Search results for: Spatial Data Analyses
25131 Preparation and Characterization of Newly Developed Trabecular Structures in Titanium Alloy to Optimize Osteointegration
Authors: M. Regis, E. Marin, S. Fusi, M. Pressacco, L. Fedrizzi
Abstract:
Electron Beam Melting (EBM) process was used to prepare porous scaffolds with controlled porosity to ensure optimal levels of osteointegration for different trabeculae sizes. Morphological characterization by means of SEM analyses was carried out to assess pore dimensions; tensile, compression and adhesion tests have been carried out to determine the mechanical behavior. The results indicate that EBM process allows the creation of regular and repeatable porous scaffolds. Mechanical properties greatly depend on pore dimension and on bulk-pore ratio. Adhesion resistance meets the normative requirements, and the overall performance of the produced structures is compatible with potential orthopaedic applications.Keywords: additive manufacturing, orthopaedic implants, osteointegration, trabecular structures
Procedia PDF Downloads 32125130 Mobile Crowdsensing Scheme by Predicting Vehicle Mobility Using Deep Learning Algorithm
Authors: Monojit Manna, Arpan Adhikary
Abstract:
In Mobile cloud sensing across the globe, an emerging paradigm is selected by the user to compute sensing tasks. In urban cities current days, Mobile vehicles are adapted to perform the task of data sensing and data collection for universality and mobility. In this work, we focused on the optimality and mobile nodes that can be selected in order to collect the maximum amount of data from urban areas and fulfill the required data in the future period within a couple of minutes. We map out the requirement of the vehicle to configure the maximum data optimization problem and budget. The Application implementation is basically set up to generalize a realistic online platform in which real-time vehicles are moving apparently in a continuous manner. The data center has the authority to select a set of vehicles immediately. A deep learning-based scheme with the help of mobile vehicles (DLMV) will be proposed to collect sensing data from the urban environment. From the future time perspective, this work proposed a deep learning-based offline algorithm to predict mobility. Therefore, we proposed a greedy approach applying an online algorithm step into a subset of vehicles for an NP-complete problem with a limited budget. Real dataset experimental extensive evaluations are conducted for the real mobility dataset in Rome. The result of the experiment not only fulfills the efficiency of our proposed solution but also proves the validity of DLMV and improves the quantity of collecting the sensing data compared with other algorithms.Keywords: mobile crowdsensing, deep learning, vehicle recruitment, sensing coverage, data collection
Procedia PDF Downloads 7725129 Development Process and Design Methods for Shared Spaces in Europe
Authors: Kazuyasu Yoshino, Keita Yamaguchi, Toshihiko Nishimura, Masashi Kawasaki
Abstract:
Shared Space, the planning and design concept that allows pedestrians and vehicles to coexist in a street space, has been advocated and developed according to the traffic conditions in each country in Europe. Especially in German/French-speaking countries, the "Meeting Zone," which is a traffic rule combining speed regulation (20km/h) and pedestrian priority, is often applied when designing shared spaces at intersections, squares, and streets in the city center. In this study, the process of establishment and development of the Meeting Zone in Switzerland, France, and Austria was chronologically organized based on the descriptions in the major discourse and guidelines in each country. Then, the characteristics of the spatial design were extracted by analyzing representative examples of Meeting Zone applications. Finally, the relationships between the different approaches to designing of Meeting Zone and traffic regulations in different countries were discussed.Keywords: shared space, traffic calming, meeting zone, street design
Procedia PDF Downloads 9425128 Behavior of Common Wheat under the Influence of Treated Waste Water
Authors: Chiahi Nadia
Abstract:
The aim of our work is to monitor the behavior of soft wheat on a morpho-physiological and agronomic scale under the influence of treated wastewater. Physico-chemical analyses of the treated sewage were also carried out, and our tests were carried out on two varieties of common wheat (Triticum aestivum L), HD1220 and ARZ. For this, a seedling was made, and two different irrigations were chosen, one using treated wastewater from the Sedrata (Wilaya of Souk ahras - Algeria) WWTP and the other stormwater as a control. The tests focused on soil and soft wheat parameters, and based on our results, the soft wheat development, physiological and yield parameters appear to respond favorably to the use of these waters.Keywords: common wheat (Triticum aestivum L.), purified wastewater, irrigation, morph physiological and agronomic parameters
Procedia PDF Downloads 6725127 The Relationship Between Argentina and the IMF (2018-2022), Economic Rationality and Moral Discourse
Authors: German Ricci, Horacio Divito
Abstract:
This article analyses the ethical dimension of the IMF in its relationship with Argentina from the Standby Agreement sanctioned in 2018 to the Extended Fund Facilities of 2023. From the analysis of the statements of the IMF, the appeal of the Agency to an ethic is evidenced and supposedly shared with the borrowing country, in addition to the well-known technical-economic evaluations. The Fund "vindicates" and "punishes" the borrowing country through moral judgment. In the Fund's narratives, the "effort," "commitment," and "work" of the local elite are rewarded. On the other hand, there is a repeated discursive emphasis of the IMF on its permanent intention to "help" Argentina through its collaborative nature. Finally, the emergence of moral prescriptions that question the very being of the debtor country and its representatives is detected when the relationship between local authorities and the IMF is tense.Keywords: IMF, Argentina, ethics, moral, dependency routine, symbolic power
Procedia PDF Downloads 8125126 A Systematic Review of Chronic Neurologic Complications of COVID-19; A Potential Risk Factor for Narcolepsy, Parkinson's Disease, and Multiple Sclerosis.
Authors: Sulemana Saibu, Moses Ikpeme
Abstract:
Background: The severity of the COVID-19 pandemic, brought on by the SARS-CoV-2 coronavirus, has been unprecedented since the 1918 influenza pandemic. SARS-CoV-2 cases of CNS and peripheral nervous system disease, including neurodegenerative disorders and chronic immune-mediated diseases, may be anticipated based on knowledge of past coronaviruses, particularly those that caused the severe acute respiratory syndrome and Middle East respiratory syndrome outbreaks. Although respiratory symptoms are the most common clinical presentation, neurological symptoms are becoming increasingly recognized, raising concerns about their potential role in causing Parkinson's disease, Multiple sclerosis, and Narcolepsy. This systematic review aims to summarize the current evidence by exploring the association between COVID-19 infection and how it may overlap with etiological mechanisms resulting in Narcolepsy, Parkinson's disease, and Multiple sclerosis. Methods: A systematic search was conducted using electronic databases ((PubMed/MedLine, Embase, PsycINFO, ScieLO, Web of Science, ProQuest (Biotechnology, Virology, and AIDS), Scopus, and CINAHL)) to identify studies published between January 2020 and December 2022 that investigated the association between COVID-19 and Parkinson's disease, multiple sclerosis, and Narcolepsy. Per the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, the review was performed and reported. Study quality was assessed using the Critical Appraisal Skills Programme Checklist and the Joanna Briggs Institute Critical appraisal tools. Results: A total of 21 studies out of 1025 met the inclusion criteria, including 8 studies reporting Parkinson's disease, 11 on multiple sclerosis, and 2 on Narcolepsy. In COVID-19 individuals compared to the general population, Narcolepsy, Parkinson's disease, and multiple sclerosis were shown to have a higher incidence. The findings imply that COVID-19 may worsen the signs or induce multiple sclerosis and Parkinson's disease and may raise the risk of developing Narcolepsy. Further research is required to confirm these connections because the available data is insufficient. Conclusion: According to the existing data, COVID-19 may raise the risk of Narcolepsy and have a causative relationship with Parkinson's disease, multiple sclerosis, and other diseases. More study is required to confirm these correlations and pinpoint probable mechanisms behind these interactions. Clinicians should be aware of how COVID-19 may affect various neurological illnesses and should treat patients who are affected accordingly.Keywords: COVID-19, parkinson’s disease, multiple sclerosis, narcolepsy, neurological disorders, sars-cov-2, neurodegenerative disorders, chronic immune-mediated diseases
Procedia PDF Downloads 8425125 Analysis of the Effects of Institutions on the Sub-National Distribution of Aid Using Geo-Referenced AidData
Authors: Savas Yildiz
Abstract:
The article assesses the performance of international aid donors to determine the sub-national distribution of their aid projects dependent on recipient countries’ governance. The present paper extends the scope from a cross-country perspective to a more detailed analysis by looking at the effects of institutional qualities on the sub-national distribution of foreign aid. The analysis examines geo-referenced aid project in 37 countries and 404 regions at the first administrative division level in Sub-Saharan Africa from the World Bank (WB) and the African Development Bank (ADB) that were approved between the years 2000 and 2011. To measure the influence of institutional qualities on the distribution of aid the following measures are used: control of corruption, government effectiveness, regulatory quality and rule of law from the World Governance Indicators (WGI) and the corruption perception index from Transparency International. Furthermore, to assess the importance of ethnic heterogeneity on the sub-national distribution of aid projects, the study also includes interaction terms measuring ethnic fragmentation. The regression results indicate a general skew of aid projects towards regions which hold capital cities, however, being incumbent presidents’ birth region does not increase the allocation of aid projects significantly. Nevertheless, with increasing quality of institutions aid projects are less skewed towards capital regions and the previously estimated coefficients loose significance in most cases. Higher ethnic fragmentation also seems to impede the possibility to allocate aid projects mainly in capital city regions and presidents’ birth places. Additionally, to assess the performance of the WB based on its own proclaimed goal to aim the poor in a country, the study also includes sub-national wealth data from the Demographic and Health Surveys (DSH), and finds that, even with better institutional qualities, regions with a larger share from the richest quintile receive significantly more aid than regions with a larger share of poor people. With increasing ethnic diversity, the allocation of aid projects towards regions where the richest citizens reside diminishes, but still remains high and significant. However, regions with a larger share of poor people still do not receive significantly more aid. This might imply that the sub-national distribution of aid projects increases in general with higher ethnic fragmentation, independent of the diverse regional needs. The results provide evidence that institutional qualities matter to undermine the influence of incumbent presidents on the allocation of aid projects towards their birth regions and capital regions. Moreover, even for countries with better institutional qualities the WB and the ADB do not seem to be able to aim the poor in a country with their aid projects. Even, if one considers need-based variables, such as infant mortality and child mortality rates, aid projects do not seem to be allocated in districts with a larger share of people in need. Therefore, the study provides further evidence using more detailed information on the sub-national distribution of aid projects that aid is not being allocated effectively towards regions with a larger share of poor people to alleviate poverty in recipient countries directly. Institutions do not have any significant influence on the sub-national distribution of aid towards the poor.Keywords: aid allocation, georeferenced data, institutions, spatial analysis
Procedia PDF Downloads 11925124 Wrist Pain, Technological Device Used, and Perceived Academic Performance Among the College of Computer Studies Students
Authors: Maquiling Jhuvie Jane R., Ojastro Regine B., Peroja Loreille Marie B., Pinili Joy Angela., Salve Genial Gail M., Villavicencio Marielle Irene B., Yap Alther Francis Garth B.
Abstract:
Introduction: This study investigated the impact of prolonged device usage on wrist pain and perceived academic performance among college students in Computer Studies. The research aims to explore the correlation between the frequency of technological device use and the incidence of wrist pain, as well as how this pain affects students' academic performance. The study seeks to provide insights that could inform interventions to promote better musculoskeletal health among students engaged in intensive technology use to further improve their academic performance. Method: The study utilized descriptive-correlational and comparative design, focusing on bona fide students from Silliman University’s College of Computer Studies during the second semester of 2023-2024. Participants were recruited through a survey sent via school email, with responses collected until March 30, 2024. Data was gathered using a password-protected device and Google Forms, ensuring restricted access to raw data. The demographic profile was summarized, and the prevalence of wrist pain and device usage were analyzed using percentages and weighted means. Statistical analyses included Spearman’s rank correlation coefficient to assess the relationship between wrist pain and device usage and an Independent T-test to evaluate differences in academic performance based on wrist pain presence. Alpha was set at 0.05. Results: The study revealed that 40% of College of Computer Studies students experience wrist pain, with 2 out of every 5 students affected. Laptops and desktops were the most frequently used devices for academic work, achieving a weighted mean of 4.511, while mobile phones and tablets received lower means of 4.183 and 1.911, respectively. The average academic performance score among students was 29.7, classified as ‘Good Performance.’ Notably, there was no significant relationship between the frequency of device usage and wrist pain, as indicated by p-values exceeding 0.05. However, a significant difference in perceived academic performance was observed, with students without wrist pain scoring an average of 30.39 compared to 28.72 for those with wrist pain and a p-value of 0.0134 confirming this distinction. Conclusion: The study revealed that about 40% of students in the College of Computer Studies experience wrist pain, but there is no significant link between device usage and pain occurrence. However, students without wrist pain demonstrated better academic performance than those with pain, suggesting that wrist health may impact academic success. These findings imply that physical therapy practices in the Philippines should focus on preventive strategies and ergonomic education to improve student health and performance.Keywords: wrist pain, frequency of use of technological devices, perceived academic performance, physical therapy
Procedia PDF Downloads 1425123 The Influence of Gender on Itraconazole Pharmacokinetic Parameters in Healthy Adults
Authors: Milijana N. Miljkovic, Viktorija M. Dragojevic-Simic, Nemanja K. Rancic, Vesna M. Jacevic, Snezana B. Djordjevic, Momir M. Mikov, Aleksandra M. Kovacevic
Abstract:
Itraconazole (ITZ) is a weak base and extremely lipophilic compound, with water solubility as a rate-limiting step in its absorption from the gastrointestinal tract. Its absolute bioavailability, about 55%, is maximal when its oral formulation, capsules, are taken immediately after a full meal. Peak plasma concentrations (Cmax) are reached within 2 to 5 hrs after their administration. ITZ undergoes extensive hepatic metabolism by human CYP3A4 isoenzyme and more than 30 different metabolites have been identified. One of the main ones is hydroxyitraconazole (HITZ), in which plasma concentrations are almost twice higher than those of ITZ. Gender differences in drug PK (Pharmacokinetics) have already been recognized, but variations in metabolism are believed to be their major cause. The aim of the study was to investigate the influence of gender on ITZ PK parameters after administration of oral capsule formulation, following 100 mg single dosing in healthy adult volunteers under fed conditions. The single-center, open-label PK study was performed. PK analyses included PK parameters obtained after a single 100 mg dose administration of itraconazole capsules to 48 females and 66 males. Blood samples were collected at pre-dose and up to 72.0 h after administration (1.0, 2.0, 3.0, 3.5, 4.0, 4.5, 5.0, 5.5, 6.0, 7.0, 9.0, 12.0, 24.0, 36.0 and 72.0 hrs). The calculated pharmacokinetic parameters, based on the plasma concentrations of itraconazole and hydroxyitraconazole, were Cmax, AUClast, and AUCtot. Plasma concentrations of ITZ and HITZ were determined using a validated liquid chromatographic method with mass spectrometric detection, while pharmacokinetic parameters were estimated using non-compartmental methods. The pharmacokinetic analyses were performed using Kinetica software version 5.0. The mean value of ITZ Cmaxmen was 74.79 ng/ml, and Cmaxwomen was 51.291 ng/ml (independent samples test; p = 0.005). Hydroxyitraconazole had a mean value of Cmaxmen 106.37 ng/ml, and the mean value Cmaxwomen was 70.05 ng/ml. Women had, on average, lower AUClast and Cmax than men. AUClastmen for ITZ was 736.02 ng/mL*h and AUClastwomen was 566.62 ng/mL*h, while AUClastmen for HITZ was 1154.80 was ng/mL*h and AUClastwomen for HITZ was 708.12 ng/mL*h (independent samples test; p = 0.033). The mean values of ITZ AUCtotmen were 884.73 ng/mL*h and AUCtotwomen was 685.10 ng/mL*h. AUCtotmen for HITZ was 1290.41 ng/mL*h, while AUCtotwomen for HIZT was 788.60 ng/mL*h (p < 0.001). The results could point out to lower oral bioavailability of ITZ in women, since values of Cmax, AUClast, and AUCtot of both ITZ and HITZ were significantly lower in women than in men, respectively. The reason may be higher expression and activity of CYP3A4 in women than in men, but there also may be differences in other PK parameters. High variability of both ITZ and HITZ concentrations in both genders confirmed that ITZ is a highly variable drug. Further examinations of its PK are needed to justify strategies for therapeutic drug monitoring in patients treated by this antifungal agent.Keywords: itraconazole, gender, hydroxyitraconazole, pharmacokinetics
Procedia PDF Downloads 13725122 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
Authors: Ramon Santana
Abstract:
The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.Keywords: fingerprint, template protection, bio-cryptography, minutiae protection
Procedia PDF Downloads 17025121 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique
Authors: Veysel Çelik, Aynur Aker, Ebru Güç
Abstract:
Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy
Procedia PDF Downloads 12625120 A Remote Sensing Approach to Calculate Population Using Roads Network Data in Lebanon
Authors: Kamel Allaw, Jocelyne Adjizian Gerard, Makram Chehayeb, Nada Badaro Saliba
Abstract:
In developing countries, such as Lebanon, the demographic data are hardly available due to the absence of the mechanization of population system. The aim of this study is to evaluate, using only remote sensing data, the correlations between the number of population and the characteristics of roads network (length of primary roads, length of secondary roads, total length of roads, density and percentage of roads and the number of intersections). In order to find the influence of the different factors on the demographic data, we studied the degree of correlation between each factor and the number of population. The results of this study have shown a strong correlation between the number of population and the density of roads and the number of intersections.Keywords: population, road network, statistical correlations, remote sensing
Procedia PDF Downloads 16125119 Aberrant Genome‐Wide DNA Methylation Profiles of Peripheral Blood Mononuclear Cells from Patients Hospitalized with COVID-19
Authors: Inam Ridha, Christine L. Kuryla, Madhuranga Thilakasiri Madugoda Ralalage Don, Norman J. Kleiman, Yunro Chung, Jin Park, Vel Murugan, Joshua LaBaer
Abstract:
To date, more than 275 million people worldwide have been diagnosed with COVID-19 and the rapid spread of the omicron variant suggests many millions more will soon become infected. Many infections are asymptomatic, while others result in mild to moderate illness. Unfortunately, some infected individuals exhibit more serious symptoms including respiratory distress, thrombosis, cardiovascular disease, multi-organ failure, cognitive difficulties, and, in roughly 2% of cases, death. Studies indicate other coronaviruses can alter the host cell's epigenetic profile and lead to alterations in the immune response. To better understand the mechanism(s) by which SARS-CoV-2 infection causes serious illness, DNA methylation profiles in peripheral blood mononuclear cells (PBMCs) from 90 hospitalized severely ill COVID-19 patients were compared to profiles from uninfected control subjects. Exploratory epigenome-wide DNA methylation analyses were performed using multiplexed methylated DNA immunoprecipitation (MeDIP) followed by pathway enrichment analysis. The findings demonstrated significant DNA methylation changes in infected individuals as compared to uninfected controls. Pathway analysis indicated that apoptosis, cell cycle control, Toll-like receptors (TLR), cytokine interactions, and T cell differentiation were among the most affected metabolic processes. In addition, changes in specific gene methylation were compared to SARS-CoV-2 induced changes in RNA expression using published RNA-seq data from 3 patients with severe COVID-19. These findings demonstrate significant correlations between differentially methylated and differentially expressed genes in a number of critical pathways.Keywords: COVID19, epigenetics, DNA mathylation, viral infection
Procedia PDF Downloads 18025118 A Multicopy Strategy for Improved Security Wireless Sensor Network
Authors: Tuğçe Yücel
Abstract:
A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.Keywords: MIP, sensor, telecommunications, WSN
Procedia PDF Downloads 51025117 Wikipedia World: A Computerized Process for Cultural Heritage Data Dissemination
Authors: L. Rajaonarivo, M. N. Bessagnet, C. Sallaberry, A. Le Parc Lacayrelle, L. Leveque
Abstract:
TCVPYR is a European FEDER (European Regional Development Fund) project which aims to promote tourism in the French Pyrenees region by leveraging its cultural heritage. It involves scientists from various domains (geographers, historians, anthropologists, computer scientists...). This paper presents a fully automated process to publish any dataset as Wikipedia articles as well as the corresponding linked information on Wikidata and Wikimedia Commons. We validate this process on a sample of geo-referenced cultural heritage data collected by TCVPYR researchers in different regions of the Pyrenees. The main result concerns the technological prerequisites, which are now in place. Moreover, we demonstrated that we can automatically publish cultural heritage data on Wikimedia.Keywords: cultural heritage dissemination, digital humanities, open data, Wikimedia automated publishing
Procedia PDF Downloads 12725116 Validation of a Reloading Vehicle Design by Finite Element Analysis
Authors: Tuğrul Aksoy, Hüseyin Karabıyık
Abstract:
Reloading vehicles are the vehicles which are generally equipped with a crane and used to carry a stowage from a point and locate onto the vehicle or vice versa. In this study, structural analysis of a reloading vehicle was performed under the loads which are predicted to be exposed under operating conditions via the finite element method. Among the finite element analysis results, the stress and displacement distributions of the vehicle and the contact pressure distributions of the guide rings within the stabilization legs were examined. Vehicle design was improved by strengthening certain parts according to the analysis results. The analyses performed for the final design were verified by the experiments involving strain gauge measurements.Keywords: structural analysis, reloading vehicle, crane, strain gauge
Procedia PDF Downloads 7025115 Adaptive Decision Feedback Equalizer Utilizing Fixed-Step Error Signal for Multi-Gbps Serial Links
Authors: Alaa Abdullah Altaee
Abstract:
This paper presents an adaptive decision feedback equalizer (ADFE) for multi-Gbps serial links utilizing a fix-step error signal extracted from cross-points of received data symbols. The extracted signal is generated based on violation of received data symbols with minimum detection requirements at the clock and data recovery (CDR) stage. The iterations of the adaptation process search for the optimum feedback tap coefficients to maximize the data eye-opening and minimize the adaptation convergence time. The effectiveness of the proposed architecture is validated using the simulation results of a serial link designed in an IBM 130 nm 1.2V CMOS technology. The data link with variable channel lengths is analyzed using Spectre from Cadence Design Systems with BSIM4 device models.Keywords: adaptive DFE, CMOS equalizer, error detection, serial links, timing jitter, wire-line communication
Procedia PDF Downloads 12025114 Data-Driven Market Segmentation in Hospitality Using Unsupervised Machine Learning
Authors: Rik van Leeuwen, Ger Koole
Abstract:
Within hospitality, marketing departments use segmentation to create tailored strategies to ensure personalized marketing. This study provides a data-driven approach by segmenting guest profiles via hierarchical clustering based on an extensive set of features. The industry requires understandable outcomes that contribute to adaptability for marketing departments to make data-driven decisions and ultimately driving profit. A marketing department specified a business question that guides the unsupervised machine learning algorithm. Features of guests change over time; therefore, there is a probability that guests transition from one segment to another. The purpose of the study is to provide steps in the process from raw data to actionable insights, which serve as a guideline for how hospitality companies can adopt an algorithmic approach.Keywords: hierarchical cluster analysis, hospitality, market segmentation
Procedia PDF Downloads 10825113 Land Use Changes and Its Implications on Livelihood Activities in Msaranga Peri-Urban Settlement in Moshi Municipality, Tanzania
Authors: Magigi Wakuru, Gaudensi Kapinga
Abstract:
This study examines land use changes and its implications on livelihood activities of peri-urban settlements in Msaranga, Moshi Municipality. Specifically; it analyses the historical development of the settlement, socioeconomic characteristics and land use changes over time. Likely, find out existing livelihood activities and how have been changing over time in the context of urbanization, and lastly highlights land use change implications on livelihood activities to residents. Interviews, observations, documentary reviews and mapping were data collection tools employed. The study shows that housing, urban agriculture, roads infrastructure, recreational, open spaces and institutions are some land use types existing in the settlement. On-farm and off-farm livelihood activities have been identified livelihood activities in the settlement. These include crop cultivation, livestock keeping, trading and formal employment and have been changing over time. However, urbanisation observed to be a catalyst of change and affect livelihood activities over time. Resorting to off-farm livelihoods activities including engaging in retail business and seeking employment in formal and informal sector are some copying strategies documented. The study wind up by pointing roles of different actors and issues of particular attention to different stakeholders towards reducing impact of land use changes on livelihood strategies in the settlement. Likely, unresolved issues for future research and policy development agenda are highlighted in this study. The study concludes that the impact of land use changes on livelihood activities need collaborative effort of different stakeholders, policy enforcement as well as public private partnership in issues based implementation in cities like Moshi where land use is rapidly changing over time within urban planning cycles due to increasing population demand in cities of Sub-Saharan Africa.Keywords: land use, land use changes, livelihood activities, peri-urban settlement, Moshi, Tanzania
Procedia PDF Downloads 32425112 Geographic Information System for Simulating Air Traffic By Applying Different Multi-Radar Positioning Techniques
Authors: Amara Rafik, Mostefa Belhadj Aissa
Abstract:
Radar data is one of the many data sources used by ATM Air Traffic Management systems. These data come from air navigation radar antennas. These radars intercept signals emitted by the various aircraft crossing the controlled airspace and calculate the position of these aircraft and retransmit their positions to the Air Traffic Management System. For greater reliability, these radars are positioned in such a way as to allow their coverage areas to overlap. An aircraft will therefore be detected by at least one of these radars. However, the position coordinates of the same aircraft and sent by these different radars are not necessarily identical. Therefore, the ATM system must calculate a single position (radar track) which will ultimately be sent to the control position and displayed on the air traffic controller's monitor. There are several techniques for calculating the radar track. Furthermore, the geographical nature of the problem requires the use of a Geographic Information System (GIS), i.e. a geographical database on the one hand and geographical processing. The objective of this work is to propose a GIS for traffic simulation which reconstructs the evolution over time of aircraft positions from a multi-source radar data set and by applying these different techniques.Keywords: ATM, GIS, radar data, simulation
Procedia PDF Downloads 11825111 From Two-Way to Multi-Way: A Comparative Study for Map-Reduce Join Algorithms
Authors: Marwa Hussien Mohamed, Mohamed Helmy Khafagy
Abstract:
Map-Reduce is a programming model which is widely used to extract valuable information from enormous volumes of data. Map-reduce designed to support heterogeneous datasets. Apache Hadoop map-reduce used extensively to uncover hidden pattern like data mining, SQL, etc. The most important operation for data analysis is joining operation. But, map-reduce framework does not directly support join algorithm. This paper explains and compares two-way and multi-way map-reduce join algorithms for map reduce also we implement MR join Algorithms and show the performance of each phase in MR join algorithms. Our experimental results show that map side join and map merge join in two-way join algorithms has the longest time according to preprocessing step sorting data and reduce side cascade join has the longest time at Multi-Way join algorithms.Keywords: Hadoop, MapReduce, multi-way join, two-way join, Ubuntu
Procedia PDF Downloads 48725110 An Approach for Ensuring Data Flow in Freight Delivery and Management Systems
Authors: Aurelija Burinskienė, Dalė Dzemydienė, Arūnas Miliauskas
Abstract:
This research aims at developing the approach for more effective freight delivery and transportation process management. The road congestions and the identification of causes are important, as well as the context information recognition and management. The measure of many parameters during the transportation period and proper control of driver work became the problem. The number of vehicles per time unit passing at a given time and point for drivers can be evaluated in some situations. The collection of data is mainly used to establish new trips. The flow of the data is more complex in urban areas. Herein, the movement of freight is reported in detail, including the information on street level. When traffic density is extremely high in congestion cases, and the traffic speed is incredibly low, data transmission reaches the peak. Different data sets are generated, which depend on the type of freight delivery network. There are three types of networks: long-distance delivery networks, last-mile delivery networks and mode-based delivery networks; the last one includes different modes, in particular, railways and other networks. When freight delivery is switched from one type of the above-stated network to another, more data could be included for reporting purposes and vice versa. In this case, a significant amount of these data is used for control operations, and the problem requires an integrated methodological approach. The paper presents an approach for providing e-services for drivers by including the assessment of the multi-component infrastructure needed for delivery of freights following the network type. The construction of such a methodology is required to evaluate data flow conditions and overloads, and to minimize the time gaps in data reporting. The results obtained show the possibilities of the proposing methodological approach to support the management and decision-making processes with functionality of incorporating networking specifics, by helping to minimize the overloads in data reporting.Keywords: transportation networks, freight delivery, data flow, monitoring, e-services
Procedia PDF Downloads 12525109 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 26225108 Multistage Data Envelopment Analysis Model for Malmquist Productivity Index Using Grey's System Theory to Evaluate Performance of Electric Power Supply Chain in Iran
Authors: Mesbaholdin Salami, Farzad Movahedi Sobhani, Mohammad Sadegh Ghazizadeh
Abstract:
Evaluation of organizational performance is among the most important measures that help organizations and entities continuously improve their efficiency. Organizations can use the existing data and results from the comparison of units under investigation to obtain an estimation of their performance. The Malmquist Productivity Index (MPI) is an important index in the evaluation of overall productivity, which considers technological developments and technical efficiency at the same time. This article proposed a model based on the multistage MPI, considering limited data (Grey’s theory). This model can evaluate the performance of units using limited and uncertain data in a multistage process. It was applied by the electricity market manager to Iran’s electric power supply chain (EPSC), which contains uncertain data, to evaluate the performance of its actors. Results from solving the model showed an improvement in the accuracy of future performance of the units under investigation, using the Grey’s system theory. This model can be used in all case studies, in which MPI is used and there are limited or uncertain data.Keywords: Malmquist Index, Grey's Theory, CCR Model, network data envelopment analysis, Iran electricity power chain
Procedia PDF Downloads 16525107 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 33425106 Modeling and Tracking of Deformable Structures in Medical Images
Authors: Said Ettaieb, Kamel Hamrouni, Su Ruan
Abstract:
This paper presents a new method based both on Active Shape Model and a priori knowledge about the spatio-temporal shape variation for tracking deformable structures in medical imaging. The main idea is to exploit the a priori knowledge of shape that exists in ASM and introduce new knowledge about the shape variation over time. The aim is to define a new more stable method, allowing the reliable detection of structures whose shape changes considerably in time. This method can also be used for the three-dimensional segmentation by replacing the temporal component by the third spatial axis (z). The proposed method is applied for the functional and morphological study of the heart pump. The functional aspect was studied through temporal sequences of scintigraphic images and morphology was studied through MRI volumes. The obtained results are encouraging and show the performance of the proposed method.Keywords: active shape model, a priori knowledge, spatiotemporal shape variation, deformable structures, medical images
Procedia PDF Downloads 34225105 Reliability Analysis of Partial Safety Factor Design Method for Slopes in Granular Soils
Authors: K. E. Daryani, H. Mohamad
Abstract:
Uncertainties in the geo-structure analysis and design have a significant impact on the safety of slopes. Traditionally, uncertainties in the geotechnical design are addressed by incorporating a conservative factor of safety in the analytical model. In this paper, a risk-based approach is adopted to assess the influence of the geotechnical variable uncertainties on the stability of infinite slopes in cohesionless soils using the “partial factor of safety on shear strength” approach as stated in Eurocode 7. Analyses conducted using Monte Carlo simulation show that the same partial factor can have very different levels of risk depending on the degree of uncertainty of the mean values of the soil friction angle and void ratio.Keywords: Safety, Probability of Failure, Reliability, Infinite Slopes, Sand.
Procedia PDF Downloads 57425104 Data Mining Approach: Classification Model Evaluation
Authors: Lubabatu Sada Sodangi
Abstract:
The rapid growth in exchange and accessibility of information via the internet makes many organisations acquire data on their own operation. The aim of data mining is to analyse the different behaviour of a dataset using observation. Although, the subset of the dataset being analysed may not display all the behaviours and relationships of the entire data and, therefore, may not represent other parts that exist in the dataset. There is a range of techniques used in data mining to determine the hidden or unknown information in datasets. In this paper, the performance of two algorithms Chi-Square Automatic Interaction Detection (CHAID) and multilayer perceptron (MLP) would be matched using an Adult dataset to find out the percentage of an/the adults that earn > 50k and those that earn <= 50k per year. The two algorithms were studied and compared using IBM SPSS statistics software. The result for CHAID shows that the most important predictors are relationship and education. The algorithm shows that those are married (husband) and have qualification: Bachelor, Masters, Doctorate or Prof-school whose their age is > 41<57 earn > 50k. Also, multilayer perceptron displays marital status and capital gain as the most important predictors of the income. It also shows that individuals that their capital gain is less than 6,849 and are single, separated or widow, earn <= 50K, whereas individuals with their capital gain is > 6,849, work > 35 hrs/wk, and > 27yrs their income will be > 50k. By comparing the two algorithms, it is observed that both algorithms are reliable but there is strong reliability in CHAID which clearly shows that relation and education contribute to the prediction as displayed in the data visualisation.Keywords: data mining, CHAID, multi-layer perceptron, SPSS, Adult dataset
Procedia PDF Downloads 37825103 Mineralogical Characteristics of Phosphates from the Djebel Onk Deposits: Treatment and Valorization of Co-Products
Authors: Samira Tlili, Amina Grairia, Sihem Benayache, Saida Bouyegh, Sabrina Ladjama, Abdelmoumen Guedri
Abstract:
Phosphorites from Djebel Onk Tebessa/Algeria deposit contain a CaO of 50-52 wt. % and P₂O₅ level of ≥ 30.20 wt. %. The microstructure revealed using a spectroscopy electronic microscope (SEM) consists of phosphate granules with an ovular form. In this investigation, we have identified phosphate with varying particle sizes using mineralogical methods. The phosphogypsum formed by the mineralization of natural phosphate has also been discovered. This co-product was formed during the attack on natural phosphates by sulfuric acid. This study demonstrated the effectiveness of the thermoanalytical technique of differential scanning calorimetry (DSC), X-ray diffraction, and EDS/MEB analysis. FTIR analyses also validated the identification of mineral phases with the observation of bands from structural phosphate groups.Keywords: phosphate, Djebel Onk deposit, mineralogy, valorization, phosphogypsum
Procedia PDF Downloads 2225102 Design of Neural Predictor for Vibration Analysis of Drilling Machine
Authors: İkbal Eski
Abstract:
This investigation is researched on design of robust neural network predictors for analyzing vibration effects on moving parts of a drilling machine. Moreover, the research is divided two parts; first part is experimental investigation, second part is simulation analysis with neural networks. Therefore, a real time the drilling machine is used to vibrations during working conditions. The measured real vibration parameters are analyzed with proposed neural network. As results: Simulation approaches show that Radial Basis Neural Network has good performance to adapt real time parameters of the drilling machine.Keywords: artificial neural network, vibration analyses, drilling machine, robust
Procedia PDF Downloads 393