseke’s constructionist frame-
work and Luhmann’s systems theory. According to Loseke,
social problems appear differently when constructed by dif-
ferent observers. Constructions vary in terms of morality,
conditions, victims/villains and solutions. From Luhmann we
learn that modern society consists of a multitude of social
systems (e.g. politics, science, economy etc.), each operating
with their own communicative codes. Combining both
approaches, we hypothesise that any social system constructs
its own (version of) social problems. Illustrating with
the empirical case ‘suicide among mentally ill people’, we
examine how a phenomenon is constructed differently as a
social problem by four different social systems: the disability
movement, politics, medicine and social work.
Dimitris Michailakis1, Werner Schirmer1,2
1 TEFSA – Platform for Theory-driven Research in Social
Work, University of Linköping, Norrköping, Sweden
2 Center for Social Theory, Department of Sociology, Ghent
University, Ghent, Belgium
Key words: constructionism, Luhmann, social problems, social
work theory, systems theory, suicide
Werner Schirmer, TEFSA – Platform for Theory-driven
Research in Social Work, Department of Social and Welfare
Studies, University of Linköping, SE 60174 Norrköping,
Sweden
E-mail: [email protected]
Accepted for publication 8 January 2014
Introduction
The academic discipline social work builds its identity
on the study of social problems. The goal is to generate
knowledge about causes, consequences and potential
solutions for social problems. This knowledge is
expected to be useful to practitioners working with
clients affected by different adverse conditions. In
empirical social work research on poverty, discrimina-
tion, social exclusion, homelessness, juvenile delin-
quency, domestic violence and human trafficking, it is
usually taken for granted what the ‘social problem’ is.
The social problem is treated as a deplorable circum-
stance about which something must be done (Holstein
& Miller, 1993a). It is therefore considered to be a
deviation from a desirable condition (how society ought
to be), how exposed groups suffer from these condi-
tions (Gould & Baldwin, 2004; Healy, 2001; Korpi,
Nelson, & Stenberg, 2007; Payne, 2005b; Trevithick,
2007) and what social work practitioners need to take
into consideration when dealing with those bearing the
symptoms of such conditions.
What this kind of research has in common is that it
addresses ‘what’ questions (What is .
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
More Related Content
Similar to Review on Psychological Crowd Model Based on LeBon’s Theory
Journal of Community & Applied Social PsychologyJ. Communi.docxtawnyataylor528
Journal of Community & Applied Social Psychology
J. Community Appl. Soc. Psychol., 13: 426–438 (2003)
Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/casp.748
The Emancipatory Character of Action Research,
its History and the Present State of the Art
BEN W. M. BOOG*
Department of Adult Education and Social Intervention, University of Groningen, Grote Rozenstraat 38,
9712 TJ Groningen, The Netherlands
ABSTRACT
Right from the start, action research was intended to be emancipatory research, and it still is. This
article will underpin this by outlining its history and the present state of the art. Though a variety of
action research approaches have developed along divergent theoretical pathways, it will be stressed
that these approaches share the most important characteristics of action research and are basically
different applications of different action theories. They are all supported by a participatory
worldview and are meant to be a double-sided process of research, self research and education direc-
ted at individual empowerment and collective empowerment and/or emancipation. Since the rela-
tionship between the researcher and the subjects being researched is crucial for the success of action
research as an emancipatory or empowering activity, this article will maintain that the most impor-
tant task of action researchers is to develop refined heuristics concerning this communication.
The article will end by making some recommendations for the improvement of action research as
an emancipatory practice. Copyright # 2003 John Wiley & Sons, Ltd.
Key words: emancipatory action research; action theory; emancipation; empowerment; participatory
worldview; relationship between researchers and researched subjects
INTRODUCTION
The historical development of action research reveals that it had emancipatory intentions
from the very beginning, and that this basis has become increasingly sophisticated with the
refinement of action research into different approaches. Action research is designed to
improve the researched subjects’ capacities to solve problems, develop skills (including
professional skills), increase their chances of self-determination, and to have more influ-
ence on the functioning and decision-making processes of organizations and institutions
from the context in which they act. Emancipation implies that the generated results of
action research are two-sided. On the one hand are the specific improved action competen-
cies of the researched subjects in the local situation in the specific research project. On the
other hand are the general enhanced action competencies in other comparable problematic
situations in the future, sometimes even in broader contexts. In addition, every action
* Correspondence to: Ben W. M. Boog, Department of Adult Education and Social Intervention, University of
Groningen, Grote Rozenstraat 38, 9712 TJ Groningen, The Netherlands. E-mail: [email pr ...
MAX WEBER Key Concepts I Sociology is a science which at.docxandreecapon
MAX WEBER: Key Concepts I
Sociology is a “science which attempts the interpretive understanding of social action to arrive
at a causal explanation of its course and effects.” While the subject matter of sociology
may overlap with history, it focuses on generalizable uniformities in social action
rather than the explanation of particular events, actions, and personalities.
Verstehen, meaning “understanding” in German, is the name Weber gives to the method of
interpretive sociology. He advocates studying social life by way of understanding the
subjective meanings that people give to their own social actions and those of others.
In fact, he considered this method of understanding the subjective states of mind of
individuals the basis for a scientific sociology. He identifies two kinds of understanding:
1) direct observational understanding of the subjective meaning of any given
individual act, its intention and 2) explanatory understanding, which looks at the
context of actions to discover the complex sets of meanings that comprise the
motivation behind individual actions in particular circumstances. He calls this complex
set of meanings a motive. Though this method of understanding is continuous with
the ways we constantly interpret other people’s behavior in our everyday lives,
sociology aims to do so in a more rigorous and systematic way—and often on a larger
scale. As it’s not feasible to interpret what’s in many heads all at once, to approximate
this method for understanding collective social life, Weber believes we need to employ
ideal types to classify different kinds of social action and their results according to the
similarities of individuals’ meanings and motivations.
Ideal Types are idealized concepts formulated by sociologists to capture a part of social reality,
which is much too complex to be understood in its entirety. Since actual situations
vary more or less in innumerable different ways from case to case, ideal types simplify
a messy reality by isolating certain aspects of institutions or social practices that are
relevant to a particular study and allow for analysis and comparison. Due to their
complexity, you should not expect to find ideal types in their pure form in real
situations. Rather, they act as simplifications that are useful for classifying and
comprehending significant parts of social reality. They can offer a window onto reality
that helps us understand the patterns within the messiness. For instance, Weber’s
notions of traditional, charismatic, and legal-rational forms of authority are ideal types:
SOC 260 Classical Social Theory Drexel University
Fall 2015 Professor Howard
authority figures will rarely fall neatly in any one of these categories but will probably
fall somewhere in between (in a grey area). Still, by constructing these ideal types,
Weber hopes to generalize about how authority ope ...
ViewpointsSocial work and social problemsA contribution f.docxlillie234567
Viewpoints
Social work and social problems:
A contribution from systems theory
and constructionism
Michailakis D., Schirmer W. Social work and social problems:
A contribution from systems theory and constructionism
Social work builds its identity on social problems. The goal is
to generate knowledge about causes, consequences and solu-
tions. However, there is a lack of theory of social problems.
We suggest that research on social problems can benefit
by ‘bringing the observer in’: Loseke’s constructionist frame-
work and Luhmann’s systems theory. According to Loseke,
social problems appear differently when constructed by dif-
ferent observers. Constructions vary in terms of morality,
conditions, victims/villains and solutions. From Luhmann we
learn that modern society consists of a multitude of social
systems (e.g. politics, science, economy etc.), each operating
with their own communicative codes. Combining both
approaches, we hypothesise that any social system constructs
its own (version of) social problems. Illustrating with
the empirical case ‘suicide among mentally ill people’, we
examine how a phenomenon is constructed differently as a
social problem by four different social systems: the disability
movement, politics, medicine and social work.
Dimitris Michailakis1, Werner Schirmer1,2
1 TEFSA – Platform for Theory-driven Research in Social
Work, University of Linköping, Norrköping, Sweden
2 Center for Social Theory, Department of Sociology, Ghent
University, Ghent, Belgium
Key words: constructionism, Luhmann, social problems, social
work theory, systems theory, suicide
Werner Schirmer, TEFSA – Platform for Theory-driven
Research in Social Work, Department of Social and Welfare
Studies, University of Linköping, SE 60174 Norrköping,
Sweden
E-mail: [email protected]
Accepted for publication 8 January 2014
Introduction
The academic discipline social work builds its identity
on the study of social problems. The goal is to generate
knowledge about causes, consequences and potential
solutions for social problems. This knowledge is
expected to be useful to practitioners working with
clients affected by different adverse conditions. In
empirical social work research on poverty, discrimina-
tion, social exclusion, homelessness, juvenile delin-
quency, domestic violence and human trafficking, it is
usually taken for granted what the ‘social problem’ is.
The social problem is treated as a deplorable circum-
stance about which something must be done (Holstein
& Miller, 1993a). It is therefore considered to be a
deviation from a desirable condition (how society ought
to be), how exposed groups suffer from these condi-
tions (Gould & Baldwin, 2004; Healy, 2001; Korpi,
Nelson, & Stenberg, 2007; Payne, 2005b; Trevithick,
2007) and what social work practitioners need to take
into consideration when dealing with those bearing the
symptoms of such conditions.
What this kind of research has in common is that it
addresses ‘what’ questions (What is .
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 763 – 770
764
2. Group Mind Theory
In this section the theory of crowd behaviours that are based on LeBon and existing
criticisms on the crowd behavioural are discussed.
2.1. LeBon’s Theory
The classic theories were proposed by LeBon (1908) and Freud (1921). They believed
that the crowd behaviours were abnormal and pathological. Therefore, civilisation and
consciousness of crowds is replaced by savage animal instincts, where the crowd keeps the
unconscious mind of individuals. The individuals lose all sense of themselves when they enter
the crowd and do not identify themselves as individuals with responsibility for their own actions,
but become unidentified members of a group. These individuals achieve a sense of power and
invincibility [2, 5]. The first component of LeBon’s theory states that the characteristic of a crowd
is specifically varied in comparisons with the characteristic of individuals. This component is
called the Law of Mental Unity of psychological crowds [2], which is like chemical elements
when combined to make an entirely new material [6]. According to Le Bon, an individual in a
psychological crowd is under hypnosis and accept easily the action of its surrounding persons.
The second component is suggestibility. Suggestibility is a state of how easily a crowd act to
any idea [7]. The third component is prestige, the level of influence that leaders have on the
psychological crowds. Leaders with higher prestige have higher influence on the other members
of the crowd. Prestige not only can turn a crowd into an irrational crowd but is necessary for an
idea to propagate in a suggestible crowd. In other words, prestige and suggestibility need an
action to spread through a crowd [8]. LeBon defines two types of prestige: acquired prestige and
personal prestige. Acquired prestige is defined as the prestige associated with appointment to
an authoritative position such as a judge, a soldier or royalty [2, 6, 9], whereas personal prestige
is earned by individuals’ charisma. One of the famous examples of personal prestige was that of
Napolean’s that can captivate people with his charisma. In fact, personal prestige is
independent of leader’s reputation [9]. The others components of Le Bon’s theory are the
remote factors that identify how ideas and belief propagate throughout a crowd [2]. These
factors include traditions, degree of education and race [6]. The last components of LeBon’s
theory are the immediate factors that refer to external events that affect the propsgation of
psychological effects such as riots in which an opinion takes shape and start to spread through
a crowd [7]. Le Bon’s theory demonstrates the importance of power in crowd behaviours and
proves a significant factor in collective action [10-11]. In conclusion, LeBon’s theory argued that
individuals lose their personal rationality and revert to the animal instincts in the crowd [12].
However, in the following century, this idea was considered as speculative and it had enormous
effects on attempts in sociology and psychology to illustrate crowd behaviour. The idea was
picked up as experimental social psychology in some researches [8], [13-18]. The valid
criticisms of Le Bon’s theory are related to reduce self-conscious, which is unable to act in a
natural way and increase chance of antisocial behaviour [12, 19]. LeBon’s theory may downplay
the social motives of crowd action [20]. Despite these criticisms, Le Bon’s Theory is important to
study because it had become prominent in many countries and in the post-Mao period, the only
attempt on crowd psychology was Le Bon’s theory that has been considerably revivified among
administrators, political elite and the general public [2-4]. The aim of applying control techniques
is to control the crowd such that it wills retrun the irrational crowd to an orderly and calm state.
Hence, the crowd is assumed as irrational as LeBon interpreted. The following section
concentrates on the mathematical psychological model based on LeBon’s theory.
2.2. Discrete-Time Model of Crowd Psychological Behavior Based on LeBon’s Theory
The mathematical model of the crowd psychological dynamics includes psychological
factors such as prestige, attitude and suggestibility that depend on each other and are unstable.
To benefit from what control system theory can offer to the study of crowd behavior, researchers
have tried to capture the principles of LeBon’s theory in a theoretic form. To start the abstraction
of model, the psychological crowd is said to be included of individuals. This method emphasizes
the ability of an individual to affect and act on its environment by social communications with
other crowd members. Researches in [6-8], [21-23] have considered crowds in a queue while
paying for groceries at a busy supermarket, waiting to use an ATM or seeking admission to an
amusement park using the mathematical model of crowd psychological dynamics that is based
3. TELKOMNIKA ISSN: 1693-6930
Review on Psychological Crowd Model Based on LeBon’s… (Vahid Behtaji Siahkal Mahalleh)
765
on Le Bon’s Theory. The state of each individual in the model is expressed by four signals,
which are the prestige, attitude, delay of attitude and suggestibility of each individual as follows:
(1)
(2)
(3)
(4)
(5)
In Equation (1), [k] is the prestige of the individual at time . The prestige constant
( ) influences the value of prestige toward zero [6-8], [21-23]. The power of a prestige is made
by the actions of individual ( ) that it is shown by the parameter . In Equation (2), is the
action of the individual at time . The attitude constant ( ) influences the speed of diminishing
the attitude value while the prestige value of individual ( ) inclines toward zero [8]. As an
interacting individuals, ( ) plays the role in their model [6]. Larger absolute values of attitude
are assumed to be undesirable [9]. In Equation (3), is the delayed value of action of the
individual at time . In Equation (4), is the suggestibility of individual at time . The
suggestibility constant is ( ) and it influences the speed of diminishing of the suggestibility
value [7]. The power of a suggestibility is made from the imitating actions of individual ( ) which
is taken from others (neighbours) shown by the parameter [8]. The default value of
suggestibility is [6-8], [21-23]. α is greater than one illustrating a constant growth. If the
social excitation ( and to incline towards zero) are absent, the value of inclines
towards [7-8]. In Equation (5), suggestibility is an exponential function of .
Individual-dependent gains are determined by [7-8]. Changes in attitude and
interactions with prestigious persons (from one time instant to the next ( ) inclines to
make a crowd more suggestible. This phenomenon is considered in [6-9], [21-23]. If individuals
interacting members who are more suggestible, the suggestibility of individual increases.
Otherwise, it decreases [9]. The interaction between attitude and suggestibility in the model
demonstrates the unstable nature of psychological crowds [2, 6]. This phenomenon motivates
the application of control system techniques to return the crowd to an orderly and calm state [6].
3. Controlling the Dynamic Psychological Factors of the Psychological Crowd Model
Various psychological crowd control schemes and their weakness are reviewed in this
section. Control theories are applied to drive the psychological dynamic factors of the
psychological crowd to a calm state, zero.
3.1. Linear Controller Scheme
Earlier schemes were based on the linearized model of the psychological crowd
dynamics given in Equations (1)-(5). In these schemes, sensors and actuators were based on
social nature [6, 25]. The psychological factors such as suggestibility, attitude and prestige were
observed by a person who played the role of a sensor. This person was called the ‘human
sensor’. The input of the human sensor was one of the state variables of the psychological
factor and the controller influenced the feedback states. The actuators were used to influence
the observers through human actuators. For example, a teacher in a class influences the
students to behave properly [6]. Among various states that define the behavior of an individual
in a crowd, as given in equation (6) attitude is physically measured and used to control the
crowd [6, 25].
(6)
4. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 763 – 770
766
In Equation (6), for any individual i in the crowd, the control signal ‘ ’, represents the
action of ith individual which has good steady state regulation, but weak transient performance.
Furthermore, the controller forces the prestige of each individual to become negative, despite
the fact that a slightly positive prestige is desired.
A Luenberger observer is possible for estimating the states, but due to model sensitivity
to noise, other schemes using nonlinear models are more feasible [6], [22-24].
3.2. Effect of Two Non-linear Controller Scheme on Group Social Behaviour
Bergey, et al. (2007) and Spieser, et al. (2008) proposed a two non-linear controller
schemes as given in Equations (7)-(9) [6, 22].
(7)
(8)
(9)
In this scheme, Equation (7) shows that the control signal has negative attitudes for
each person [6, 22]. The controller tries to make the attitude of each people zero at every time
instant. In fact, the controller cancels out the attitude of each person at every time instant. The
prestige values are negative when the Luenberger observer based linear plant is applied.
Therefore, this issue is solved using nonlinear controller.
From the stabilization time viewpoint, the performance of the controller is better than the
traditional Luenberger observer [6, 22]. But the nonlinear control scheme requires many
resources, for example, N observers require N controllers [6, 22]. Therefore, another nonlinear
control scheme is suggested in Equations (8)-(9). Equation (8) shows that the controller only
controls the most outspoken person who has the largest absolute value of attitude. The control
signal is defined in Equation (9). The simulation’s result of this control scheme shows the same
behavior as the previous one (nonlinear control) without many resources [6].
In spite of the good performance of two nonlinear controllers and simple schemes,
there were two following problems for nonlinear controllers’ schemes [6, 22]. The first issue is
the nonlinear controller scheme in Equations (7) and (9) cancel out the dynamic state of attitude
Equation (2). This assumption contradictory to LeBon’s theory of social group behavior. The
second issue as indicated in Equation (9), is that human controller are scampered in the crowd
controlling each individual at every time instant, requiring more energy. Therefore other control
strategies are employed [21-23].
3.3. One Control agent to Stabilize One-Dimensional Crowd
This method explored the social group behavior and controller implementation [26-27].
Control agent was introduced as an authoritative figure (such as police officer, teacher, a
security card etc.) that does not follow crowd mentality and had fair judgment. For example,
children consider parents, police officers and teachers as traditional authoritative figure [28].
The control agent was able to sense all states of agents’ psychological factors [21-23]. The
control agents used their knowledge as well as LeBon’s idea and influenced the crowd
behaviors [21-23]. The characteristics of control agents are presented by Equations (10)
to (12) [22].
(10)
(11)
(12)
In Equation (10) if the prestige is greater than zero, it means the control agent has
constant influence on the behavior of the crowd. Equation (11) indicates, the control agent make
decision based on the behavior of individuals in the crowd. In other word, the behaviors of
individuals are predicated by the control agent. Equation (12) shows that the control agent is not
5. TELKOMNIKA ISSN: 1693-6930
Review on Psychological Crowd Model Based on LeBon’s… (Vahid Behtaji Siahkal Mahalleh)
767
influenced by suggestion. Therefore, the control agent has zero suggestibility value ( ) [21-
23]. In terms of a system perspective, a control agent is introduced to provide feedback to the
system to achieve stability. In earlier works the performance of sensor and actuator were done
by a person. The presented control agent was used to stabilize queues.
Spieser, et al. (2008) applied a simple queue to show how control signal propagates
through members in a queue. The objective was to achieve zero state of two individuals at
(crowd gets calm). In this work, the control agent was positioned at the beginning of the queue
and it influenced each observer through observer to observer interaction. The propagation of
control signal from one observer to another was modelled using equation (13) [22].
(13)
In Equation (13) the function is independent of the control signal and
considered non zero ( ). The aim of this study was to find a serious of controllers to
stabilize the crowd. The results concluded that if the attitude of the right most agents becomes
zero for the interval , the attitude of each individual shall become zero. The results also
showed a proportional relationship between control effort and queue’s length and the time taken
to stabilize the crowd. For optimal performance it was found that the time taken by control signal
to propagate through the crowd must be minimum. This caused a limitation on the control of
large crowd by a single agent. In this method, crowd stability law requires the measurement of
each individual’s attitude to stabilize the crowd, which is not suitable for large crowds. Similarly,
the settling time becomes very large for a large crowd. This method is not so suitable. For large
crowd, multi control agent scheme is used [21].
3.4. Multi-Agent Controllers to Stabilize One-Dimensional Crowd
In this method, multiple controllers were used to stabilize a 1D queue [21]. The
approach used similar to single agent control approach [22]. In multiple agent control scheme
the controllers were restricted to have coordinated approach to present control signal collisions
between control agents [34]. For example, when the right most individual is as control agent, it
should play a more active role in stabilizing the queue. Another advantage of multiple agent
control scheme is reduction of the state variables required for control [23]. The mult iple agent
control scheme requires each agent to control sequentially. For example, if in a crowd of five
members (X1, O2, X3, O4, X5) with (X1, X3, X5) being the control agents, the control X5 first
applies the control signal, followed by X3, while X1 applies control signal after X3. For simplicity
the queue can be sub-divided into sub queues with control agents in each sub queues. In this
case, the sub queues interaction becomes important. This method results into a new control
law. Earlier research [21, 23] has shown that if any queue has even number of member, the
division of that queue into sub queues, results into sub queues with interaction required. The
propagation time taken by the control signal to propagate from one agent to the next is
considered same for simplicity. In equal sub queues the attitude of the left most control agent is
calculated using the attitude of the right agents is given by Equation (14).
(14)
In Equation (14), is the dependent control signal and is the
independent control signal. The dependent control signal is non zero. It is important
to mention that the product of dependent and independent control signal ,
as given in Equation (14) depends upon the entre state of the queue and not only one the sub
queues. Similarly, in the same sub queue, the attitude of the right most agent is calculated using
the attitude of the left agents is given by Equation (15).
(15)
The term of dependent control signal is nonzero . If the number
of agents is odd, then unequal sub queues are created with left most sub queue being larger
6. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 763 – 770
768
than the right ones. The attitude of the right most agent in the right most sub queue is calculated
using the attitude of the left most agent in the same sub queue using Equation (15), which is
similar in both cases (Even and Odd). However, the attitude of the right most agent in the left
sub queue is calculated from the left most agent in the same sub queue (Even and Odd) with
few modification to Equation (14), which was used for even sub queues. In this case, the
attitudes and does not only depend upon the attitude of the left most
agent in the same sub queue ( as in Equation 14) but also depends upon the prestige of the
control agent of the right most agent in the right sub queue, but also on the value of the second
controller.
In single control agent queue case, the control signal applied by the control agent
anywhere in the queue to control the queue is given by Equation (13) which is also applicable
for queues having multiple sub queues if the interaction between sub queues is considered [21].
Hence, Equation (16) can be used to obtain the control signal for any case.
, k≥0, (16)
According to Equation (11), the control signal is related to the state of the entire queue.
Thus, the prestige and value of the right most agent can be deduced from other control agents.
Another approach used for the analysis of queue is by using inductive process. In this process,
if the action of right most agent is forced to become zero, the action of the other agents
approach zero through induction. But in sub queues, the process is slightly different. In the left
most sub queue, the left most control agent is forced to control the right most agent in the same
sub queue only. If the left most control agent in left most sub queue, does not only control the
right most agent in the same sub queue, the controllers cannot control the entire queue
(according to inductive analysis). For example, the target agent of the queue ( ) had
one neighbor but in this case the target agent ( ) has two neighbors ( and ) as
shown in Figure 1. If there are two neighbors ( and ) for target agent ( ), one of
neighbor ( ) must be other target of other controller ( ) so that the attitude of
approached zero [21-23].
Figure 1. Induction assumption for two controllers [21]
The aim of this work is to show how social changes are handled in a crowd using graph
theory. The control agent had only one target that is unrealistic in many social setting.
Therefore, in the next scheme, multiple control agents are introduced in crowd to stabilize a two
dimensional crowd. The controllers use cooperation and communication to achieve a common
objective [23].
3.5. Multi-Agent Controllers to Stabilize Two-Dimensional Crowd
In a two dimensional crowd, cooperative control system is applied. The cooperative
system consists of dynamic objects that cooperate and communicate to achieve a shared or
common goal. Illustrations of cooperative system are understood in majority of human acting
and other biologic systems that are considered to have certain advantages over other
cooperative control systems [29-30]. A few examples of cooperative control systems are
economic and social systems [31-33]. Cooperative control theory has been applied to stabilize
the attitude of the crowd [23]. In this method, a two-dimensional (2D) suggestible crowd was
assumed. The law used for controlling the agents was similar to previous works. Following is the
list of assumptions used in that analysis: 1) Control agents ( ) had one neighbor, 2) Control
agents had exactly one target. Thus, the number of targets equaled with the number of control
agents in the crowd, 3) At least one path must exist from position of control agent to its target, 4)
7. TELKOMNIKA ISSN: 1693-6930
Review on Psychological Crowd Model Based on LeBon’s… (Vahid Behtaji Siahkal Mahalleh)
769
Communication among control agents had not delay, 5- the full state of the crowd can be sense
by control agent and the control target should be close to controller [23].
In that approach, the assumptions were used to create laws for algorithms. The first law
forced the controllers to achieve zero action. Based on this law, if two controllers ( ) had
targets consequently and , the distance of control relative to its target ( ) must be less
than the distance of other controller ( ) relative to ’s target ( ). The target elements were
considered to belong to set . In the algorithm, the neighbors of target set were determined,
with the condition that only are neighbor has non zero action, otherwise, the laws fail to control
the system. In reality, the inductive approach was applied [21-22].
In this algorithm, the element of new set ( ) must have only one neighbor who has
non-zero action, So that the action of new neighbor can approach zero. This process continues
until all the neighbours before thwe next control agent become zero. The last set is called .
The next algorithm is related to stabilizing time. This algorithm states that maximum stabilization
time is reached when the distance between control agents is maximums. This method was
limited by the condition that crowd must have less control agents than observers. This method is
improved using graph theory. It is assumed the first assumption used in the previous study is
unrealistic in some social stings, which must be investigated in future studies, the stabilizing
time must be improved, based on the number of observers. It should include recent
psychological studies and the social interaction of the crowd must be optimized. Discrete
systems were also studied [34] for digital control systems that can be useful for stabilization of
crowd’s action in psychological model. Le Bon’s theory has also been studied by some
researchers [35].
4. Conclusion
This paper presents an inclusive review on the psychological crowd based on LeBon’s
theory and control schemes for stabilizing the attitude of crowds such as one-dimensional and
two-dimensional crowds. The vast number of available references showed that LeBon’s theory
has a lot of applications for the irrational crowd model that is used by sociologists and
psychologists. The best control scheme introduced control agents, who propagated their
behavior based on the whole state of psychological crowd. These control agents were
compatible with social group behavior theories such as LeBon’s theory. The previous works
attempted to compute the control signal values for various positions of control agents based on
the mathematical psychological crowd model and reduced the burden of control agents. It is
valuable to study more about recent social psychological theories and graph theories to improve
modeling and controlling of psychological crowd model.
Acknowledgements
The authors would like to thank Universiti Teknologi Malaysia and the Ministry of Higher
Education for their supports. This project is supported by Research University Grant Vote
13H78.
References
[1] Vider S. Rethinking crowd violence: Self categorization theory and the Woodstock 1999 riot. Journal
for the Theory of Social Behaviour. 2004; 34(2): 141-166.
[2] Le Bon G. The crowd: A study of the popular mind. Fischer. 1897.
[3] Smelser NJ. Theory of collective behavior. Quid Pro Books. 2011.
[4] Moscovici S. The age of the crowd: A historical treatise on mass psychology. Cambridge University
Press. 1985.
[5] Drury J, Reicher SD, Stott C. The psychology of collective action. Culture and Social Change:
Transforming Society Through the Power of Ideas. 2012; 19.
[6] Bergey K, Spieser K, Davison DE. The psychological dynamics of students in a classroom: Modeling
and control strategies based on suggestibility theory. 2007 IEEE International Conference on Control
Applications. 2007.
[7] Sadiyoko A, Riyanto TB, Mutijarsa K. The Propagation of Psychological Variables in Crowd:
Simulation Results. 2012 Sixth Asia Modelling Symposium. 2012.
8. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 2, June 2017 : 763 – 770
770
[8] Mahalleh VBS, Selamat H, Sandhu F. The effects of distance in dynamic psychological factors of one-
dimensional queue. Control Conference (ASCC), 2015 10th Asian. 2015.
[9] Wood S. Prestige in world politics: History, theory, expression. International Politics. 2013; 50(3): 387-
411.
[10] Drury J, Reicher S. Collective action and psychological change: The emergence of new social
identities. British Journal of Social Psychology. 2000; 39(4): 579-604.
[11] Khamis N, Haniff MF, Selamat H, Lutfy OF. Agent motivational and repulsion forces optimization in
agent basic movement model. Control Conference (ASCC), 2015 10th Asian. 2015.
[12] Spears R, Postmes T. Group Identity, Social Influence, and Collective Action Online. The Handbook of
the Psychology of Communication Technology. Oxford: John Wiley & Sons. 2015: 23-46.
[13] Festinger L, Pepitone A, Newcomb T. Some consequences of de-individuation in a group. The Journal
of Abnormal and Social Psychology. 1952; 47(2S): 382.
[14] Diener E. Deindividuation: The absence of self-awareness and self-regulation in group members. The
psychology of group influence. 1980; 209-242.
[15] Prentice-Dunn S, Rogers RW. Deindividuation and the self-regulation of behavior. Lawrence Erlbaum
Associates, Inc. 1989.
[16] Zimbardo PG, editor. The human choice: Individuation, reason, and order versus deindividuation,
impulse, and chaos. Nebraska symposium on motivation. 1969.
[17] Ohlberg M. The Era of Crowds: Gustave Le Bon, Crowd Psychology, and Conceptualizations of Mass-
Elite Relations in China. The Dynamics of Transculturality. 2015: 157-183.
[18] Stage C. The online crowd: a contradiction in terms? On the potentials of Gustave Le Bon's crowd
psychology in an analysis of affective blogging. Distinktion: Scandinavian Journal of Social Theory.
2013; 14(2): 211-226.
[19] Reicher S. The psychology of crowd dynamics. Blackwell handbook of social psychology: Group
processes. 2001: 182-208.
[20] La Macchia ST, Louis WR. Crowd behaviour and collective action. Understanding Peace and Conflict
Through Social Identity Theory. 2016: 89-104.
[21] Spieser K, Davison DE. Multi-agent stabilisation of the psychological dynamics of one-dimensional
crowds. Automatica. 2009;45(3):657-64.
[22] Spieser K, Davison D. Stabilizing the psychological dynamics of people in a queue. 2008 American
Control Conference. 2008.
[23] Spieser K, Davison D. A cooperative multi-agent approach for stabilizing the psychological dynamics
of a two-dimensional crowd. 2009 American Control Conference. 2009.
[24] Nunes DS, Zhang P, Silva JS. A survey on human-in-the-loop applications towards an internet of all.
IEEE Communications Surveys & Tutorials. 2015; 17(2): 944-965.
[25] Irfan MT, Ortiz LE. On influence, stable behavior, and the most influential individuals in networks: A
game-theoretic approach. Artificial Intelligence. 2014; 215: 79-119.
[26] Cazenille L, Bredeche N, Halloy J. Automated optimisation of multi-level models of collective
behaviour in a mixed society of animals and robots. 2016.
[27] Casadiego L, Pelechano N, editors. From One to Many: Simulating Groups of Agents with
Reinforcement Learning Controllers. International Conference on Intelligent Virtual Agents. 2015.
[28] Peters RS. Authority, responsibility and education. Routledge. 2015.
[29] Akçay E, Roughgarden J, Fearon JD, Ferejohn JA, Weingast BR. Biological institutions: The political
science of animal cooperation. 2013.
[30] Rey GZ, Carvalho M, Trentesaux D. Cooperation models between humans and artificial self-
organizing systems: Motivations, issues and perspectives. Resilient Control Systems (ISRCS), 2013
6th International Symposium on. 2013.
[31] Xargay E, Dobrokhodov V, Kaminer I, Pascoal AM, Hovakimyan N, Cao C. Time-critical cooperative
control of multiple autonomous vehicles. IEEE Control Systems Magazine. 2012; 32(5): 49.
[32] Sandhu F, Selamat H, Mahalleh VBS. Direct Yaw Control of Vehicle using State Dependent Riccati
Equation with Integral Terms. Advances in Electrical and Computer Engineering. 2016; 16(2).
[33] Sandhu F, Selamat H, Mahalleh VBS. Review of Modern Vehicle Modelling. Journal of
Telecommunication, Electronic and Computer Engineering (JTEC). 2016; 8(11): 111-117.
[34] Shams NA, Davison DE, editors. A co-operative control approach to the regulation of nonlinear
discrete-time structured systems. Electrical and Computer Engineering (CCECE), 2011 24th Canadian
Conference on. 2011.
[35] Mahalleh VBS, Selamat H, Sandhu F, Khamis N. Improved crowd psychological model and control.
Jurnal Teknologi. 2016; 78(6-13): 121-128.