Pub Date : 2023-01-01DOI: 10.6703/ijase.202306_20(2).003
Ahmed S. Abuhammad, M. Ahmed
{"title":"Negation detection techniques in sentiment analysis: A survey","authors":"Ahmed S. Abuhammad, M. Ahmed","doi":"10.6703/ijase.202306_20(2).003","DOIUrl":"https://doi.org/10.6703/ijase.202306_20(2).003","url":null,"abstract":"","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82835630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.6703/ijase.202309_20(3).007
Dwi Kurniawan, Adri Nora, Rheysa Permata Sari
Despite having abundant of natural sources of vitamin A
{"title":"Product, process and net present worth analysis of a palm oil-based beta carotene industry","authors":"Dwi Kurniawan, Adri Nora, Rheysa Permata Sari","doi":"10.6703/ijase.202309_20(3).007","DOIUrl":"https://doi.org/10.6703/ijase.202309_20(3).007","url":null,"abstract":"Despite having abundant of natural sources of vitamin A","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.6703/ijase.202309_20(3).009
Chao-Tang Tseng, Shu-Fu Zhang
The parallel machine scheduling problem with the consideration of GoS (grade of service) constraints originates from the service provision of different membership levels in the service industry. This scheduling problem has been widely found in industrial manufacturing and sustainable manufacturing practices. For example, in a sustainable manufacturing production line, multiple machines are set up as parallel machines to support each other to achieve shared manufacturing. However, the machines still have processing constraints with different service level constraints and do not support all jobs. This study investigates this parallel machine scheduling problem and uses the total completion time as the objective criterion. This criterion has not been studied in the literature for this scheduling problem. Several heuristics are proposed to solve the two-machine and multi-machine scheduling problems. The structure of these heuristics is mainly divided into two stages: the SPT rule and the insertion method. In addition, a fast method for calculating the total completion time is developed from the insertion method. The experimental results prove that the proposed heuristics are effective in solving this scheduling problem. For both small-and large-size problems, the proposed heuristics can obtain good solutions quickly and are potentially suitable for practical use.
{"title":"Heuristics for parallel machine scheduling with GoS eligibility constraints","authors":"Chao-Tang Tseng, Shu-Fu Zhang","doi":"10.6703/ijase.202309_20(3).009","DOIUrl":"https://doi.org/10.6703/ijase.202309_20(3).009","url":null,"abstract":"The parallel machine scheduling problem with the consideration of GoS (grade of service) constraints originates from the service provision of different membership levels in the service industry. This scheduling problem has been widely found in industrial manufacturing and sustainable manufacturing practices. For example, in a sustainable manufacturing production line, multiple machines are set up as parallel machines to support each other to achieve shared manufacturing. However, the machines still have processing constraints with different service level constraints and do not support all jobs. This study investigates this parallel machine scheduling problem and uses the total completion time as the objective criterion. This criterion has not been studied in the literature for this scheduling problem. Several heuristics are proposed to solve the two-machine and multi-machine scheduling problems. The structure of these heuristics is mainly divided into two stages: the SPT rule and the insertion method. In addition, a fast method for calculating the total completion time is developed from the insertion method. The experimental results prove that the proposed heuristics are effective in solving this scheduling problem. For both small-and large-size problems, the proposed heuristics can obtain good solutions quickly and are potentially suitable for practical use.","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quantum computing rests upon two theoretical pillars: entanglement and superposition. But some physicists say that this is a very shaky foundation and quantum computing success will have to be based on a different theoretical foundation. The g-qubit theory supports this point of view. Current article is the second one of the two and about the entanglement. It gives different, more physically feasible, not mysterious, explanation of what the entanglement is. The suggested formalism demonstrates that the core of future quantum computing should not be in entanglement which only formally follows in conventional quantum mechanics from representation of the many particle states as tensor products of individual states. The core of quantum computing scheme should be in manipulation and transferring of wave functions on as operators acting on observables and formulated in terms of geometrical algebra. In this way quantum computer will be a kind of analog computer keeping and processing information by sets of objects possessing infinite number of degrees of freedom, contrary to the two value bits or two-dimensional Hilbert space elements, qubits.
{"title":"The G-Qubit Theory Alternative to Conventional Tensor-Product Explanation of Entanglement","authors":"A. Soiguine","doi":"10.30560/ijas.v6n1p1","DOIUrl":"https://doi.org/10.30560/ijas.v6n1p1","url":null,"abstract":"Quantum computing rests upon two theoretical pillars: entanglement and superposition. But some physicists say that this is a very shaky foundation and quantum computing success will have to be based on a different theoretical foundation. The g-qubit theory supports this point of view. Current article is the second one of the two and about the entanglement. It gives different, more physically feasible, not mysterious, explanation of what the entanglement is. The suggested formalism demonstrates that the core of future quantum computing should not be in entanglement which only formally follows in conventional quantum mechanics from representation of the many particle states as tensor products of individual states. The core of quantum computing scheme should be in manipulation and transferring of wave functions on as operators acting on observables and formulated in terms of geometrical algebra. In this way quantum computer will be a kind of analog computer keeping and processing information by sets of objects possessing infinite number of degrees of freedom, contrary to the two value bits or two-dimensional Hilbert space elements, qubits.","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86856402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-25DOI: 10.30954/2322-0465.3.2022.2
E. Z.
The widespread usage of social media as a vehicle to communicate and exchange information has been massively growing, especially in the times of the current COVID-19 pandemic. Billions of people around the world now can connect to the internet and transmit uninterrupted data via social media platforms. There are numerous papers available targeting teenagers and adults utilizing social media as a platform to make vital decisions. However, the adoption of modern communication technologies among senior citizens has been rarely investigated. In this paper, we propose to investigate a sample of 80 senior adults who were looking for assisted living facility services through a Facebook social media platform. We aim to understand what guided their decision to contact an assisted living facility for the service, and what options they prefer for their stay. This paper will be among pioneering papers since the investigation of senior citizens and social media utilization for assisted living is scarcely found on scientific search engines such as PubMed.
{"title":"Engagement with Facebook Advertisements among Senior Citizens as a Vehicle to Choose Assisted Living Facilities in the Local Area: An Observational Study","authors":"E. Z.","doi":"10.30954/2322-0465.3.2022.2","DOIUrl":"https://doi.org/10.30954/2322-0465.3.2022.2","url":null,"abstract":"The widespread usage of social media as a vehicle to communicate and exchange information has been massively growing, especially in the times of the current COVID-19 pandemic. Billions of people around the world now can connect to the internet and transmit uninterrupted data via social media platforms. There are numerous papers available targeting teenagers and adults utilizing social media as a platform to make vital decisions. However, the adoption of modern communication technologies among senior citizens has been rarely investigated. In this paper, we propose to investigate a sample of 80 senior adults who were looking for assisted living facility services through a Facebook social media platform. We aim to understand what guided their decision to contact an assisted living facility for the service, and what options they prefer for their stay. This paper will be among pioneering papers since the investigation of senior citizens and social media utilization for assisted living is scarcely found on scientific search engines such as PubMed.","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88332051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-25DOI: 10.30954/2322-0465.3.2022.5
{"title":"Program Components of Efforts for Children’s with special needs Education and Inclusion: Evidence from Proyash","authors":"","doi":"10.30954/2322-0465.3.2022.5","DOIUrl":"https://doi.org/10.30954/2322-0465.3.2022.5","url":null,"abstract":"","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85923726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-25DOI: 10.30954/2322-0465.3.2022.3
Tobias Gross
{"title":"Interlingual Morpho-Syntactic L1-Interference and L2-Syntax Errors: Experiences, Observations and Deductions","authors":"Tobias Gross","doi":"10.30954/2322-0465.3.2022.3","DOIUrl":"https://doi.org/10.30954/2322-0465.3.2022.3","url":null,"abstract":"","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86689434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-25DOI: 10.30954/2322-0465.3.2022.4
Milindkumar Vinayakrao
{"title":"Design and Analysis of Security Protocol in Mobile Ad-hoc Networks","authors":"Milindkumar Vinayakrao","doi":"10.30954/2322-0465.3.2022.4","DOIUrl":"https://doi.org/10.30954/2322-0465.3.2022.4","url":null,"abstract":"","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74480585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-25DOI: 10.30954/2322-0465.3.2022.1
P. Paul
{"title":"Blockchain in Educational Development: Potentialities and Issues—Towards sophisticated Digital Education Systems","authors":"P. Paul","doi":"10.30954/2322-0465.3.2022.1","DOIUrl":"https://doi.org/10.30954/2322-0465.3.2022.1","url":null,"abstract":"","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78528224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quantum computing rests upon two theoretical pillars: superposition and entanglement. But some physicists say that this is a very shaky foundation and quantum computing success will have to be based on a different theoretical foundation. The g-qubit theory supports that point of view. Current article is the first one of two and about the superposition principle. Quantum superposition principle states that any two quantum wave functions can be superposed, and the result be another valid wave function. It specifically refers to linearity of the Schrodinger equation. In the g-qubit theory quantum wave functions are identified by points on the surface of three-dimensional sphere . That gives different, more physically feasible, not mysterious, explanation of what the superposition is.
{"title":"Superposition of Wave Functions in the G-Qubit Theory","authors":"A. Soiguine","doi":"10.30560/ijas.v5n2p8","DOIUrl":"https://doi.org/10.30560/ijas.v5n2p8","url":null,"abstract":"Quantum computing rests upon two theoretical pillars: superposition and entanglement. But some physicists say that this is a very shaky foundation and quantum computing success will have to be based on a different theoretical foundation. The g-qubit theory supports that point of view. Current article is the first one of two and about the superposition principle. Quantum superposition principle states that any two quantum wave functions can be superposed, and the result be another valid wave function. It specifically refers to linearity of the Schrodinger equation. In the g-qubit theory quantum wave functions are identified by points on the surface of three-dimensional sphere . That gives different, more physically feasible, not mysterious, explanation of what the superposition is.","PeriodicalId":13778,"journal":{"name":"International Journal of Applied Science and Engineering","volume":"311 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82903636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}