Search results for: thick data analytics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24916

Search results for: thick data analytics

24466 Data Disorders in Healthcare Organizations: Symptoms, Diagnoses, and Treatments

Authors: Zakieh Piri, Shahla Damanabi, Peyman Rezaii Hachesoo

Abstract:

Introduction: Healthcare organizations like other organizations suffer from a number of disorders such as Business Sponsor Disorder, Business Acceptance Disorder, Cultural/Political Disorder, Data Disorder, etc. As quality in healthcare care mostly depends on the quality of data, we aimed to identify data disorders and its symptoms in two teaching hospitals. Methods: Using a self-constructed questionnaire, we asked 20 questions in related to quality and usability of patient data stored in patient records. Research population consisted of 150 managers, physicians, nurses, medical record staff who were working at the time of study. We also asked their views about the symptoms and treatments for any data disorders they mentioned in the questionnaire. Using qualitative methods we analyzed the answers. Results: After classifying the answers, we found six main data disorders: incomplete data, missed data, late data, blurred data, manipulated data, illegible data. The majority of participants believed in their important roles in treatment of data disorders while others believed in health system problems. Discussion: As clinicians have important roles in producing of data, they can easily identify symptoms and disorders of patient data. Health information managers can also play important roles in early detection of data disorders by proactively monitoring and periodic check-ups of data.

Keywords: data disorders, quality, healthcare, treatment

Procedia PDF Downloads 420
24465 Leveraging Digital Transformation Initiatives and Artificial Intelligence to Optimize Readiness and Simulate Mission Performance across the Fleet

Authors: Justin Woulfe

Abstract:

Siloed logistics and supply chain management systems throughout the Department of Defense (DOD) has led to disparate approaches to modeling and simulation (M&S), a lack of understanding of how one system impacts the whole, and issues with “optimal” solutions that are good for one organization but have dramatic negative impacts on another. Many different systems have evolved to try to understand and account for uncertainty and try to reduce the consequences of the unknown. As the DoD undertakes expansive digital transformation initiatives, there is an opportunity to fuse and leverage traditionally disparate data into a centrally hosted source of truth. With a streamlined process incorporating machine learning (ML) and artificial intelligence (AI), advanced M&S will enable informed decisions guiding program success via optimized operational readiness and improved mission success. One of the current challenges is to leverage the terabytes of data generated by monitored systems to provide actionable information for all levels of users. The implementation of a cloud-based application analyzing data transactions, learning and predicting future states from current and past states in real-time, and communicating those anticipated states is an appropriate solution for the purposes of reduced latency and improved confidence in decisions. Decisions made from an ML and AI application combined with advanced optimization algorithms will improve the mission success and performance of systems, which will improve the overall cost and effectiveness of any program. The Systecon team constructs and employs model-based simulations, cutting across traditional silos of data, aggregating maintenance, and supply data, incorporating sensor information, and applying optimization and simulation methods to an as-maintained digital twin with the ability to aggregate results across a system’s lifecycle and across logical and operational groupings of systems. This coupling of data throughout the enterprise enables tactical, operational, and strategic decision support, detachable and deployable logistics services, and configuration-based automated distribution of digital technical and product data to enhance supply and logistics operations. As a complete solution, this approach significantly reduces program risk by allowing flexible configuration of data, data relationships, business process workflows, and early test and evaluation, especially budget trade-off analyses. A true capability to tie resources (dollars) to weapon system readiness in alignment with the real-world scenarios a warfighter may experience has been an objective yet to be realized to date. By developing and solidifying an organic capability to directly relate dollars to readiness and to inform the digital twin, the decision-maker is now empowered through valuable insight and traceability. This type of educated decision-making provides an advantage over the adversaries who struggle with maintaining system readiness at an affordable cost. The M&S capability developed allows program managers to independently evaluate system design and support decisions by quantifying their impact on operational availability and operations and support cost resulting in the ability to simultaneously optimize readiness and cost. This will allow the stakeholders to make data-driven decisions when trading cost and readiness throughout the life of the program. Finally, sponsors are available to validate product deliverables with efficiency and much higher accuracy than in previous years.

Keywords: artificial intelligence, digital transformation, machine learning, predictive analytics

Procedia PDF Downloads 146
24464 Basketball Game-Related Statistics Discriminating Teams Competing in Basketball Africa League and Euroleague: Comparative Analysis

Authors: Ng'etich K. Stephen

Abstract:

Abstract—Globally analytics in basketball has advanced tremendously in the last decade. Organizations are leveraging the insights to improve team and player performance and, in the long run, generate revenue out of it. Due to limited basketball game-related statistics in African competitions, teams are unaware of how they compete with other continental basketball teams. The purpose of this study is to evaluate the regional difference in basketball game-related statistics between African teams that played in the newly formed league, the basketball African league and the European league. The basketball African league, a competition created through the partnership between NBA and FIBA, offers a good starting point since it has valuable basketball metrics to analyze. This study sought to use multivariate linear discriminant analysis to identify the game-related statistics that discriminate the teams in Euro league and the basketball African league.

Keywords: basketball africa league, basketball, euroleague, fiba, africa

Procedia PDF Downloads 91
24463 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive

Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh

Abstract:

Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.

Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data

Procedia PDF Downloads 280
24462 A Fuzzy Kernel K-Medoids Algorithm for Clustering Uncertain Data Objects

Authors: Behnam Tavakkol

Abstract:

Uncertain data mining algorithms use different ways to consider uncertainty in data such as by representing a data object as a sample of points or a probability distribution. Fuzzy methods have long been used for clustering traditional (certain) data objects. They are used to produce non-crisp cluster labels. For uncertain data, however, besides some uncertain fuzzy k-medoids algorithms, not many other fuzzy clustering methods have been developed. In this work, we develop a fuzzy kernel k-medoids algorithm for clustering uncertain data objects. The developed fuzzy kernel k-medoids algorithm is superior to existing fuzzy k-medoids algorithms in clustering data sets with non-linearly separable clusters.

Keywords: clustering algorithm, fuzzy methods, kernel k-medoids, uncertain data

Procedia PDF Downloads 202
24461 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 186
24460 Healthcare Data Mining Innovations

Authors: Eugenia Jilinguirian

Abstract:

In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.

Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database

Procedia PDF Downloads 54
24459 The Socio-Technical Relationship between Architects and Nano-Enhanced Materials: An Ethnographic Study in Cairo, Egypt

Authors: Ramy Bakir

Abstract:

Advancements in the field of nanoscience and nanotechnology have had a sweeping effect on the manufacturing industry in the last two decades, and have specifically allowed for the enhancement of a multitude of applications in the field of building technology. Research carried out in the architectural field in the past decade highlights how those enhancements have improved the structural and environmental performance of buildings, and/or how they developed the aesthetic value of façade or interior treatments. In developing countries, such as Egypt, the actual use of those nano-enhanced applications and their benefits rarely manifest. Hence this paper investigates the socio-technical relationship between the architectural design process and nanotechnology in Cairo using participant observation within an ethnographic study. The study focused on the socio-cultural context of an environmental design process in a specific design firm, and the role of nano-enhanced applications in it, and provided a thick description of the design decisions made within the preliminary stages of the design process of a residential building in Cairo, Egypt. Using Grounded Theory, and through the analysis and coding of the qualitative data collected, this paper was able to identify specific socio-cultural issues influencing individual architect cognition, clarifying how the context of the design process of the studied project affected the design team members’ responses to nano-enhanced materials. This paper presents those findings within a framework of the three identified statuses of response to nanotechnology and classifies the socio-cultural reasons influencing them. In doing so, the paper aims to shed more light on the relation between nanotechnology and architects in their natural environment, and hence allow both to benefit more from a clearer understanding of how the socio-cultural context, along with the benefits of using nanotechnology, influences the design decisions made.

Keywords: nanotechnology, design process, socio-cultural context, nano-enhanced applications

Procedia PDF Downloads 252
24458 Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering

Authors: Yunus Doğan, Ahmet Durap

Abstract:

Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine.

Keywords: clustering algorithms, coastal engineering, data mining, data summarization, statistical methods

Procedia PDF Downloads 353
24457 Nondestructive Prediction and Classification of Gel Strength in Ethanol-Treated Kudzu Starch Gels Using Near-Infrared Spectroscopy

Authors: John-Nelson Ekumah, Selorm Yao-Say Solomon Adade, Mingming Zhong, Yufan Sun, Qiufang Liang, Muhammad Safiullah Virk, Xorlali Nunekpeku, Nana Adwoa Nkuma Johnson, Bridget Ama Kwadzokpui, Xiaofeng Ren

Abstract:

Enhancing starch gel strength and stability is crucial. However, traditional gel property assessment methods are destructive, time-consuming, and resource-intensive. Thus, understanding ethanol treatment effects on kudzu starch gel strength and developing a rapid, nondestructive gel strength assessment method is essential for optimizing the treatment process and ensuring product quality consistency. This study investigated the effects of different ethanol concentrations on the microstructure of kudzu starch gels using a comprehensive microstructural analysis. We also developed a nondestructive method for predicting gel strength and classifying treatment levels using near-infrared (NIR) spectroscopy, and advanced data analytics. Scanning electron microscopy revealed progressive network densification and pore collapse with increasing ethanol concentration, correlating with enhanced mechanical properties. NIR spectroscopy, combined with various variable selection methods (CARS, GA, and UVE) and modeling algorithms (PLS, SVM, and ELM), was employed to develop predictive models for gel strength. The UVE-SVM model demonstrated exceptional performance, with the highest R² values (Rc = 0.9786, Rp = 0.9688) and lowest error rates (RMSEC = 6.1340, RMSEP = 6.0283). Pattern recognition algorithms (PCA, LDA, and KNN) successfully classified gels based on ethanol treatment levels, achieving near-perfect accuracy. This integrated approach provided a multiscale perspective on ethanol-induced starch gel modification, from molecular interactions to macroscopic properties. Our findings demonstrate the potential of NIR spectroscopy, coupled with advanced data analysis, as a powerful tool for rapid, nondestructive quality assessment in starch gel production. This study contributes significantly to the understanding of starch modification processes and opens new avenues for research and industrial applications in food science, pharmaceuticals, and biomaterials.

Keywords: kudzu starch gel, near-infrared spectroscopy, gel strength prediction, support vector machine, pattern recognition algorithms, ethanol treatment

Procedia PDF Downloads 12
24456 The Reconstruction of Paleoenvironment Aptian Sediments of the Massive Serdj, North Central Tunisia

Authors: H. Khaled, F. Chaabani, F. Boulvain

Abstract:

This paper focuses on the studied of Aptian series that crops out at the Jebel Serdj in the north central Tunisia. The study series is about 590 meters thick and it is consisting of limestones, marly limestones associated with some levels of siltstones and marls. Two sections are studied in detail regarding lithology, microfacies, magnetic susceptibility and mineralogical composition to provide new insights into the paleoenvironmental evolution and paleoclimatological implications during this period. The following facies associations representing different ramp palaeoenvironments have been identified: mudstone–wackestone outer ramp facies; skeletal grainstone- packstone mid-ramp facies, packstone-grainstone inner-ramp facies which include a variety of organisms such as rudists and ooids and mudstone–wackestone coastal facies rich with miliolidea and orbitolines. The magnetic susceptibility (Xᵢₙ) of all samples was compared with the lithological and microfacies variation. We show that high values of magnetic susceptibility are correlated with the distal facies.

Keywords: Aptian, Serdj Formation, geochemical, mineralogy

Procedia PDF Downloads 135
24455 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 73
24454 Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises

Authors: Martin Böhmer, Agatha Dabrowski, Boris Otto

Abstract:

The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a “data knowledge model”. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research.

Keywords: data management, digitization, industry 4.0, knowledge engineering, metamodel

Procedia PDF Downloads 345
24453 Anticipating Asthma with Control Environmental Factors and Food

Authors: Destin Kurniawati

Abstract:

Asthma is one of the deadly diseases in the world. According to the World Health Organization in 2012, 300 million people suffer from asthma of different races and classes. An estimated 250,000 people die because of asthma annually.As well as more than 57% of children and 51% of adults with asthma. There two risk factors for asthma. That risk factors are the host and environmental. One of the environmental factors that can bring asthma is allergens. When an allergen enters the body, the allergen binds to IgE and cause cell granulat- issued several mediators such as histamine, leukotrienes, bradykinin or something like that. This will cause localized edema effect on bronchial walls of small, thick mucous secretions in the bronchioles, and bronchial smooth muscle spasm. Then there will be inflammation of the airways. Methodology this research is by literature. Therefore, to anticipate and cope with asthma is to control environmental factors that serve to minimize allergens and controlling one's intake in the form of antioxidant-rich foods. Foods rich in antioxidants serve to improve lung function and decrease symptoms of the disease of the respiratory tract.

Keywords: asthma, deadly disease, allergen, environmental and food control

Procedia PDF Downloads 249
24452 Floorboards, Whitewalls and Butterflies: Ethnography of a Community Mental Health Cafe

Authors: J. N. Bardi, N. Wright, S. Timmons, P. Crawford

Abstract:

Introduction: In the United Kingdom (UK), the transfer of care from the asylums to the community has meant that some people with mental health problems (MHP) may not have access to suitable or adequate statutory community mental health services (CMHS). However, in addition to statutory CMHS, there are informal CMHS that provide spaces where people with MHP can attend such as faith communities, clubhouses, user-led organisations, day centres including drop-in-centres and community hubs and community mental health cafés (CMHCs). Aim: To qualitatively understand what happens in a community mental health café in relation to the place, people and processes, from the participant's perspective. Methodology: Ethnography Methods: Data collection will be field notes from observations written as thick description and interviews with participants. Data analysis will be thematic and narrative analysis. Relevance: The study seeks to observe what happens in a user-led community mental health café and explore if it provides the services that it claims to offer. Therefore, a literature review was conducted to examine the research evidence related to informal CMHS, focusing on similarities and differences. Results indicated that informal CMHS differ with regards to why, how, who set them up and who funds them, but they are similar because people with MHP who attend them report related psychological, vocational, and social interaction benefits. In addition to the differences listed above, CMHCs differ in their adoption of the commercial café model of social space and some CMHCs claim to address needs of social isolation and loneliness which they assert are not properly addressed by statutory CMHS and some informal CMHS. Therefore, CMHCs explicitly differentiate themselves from statutory CMHS and some informal CMHS such as day centres, hospitals and social services. However, CMHCs were found to be like drop-in-centres and community hubs which are also free for MHP to attend without the need for assessments, membership or appointments. To situate community mental health café within other informal CMHS and provide a rationale for the proposed study a scoping review was conducted to determine the scope of available research evidence on CMHCs. Findings from the scoping review reflected the literature review findings with regards to the benefits of attending informal CMHCs for people with MHP. Of the ten studies included in the scoping review, seven were on CMHCs for people living with dementia and two were on CMHCs for people with a broader range of MHP. The researcher hopes that findings from the proposed PhD study will build on the existing understanding of informal CMHS, extend the research evidence on CMHCs and address any gap in the literature.

Keywords: cafe, community, ethnography, mental health

Procedia PDF Downloads 175
24451 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 348
24450 Isolation and Characterization of Indigenous Rhizosphere Bacteria Producing Gibberellin Acid from Local Soybeans in Three Different Areas of South Sulawesi

Authors: Asmiaty Sahur, Ambo Ala, Baharuddin Patanjengi, Elkawakib Syam'un

Abstract:

This study aimed to isolate and characterize the indigenous Rhizosphere bacteria producing Gibberellin Acid as plant growth isolated from local soybean of three different areas in South Sulawesi, Indonesia. Several soil samples of soybean plants were collected from the Rhizosphere of local soybeans in three different areas of South Sulawesi such as Soppeng, Bone and Takalar. There were 56 isolates of bacteria were isolated and grouped into gram-positive bacteria and gram negative bacteria .There are 35 isolates produce a thick slime or slimy when cultured on media Natrium Broth and the remaining of those produced spores. The results showed that of potential bacterial isolated produced Gibberellin Acid in high concentration. The best isolate of Rhizosphere bacteria for the production of Gibberellin Acid is with concentration 2%. There are 4 isolates that had higher concentration are AKB 19 (4.67 mg/ml) followed by RKS 17 (3.80 mg/ml), RKS 25 (3.70 mg / ml) and RKS 24 (3.29 mg/ml) respectively.

Keywords: rhizosphere, bacteria, gibberellin acid, soybeans

Procedia PDF Downloads 229
24449 Experimental Investigation and Hardness Analysis of Chromoly Steel Multipass Welds Using GMAW

Authors: S. Ramesh, A. S. Sasiraaju, K. Sidhaarth, N. Sudhan Rajkumar, V. Manivel Muralidaran

Abstract:

This work presents the result of investigations aimed at determining the hardness of the welded Chromoly (A 4130) steel plate of 2” thickness. Multi pass welding for the thick sections was carried out and analyzed for the Chromoly alloy steel plates. The study of hardness at the weld metal reveals that there is the presence of different micro structure products which yields diverse properties. The welding carried out using GMAW with ER70s-2 electrode. Single V groove design was selected for the butt joint configuration. The presence of hydrogen has been suppressed by selecting low hydrogen electrode. Preheating of the plate prior to welding reduces the cooling rate which also affects the weld metal microstructure. The shielding gas composition used in this analysis is 80% Ar-20% CO2. The experimental analysis gives the detailed study of the hardness of the material.

Keywords: chromoly, gas metal arc weld (GMAW), hardness, multi pass weld, shielding gas composition

Procedia PDF Downloads 207
24448 On the Combination of Patient-Generated Data with Data from a Secure Clinical Network Environment: A Practical Example

Authors: Jeroen S. de Bruin, Karin Schindler, Christian Schuh

Abstract:

With increasingly more mobile health applications appearing due to the popularity of smartphones, the possibility arises that these data can be used to improve the medical diagnostic process, as well as the overall quality of healthcare, while at the same time lowering costs. However, as of yet there have been no reports of a successful combination of patient-generated data from smartphones with data from clinical routine. In this paper, we describe how these two types of data can be combined in a secure way without modification to hospital information systems, and how they can together be used in a medical expert system for automatic nutritional classification and triage.

Keywords: mobile health, data integration, expert systems, disease-related malnutrition

Procedia PDF Downloads 466
24447 The Prospects of Leveraging (Big) Data for Accelerating a Just Sustainable Transition around Different Contexts

Authors: Sombol Mokhles

Abstract:

This paper tries to show the prospects of utilising (big)data for enabling just the transition of diverse cities. Our key purpose is to offer a framework of applications and implications of utlising (big) data in comparing sustainability transitions across different cities. Relying on the cosmopolitan comparison, this paper explains the potential application of (big) data but also its limitations. The paper calls for adopting a data-driven and just perspective in including different cities around the world. Having a just and inclusive approach at the front and centre ensures a just transition with synergistic effects that leave nobody behind.

Keywords: big data, just sustainable transition, cosmopolitan city comparison, cities

Procedia PDF Downloads 89
24446 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 372
24445 Laser-TIG Welding-Brazing for Dissimilar Metals between Aluminum Alloy and Steel

Authors: Xiangfang Xu, Bintao Wu, Yugang Miao, Duanfeng Han

Abstract:

Experiments were conducted on 5A06 aluminum alloy and Q235 steel using the laser-TIG hybrid heat source welding-brazing method to realize the reliable connection of Al/Fe dissimilar metals and the welding characteristics were analyzed. It was found that the joints with uniform seam and high tensile strength could be obtained using such a method, while the welding process demanded special welding parameters. Spectrum measurements showed that the Al and Fe atoms diffused more thoroughly at the brazing interface and formed a 3μm-thick intermetallic compound layer at the Al/Fe joints brazed connection interface. Shearing tests indicated that the shearing strength of the Al/Fe welding-brazed joint was 165MPa. The fracture occurred near the melting zone of aluminum alloy, which belonged to the mixed mode with the ductile fracture as the base and the brittle fracture as the supplement.

Keywords: Al/Fe dissimilar metals, laser-TIG hybrid heat source, shearing strength, welding-brazing method

Procedia PDF Downloads 378
24444 Line Heating Forming: Methodology and Application Using Kriging and Fifth Order Spline Formulations

Authors: Henri Champliaud, Zhengkun Feng, Ngan Van Lê, Javad Gholipour

Abstract:

In this article, a method is presented to effectively estimate the deformed shape of a thick plate due to line heating. The method uses a fifth order spline interpolation, with up to C3 continuity at specific points to compute the shape of the deformed geometry. First and second order derivatives over a surface are the resulting parameters of a given heating line on a plate. These parameters are determined through experiments and/or finite element simulations. Very accurate kriging models are fitted to real or virtual surfaces to build-up a database of maps. Maps of first and second order derivatives are then applied on numerical plate models to evaluate their evolving shapes through a sequence of heating lines. Adding an optimization process to this approach would allow determining the trajectories of heating lines needed to shape complex geometries, such as Francis turbine blades.

Keywords: deformation, kriging, fifth order spline interpolation, first, second and third order derivatives, C3 continuity, line heating, plate forming, thermal forming

Procedia PDF Downloads 443
24443 Context-Aware Point-Of-Interests Recommender Systems Using Integrated Sentiment and Network Analysis

Authors: Ho Yeon Park, Kyoung-Jae Kim

Abstract:

Recently, user’s interests for location-based social network service increases according to the advances of social web and location-based technologies. It may be easy to recommend preferred items if we can use user’s preference, context and social network information simultaneously. In this study, we propose context-aware POI (point-of-interests) recommender systems using location-based network analysis and sentiment analysis which consider context, social network information and implicit user’s preference score. We propose a context-aware POI recommendation system consisting of three sub-modules and an integrated recommendation system of them. First, we will develop a recommendation module based on network analysis. This module combines social network analysis and cluster-indexing collaboration filtering. Next, this study develops a recommendation module using social singular value decomposition (SVD) and implicit SVD. In this research, we will develop a recommendation module that can recommend preference scores based on the frequency of POI visits of user in POI recommendation process by using social and implicit SVD which can reflect implicit feedback in collaborative filtering. We also develop a recommendation module using them that can estimate preference scores based on the recommendation. Finally, this study will propose a recommendation module using opinion mining and emotional analysis using data such as reviews of POIs extracted from location-based social networks. Finally, we will develop an integration algorithm that combines the results of the three recommendation modules proposed in this research. Experimental results show the usefulness of the proposed model in relation to the recommended performance.

Keywords: sentiment analysis, network analysis, recommender systems, point-of-interests, business analytics

Procedia PDF Downloads 236
24442 Acceptance of Big Data Technologies and Its Influence towards Employee’s Perception on Job Performance

Authors: Jia Yi Yap, Angela S. H. Lee

Abstract:

With the use of big data technologies, organization can get result that they are interested in. Big data technologies simply load all the data that is useful for the organizations and provide organizations a better way of analysing data. The purpose of this research is to get employees’ opinion from films in Malaysia to explore the use of big data technologies in their organization in order to provide how it may affect the perception of the employees on job performance. Therefore, in order to identify will accepting big data technologies in the organization affect the perception of the employee, questionnaire will be distributed to different employee from different Small and medium-sized enterprises (SME) organization listed in Malaysia. The conceptual model proposed will test with other variables in order to see the relationship between variables.

Keywords: big data technologies, employee, job performance, questionnaire

Procedia PDF Downloads 282
24441 Recycling of Post-Industrial Cotton Wastes: Quality and Rotor Spinning of Reclaimed Fibers

Authors: Béchir Wanassi, Béchir Azzouz, Taher Halimi, Mohamed Ben Hassen

Abstract:

Mechanical recycling of post-industrial cotton yarn wastes, as well as the effects of passage number on the properties of reclaimed fibers, have been investigated. A new Modified Fiber Quality Index (MFQI) and Spinning Consistency Index (MSCI) for the characterization of the quality are presented. This index gives the real potential of spinnability according to its physical properties. The best quality of reclaimed fibers (after 7th passage) was used to produce rotor yarns. 100% recycling cotton yarns were produced in open-end spinning system with different rotor speed (i.e. 65000, 70000, and 80000 rpm), opening roller speed (i.e. 7700, 8200, and 8700 rpm) and twist factor (i.e. 137, 165, and 183). The effects of spinning parameters were investigated to evaluate a 100% recycling cotton yarns quality (TQI, hairiness, thin places, and thick places) using DOE method.

Keywords: cotton wastes, DOE, mechanical recycling, rotor spinning

Procedia PDF Downloads 291
24440 Normalizing Flow to Augmented Posterior: Conditional Density Estimation with Interpretable Dimension Reduction for High Dimensional Data

Authors: Cheng Zeng, George Michailidis, Hitoshi Iyatomi, Leo L. Duan

Abstract:

The conditional density characterizes the distribution of a response variable y given other predictor x and plays a key role in many statistical tasks, including classification and outlier detection. Although there has been abundant work on the problem of Conditional Density Estimation (CDE) for a low-dimensional response in the presence of a high-dimensional predictor, little work has been done for a high-dimensional response such as images. The promising performance of normalizing flow (NF) neural networks in unconditional density estimation acts as a motivating starting point. In this work, the authors extend NF neural networks when external x is present. Specifically, they use the NF to parameterize a one-to-one transform between a high-dimensional y and a latent z that comprises two components [zₚ, zₙ]. The zₚ component is a low-dimensional subvector obtained from the posterior distribution of an elementary predictive model for x, such as logistic/linear regression. The zₙ component is a high-dimensional independent Gaussian vector, which explains the variations in y not or less related to x. Unlike existing CDE methods, the proposed approach coined Augmented Posterior CDE (AP-CDE) only requires a simple modification of the common normalizing flow framework while significantly improving the interpretation of the latent component since zₚ represents a supervised dimension reduction. In image analytics applications, AP-CDE shows good separation of 𝑥-related variations due to factors such as lighting condition and subject id from the other random variations. Further, the experiments show that an unconditional NF neural network based on an unsupervised model of z, such as a Gaussian mixture, fails to generate interpretable results.

Keywords: conditional density estimation, image generation, normalizing flow, supervised dimension reduction

Procedia PDF Downloads 81
24439 Gesture in the Arabic and Malay Languages a Comparative Study

Authors: Siti Sara binti Hj Ahmad, Adil Elshiekh Abdalla

Abstract:

The Arabic and Malay languages belong to different language’s families; while the Arabic language descends from the Semitic language, Malay belongs to the Austronesian (Malayo-Polynesian) family. Hence, the grammatical systems of the two languages differ from each other. Arabic, being a language found in the heart of the dessert, and Malay is the language found in the heart of thick equatorial forests, is another source of vital cultural differences. Consequently, it is expected that this situation will create differences in the ways of how speakers of the two languages perceive the world around them, convey and understand their messages. On the other hand, as the majority of the speakers of Malay language are Muslims, Arabic language found its way in this region; currently, Arabic is widely taught in school, some terms of it found their way in the Malay language. Accordingly, the Arabic language and culture have widely penetrated into the Malay language. This study is proposed with the aim to find out the differences and similarities between the two languages, in the term of the nonverbal communication. The result of this study will be of high significance, as it will help in enhancing the mutual understanding between the speakers of these languages. The comparative analysis approach will be utilized in this study.

Keywords: gesture, Arabic language, Malay language, comparative analysis

Procedia PDF Downloads 547
24438 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 75
24437 Optimization of Roster Construction In Sports

Authors: Elijah Cavan

Abstract:

In Major League Sports (MLB, NBA, NHL, NFL), it is the Front Office Staff (FOS) who make decisions about who plays for their respective team. The FOS bear the brunt of the responsibility for acquiring players through drafting, trading and signing players in free agency while typically contesting with maximum roster salary constraints. The players themselves are volatile assets of these teams- their value fluctuates with age and performance. A simple comparison can be made when viewing players as assets. The problem here is similar to that of optimizing your investment portfolio. The The goal is ultimately to maximize your periodic returns while tolerating a fixed risk (degree of uncertainty/ potential loss). Each franchise may value assets differently, and some may only tolerate lower risk levels- these are examples of factors that introduce additional constraints into the model. In this talk, we will detail the mathematical formulation of this problem as a constrained optimization problem- which can be solved with classical machine learning methods but is also well posed as a problem to be solved on quantum computers

Keywords: optimization, financial mathematics, sports analytics, simulated annealing

Procedia PDF Downloads 105