Search results for: retroreflective marker data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25245

Search results for: retroreflective marker data

24855 Generation of Quasi-Measurement Data for On-Line Process Data Analysis

Authors: Hyun-Woo Cho

Abstract:

For ensuring the safety of a manufacturing process one should quickly identify an assignable cause of a fault in an on-line basis. To this end, many statistical techniques including linear and nonlinear methods have been frequently utilized. However, such methods possessed a major problem of small sample size, which is mostly attributed to the characteristics of empirical models used for reference models. This work presents a new method to overcome the insufficiency of measurement data in the monitoring and diagnosis tasks. Some quasi-measurement data are generated from existing data based on the two indices of similarity and importance. The performance of the method is demonstrated using a real data set. The results turn out that the presented methods are able to handle the insufficiency problem successfully. In addition, it is shown to be quite efficient in terms of computational speed and memory usage, and thus on-line implementation of the method is straightforward for monitoring and diagnosis purposes.

Keywords: data analysis, diagnosis, monitoring, process data, quality control

Procedia PDF Downloads 477
24854 Subjective Time as a Marker of the Present Consciousness

Authors: Anastasiya Paltarzhitskaya

Abstract:

Subjective time plays an important role in consciousness processes and self-awareness at the moment. The concept of intrinsic neural timescales (INT) explains the difference in perceiving various time intervals. The capacity to experience the present builds on the fundamental properties of temporal cognition. The challenge that both philosophy and neuroscience try to answer is how the brain differentiates the present from the past and future. In our work, we analyze papers which describe mechanisms involved in the perception of ‘present’ and ‘non-present’, i.e., future and past moments. Taking into account that we perceive time intervals even during rest or relaxation, we suppose that the default-mode network activity can code time features, including the present moment. We can compare some results of time perceptual studies, where brain activity was shown in states with different flows of time, including resting states and during “mental time travel”. According to the concept of mental traveling, we employ a range of scenarios which demand episodic memory. However, some papers show that the hippocampal region does not activate during time traveling. It is a controversial result that is further complicated by the phenomenological aspect that includes a holistic set of information about the individual’s past and future.

Keywords: temporal consciousness, time perception, memory, present

Procedia PDF Downloads 72
24853 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 92
24852 Investigation of Suspected Viral Hepatitis Outbreaks in North India

Authors: Mini P. Singh, Manasi Majumdar, Kapil Goyal, Pvm Lakshmi, Deepak Bhatia, Radha Kanta Ratho

Abstract:

India is endemic for Hepatitis E virus and frequent water borne outbreaks are reported. The conventional diagnosis rests on the detection of serum anti-HEV IgM antibodies which may take 7-10 days to develop. Early diagnosis in such a situation is desirable for the initiation of prompt control measures. The present study compared three diagnostic methods in 60 samples collected during two suspected HEV outbreaks in the vicinity of Chandigarh, India. The anti-HEV IgM, HEV antigen and HEV-RNA could be detected in serum samples of 52 (86.66%), 16 (26.66%) and 18 (30%) patients respectively. The suitability of saliva samples for antibody detection was also evaluated in 21 paired serum- saliva samples. A total of 15 serum samples showed the presence of anti HEV IgM antibodies, out of which 10 (10/15; 66.6%) were also positive for these antibodies in saliva samples (χ2 = 7.636, p < 0.0057), thus showing a concordance of 76.91%. The positivity of reverse transcriptase PCR and HEV antigen detection was 100% within one week of illness which declined to 5-10% thereafter. The outbreak was attributed to HEV Genotype 1, Subtype 1a and the clinical and environmental strains clustered together. HEV antigen and RNA were found to be an early diagnostic marker with 96.66% concordance. The results indicate that the saliva samples can be used as an alternative to serum samples in an outbreak situation.

Keywords: HEV-antigen, outbreak, phylogenetic analysis, saliva

Procedia PDF Downloads 413
24851 Using Equipment Telemetry Data for Condition-Based maintenance decisions

Authors: John Q. Todd

Abstract:

Given that modern equipment can provide comprehensive health, status, and error condition data via built-in sensors, maintenance organizations have a new and valuable source of insight to take advantage of. This presentation will expose what these data payloads might look like and how they can be filtered, visualized, calculated into metrics, used for machine learning, and generate alerts for further action.

Keywords: condition based maintenance, equipment data, metrics, alerts

Procedia PDF Downloads 183
24850 The Change in the Temporomandibular Joint Bone in Osteoarthritis Induced Mice

Authors: Boonyalitpun P., Pruckpattranon P., Thonghom A., Rotpenpian N.

Abstract:

Osteoarthritis is a musculoskeletal and neuromuscular abnormality, masticatory muscle, and other tissue that causes pain and breaks down the articular surface of the temporomandibular joint (TMJ). The aim of this study is to investigate the change in the mandibular condyle, in terms of thickness and porosity, and osteoclast marker in the mandibular condyle of TMJ induced osteoarthritis mice (TMJ-OA mice). We investigated the bony changes in the TMJ structure of a complete Freund adjuvant (CFA)-injected TMJ in a mice model over 28 days. On day 28, we observed any change in the TMJ by a micro computed tomography scan (micro-CT scan) in the parameters of trabecular microarchitecture. Then we studied the thickness of the condyles by hematoxylin and eosin staining. Moreover, we calculated the area around the TMJ’s condylar head containing the osteoclast expression by TRAP (Tartrate-resistant acid phosphatase) immunohistochemistry staining. The result found that the parameter of a micro-CT scan was no different from microarchitecture in the TMJ compared with the control group; however, mandibular condyles of the TMJ-OA group was significantly thinner than the control groups, and the osteoclast expression significantly increased in the TMJ-OA group. Therefore, our findings suggest that CFA-induced TMJ-OA represents an expression of osteoclast mandibular condyle of the TMJ, which is the proposed mechanism for a TMJ-OA model.

Keywords: condyle, osteoarthritis, osteoclast, temporomandibular joint

Procedia PDF Downloads 92
24849 Effect of Ultrasound and Enzyme on the Extraction of Eurycoma longifolia (Tongkat Ali)

Authors: He Yuhai, Ahmad Ziad Bin Sulaiman

Abstract:

Tongkat Ali, or Eurycoma longifolia, is a traditional Malay and Orang Asli herb used as aphrodisiac, general tonic, anti-Malaria, and anti-Pyretic. It has been recognized as a cashcrop by Malaysia due to its high value for the pharmaceutical use. In Tongkat Ali, eurycomanone, a quassinoid is usually chosen as a marker phytochemical as it is the most abundant phytochemical. In this research, ultrasound and enzyme were used to enhance the extraction of Eurycomanone from Tongkat Ali. Ultrasonic assisted extraction (USE) enhances extraction by facilitating the swelling and hydration of the plant material, enlarging the plant pores, breaking the plant cell, reducing the plant particle size and creating cavitation bubbles that enhance mass transfer in both the washing and diffusion phase of extraction. Enzyme hydrolyses the cell wall of the plant, loosening the structure of the cell wall, releasing more phytochemicals from the plant cell, enhancing the productivity of the extraction. Possible effects of ultrasound on the activity of the enzyme during the hydrolysis of the cell wall is under the investigation by this research. The extracts was analysed by high performance liquid chromatography for the yields of Eurycomanone. In this whole process, the conventional water extraction was used as a control of comparing the performance of the ultrasound and enzyme assisted extraction.

Keywords: ultrasound, enzymatic, extraction, Eurycoma longifolia

Procedia PDF Downloads 415
24848 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 282
24847 Hybrid Reliability-Similarity-Based Approach for Supervised Machine Learning

Authors: Walid Cherif

Abstract:

Data mining has, over recent years, seen big advances because of the spread of internet, which generates everyday a tremendous volume of data, and also the immense advances in technologies which facilitate the analysis of these data. In particular, classification techniques are a subdomain of Data Mining which determines in which group each data instance is related within a given dataset. It is used to classify data into different classes according to desired criteria. Generally, a classification technique is either statistical or machine learning. Each type of these techniques has its own limits. Nowadays, current data are becoming increasingly heterogeneous; consequently, current classification techniques are encountering many difficulties. This paper defines new measure functions to quantify the resemblance between instances and then combines them in a new approach which is different from actual algorithms by its reliability computations. Results of the proposed approach exceeded most common classification techniques with an f-measure exceeding 97% on the IRIS Dataset.

Keywords: data mining, knowledge discovery, machine learning, similarity measurement, supervised classification

Procedia PDF Downloads 461
24846 Seismic Data Scaling: Uncertainties, Potential and Applications in Workstation Interpretation

Authors: Ankur Mundhra, Shubhadeep Chakraborty, Y. R. Singh, Vishal Das

Abstract:

Seismic data scaling affects the dynamic range of a data and with present day lower costs of storage and higher reliability of Hard Disk data, scaling is not suggested. However, in dealing with data of different vintages, which perhaps were processed in 16 bits or even 8 bits and are need to be processed with 32 bit available data, scaling is performed. Also, scaling amplifies low amplitude events in deeper region which disappear due to high amplitude shallow events that saturate amplitude scale. We have focused on significance of scaling data to aid interpretation. This study elucidates a proper seismic loading procedure in workstations without using default preset parameters as available in most software suites. Differences and distribution of amplitude values at different depth for seismic data are probed in this exercise. Proper loading parameters are identified and associated steps are explained that needs to be taken care of while loading data. Finally, the exercise interprets the un-certainties which might arise when correlating scaled and unscaled versions of seismic data with synthetics. As, seismic well tie correlates the seismic reflection events with well markers, for our study it is used to identify regions which are enhanced and/or affected by scaling parameter(s).

Keywords: clipping, compression, resolution, seismic scaling

Procedia PDF Downloads 465
24845 Aquaporin-1 as a Differential Marker in Toxicant-Induced Lung Injury

Authors: Ekta Yadav, Sukanta Bhattacharya, Brijesh Yadav, Ariel Hus, Jagjit Yadav

Abstract:

Background and Significance: Respiratory exposure to toxicants (chemicals or particulates) causes disruption of lung homeostasis leading to lung toxicity/injury manifested as pulmonary inflammation, edema, and/or other effects depending on the type and extent of exposure. This emphasizes the need for investigating toxicant type-specific mechanisms to understand therapeutic targets. Aquaporins, aka water channels, are known to play a role in lung homeostasis. Particularly, the two major lung aquaporins AQP5 and AQP1 expressed in alveolar epithelial and vasculature endothelia respectively allow for movement of the fluid between the alveolar air space and the associated vasculature. In view of this, the current study is focused on understanding the regulation of lung aquaporins and other targets during inhalation exposure to toxic chemicals (Cigarette smoke chemicals) versus toxic particles (Carbon nanoparticles) or co-exposures to understand their relevance as markers of injury and intervention. Methodologies: C57BL/6 mice (5-7 weeks old) were used in this study following an approved protocol by the University of Cincinnati Institutional Animal Care and Use Committee (IACUC). The mice were exposed via oropharyngeal aspiration to multiwall carbon nanotube (MWCNT) particles suspension once (33 ugs/mouse) followed by housing for four weeks or to Cigarette smoke Extract (CSE) using a daily dose of 30µl/mouse for four weeks, or to co-exposure using the combined regime. Control groups received vehicles following the same dosing schedule. Lung toxicity/injury was assessed in terms of homeostasis changes in the lung tissue and lumen. Exposed lungs were analyzed for transcriptional expression of specific targets (AQPs, surfactant protein A, Mucin 5b) in relation to tissue homeostasis. Total RNA from lungs extracted using TRIreagent kit was analyzed using qRT-PCR based on gene-specific primers. Total protein in bronchoalveolar lavage (BAL) fluid was determined by the DC protein estimation kit (BioRad). GraphPad Prism 5.0 (La Jolla, CA, USA) was used for all analyses. Major findings: CNT exposure alone or as co-exposure with CSE increased the total protein content in the BAL fluid (lung lumen rinse), implying compromised membrane integrity and cellular infiltration in the lung alveoli. In contrast, CSE showed no significant effect. AQP1, required for water transport across membranes of endothelial cells in lungs, was significantly upregulated in CNT exposure but downregulated in CSE exposure and showed an intermediate level of expression for the co-exposure group. Both CNT and CSE exposures had significant downregulating effects on Muc5b, and SP-A expression and the co-exposure showed either no significant effect (Muc5b) or significant downregulating effect (SP-A), suggesting an increased propensity for infection in the exposed lungs. Conclusions: The current study based on the lung toxicity mouse model showed that both toxicant types, particles (CNT) versus chemicals (CSE), cause similar downregulation of lung innate defense targets (SP-A, Muc5b) and mostly a summative effect when presented as co-exposure. However, the two toxicant types show differential induction of aquaporin-1 coinciding with the corresponding differential damage to alveolar integrity (vascular permeability). Interestingly, this implies the potential of AQP1 as a differential marker of toxicant type-specific lung injury.

Keywords: aquaporin, gene expression, lung injury, toxicant exposure

Procedia PDF Downloads 179
24844 Association of Social Data as a Tool to Support Government Decision Making

Authors: Diego Rodrigues, Marcelo Lisboa, Elismar Batista, Marcos Dias

Abstract:

Based on data on child labor, this work arises questions about how to understand and locate the factors that make up the child labor rates, and which properties are important to analyze these cases. Using data mining techniques to discover valid patterns on Brazilian social databases were evaluated data of child labor in the State of Tocantins (located north of Brazil with a territory of 277000 km2 and comprises 139 counties). This work aims to detect factors that are deterministic for the practice of child labor and their relationships with financial indicators, educational, regional and social, generating information that is not explicit in the government database, thus enabling better monitoring and updating policies for this purpose.

Keywords: social data, government decision making, association of social data, data mining

Procedia PDF Downloads 366
24843 Outlier Detection in Stock Market Data using Tukey Method and Wavelet Transform

Authors: Sadam Alwadi

Abstract:

Outlier values become a problem that frequently occurs in the data observation or recording process. Thus, the need for data imputation has become an essential matter. In this work, it will make use of the methods described in the prior work to detect the outlier values based on a collection of stock market data. In order to implement the detection and find some solutions that maybe helpful for investors, real closed price data were obtained from the Amman Stock Exchange (ASE). Tukey and Maximum Overlapping Discrete Wavelet Transform (MODWT) methods will be used to impute the detect the outlier values.

Keywords: outlier values, imputation, stock market data, detecting, estimation

Procedia PDF Downloads 79
24842 Prevalence of Microalbuminuria and Its Relation with Various Risk Factors in Type 1 Diabetes Mellitus

Authors: Singh Baljinder, Sharma Navneet

Abstract:

Microalbuminuria is the earliest detectable marker of diabetic nephropathy. We planned to evaluate the prevalence of microalbuminuria in type 1 diabetics and correlate with various risk factor. We randomly selected 100 type 1 diabetic patients after inclusion and exclusion criteria from DCRC, S. P. Medical College, Bikaner. Clinical examinations for anthropometeric parameters, hypertension, retinopathy, glycaemic status, lipid profile were done and microalbuminuria was estimated by micral test. Microalbuminuria was seen in 38% patients. The mean urinary albumin concentration was 96.61 mg/l in microalbuminuria positive cases, 134 mg/L in hypertensive patients while 74.5 mg/L in normal patients. Mean diabetic duration was 6.43 years in microalbuminurics. Albumin excretion increased significantly with age at onset of 10-18 years and declined thereafter. Microalbuminuria cases exhibited mean cholesterol 181.63 mg%, TG 130.94 mg%, LDL 109.87 mg%, HDL 57.5 mg% and VLDL 30.64 mg%. Mean urinary albumin concentration in patients with retinopathy was 160.52 mg/L while 78.66 mg/L without retinopathy. In multiple stepwise logistic regression analysis, a strong positive association was seen between microalbuminuria and hypertension (OR=5.087, CI=2.1319-12.101), fasting blood sugar (OR=3. 491, CI=1.138-10.70), duration of diabetes (OR=3.41, CI=1.360-8.55) and HbA1c (OR=2.381, CI-=1.1-5.64). The present study indicates that microalbuminuria is a common complication of type 1 diabetes mellitus and can be prevented by careful management of risk factors.

Keywords: type 1 diabetes, microalbuminuria, diabetic nephropathy, retinopathy, hypertension

Procedia PDF Downloads 444
24841 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 290
24840 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework

Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe

Abstract:

This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.

Keywords: IoT, fog, cloud, data analysis, data privacy

Procedia PDF Downloads 94
24839 Cellulose Acetate Nanofiber Modification for Regulating Astrocyte Activity via Simple Heat Treatment

Authors: Sang-Myung Jung, Jeong Hyun Ju, Gwang Heum Yoon, Hwa Sung Shin

Abstract:

Central nervous system (CNS) consists of neuronal cell and supporting cells. Astrocytes are the most common supporting cells and play roles in metabolism between neurons and blood vessel. For this function, engineered astrocytes have been studied as a therapeutic source for CNS injury. In neural tissue engineering, nanofiber has been suggested as an effective scaffold for providing structure and mechanical properties influencing physiology. Cellulose acetate (CA) has been investigated for material to fabricate scaffold because of its biocompatibility, biodegradability and fine thermal stability. In this research, CA nanofiber was modified via heat treatment and its effect on astrocyte activity was evaluated. Adhesion and viability of astrocyte were increased in proportion to stiffness. Additionally, expression of GFAP, a marker of astrocyte activation, was increased via stiffness of scaffold. This research suggests a simple modification method to change stiffness of CA nanofiber and shows cellular behavior affecting stiffness of three-dimensional scaffold independently. For the results, we highlight that the stiffness is a factor to regulate astrocyte activity.

Keywords: astrocyte, cellulose acetate, cell therapy, stiffness of scaffold

Procedia PDF Downloads 474
24838 Comparison of Selected Pier-Scour Equations for Wide Piers Using Field Data

Authors: Nordila Ahmad, Thamer Mohammad, Bruce W. Melville, Zuliziana Suif

Abstract:

Current methods for predicting local scour at wide bridge piers, were developed on the basis of laboratory studies and very limited scour prediction were tested with field data. Laboratory wide pier scour equation from previous findings with field data were presented. A wide range of field data were used and it consists of both live-bed and clear-water scour. A method for assessing the quality of the data was developed and applied to the data set. Three other wide pier-scour equations from the literature were used to compare the performance of each predictive method. The best-performing scour equation were analyzed using statistical analysis. Comparisons of computed and observed scour depths indicate that the equation from the previous publication produced the smallest discrepancy ratio and RMSE value when compared with the large amount of laboratory and field data.

Keywords: field data, local scour, scour equation, wide piers

Procedia PDF Downloads 402
24837 The Maximum Throughput Analysis of UAV Datalink 802.11b Protocol

Authors: Inkyu Kim, SangMan Moon

Abstract:

This IEEE 802.11b protocol provides up to 11Mbps data rate, whereas aerospace industry wants to seek higher data rate COTS data link system in the UAV. The Total Maximum Throughput (TMT) and delay time are studied on many researchers in the past years This paper provides theoretical data throughput performance of UAV formation flight data link using the existing 802.11b performance theory. We operate the UAV formation flight with more than 30 quad copters with 802.11b protocol. We may be predicting that UAV formation flight numbers have to bound data link protocol performance limitations.

Keywords: UAV datalink, UAV formation flight datalink, UAV WLAN datalink application, UAV IEEE 802.11b datalink application

Procedia PDF Downloads 388
24836 Methods for Distinction of Cattle Using Supervised Learning

Authors: Radoslav Židek, Veronika Šidlová, Radovan Kasarda, Birgit Fuerst-Waltl

Abstract:

Machine learning represents a set of topics dealing with the creation and evaluation of algorithms that facilitate pattern recognition, classification, and prediction, based on models derived from existing data. The data can present identification patterns which are used to classify into groups. The result of the analysis is the pattern which can be used for identification of data set without the need to obtain input data used for creation of this pattern. An important requirement in this process is careful data preparation validation of model used and its suitable interpretation. For breeders, it is important to know the origin of animals from the point of the genetic diversity. In case of missing pedigree information, other methods can be used for traceability of animal´s origin. Genetic diversity written in genetic data is holding relatively useful information to identify animals originated from individual countries. We can conclude that the application of data mining for molecular genetic data using supervised learning is an appropriate tool for hypothesis testing and identifying an individual.

Keywords: genetic data, Pinzgau cattle, supervised learning, machine learning

Procedia PDF Downloads 543
24835 Router 1X3 - RTL Design and Verification

Authors: Nidhi Gopal

Abstract:

Routing is the process of moving a packet of data from source to destination and enables messages to pass from one computer to another and eventually reach the target machine. A router is a networking device that forwards data packets between computer networks. It is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). This paper mainly emphasizes upon the study of router device, its top level architecture, and how various sub-modules of router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top module.

Keywords: data packets, networking, router, routing

Procedia PDF Downloads 805
24834 Decreased Autophagy Contributes to Senescence Induction in HS68 Cells

Authors: Byeal-I Han, Michael Lee

Abstract:

Ageing is associated with an increased risk of diseases such as cancer, and neurodegenerative disorders. Increased autophagy delays ageing and extends longevity. In this study, we investigated the role of autophagy in longevity using human foreskin fibroblast HS68 cells, in which a senescence-like growth arrest can be induced. In particular, cellular senescence is manifested by the irreversible cell cycle arrest, and may contribute to the ageing of organisms. The senescence state was measured with staining for senescence-associated β-galactosidase (SA-β-gal) activity that represents a sensitive and reliable marker to quantify senescent cells. We detected a significantly increased percentage (%) of SA-β-gal positive cells in HS68 cultures at passage 40 (63%) when compared with younger ones at passage 15 (0.5%). As expected, HS68 cells at passage 40 exhibited much lower proliferation rate than cells at passage 15. The basal levels of LC3 were measured by immunoblotting showing a comparison of LC3-I and LC3-II levels at 3 age-points in serially passaged HS68 cells. LC3-II/LC3-I ratio at different passage levels relative to β-actin levels of each band confirmed that cells at passage 34 showed lower conversion of non-autophagic LC3-I to autophagic LC3-II than the cells at passage 16. Furthermore, Cyto-ID autophagy assay also revealed that late passage cells showed lower autophagy than the early passage cells. Together, our findings suggest that senescence induction might be associated with decreased autophagy.

Keywords: ageing, autophagy, senescence, HS68

Procedia PDF Downloads 252
24833 Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests

Authors: Julius Onyancha, Valentina Plekhanova

Abstract:

One of the significant issues facing web users is the amount of noise in web data which hinders the process of finding useful information in relation to their dynamic interests. Current research works consider noise as any data that does not form part of the main web page and propose noise web data reduction tools which mainly focus on eliminating noise in relation to the content and layout of web data. This paper argues that not all data that form part of the main web page is of a user interest and not all noise data is actually noise to a given user. Therefore, learning of noise web data allocated to the user requests ensures not only reduction of noisiness level in a web user profile, but also a decrease in the loss of useful information hence improves the quality of a web user profile. Noise Web Data Learning (NWDL) tool/algorithm capable of learning noise web data in web user profile is proposed. The proposed work considers elimination of noise data in relation to dynamic user interest. In order to validate the performance of the proposed work, an experimental design setup is presented. The results obtained are compared with the current algorithms applied in noise web data reduction process. The experimental results show that the proposed work considers the dynamic change of user interest prior to elimination of noise data. The proposed work contributes towards improving the quality of a web user profile by reducing the amount of useful information eliminated as noise.

Keywords: web log data, web user profile, user interest, noise web data learning, machine learning

Procedia PDF Downloads 261
24832 Data Mining and Knowledge Management Application to Enhance Business Operations: An Exploratory Study

Authors: Zeba Mahmood

Abstract:

The modern business organizations are adopting technological advancement to achieve competitive edge and satisfy their consumer. The development in the field of Information technology systems has changed the way of conducting business today. Business operations today rely more on the data they obtained and this data is continuously increasing in volume. The data stored in different locations is difficult to find and use without the effective implementation of Data mining and Knowledge management techniques. Organizations who smartly identify, obtain and then convert data in useful formats for their decision making and operational improvements create additional value for their customers and enhance their operational capabilities. Marketers and Customer relationship departments of firm use Data mining techniques to make relevant decisions, this paper emphasizes on the identification of different data mining and Knowledge management techniques that are applied to different business industries. The challenges and issues of execution of these techniques are also discussed and critically analyzed in this paper.

Keywords: knowledge, knowledge management, knowledge discovery in databases, business, operational, information, data mining

Procedia PDF Downloads 531
24831 Indexing and Incremental Approach Using Map Reduce Bipartite Graph (MRBG) for Mining Evolving Big Data

Authors: Adarsh Shroff

Abstract:

Big data is a collection of dataset so large and complex that it becomes difficult to process using data base management tools. To perform operations like search, analysis, visualization on big data by using data mining; which is the process of extraction of patterns or knowledge from large data set. In recent years, the data mining applications become stale and obsolete over time. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. This project uses i2MapReduce, an incremental processing extension to Map Reduce, the most widely used framework for mining big data. I2MapReduce performs key-value pair level incremental processing rather than task level re-computation, supports not only one-step computation but also more sophisticated iterative computation, which is widely used in data mining applications, and incorporates a set of novel techniques to reduce I/O overhead for accessing preserved fine-grain computation states. To optimize the mining results, evaluate i2MapReduce using a one-step algorithm and three iterative algorithms with diverse computation characteristics for efficient mining.

Keywords: big data, map reduce, incremental processing, iterative computation

Procedia PDF Downloads 345
24830 Degemination in Emirati Pidgin Arabic: A Sociolinguistic Perspective

Authors: Abdel Rahman Mitib Altakhaineh, Abdul Salam Mohamad Alnamer, Sulafah Abdul Salam Alnamer

Abstract:

This study examines the production of gemination in Emirati Pidgin Arabic (EPA) spoken by blue-collar workers in the United Arab Emirates (UAE). A simple naming test was designed to test the production of geminates and a follow-up discussion was conducted with some of the participants to obtain the complementary qualitative analysis. The goal of the test was to determine whether the EPA speakers would produce a geminated or degeminated phoneme. A semi-structured interview was conducted with a subset of the study cohort to obtain participants’ own explanation where they degeminated the consonants. Our findings suggest that the exercising of this choice functions as a sociolinguistic strategy in a similar manner to that observed by Labov in his study of Martha’s Vineyard. The findings also show that speakers of EPA are inclined to degeminate consonantal geminates to establish themselves as members of a particular social group. Reasons for wanting to achieve this aim were given as: to claim privileges only available to members of this group (such as employment) and to distinguish themselves from the dominant cultural group. The study concludes that degemination in EPA has developed into a sociolinguistic solidarity marker.

Keywords: sociolinguistics, morphophonology, degemination, solidarity, Emirati pidgin Arabic

Procedia PDF Downloads 208
24829 Analyzing Large Scale Recurrent Event Data with a Divide-And-Conquer Approach

Authors: Jerry Q. Cheng

Abstract:

Currently, in analyzing large-scale recurrent event data, there are many challenges such as memory limitations, unscalable computing time, etc. In this research, a divide-and-conquer method is proposed using parametric frailty models. Specifically, the data is randomly divided into many subsets, and the maximum likelihood estimator from each individual data set is obtained. Then a weighted method is proposed to combine these individual estimators as the final estimator. It is shown that this divide-and-conquer estimator is asymptotically equivalent to the estimator based on the full data. Simulation studies are conducted to demonstrate the performance of this proposed method. This approach is applied to a large real dataset of repeated heart failure hospitalizations.

Keywords: big data analytics, divide-and-conquer, recurrent event data, statistical computing

Procedia PDF Downloads 161
24828 Adoption of Big Data by Global Chemical Industries

Authors: Ashiff Khan, A. Seetharaman, Abhijit Dasgupta

Abstract:

The new era of big data (BD) is influencing chemical industries tremendously, providing several opportunities to reshape the way they operate and help them shift towards intelligent manufacturing. Given the availability of free software and the large amount of real-time data generated and stored in process plants, chemical industries are still in the early stages of big data adoption. The industry is just starting to realize the importance of the large amount of data it owns to make the right decisions and support its strategies. This article explores the importance of professional competencies and data science that influence BD in chemical industries to help it move towards intelligent manufacturing fast and reliable. This article utilizes a literature review and identifies potential applications in the chemical industry to move from conventional methods to a data-driven approach. The scope of this document is limited to the adoption of BD in chemical industries and the variables identified in this article. To achieve this objective, government, academia, and industry must work together to overcome all present and future challenges.

Keywords: chemical engineering, big data analytics, industrial revolution, professional competence, data science

Procedia PDF Downloads 81
24827 Secure Multiparty Computations for Privacy Preserving Classifiers

Authors: M. Sumana, K. S. Hareesha

Abstract:

Secure computations are essential while performing privacy preserving data mining. Distributed privacy preserving data mining involve two to more sites that cannot pool in their data to a third party due to the violation of law regarding the individual. Hence in order to model the private data without compromising privacy and information loss, secure multiparty computations are used. Secure computations of product, mean, variance, dot product, sigmoid function using the additive and multiplicative homomorphic property is discussed. The computations are performed on vertically partitioned data with a single site holding the class value.

Keywords: homomorphic property, secure product, secure mean and variance, secure dot product, vertically partitioned data

Procedia PDF Downloads 408
24826 MICA-TM Peptide Selectively Binds to HLAs Associated with Behçet's Disease

Authors: Sirilak Kongkaew, Pathumwadee Yodmanee, Nopporn Kaiyawet, Arthitaya Meeprasert, Thanyada Rungrotmongkol, Toshikatsu Kaburaki, Hiroshi Noguchi, Fujio Takeuch, Nawee Kungwan, Supot Hannongbua

Abstract:

Behçet’s disease (BD) is a genetic autoimmune expressed by multisystemic inflammatory disorder mostly occurred at the skin, joints, gastrointestinal tract, and genitalia, including ocular, oral, genital, and central nervous systems. Most BD patients in Japan and Korea were strongly indicated by the genetic factor namely HLA-B*51 (especially, HLA-B*51:01) marker in HMC class I, while HLA-A*26:01 allele has been detected from the BD patients in Greek, Japan, and Taiwan. To understand the selective binding of the MICA-TM peptide towards the HLAs associated with BD, the molecular dynamics simulations were applied on the four HLA alleles (B*51:01, B*35:01, A*26:01, and A*11:01) in complex with such peptide. As a result, the key residues in the binding groove of HLA protein which play an important role in the MICA-TM peptide binding and stabilization were revealed. The Van der Waals force was found to be the main protein-protein interaction. Based on the binding free energy prediction by MM/PBSA method, the MICA-TM peptide interacted stronger to the HLA alleles associated to BD in the identical class by 7-12 kcal/mol. The obtained results from the present study could help to differentiate the HLA alleles and explain a source of Behçet’s disease.

Keywords: Behçet’s disease, MD simulations, HMC class I, autoimmune

Procedia PDF Downloads 391