Search results for: data exploitation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24648

Search results for: data exploitation

24288 Investigation on Properties and Applications of Graphene as Single Layer of Carbon Atoms

Authors: Ali Ashjaran

Abstract:

Graphene is undoubtedly emerging as one of the most promising materials because of its unique combination of superb properties, which opens a way for its exploitation in a wide spectrum of applications ranging from electronics to optics, sensors, and biodevices. In addition, Graphene-based nanomaterials have many promising applications in energy-related areas. Graphene a single layer of carbon atoms, combines several exceptional properties, which makes it uniquely suited as a coating material: transparency, excellent mechanical stability, low chemical reactivity, Optical, impermeability to most gases, flexibility, and very high thermal and electrical conductivity. Graphene is a material that can be utilized in numerous disciplines including, but not limited to: bioengineering, composite materials, energy technology and nanotechnology, biological engineering, optical electronics, ultrafiltration, photovoltaic cells. This review aims to provide an overiew of graphene structure, properties and some applications.

Keywords: graphene, carbon, anti corrosion, optical and electrical properties, sensors

Procedia PDF Downloads 249
24287 The Perspective on Data Collection Instruments for Younger Learners

Authors: Hatice Kübra Koç

Abstract:

For academia, collecting reliable and valid data is one of the most significant issues for researchers. However, it is not the same procedure for all different target groups; meanwhile, during data collection from teenagers, young adults, or adults, researchers can use common data collection tools such as questionnaires, interviews, and semi-structured interviews; yet, for young learners and very young ones, these reliable and valid data collection tools cannot be easily designed or applied by the researchers. In this study, firstly, common data collection tools are examined for ‘very young’ and ‘young learners’ participant groups since it is thought that the quality and efficiency of an academic study is mainly based on its valid and correct data collection and data analysis procedure. Secondly, two different data collection instruments for very young and young learners are stated as discussing the efficacy of them. Finally, a suggested data collection tool – a performance-based questionnaire- which is specifically developed for ‘very young’ and ‘young learners’ participant groups in the field of teaching English to young learners as a foreign language is presented in this current study. The designing procedure and suggested items/factors for the suggested data collection tool are accordingly revealed at the end of the study to help researchers have studied with young and very learners.

Keywords: data collection instruments, performance-based questionnaire, young learners, very young learners

Procedia PDF Downloads 58
24286 Generation of Quasi-Measurement Data for On-Line Process Data Analysis

Authors: Hyun-Woo Cho

Abstract:

For ensuring the safety of a manufacturing process one should quickly identify an assignable cause of a fault in an on-line basis. To this end, many statistical techniques including linear and nonlinear methods have been frequently utilized. However, such methods possessed a major problem of small sample size, which is mostly attributed to the characteristics of empirical models used for reference models. This work presents a new method to overcome the insufficiency of measurement data in the monitoring and diagnosis tasks. Some quasi-measurement data are generated from existing data based on the two indices of similarity and importance. The performance of the method is demonstrated using a real data set. The results turn out that the presented methods are able to handle the insufficiency problem successfully. In addition, it is shown to be quite efficient in terms of computational speed and memory usage, and thus on-line implementation of the method is straightforward for monitoring and diagnosis purposes.

Keywords: data analysis, diagnosis, monitoring, process data, quality control

Procedia PDF Downloads 456
24285 The Delaying Influence of Degradation on the Divestment of Gas Turbines for Associated Gas Utilisation: Part 1

Authors: Mafel Obhuo, Dodeye I. Igbong, Duabari S. Aziaka, Pericles Pilidis

Abstract:

An important feature of the exploitation of associated gas as fuel for gas turbine engines is a declining supply. So when exploiting this resource, the divestment of prime movers is very important as the fuel supply diminishes with time. This paper explores the influence of engine degradation on the timing of divestments. Hypothetical but realistic gas turbine engines were modelled with Turbomatch, the Cranfield University gas turbine performance simulation tool. The results were deployed in three degradation scenarios within the TERA (Techno-economic and environmental risk analysis) framework to develop economic models. An optimisation with Genetic Algorithms was carried out to maximize the economic benefit. The results show that degradation will have a significant impact. It will delay the divestment of power plants, while they are running less efficiently. Over a 20 year investment, a decrease of $0.11bn, $0.26bn and $0.45bn (billion US dollars) were observed for the three degradation scenarios as against the clean case.

Keywords: economic return, flared associated gas, net present value, optimization

Procedia PDF Downloads 108
24284 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 72
24283 Raising Awareness among Residents about the Exact Fate of Dirt in the Neighborhood of Porto Belo

Authors: Marie Oslène Honorat

Abstract:

Porto Belo is a neighborhood in the city of Foz do Iguaçu / PR, located in the Vila C region of Brazil. It is a project that addresses the question of the dirt generated by the neighborhood community about how they dispose and recycle domestic waste. This project aimed at raising awareness among residents, on how important it is to preserve the environment and take care, especially of the space in which we are located. Living this way manages to minimize the exploitation of natural resources, soil and water pollution. After collecting information about what one saw, we questioned some people in the neighborhood to find out about selective collection, recycling, and the separation and final destination of garbage. From the study, it was possible to verify the importance of placing more trash cans on neighborhood streets, where garbage is discarded, and the importance of promoting environmental education to improve the environment and quality of life. The methodology used in this research was a qualitative methodology that seeks the principle of transforming reality through investigation.

Keywords: awareness, recycling, selective collection, waste disposal

Procedia PDF Downloads 35
24282 Using Equipment Telemetry Data for Condition-Based maintenance decisions

Authors: John Q. Todd

Abstract:

Given that modern equipment can provide comprehensive health, status, and error condition data via built-in sensors, maintenance organizations have a new and valuable source of insight to take advantage of. This presentation will expose what these data payloads might look like and how they can be filtered, visualized, calculated into metrics, used for machine learning, and generate alerts for further action.

Keywords: condition based maintenance, equipment data, metrics, alerts

Procedia PDF Downloads 162
24281 Impact of Changes in Travel Behavior Triggered by the Covid-19 Pandemic on Tourist Ininfrastructure. Water Reservoirs of the Vltava Cascade (Czechia) Case Study

Authors: Jiří Vágner, Dana Fialová

Abstract:

The Covid-19 pandemic and its effects have triggered significant changes in travel behavior. On the contrary to a deep decline in international tourism, domestic tourism has recovered. It has not fully replaced the total volume of national tourism so far. However, from a regional point of view, and especially according to the type of destinations, regional targeting has changed significantly compared to the previous period. Urban destinations, which used to be the domain of foreign tourists, have been relatively orphaned, in contrast to destinations tied to natural attractions, which have seen seasonal increases. Even here, at a lower hierarchical geographic level, we can observe the differentiation resulting from the existing localization and infrastructure. The case study is focused on the three largest water reservoirs of the Vltava Cascade in Czechia– Lipno, Orlík, and Slapy. Based on a detailed field survey, in the periods before and during the pandemic, as well as available statistical data (Tourdata; Czech Statistical Office, Czech Cadaster and Ordnance Survey), different trends in the exploitation of these destinations with regard to existing or planned infrastructure are documented, analyzed and explained. This gives us the opportunity to discuss on concrete examples of generally known phenomena that are usually neglected in tourism: slum, brownfield, greenfield. Changes in travel behavior – especially the focus on spending leisure time individually in naturally attractive destinations – can affect the use of sites, which can be defined as a tourist or recreational slum, brownfield, but also as a tourist greenfield development. Sociocultural changes and perception of destinations by tourists and other actors represent, besides environmental changes, major trends in current tourism.

Keywords: Covid-19 pandemic, czechia, sociocultural and environmental impacts, tourist infrastructure, travel behavior, the Vltava Cascade water reservoirs

Procedia PDF Downloads 126
24280 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 265
24279 Hybrid Reliability-Similarity-Based Approach for Supervised Machine Learning

Authors: Walid Cherif

Abstract:

Data mining has, over recent years, seen big advances because of the spread of internet, which generates everyday a tremendous volume of data, and also the immense advances in technologies which facilitate the analysis of these data. In particular, classification techniques are a subdomain of Data Mining which determines in which group each data instance is related within a given dataset. It is used to classify data into different classes according to desired criteria. Generally, a classification technique is either statistical or machine learning. Each type of these techniques has its own limits. Nowadays, current data are becoming increasingly heterogeneous; consequently, current classification techniques are encountering many difficulties. This paper defines new measure functions to quantify the resemblance between instances and then combines them in a new approach which is different from actual algorithms by its reliability computations. Results of the proposed approach exceeded most common classification techniques with an f-measure exceeding 97% on the IRIS Dataset.

Keywords: data mining, knowledge discovery, machine learning, similarity measurement, supervised classification

Procedia PDF Downloads 440
24278 Seismic Data Scaling: Uncertainties, Potential and Applications in Workstation Interpretation

Authors: Ankur Mundhra, Shubhadeep Chakraborty, Y. R. Singh, Vishal Das

Abstract:

Seismic data scaling affects the dynamic range of a data and with present day lower costs of storage and higher reliability of Hard Disk data, scaling is not suggested. However, in dealing with data of different vintages, which perhaps were processed in 16 bits or even 8 bits and are need to be processed with 32 bit available data, scaling is performed. Also, scaling amplifies low amplitude events in deeper region which disappear due to high amplitude shallow events that saturate amplitude scale. We have focused on significance of scaling data to aid interpretation. This study elucidates a proper seismic loading procedure in workstations without using default preset parameters as available in most software suites. Differences and distribution of amplitude values at different depth for seismic data are probed in this exercise. Proper loading parameters are identified and associated steps are explained that needs to be taken care of while loading data. Finally, the exercise interprets the un-certainties which might arise when correlating scaled and unscaled versions of seismic data with synthetics. As, seismic well tie correlates the seismic reflection events with well markers, for our study it is used to identify regions which are enhanced and/or affected by scaling parameter(s).

Keywords: clipping, compression, resolution, seismic scaling

Procedia PDF Downloads 447
24277 Flood Analysis of Domestic Rooftop Rainwater Harvesting in Low Lying Flood Plain Areas at Gomti Nagar In Rain-Dominated Monsoon Climates

Authors: Rajkumar Ghosh

Abstract:

Rapid urbanization, rising population, changing lifestyles and in-migration, Lucknow is groundwater over-exploited area, with an abstract rate of 1968 m3/day/km2 in Gomti Nagar. The groundwater situation in Gomti Nagar is deteriorating day-by-day. According to the work, the calculated annual water deficiency in Gomti Nagar area will be 28061 Million Litre (ML) in 2022. Within 30 yrs., the water deficiency will be 735570 ML (till 2051). The calculated groundwater recharge in Gomti Nagar was 10813 ML/y (in 2022). The annual groundwater abstraction from Gomti Nagar area was 35332 ML/yr. (in 2022). Bye-laws (≥ 300 sq.m) existing RTRWHs can recharge 17.71 ML/yr. in Gomti Nagar area. The existing RTRWHs are contributing 0.07% for recharging groundwater table. In Gomti Nagar, the water level is dropping at a rate of 1.0 metre per year, and the depth of the water table is less than 30 metre below ground level (mbgl). Natural groundwater recharge is affected by the geomorphological conditions of the surrounding area. Gomti Nagar is located on the erosional terrace (Te) and depositional terrace (d) of the Gomti River. The flood plain in Lucknow city is less active due to the embankments on the both sides of the Gomti River. The alluvium is composed of clay sandy up to a depth of 30m, and the alignment of the Gomti River reveals the presence of sandy soil at shallow depths. Aquifer depth 120 metre. Recharge as in Gomti Nagar (it may vary) 0 – 150 metre. Infiltration rates in alluvial floodplains range from 0.8 to 74 cm/hr. Geologically and Geomorphologically support rapid percolation of rainwater through alluvium in Gomti Nagar, Lucknow city, Uttar Pradesh. Over-exploitation of groundwater causes natural hazards viz. land subsidence, development of cracks on roads and buildings, development of vacuum and compactness of soil/clay which leads towards land subsidence, devastating effects on natural stream flow. Gomti River already transitioning phase from ‘effluent’ to ‘influent’, and saline intrusion in Aquifer –II (among Five aquifers in Lucknow city). A 250 m long crack developed in 2007 due to groundwater depletion in Dullu Khera and Vader Khera village of Kakori, Uttar Pradesh. The groundwater table of Lucknow is declining and water table imbalance occurs due to 17 times less recharge than groundwater exploitation. Uttar Pradesh along with four states have extracted 49% of groundwater in the entire country. In Gomti Nagar area, 27305 no of houses are present and available build up area 3.8 sq. km (60% of plot area) based on Lucknow Development Authority (LDA) Master plan 2031. If RTRWHs would install in all the houses, then 12% harvested rainwater contribute to the water table in Gomti Nagar area. Till 2051, Gomti Nagar area will harvest 91110 ML of rainwater. There are minimalistic chances that any incidence of flood can occur due to RTRWH. Thus, it can conclud that RTRWH is not related to flood happening in urban areas viz. Gomti Nagar.

Keywords: RTRWH, aquifer, groundwater table, rainwater, infiltration

Procedia PDF Downloads 50
24276 Association of Social Data as a Tool to Support Government Decision Making

Authors: Diego Rodrigues, Marcelo Lisboa, Elismar Batista, Marcos Dias

Abstract:

Based on data on child labor, this work arises questions about how to understand and locate the factors that make up the child labor rates, and which properties are important to analyze these cases. Using data mining techniques to discover valid patterns on Brazilian social databases were evaluated data of child labor in the State of Tocantins (located north of Brazil with a territory of 277000 km2 and comprises 139 counties). This work aims to detect factors that are deterministic for the practice of child labor and their relationships with financial indicators, educational, regional and social, generating information that is not explicit in the government database, thus enabling better monitoring and updating policies for this purpose.

Keywords: social data, government decision making, association of social data, data mining

Procedia PDF Downloads 345
24275 Outlier Detection in Stock Market Data using Tukey Method and Wavelet Transform

Authors: Sadam Alwadi

Abstract:

Outlier values become a problem that frequently occurs in the data observation or recording process. Thus, the need for data imputation has become an essential matter. In this work, it will make use of the methods described in the prior work to detect the outlier values based on a collection of stock market data. In order to implement the detection and find some solutions that maybe helpful for investors, real closed price data were obtained from the Amman Stock Exchange (ASE). Tukey and Maximum Overlapping Discrete Wavelet Transform (MODWT) methods will be used to impute the detect the outlier values.

Keywords: outlier values, imputation, stock market data, detecting, estimation

Procedia PDF Downloads 63
24274 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 263
24273 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework

Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe

Abstract:

This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.

Keywords: IoT, fog, cloud, data analysis, data privacy

Procedia PDF Downloads 71
24272 Comparison of Selected Pier-Scour Equations for Wide Piers Using Field Data

Authors: Nordila Ahmad, Thamer Mohammad, Bruce W. Melville, Zuliziana Suif

Abstract:

Current methods for predicting local scour at wide bridge piers, were developed on the basis of laboratory studies and very limited scour prediction were tested with field data. Laboratory wide pier scour equation from previous findings with field data were presented. A wide range of field data were used and it consists of both live-bed and clear-water scour. A method for assessing the quality of the data was developed and applied to the data set. Three other wide pier-scour equations from the literature were used to compare the performance of each predictive method. The best-performing scour equation were analyzed using statistical analysis. Comparisons of computed and observed scour depths indicate that the equation from the previous publication produced the smallest discrepancy ratio and RMSE value when compared with the large amount of laboratory and field data.

Keywords: field data, local scour, scour equation, wide piers

Procedia PDF Downloads 376
24271 The Maximum Throughput Analysis of UAV Datalink 802.11b Protocol

Authors: Inkyu Kim, SangMan Moon

Abstract:

This IEEE 802.11b protocol provides up to 11Mbps data rate, whereas aerospace industry wants to seek higher data rate COTS data link system in the UAV. The Total Maximum Throughput (TMT) and delay time are studied on many researchers in the past years This paper provides theoretical data throughput performance of UAV formation flight data link using the existing 802.11b performance theory. We operate the UAV formation flight with more than 30 quad copters with 802.11b protocol. We may be predicting that UAV formation flight numbers have to bound data link protocol performance limitations.

Keywords: UAV datalink, UAV formation flight datalink, UAV WLAN datalink application, UAV IEEE 802.11b datalink application

Procedia PDF Downloads 361
24270 Methods for Distinction of Cattle Using Supervised Learning

Authors: Radoslav Židek, Veronika Šidlová, Radovan Kasarda, Birgit Fuerst-Waltl

Abstract:

Machine learning represents a set of topics dealing with the creation and evaluation of algorithms that facilitate pattern recognition, classification, and prediction, based on models derived from existing data. The data can present identification patterns which are used to classify into groups. The result of the analysis is the pattern which can be used for identification of data set without the need to obtain input data used for creation of this pattern. An important requirement in this process is careful data preparation validation of model used and its suitable interpretation. For breeders, it is important to know the origin of animals from the point of the genetic diversity. In case of missing pedigree information, other methods can be used for traceability of animal´s origin. Genetic diversity written in genetic data is holding relatively useful information to identify animals originated from individual countries. We can conclude that the application of data mining for molecular genetic data using supervised learning is an appropriate tool for hypothesis testing and identifying an individual.

Keywords: genetic data, Pinzgau cattle, supervised learning, machine learning

Procedia PDF Downloads 522
24269 Router 1X3 - RTL Design and Verification

Authors: Nidhi Gopal

Abstract:

Routing is the process of moving a packet of data from source to destination and enables messages to pass from one computer to another and eventually reach the target machine. A router is a networking device that forwards data packets between computer networks. It is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). This paper mainly emphasizes upon the study of router device, its top level architecture, and how various sub-modules of router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top module.

Keywords: data packets, networking, router, routing

Procedia PDF Downloads 769
24268 Quality of Life among Female Sex Workers of Selected Organization of Pokhara: A Methodological Triangulation

Authors: Sharmila Dahal Paudel

Abstract:

Background: There are around twenty-four thousand to twenty-eight thousand Female Sex Workers in Nepal. FSWs are the vulnerable groups for sexually transmitted infections (STIs) and human immunodeficiency virus (HIV) infections which directly and indirectly ease to reduce the quality of life of such groups. Due to their highly marginalized status, FSWs in Nepal have limited access to information about reproductive health and safe sex practices. The objectives of the study are to assess the quality of life of female sex workers and the factors affecting them. Materials and Methods: A descriptive cross-sectional study with methodological triangulation was conducted among 108 FSWs on the basis of service record of selected organization of Pokhara valley. The complete enumerative sampling was used to select FSWs. Structured interview schedule, WHOQOL-BREF and in-depth questionnaire were used to collect the data. The descriptive and inferential statistics were used to interpret the result. Results: The mean age of participants were 23.44 years and the mean quality of life score was 174.06 ranging from 56.54 to 370.78. Among the domain scores, the mean score is highest in social domain (55.89) followed by physical (45.42), psychological (39.27) and the environmental (34.23). Regarding the association of QOL with socio-demographic, occupation and health-related variables, the multi-linear regression suggests that the satisfaction with occupation was highly significant with the total QOL score (B=-50.50, SE=10.46; p= <0.001) and there is negative relation between QOL and feeling of exploitation and facing STI problems. This means those who feels exploited have significantly less QOL comparing with those who did not feel the same. In correlation analysis, all the domains are positively co-related with each domain which is found to be significant at 1% level of significance. Conclusion: The highest mean score was in social domain, and the lowest is in environmental domain which suggests that the items included in environmental domains could not be utilized or hindrance were there.

Keywords: FSWs, HIV, QOL, WHOQOL-BREF

Procedia PDF Downloads 146
24267 Exploitation of Terpenes as Guardians in Plant Biotechnology

Authors: Farzad Alaeimoghadam, Farnaz Alaeimoghadam

Abstract:

Plants are always being threatened by biotic and abiotic elements in their abode. Although they have inherited mechanisms to defend themselves, sometimes due to overpowering of their enemies or weakening of themselves, they just suffer from those elements. Human, as to help plants defend themselves, have developed several methods among which application of terpenes via plant biotechnology is promising. Terpenes are the most frequent and diverse secondary metabolites in plants. In these plants, terpenes are involved in different protective aspects. In this field, by utilizing biotechnological approaches on them, a delicate, precise, and an economic intervention will be achieved. In this review, first, the importance of terpenes as guardians in plants, which include their allelopathy effect, a call for alliances, and a mitigation impact on abiotic stresses will be pointed out. Second, problems concerning terpenes application in plant biotechnology comprising: damage to cell, undesirable terpene production and undesirable concentration and proportion of terpenes will be discussed. At the end, the approaches in plant biotechnology of terpenes including tampering with terpene gene sequences, compartmentalization, and localization and utilization of membrane transporters will be expressed. It is concluded with some useful notions concerning the topic.

Keywords: plant biotechnology, plant protection, terpenes, terpenoids

Procedia PDF Downloads 326
24266 Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests

Authors: Julius Onyancha, Valentina Plekhanova

Abstract:

One of the significant issues facing web users is the amount of noise in web data which hinders the process of finding useful information in relation to their dynamic interests. Current research works consider noise as any data that does not form part of the main web page and propose noise web data reduction tools which mainly focus on eliminating noise in relation to the content and layout of web data. This paper argues that not all data that form part of the main web page is of a user interest and not all noise data is actually noise to a given user. Therefore, learning of noise web data allocated to the user requests ensures not only reduction of noisiness level in a web user profile, but also a decrease in the loss of useful information hence improves the quality of a web user profile. Noise Web Data Learning (NWDL) tool/algorithm capable of learning noise web data in web user profile is proposed. The proposed work considers elimination of noise data in relation to dynamic user interest. In order to validate the performance of the proposed work, an experimental design setup is presented. The results obtained are compared with the current algorithms applied in noise web data reduction process. The experimental results show that the proposed work considers the dynamic change of user interest prior to elimination of noise data. The proposed work contributes towards improving the quality of a web user profile by reducing the amount of useful information eliminated as noise.

Keywords: web log data, web user profile, user interest, noise web data learning, machine learning

Procedia PDF Downloads 240
24265 The Role of Non-Governmental Organizations in Combating Human Trafficking in South India: An Overview

Authors: Kumudini Achchi

Abstract:

India, being known for its rich cultural values has given a special place to women who are also been victims of humiliation, torture, and exploitation. The major share of Human Trafficking goes to sex trafficking which is recognised as world’s second most huge social evil. The original form of sex trafficking in India is prostitution with and without religious sanction. Today the situation of such women reached as an issue of human rights where they rights are denied severely. This situation demanded intervention to protect them from the exploitative situation. NGO are the proactive initiatives which offer support to the exploited women in sex trade. To understand the intervention programs of NGOs in South India, a study was conducted covering four states and a union territory considering 32 NGOs based on their preparedness to participate in the research study. Descriptive and diagnostic research design was adopted along with interview schedule as a tool for collecting data. The study reveals that these NGOs believes in the possibility of mainstreaming commercially sexually exploited women and found adopted seven different programs in the process such as rescue, rehabilitation, reintegration, prevention, developmental, advocacy and research. Each area involves different programs to reach and prepare the exploited women towards mainstreamed society which has been discussed in the paper. Implementation of these programs is not an easy task for the organizations rather they are facing hardships in the areas such as social, legal, financial, political which are hindering the successful operations. Rescue, advocacy, and research are the least adopted areas by the NGOs because of lack of support as well as knowledge in the area. Rehabilitation stands as the most adopted area in implementation. The paper further deals with the challenges in the implementation of the programs as well as the remedial measures in social work point of view having Indian cultural background.

Keywords: NGOs, commercially sexually exploited women, programmes, South India

Procedia PDF Downloads 230
24264 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 109
24263 Data Mining and Knowledge Management Application to Enhance Business Operations: An Exploratory Study

Authors: Zeba Mahmood

Abstract:

The modern business organizations are adopting technological advancement to achieve competitive edge and satisfy their consumer. The development in the field of Information technology systems has changed the way of conducting business today. Business operations today rely more on the data they obtained and this data is continuously increasing in volume. The data stored in different locations is difficult to find and use without the effective implementation of Data mining and Knowledge management techniques. Organizations who smartly identify, obtain and then convert data in useful formats for their decision making and operational improvements create additional value for their customers and enhance their operational capabilities. Marketers and Customer relationship departments of firm use Data mining techniques to make relevant decisions, this paper emphasizes on the identification of different data mining and Knowledge management techniques that are applied to different business industries. The challenges and issues of execution of these techniques are also discussed and critically analyzed in this paper.

Keywords: knowledge, knowledge management, knowledge discovery in databases, business, operational, information, data mining

Procedia PDF Downloads 509
24262 Indexing and Incremental Approach Using Map Reduce Bipartite Graph (MRBG) for Mining Evolving Big Data

Authors: Adarsh Shroff

Abstract:

Big data is a collection of dataset so large and complex that it becomes difficult to process using data base management tools. To perform operations like search, analysis, visualization on big data by using data mining; which is the process of extraction of patterns or knowledge from large data set. In recent years, the data mining applications become stale and obsolete over time. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. This project uses i2MapReduce, an incremental processing extension to Map Reduce, the most widely used framework for mining big data. I2MapReduce performs key-value pair level incremental processing rather than task level re-computation, supports not only one-step computation but also more sophisticated iterative computation, which is widely used in data mining applications, and incorporates a set of novel techniques to reduce I/O overhead for accessing preserved fine-grain computation states. To optimize the mining results, evaluate i2MapReduce using a one-step algorithm and three iterative algorithms with diverse computation characteristics for efficient mining.

Keywords: big data, map reduce, incremental processing, iterative computation

Procedia PDF Downloads 322
24261 Analyzing Large Scale Recurrent Event Data with a Divide-And-Conquer Approach

Authors: Jerry Q. Cheng

Abstract:

Currently, in analyzing large-scale recurrent event data, there are many challenges such as memory limitations, unscalable computing time, etc. In this research, a divide-and-conquer method is proposed using parametric frailty models. Specifically, the data is randomly divided into many subsets, and the maximum likelihood estimator from each individual data set is obtained. Then a weighted method is proposed to combine these individual estimators as the final estimator. It is shown that this divide-and-conquer estimator is asymptotically equivalent to the estimator based on the full data. Simulation studies are conducted to demonstrate the performance of this proposed method. This approach is applied to a large real dataset of repeated heart failure hospitalizations.

Keywords: big data analytics, divide-and-conquer, recurrent event data, statistical computing

Procedia PDF Downloads 138
24260 Adoption of Big Data by Global Chemical Industries

Authors: Ashiff Khan, A. Seetharaman, Abhijit Dasgupta

Abstract:

The new era of big data (BD) is influencing chemical industries tremendously, providing several opportunities to reshape the way they operate and help them shift towards intelligent manufacturing. Given the availability of free software and the large amount of real-time data generated and stored in process plants, chemical industries are still in the early stages of big data adoption. The industry is just starting to realize the importance of the large amount of data it owns to make the right decisions and support its strategies. This article explores the importance of professional competencies and data science that influence BD in chemical industries to help it move towards intelligent manufacturing fast and reliable. This article utilizes a literature review and identifies potential applications in the chemical industry to move from conventional methods to a data-driven approach. The scope of this document is limited to the adoption of BD in chemical industries and the variables identified in this article. To achieve this objective, government, academia, and industry must work together to overcome all present and future challenges.

Keywords: chemical engineering, big data analytics, industrial revolution, professional competence, data science

Procedia PDF Downloads 57
24259 Secure Multiparty Computations for Privacy Preserving Classifiers

Authors: M. Sumana, K. S. Hareesha

Abstract:

Secure computations are essential while performing privacy preserving data mining. Distributed privacy preserving data mining involve two to more sites that cannot pool in their data to a third party due to the violation of law regarding the individual. Hence in order to model the private data without compromising privacy and information loss, secure multiparty computations are used. Secure computations of product, mean, variance, dot product, sigmoid function using the additive and multiplicative homomorphic property is discussed. The computations are performed on vertically partitioned data with a single site holding the class value.

Keywords: homomorphic property, secure product, secure mean and variance, secure dot product, vertically partitioned data

Procedia PDF Downloads 393