Search results for: big data interpretation
25364 The Economic Limitations of Defining Data Ownership Rights
Authors: Kacper Tomasz Kröber-Mulawa
Abstract:
This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.Keywords: antitrust, data, data ownership, digital economy, property rights
Procedia PDF Downloads 8225363 Protecting the Cloud Computing Data Through the Data Backups
Authors: Abdullah Alsaeed
Abstract:
Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.
Procedia PDF Downloads 8725362 Missing Link Data Estimation with Recurrent Neural Network: An Application Using Speed Data of Daegu Metropolitan Area
Authors: JaeHwan Yang, Da-Woon Jeong, Seung-Young Kho, Dong-Kyu Kim
Abstract:
In terms of ITS, information on link characteristic is an essential factor for plan or operation. But in practical cases, not every link has installed sensors on it. The link that does not have data on it is called “Missing Link”. The purpose of this study is to impute data of these missing links. To get these data, this study applies the machine learning method. With the machine learning process, especially for the deep learning process, missing link data can be estimated from present link data. For deep learning process, this study uses “Recurrent Neural Network” to take time-series data of road. As input data, Dedicated Short-range Communications (DSRC) data of Dalgubul-daero of Daegu Metropolitan Area had been fed into the learning process. Neural Network structure has 17 links with present data as input, 2 hidden layers, for 1 missing link data. As a result, forecasted data of target link show about 94% of accuracy compared with actual data.Keywords: data estimation, link data, machine learning, road network
Procedia PDF Downloads 51025361 Customer Data Analysis Model Using Business Intelligence Tools in Telecommunication Companies
Authors: Monica Lia
Abstract:
This article presents a customer data analysis model using business intelligence tools for data modelling, transforming, data visualization and dynamic reports building. Economic organizational customer’s analysis is made based on the information from the transactional systems of the organization. The paper presents how to develop the data model starting for the data that companies have inside their own operational systems. The owned data can be transformed into useful information about customers using business intelligence tool. For a mature market, knowing the information inside the data and making forecast for strategic decision become more important. Business Intelligence tools are used in business organization as support for decision-making.Keywords: customer analysis, business intelligence, data warehouse, data mining, decisions, self-service reports, interactive visual analysis, and dynamic dashboards, use cases diagram, process modelling, logical data model, data mart, ETL, star schema, OLAP, data universes
Procedia PDF Downloads 43025360 Support Provided by Midwives to Women during Labour in a Public Hospital, Limpopo Province, South Africa: A Participant Observation Study
Authors: Sonto Maputle
Abstract:
Background: Support during labour increase women's chances of having positive childbirth experiences as well as childbirth outcomes. The purpose of this study was to determine the support provided by midwives to women during labour at the public hospital in Limpopo Province. The study was conducted at the Tertiary hospital in Limpopo Province. Methods: A qualitative, participant observation approach was used. Population consisted of all women that were admitted to deliver their babies and the midwives who provided midwifery care in the obstetric unit of one tertiary public hospital in Limpopo Province. Non-probability, purposive and convenience sampling were used to sample 24 women and 12 midwives. Data were collected through participant observations which included unstructured conversations with the use of observational guide, field notes of events and conversations that occurred when women interact with midwives were recorded verbatim and a Visual Analog Scale to complement the observations. Data was analysed qualitatively but were presented in the tables and bar graphs. Results: Five themes emerged as support provided by midwives during labour, namely; communication between women and midwives, informational support, emotional support activities, interpretation of the experienced labour pain and supportive care activities during labour. Conclusion: The communication was occurring when the midwife was rendering midwifery care and very limited for empowering. The information sharing focused on the assistive actions rather than on the activities that would promote mothers’ participation. The emotional support activities indicated lack of respect and disregard cultural preferences and this contributed to inability to exercise choices in decision-making. The study recommended the implementation of Batho Pele principles in order to provide woman-centred care during labour.Keywords: communication between women and midwives, labour pains, informational and emotional support, physical comforting measures
Procedia PDF Downloads 15225359 Socio-Religious Mythology of the Igala of Central Nigeria Area
Authors: Abdullahi Musa Yusuf
Abstract:
Culture and traditions are an embodiment of every society. In Africa, people are socialized into believing that the world is full of mysteries. Mysteries that can only be explain through the interpretation of some forces which are ordinarily beyond the comprehension of Man. These forces have the power and capability of influencing the lives of the living either benevolently or malevolently. To decipher these mysteries various religious and cultural practices were evolved. This paper is therefore an attempt to explain the traditional religious belief system and the relationship existing between the forces of the living and dead among the Igala people of the Central Nigeria Region.Keywords: culture, tradition, mythology, Nigeria
Procedia PDF Downloads 60525358 Analysis of a IncResU-Net Model for R-Peak Detection in ECG Signals
Authors: Beatriz Lafuente Alcázar, Yash Wani, Amit J. Nimunkar
Abstract:
Cardiovascular Diseases (CVDs) are the leading cause of death globally, and around 80% of sudden cardiac deaths are due to arrhythmias or irregular heartbeats. The majority of these pathologies are revealed by either short-term or long-term alterations in the electrocardiogram (ECG) morphology. The ECG is the main diagnostic tool in cardiology. It is a non-invasive, pain free procedure that measures the heart’s electrical activity and that allows the detecting of abnormal rhythms and underlying conditions. A cardiologist can diagnose a wide range of pathologies based on ECG’s form alterations, but the human interpretation is subjective and it is contingent to error. Moreover, ECG records can be quite prolonged in time, which can further complicate visual diagnosis, and deeply retard disease detection. In this context, deep learning methods have risen as a promising strategy to extract relevant features and eliminate individual subjectivity in ECG analysis. They facilitate the computation of large sets of data and can provide early and precise diagnoses. Therefore, the cardiology field is one of the areas that can most benefit from the implementation of deep learning algorithms. In the present study, a deep learning algorithm is trained following a novel approach, using a combination of different databases as the training set. The goal of the algorithm is to achieve the detection of R-peaks in ECG signals. Its performance is further evaluated in ECG signals with different origins and features to test the model’s ability to generalize its outcomes. Performance of the model for detection of R-peaks for clean and noisy ECGs is presented. The model is able to detect R-peaks in the presence of various types of noise, and when presented with data, it has not been trained. It is expected that this approach will increase the effectiveness and capacity of cardiologists to detect divergences in the normal cardiac activity of their patients.Keywords: arrhythmia, deep learning, electrocardiogram, machine learning, R-peaks
Procedia PDF Downloads 18625357 Microfacies and Sedimentary Environment of Potentially Hydrocarbon-Bearing Ordovician and Silurian Deposits of Selected Boreholes in the Baltic Syneclise (NE Poland)
Authors: Katarzyna Sobczak
Abstract:
Over the last few years extensive research on the Lower Palaeozic of the Baltic region has been carried out, associated with growing interest in the unconventional hydrocarbon resources of the area. The present study contributes to this investigation by providing relevant microfacies analysis of Ordovician and Silurian carbonate and clastic deposits of the Polish part of the Baltic Syneclise, using data from the Kętrzyn IG-1, Henrykowo 1 and Babiak 1 boreholes. The analytical data, encompassing sedimentological, palaeontological, and petrographic indicators enables the interpretation of the sedimentary environments and their control factors. The main microfacies types distinguished within the studied interval are: bioclastic wackestone, bioclastic packstone, carbonate-rich mudstone, marlstone, nodular limestone and bituminous claystone. The Ordovician is represented by redeposited carbonate rocks formed in a relatively high-energy environment (middle shelf setting). The Upper Ordovician-Lower Silurian rocks of the studied basin represent sedimentary succession formed during a distinctive marine transgression. Considering the sedimentological and petrological data from the Silurian, a low-energy sedimentary environment (offshore setting) with intermittent high-energy events (tempestites) can be inferred for the sedimentary basin of NE Poland. Slow sedimentation of carbonate ooze and fine-grained siliciclastic rocks, formed under oxygen-deficient conditions of the seabed, favoured organic matter preservation. The presence of the storm beds suggests an episodic nature of seabed oxygenation. A significant part of the analysed depositional successions shows characteristics indicative of deposition from gravity flows, but lacks evidence of its turbidity origins. There is, however, evidence for storms acting as a mechanism of flow activation. The discussed Ordovician-Silurian transition of depositional environments in the Baltic area fits well to the global environmental changes encompassing the Upper Ordovician and the Lower Silurian.Keywords: Baltic Syneclise, microfacies analysis, Ordovician, Silurian, unconventional hydrocarbons
Procedia PDF Downloads 43325356 Image Segmentation Techniques: Review
Authors: Lindani Mbatha, Suvendi Rimer, Mpho Gololo
Abstract:
Image segmentation is the process of dividing an image into several sections, such as the object's background and the foreground. It is a critical technique in both image-processing tasks and computer vision. Most of the image segmentation algorithms have been developed for gray-scale images and little research and algorithms have been developed for the color images. Most image segmentation algorithms or techniques vary based on the input data and the application. Nearly all of the techniques are not suitable for noisy environments. Most of the work that has been done uses the Markov Random Field (MRF), which involves the computations and is said to be robust to noise. In the past recent years' image segmentation has been brought to tackle problems such as easy processing of an image, interpretation of the contents of an image, and easy analysing of an image. This article reviews and summarizes some of the image segmentation techniques and algorithms that have been developed in the past years. The techniques include neural networks (CNN), edge-based techniques, region growing, clustering, and thresholding techniques and so on. The advantages and disadvantages of medical ultrasound image segmentation techniques are also discussed. The article also addresses the applications and potential future developments that can be done around image segmentation. This review article concludes with the fact that no technique is perfectly suitable for the segmentation of all different types of images, but the use of hybrid techniques yields more accurate and efficient results.Keywords: clustering-based, convolution-network, edge-based, region-growing
Procedia PDF Downloads 9725355 Alteration Quartz-Kfeldspar-Apatite-Molybdenite at B Anomaly Prospection with Artificial Neural Network to Determining Molydenite Economic Deposits in Malala District, Western Sulawesi
Authors: Ahmad Lutfi, Nikolas Dhega
Abstract:
The Malala deposit in northwest Sulawesi is the only known porphyry molybdenum and the only source for rhenium, occurrence in Indonesia. The neural network method produces results that correspond very closely to those of the knowledge-based fuzzy logic method and weights of evidence method. This method required data of solid geology, regional faults, airborne magnetic, gamma-ray survey data and GIS data. This interpretation of the network output fits with the intuitive notion that a prospective area has characteristics that closely resemble areas known to contain mineral deposits. Contrasts with the weights of evidence and fuzzy logic methods, where, for a given grid location, each input-parameter value automatically results in an increase in the prospective estimated. Malala District indicated molybdenum anomalies in stream sediments from in excess of 15 km2 were obtained, including the Takudan Fault as most prominent structure with striking 40̊ to 60̊ over a distance of about 30 km and in most places weakly at anomaly B, developed over an area of 4 km2, with a ‘shell’ up to 50 m thick at the intrusive contact with minor mineralization occurring in the Tinombo Formation. Series of NW trending, steeply dipping fracture zones, named the East Zone has an estimated resource of 100 Mt at 0.14% MoS2 and minimum target of 150 Mt 0.25%. The Malala porphyries occur as stocks and dykes with predominantly granitic, with fluorine-poor class of molybdenum deposits and belongs to the plutonic sub-type. Unidirectional solidification textures consisting of subparallel, crenulated layers of quartz that area separated by layers of intrusive material textures. The deuteric nature of the molybdenum mineralization and the dominance of carbonate alteration.The nature of the Stage I with alteration barren quartz K‐feldspar; and Stage II with alteration quartz‐K‐feldspar‐apatite-molybdenite veins combined with the presence of disseminated molybdenite with primary biotite in the host intrusive.Keywords: molybdenite, Malala, porphyries, anomaly B
Procedia PDF Downloads 15325354 Different Data-Driven Bivariate Statistical Approaches to Landslide Susceptibility Mapping (Uzundere, Erzurum, Turkey)
Authors: Azimollah Aleshzadeh, Enver Vural Yavuz
Abstract:
The main goal of this study is to produce landslide susceptibility maps using different data-driven bivariate statistical approaches; namely, entropy weight method (EWM), evidence belief function (EBF), and information content model (ICM), at Uzundere county, Erzurum province, in the north-eastern part of Turkey. Past landslide occurrences were identified and mapped from an interpretation of high-resolution satellite images, and earlier reports as well as by carrying out field surveys. In total, 42 landslide incidence polygons were mapped using ArcGIS 10.4.1 software and randomly split into a construction dataset 70 % (30 landslide incidences) for building the EWM, EBF, and ICM models and the remaining 30 % (12 landslides incidences) were used for verification purposes. Twelve layers of landslide-predisposing parameters were prepared, including total surface radiation, maximum relief, soil groups, standard curvature, distance to stream/river sites, distance to the road network, surface roughness, land use pattern, engineering geological rock group, topographical elevation, the orientation of slope, and terrain slope gradient. The relationships between the landslide-predisposing parameters and the landslide inventory map were determined using different statistical models (EWM, EBF, and ICM). The model results were validated with landslide incidences, which were not used during the model construction. In addition, receiver operating characteristic curves were applied, and the area under the curve (AUC) was determined for the different susceptibility maps using the success (construction data) and prediction (verification data) rate curves. The results revealed that the AUC for success rates are 0.7055, 0.7221, and 0.7368, while the prediction rates are 0.6811, 0.6997, and 0.7105 for EWM, EBF, and ICM models, respectively. Consequently, landslide susceptibility maps were classified into five susceptibility classes, including very low, low, moderate, high, and very high. Additionally, the portion of construction and verification landslides incidences in high and very high landslide susceptibility classes in each map was determined. The results showed that the EWM, EBF, and ICM models produced satisfactory accuracy. The obtained landslide susceptibility maps may be useful for future natural hazard mitigation studies and planning purposes for environmental protection.Keywords: entropy weight method, evidence belief function, information content model, landslide susceptibility mapping
Procedia PDF Downloads 13225353 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java
Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah
Abstract:
Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.Keywords: exploitation, home batik industry, occupational health and safety, putting-out system
Procedia PDF Downloads 31725352 Opening up Government Datasets for Big Data Analysis to Support Policy Decisions
Authors: K. Hardy, A. Maurushat
Abstract:
Policy makers are increasingly looking to make evidence-based decisions. Evidence-based decisions have historically used rigorous methodologies of empirical studies by research institutes, as well as less reliable immediate survey/polls often with limited sample sizes. As we move into the era of Big Data analytics, policy makers are looking to different methodologies to deliver reliable empirics in real-time. The question is not why did these people do this for the last 10 years, but why are these people doing this now, and if the this is undesirable, and how can we have an impact to promote change immediately. Big data analytics rely heavily on government data that has been released in to the public domain. The open data movement promises greater productivity and more efficient delivery of services; however, Australian government agencies remain reluctant to release their data to the general public. This paper considers the barriers to releasing government data as open data, and how these barriers might be overcome.Keywords: big data, open data, productivity, data governance
Procedia PDF Downloads 37125351 Literary Interpretation and Systematic-Structural Analysis of the Titles of the Works “The Day Lasts More than a Hundred Years”, “Doomsday”
Authors: Bahor Bahriddinovna Turaeva
Abstract:
The article provides a structural analysis of the titles of the famous Kyrgyz writer Chingiz Aitmatov’s creative works “The Day Lasts More Than a Hundred Years”, “Doomsday”. The author’s creative purpose in naming the work of art, the role of the elements of the plot, and the composition of the novels in revealing the essence of the title are explained. The criteria that are important in naming the author’s works in different genres are classified, and the titles that mean artistic time and artistic space are studied separately. Chronotope is being concerned as the literary-aesthetic category in world literary studies, expressing the scope of the universe interpretation, the author’s outlook and imagination regarding the world foundation, defining personages, and the composition means of expressing the sequence and duration of the events. A creative comprehension of the chronotope as a means of arranging the work composition, structure and constructing an epic field of the text demands a special approach to understanding the aesthetic character of the work. Since the chronotope includes all the elements of a fictional work, it is impossible to present the plot, composition, conflict, system of characters, feelings, and mood of the characters without the description of the chronotope. In the following development of the scientific-theoretical thought in the world, the chronotope is accepted to be one of the poetic means to demonstrate reality as well as to be a literary process that is basic for the expression of reality in the compositional construction and illustration of the plot relying on the writer’s intention and the ideological conception of the literary work. Literary time enables one to cognate the literary world picture created by the author in terms of the descriptive subject and object of the work. Therefore, one of the topical tasks of modern Uzbek literary studies is to describe historical evidence, event, the life of outstanding people, the chronology of the near past based on the literary time; on the example of the creative works of a certain period, creators or an individual writer are analyzed in separate or comparative-typological aspect.Keywords: novel, title, chronotope, motive, epigraph, analepsis, structural analysis, plot line, composition
Procedia PDF Downloads 7625350 Deictic Expressions in Selected Football Commentaries
Authors: Vera Ofori Akomah
Abstract:
There is no society without language. In football, language serves as a tool for communication. The football language and meaning of activities are largely revealed through the utterances of football commentators. The linguistic subfield of pragmatics is related to the study of meaning. Pragmatics shows that the interpretation of utterances not only depends on linguistic knowledge but also depends on knowledge about the context of the utterance, knowledge about the status of those involved such as the intent of the speaker, the place, and time of the utterance. Pragmatics analysis comes in several forms and one of such is Deixis. In football commentating, commentators often use deitic expressions in building utterances. The researcher intends to analyse deixis contained in three selected football commentaries through the use of Levinson’s deixis theory. This research is a qualitative study with content analysis as its method. This is because this study focuses on deitic expressions in football commentaries. The data of this study are utterances from English commentaries from 2016 El Classico match between Barcelona and Real Madrid, 2018 FIFA World Cup: Portugal vs Spain and 2022 FIFA World Cup Qualifier: Ghana v Nigeria. The result of the study reveals that there are five kinds of deixis which are person deixis (divided into three: the first person, the second person and the third person), place deixis, time deixis, discourse deixis and social deixis.Keywords: pragmatics analysis, football commentary, deixis, types of deixis
Procedia PDF Downloads 2725349 Analysing the Applicability of a Participatory Approach to Life Cycle Sustainability Assessment: Case Study of a Housing Estate Regeneration in London
Authors: Sahar Navabakhsh, Rokia Raslan, Yair Schwartz
Abstract:
Decision-making on regeneration of housing estates, whether to refurbish or re-build, has been mostly triggered by economic factors. To enable sustainable growth, it is vital that environmental and social impacts of different scenarios are also taken into account. The methodology used to include all the three sustainable development pillars is called Life Cycle Sustainability Assessment (LCSA), which comprises of Life Cycle Assessment (LCA) for the assessment of environmental impacts of buildings. Current practice of LCA is regularly conducted post design stage and by sustainability experts. Not only is undertaking an LCA at this stage less effective, but issues such as the limited scope for the definition and assessment of environmental impacts, the implication of changes in the system boundary and the alteration of each of the variable metrics, employment of different Life Cycle Impact Assessment Methods and use of various inventory data for Life Cycle Inventory Analysis can result in considerably contrasting results. Given the niche nature and scarce specialist domain of LCA of buildings, the majority of the stakeholders do not contribute to the generation or interpretation of the impact assessment, and the results can be generated and interpreted subjectively due to the mentioned uncertainties. For an effective and democratic assessment of environmental impacts, different stakeholders, and in particular the community and design team should collaborate in the process of data collection, assessment and analysis. This paper examines and evaluates a participatory approach to LCSA through the analysis of a case study of a housing estate in South West London. The study has been conducted throughout tier-based collaborative methods to collect and share data through surveys and co-design workshops with the community members and the design team as the main stakeholders. The assessment of lifecycle impacts is conducted throughout the process and has influenced the decision-making on the design of the Community Plan. The evaluation concludes better assessment transparency and outcome, alongside other socio-economic benefits of identifying and engaging the most contributive stakeholders in the process of conducting LCSA.Keywords: life cycle assessment, participatory LCA, life cycle sustainability assessment, participatory processes, decision-making, housing estate regeneration
Procedia PDF Downloads 14725348 Websites for Hypothesis Testing
Authors: Frantisek Mosna
Abstract:
E-learning has become an efficient and widespread means in process of education at all branches of human activities. Statistics is not an exception. Unfortunately the main focus in the statistics teaching is usually paid to the substitution to formulas. Suitable web-sites can simplify and automate calculation and provide more attention and time to the basic principles of statistics, mathematization of real-life situations and following interpretation of results. We introduce our own web-sites for hypothesis testing. Their didactic aspects, technical possibilities of individual tools for their creating, experience and advantages or disadvantages of them are discussed in this paper. These web-sites do not substitute common statistical software but significantly improve the teaching of the statistics at universities.Keywords: e-learning, hypothesis testing, PHP, web-sites
Procedia PDF Downloads 42525347 A Review on Existing Challenges of Data Mining and Future Research Perspectives
Authors: Hema Bhardwaj, D. Srinivasa Rao
Abstract:
Technology for analysing, processing, and extracting meaningful data from enormous and complicated datasets can be termed as "big data." The technique of big data mining and big data analysis is extremely helpful for business movements such as making decisions, building organisational plans, researching the market efficiently, improving sales, etc., because typical management tools cannot handle such complicated datasets. Special computational and statistical issues, such as measurement errors, noise accumulation, spurious correlation, and storage and scalability limitations, are brought on by big data. These unique problems call for new computational and statistical paradigms. This research paper offers an overview of the literature on big data mining, its process, along with problems and difficulties, with a focus on the unique characteristics of big data. Organizations have several difficulties when undertaking data mining, which has an impact on their decision-making. Every day, terabytes of data are produced, yet only around 1% of that data is really analyzed. The idea of the mining and analysis of data and knowledge discovery techniques that have recently been created with practical application systems is presented in this study. This article's conclusion also includes a list of issues and difficulties for further research in the area. The report discusses the management's main big data and data mining challenges.Keywords: big data, data mining, data analysis, knowledge discovery techniques, data mining challenges
Procedia PDF Downloads 11025346 Problems Confronting the Teaching of Sex Education in Some Selected Secondary Schools in the Akoko Region of Ondo State, Nigeria
Authors: Jimoh Abiodun Alaba
Abstract:
Context: In many traditional African societies, sex education is often considered a taboo topic. However, the importance of sex education is becoming increasingly evident. This study aims to investigate the challenges faced in teaching sex education in selected secondary schools in the Akoko region of Ondo state, Nigeria. Research Aim: The aim of this study is to identify and examine the problems confronting the teaching of sex education in selected secondary schools in the Akoko region of Ondo state, Nigeria. Methodology: The study utilized a multi-stage sampling method. The first stage involved a purposive selection of ten (10) secondary schools in the Akoko region of Ondo State, while the second stage was a random selection of twenty (20) students, each in the selected secondary schools of the study area. This makes a total of two (200) hundred students that were considered for the survey. Descriptive analysis using percentages was employed to analyze the collected data. Factor analysis was also used to identify the most significant problems. Findings: The study revealed that sex education has been neglected in the sampled secondary schools due to traditional African beliefs that do not support the teaching and learning of this subject. Furthermore, there was evidence to suggest that parents also displayed reluctance towards the teaching of sex education, fearing that it might expose students to inappropriate behavior. Consequently, students were deprived of this essential aspect of education necessary for self-awareness and development. Theoretical Importance: This study contributes to the understanding of the challenges faced in teaching sex education in traditional African societies, specifically in the selected secondary schools in the Akoko region of Ondo state, Nigeria. Data Collection: Data were collected through the administration of 200 questionnaires in ten selected secondary schools. Additionally, information was gathered from federal, state, and local government authorities. Analysis Procedures: The collected data were analyzed using descriptive analysis, employing percentage calculations for better interpretation. Furthermore, factor analysis was conducted to isolate the most significant problems identified. Conclusion: The study concludes that sex education in the sampled secondary schools in the Akoko region of Ondo state, Nigeria, has suffered neglect due to traditional African beliefs and parental concerns. Consequently, students are denied an important aspect of education necessary for their self-awareness and development. Recommendations are made to change the negative perception of sex education, enrich the curriculum, and employ qualified personnel for its teaching. Additionally, it is suggested that sex education should be integrated with moral instruction.Keywords: African traditional belief, sex, sex education, sexual misdemeanor, morality
Procedia PDF Downloads 8525345 A Systematic Review on Challenges in Big Data Environment
Authors: Rimmy Yadav, Anmol Preet Kaur
Abstract:
Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.Keywords: big data, privacy, data management, network and energy consumption
Procedia PDF Downloads 31225344 Seismic Inversion for Geothermal Exploration
Authors: E. N. Masri, E. Takács
Abstract:
Amplitude Versus Offset (AVO) and simultaneous model-based impedance inversion techniques have not been utilized for geothermal exploration commonly; however, some recent publications called the attention that they can be very useful in the geothermal investigations. In this study, we present rock physical attributes obtained from 3D pre-stack seismic data and well logs collected in a study area of the NW part of Pannonian Basin where the geothermal reservoir is located in the fractured zones of Triassic basement and it was hit by three productive-injection well pairs. The holes were planned very successfully based on the conventional 3D migrated stack volume prior to this study. Subsequently, the available geophysical-geological datasets provided a great opportunity to test modern inversion procedures in the same area. In this presentation, we provide a summary of the theory and application of the most promising seismic inversion techniques from the viewpoint of geothermal exploration. We demonstrate P- and S-wave impedance, as well as the velocity (Vp and Vs), the density, and the Vp/Vs ratio attribute volumes calculated from the seismic and well-logging data sets. After a detailed discussion, we conclude that P-wave impedance and Vp/Vp ratio are the most helpful parameters for lithology discrimination in the study area. They detect the hot water saturated fracture zone very well thus they can be very useful in mapping the investigated reservoir. Integrated interpretation of all the obtained rock-physical parameters is essential. We are extending the above discussed pre-stack seismic tools by studying the possibilities of Elastic Impedance Inversion (EII) for geothermal exploration. That procedure provides two other useful rock-physical properties, the compressibility and the rigidity (Lamé parameters). Results of those newly created elastic parameters will also be demonstrated in the presentation. Geothermal extraction is of great interest nowadays; and we can adopt several methods have been successfully applied in the hydrocarbon exploration for decades to discover new reservoirs and reduce drilling risk and cost.Keywords: fractured zone, seismic, well-logging, inversion
Procedia PDF Downloads 12625343 Survey on Big Data Stream Classification by Decision Tree
Authors: Mansoureh Ghiasabadi Farahani, Samira Kalantary, Sara Taghi-Pour, Mahboubeh Shamsi
Abstract:
Nowadays, the development of computers technology and its recent applications provide access to new types of data, which have not been considered by the traditional data analysts. Two particularly interesting characteristics of such data sets include their huge size and streaming nature .Incremental learning techniques have been used extensively to address the data stream classification problem. This paper presents a concise survey on the obstacles and the requirements issues classifying data streams with using decision tree. The most important issue is to maintain a balance between accuracy and efficiency, the algorithm should provide good classification performance with a reasonable time response.Keywords: big data, data streams, classification, decision tree
Procedia PDF Downloads 52125342 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication
Authors: Aishwarya Shekhar, Himanshu Sharma
Abstract:
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.Keywords: confidentiality, deduplication, data compression, hybridity of cloud
Procedia PDF Downloads 38325341 What 4th-Year Primary-School Students are Thinking: A Paper Airplane Problem
Authors: Neslihan Şahin Çelik, Ali Eraslan
Abstract:
In recent years, mathematics educators have frequently stressed the necessity of instructing students about models and modeling approaches that encompass cognitive and metacognitive thought processes, starting from the first years of school and continuing on through the years of higher education. The purpose of this study is to examine the thought processes of 4th-grade primary school students in their modeling activities and to explore the difficulties encountered in these processes, if any. The study, of qualitative design, was conducted in the 2015-2016 academic year at a public state-school located in a central city in the Black Sea Region of Turkey. A preliminary study was first implemented with designated 4th grade students, after which the criterion sampling method was used to select three students that would be recruited into the focus group. The focus group that was thus formed was asked to work on the model eliciting activity of the Paper Airplane Problem and the entire process was recorded on video. The Paper Airplane Problem required the students to determine the winner with respect to: (a) the plane that stays in the air for the longest time; (b) the plane that travels the greatest distance in a straight-line path; and (c) the overall winner for the contest. A written transcript was made of the video recording, after which the recording and the students' worksheets were analyzed using the Blum and Ferri modeling cycle. The results of the study revealed that the students tested the hypotheses related to daily life that they had set up, generated ideas of their own, verified their models by making connections with real life, and tried to make their models generalizable. On the other hand, the students had some difficulties in terms of their interpretation of the table of data and their ways of operating on the data during the modeling processes.Keywords: primary school students, model eliciting activity, mathematical modeling, modeling process, paper airplane problem
Procedia PDF Downloads 35825340 A Review of Machine Learning for Big Data
Authors: Devatha Kalyan Kumar, Aravindraj D., Sadathulla A.
Abstract:
Big data are now rapidly expanding in all engineering and science and many other domains. The potential of large or massive data is undoubtedly significant, make sense to require new ways of thinking and learning techniques to address the various big data challenges. Machine learning is continuously unleashing its power in a wide range of applications. In this paper, the latest advances and advancements in the researches on machine learning for big data processing. First, the machine learning techniques methods in recent studies, such as deep learning, representation learning, transfer learning, active learning and distributed and parallel learning. Then focus on the challenges and possible solutions of machine learning for big data.Keywords: active learning, big data, deep learning, machine learning
Procedia PDF Downloads 44625339 Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights
Authors: Tomy Prihananto, Damar Apri Sudarmadi
Abstract:
Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.Keywords: Indonesia, protection, personal data, privacy, human rights, encryption
Procedia PDF Downloads 18325338 Masquerade and “What Comes Behind Six Is More Than Seven”: Thoughts on Art History and Visual Culture Research Methods
Authors: Osa D Egonwa
Abstract:
In the 21st century, the disciplinary boundaries of past centuries that we often create through mainstream art historical classification, techniques and sources may have been eroded by visual culture, which seems to provide a more inclusive umbrella for the new ways artists go about the creative process and its resultant commodities. Over the past four decades, artists in Africa have resorted to new materials, techniques and themes which have affected our ways of research on these artists and their art. Frontline artists such as El Anatsui, Yinka Shonibare, Erasmus Onyishi are demonstrating that any material is just suitable for artistic expression. Most of times, these materials come with their own techniques/effects and visual syntax: a combination of materials compounds techniques, formal aesthetic indexes, halo effects, and iconography. This tends to challenge the categories and we lean on to view, think and talk about them. This renders our main stream art historical research methods inadequate, thus suggesting new discursive concepts, terms and theories. This paper proposed the Africanist eclectic methods derived from the dual framework of Masquerade Theory and What Comes Behind Six is More Than Seven. This paper shares thoughts/research on art historical methods, terminological re-alignments on classification/source data, presentational format and interpretation arising from the emergent trends in our subject. The outcome provides useful tools to mediate new thoughts and experiences in recent African art and visual culture.Keywords: art historical methods, classifications, concepts, re-alignment
Procedia PDF Downloads 11025337 Exploring the Birth of Modern Art in Borneo, Post-War Era 1945 to 1970
Authors: Rahah Hasan, Faridah Sahari
Abstract:
This paper describes the development of modern art in Borneo, particularly in Sarawak, Sabah, and Brunei, after the Second World War until the 1970s. This was the period when the British Colonial government dictated the education system, which consequentially inculcated visual art through art and craft subjects imposed on all vernacular schools in Borneo. British influence within the state governance, social, and education system designed with Western ideology created not only a westernized society and mindset but at the same time generated artistic opportunities for emerging local painters to be involved in the initiation of Modern Art in Borneo. Through the historical method and analysis of primary and secondary data, it was obvious that the existence of colonial government departments and institutions such as museums and teaching colleges, and other social organizations in Borneo at that time contributed significantly to the artistic movement. The similar structure and motivation of development in other areas of Borneo confirmed that artistic affirmation of modern art advanced homogenously. Their understanding of easel painting as well as a unique interpretation of culture once distanced from traditional art, resulting in a new visual image that transcended their ethnicity and identity through new mediums and tools. These meticulous interventions modestly visualized in each painting, as discussed in this paper, hopefully, will give a deeper understanding and appreciation of the history of modern art in Borneo.Keywords: art history, Borneo art, fine art, modern art
Procedia PDF Downloads 14325336 The Problem of Now in Special Relativity Theory
Authors: Mogens Frank Mikkelsen
Abstract:
Special Relativity Theory (SRT) includes only one characteristic of light, the speed is equal to all observers, and by excluding other relevant characteristics of light, the common interpretation of SRT should be regarded as merely an approximative theory. By rethinking the iconic double light cones, a revised version of SRT can be developed. The revised concept of light cones acknowledges an asymmetry of past and future light cones and introduced a concept of the extended past to explain the predictions as something other than the future. Combining this with the concept of photon-paired events, led to the inference that Special Relativity theory can support the existence of Now.Keywords: relativity, light cone, Minkowski, time
Procedia PDF Downloads 8525335 The Various Legal Dimensions of Genomic Data
Authors: Amy Gooden
Abstract:
When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.Keywords: artificial intelligence, data, law, genomics, rights
Procedia PDF Downloads 138