Search results for: big video data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24766

Search results for: big video data

24286 Identification of Damage Mechanisms in Interlock Reinforced Composites Using a Pattern Recognition Approach of Acoustic Emission Data

Authors: M. Kharrat, G. Moreau, Z. Aboura

Abstract:

The latest advances in the weaving industry, combined with increasingly sophisticated means of materials processing, have made it possible to produce complex 3D composite structures. Mainly used in aeronautics, composite materials with 3D architecture offer better mechanical properties than 2D reinforced composites. Nevertheless, these materials require a good understanding of their behavior. Because of the complexity of such materials, the damage mechanisms are multiple, and the scenario of their appearance and evolution depends on the nature of the exerted solicitations. The AE technique is a well-established tool for discriminating between the damage mechanisms. Suitable sensors are used during the mechanical test to monitor the structural health of the material. Relevant AE-features are then extracted from the recorded signals, followed by a data analysis using pattern recognition techniques. In order to better understand the damage scenarios of interlock composite materials, a multi-instrumentation was set-up in this work for tracking damage initiation and development, especially in the vicinity of the first significant damage, called macro-damage. The deployed instrumentation includes video-microscopy, Digital Image Correlation, Acoustic Emission (AE) and micro-tomography. In this study, a multi-variable AE data analysis approach was developed for the discrimination between the different signal classes representing the different emission sources during testing. An unsupervised classification technique was adopted to perform AE data clustering without a priori knowledge. The multi-instrumentation and the clustered data served to label the different signal families and to build a learning database. This latter is useful to construct a supervised classifier that can be used for automatic recognition of the AE signals. Several materials with different ingredients were tested under various solicitations in order to feed and enrich the learning database. The methodology presented in this work was useful to refine the damage threshold for the new generation materials. The damage mechanisms around this threshold were highlighted. The obtained signal classes were assigned to the different mechanisms. The isolation of a 'noise' class makes it possible to discriminate between the signals emitted by damages without resorting to spatial filtering or increasing the AE detection threshold. The approach was validated on different material configurations. For the same material and the same type of solicitation, the identified classes are reproducible and little disturbed. The supervised classifier constructed based on the learning database was able to predict the labels of the classified signals.

Keywords: acoustic emission, classifier, damage mechanisms, first damage threshold, interlock composite materials, pattern recognition

Procedia PDF Downloads 134
24285 Skin-to-Skin Contact Simulation: Improving Health Outcomes for Medically Fragile Newborns in the Neonatal Intensive Care Unit

Authors: Gabriella Zarlenga, Martha L. Hall

Abstract:

Introduction: Premature infants are at risk for neurodevelopmental deficits and hospital readmissions, which can increase the financial burden on the health care system and families. Kangaroo care (skin-to-skin contact) is a practice that can improve preterm infant health outcomes. Preterm infants can acquire adequate body temperature, heartbeat, and breathing regulation through lying directly on the mother’s abdomen and in between her breasts. Due to some infant’s condition, kangaroo care is not a feasible intervention. The purpose of this proof-of-concept research project is to create a device which simulates skin-to-skin contact for pre-term infants not eligible for kangaroo care, with the aim of promoting baby’s health outcomes, reducing the incidence of serious neonatal and early childhood illnesses, and/or improving cognitive, social and emotional aspects of development. Methods: The study design is a proof-of-concept based on a three-phase approach; (1) observational study and data analysis of the standard of care for 2 groups of pre-term infants, (2) design and concept development of a novel device for pre-term infants not currently eligible for standard kangaroo care, and (3) prototyping, laboratory testing, and evaluation of the novel device in comparison to current assessment parameters of kangaroo care. A single center study will be conducted in an area hospital offering Level III neonatal intensive care. Eligible participants include newborns born premature (28-30 weeks of age) admitted to the NICU. The study design includes 2 groups: a control group receiving standard kangaroo care and an experimental group not eligible for kangaroo care. Based on behavioral analysis of observational video data collected in the NICU, the device will be created to simulate mother’s body using electrical components in a thermoplastic polymer housing covered in silicone. It will be designed with a microprocessor that controls simulated respiration, heartbeat, and body temperature of the 'simulated caregiver' by using a pneumatic lung, vibration sensors (heartbeat), pressure sensors (weight/position), and resistive film to measure temperature. A slight contour of the simulator surface may be integrated to help position the infant correctly. Control and monitoring of the skin-to-skin contact simulator would be performed locally by an integrated touchscreen. The unit would have built-in Wi-Fi connectivity as well as an optional Bluetooth connection in which the respiration and heart rate could be synced with a parent or caregiver. A camera would be integrated, allowing a video stream of the infant in the simulator to be streamed to a monitoring location. Findings: Expected outcomes are stabilization of respiratory and cardiac rates, thermoregulation of those infants not eligible for skin to skin contact with their mothers, and real time mother Bluetooth to the device to mimic the experience in the womb. Results of this study will benefit clinical practice by creating a new standard of care for premature neonates in the NICU that are deprived of skin to skin contact due to various health restrictions.

Keywords: kangaroo care, wearable technology, pre-term infants, medical design

Procedia PDF Downloads 136
24284 A Framework for Teaching the Intracranial Pressure Measurement through an Experimental Model

Authors: Christina Klippel, Lucia Pezzi, Silvio Neto, Rafael Bertani, Priscila Mendes, Flavio Machado, Aline Szeliga, Maria Cosendey, Adilson Mariz, Raquel Santos, Lys Bendett, Pedro Velasco, Thalita Rolleigh, Bruna Bellote, Daria Coelho, Bruna Martins, Julia Almeida, Juliana Cerqueira

Abstract:

This project presents a framework for teaching intracranial pressure monitoring (ICP) concepts using a low-cost experimental model in a neurointensive care education program. Data concerning ICP monitoring contribute to the patient's clinical assessment and may dictate the course of action of a health team (nursing, medical staff) and influence decisions to determine the appropriate intervention. This study aims to present a safe method for teaching ICP monitoring to medical students in a Simulation Center. Methodology: Medical school teachers, along with students from the 4th year, built an experimental model for teaching ICP measurement. The model consists of a mannequin's head with a plastic bag inside simulating the cerebral ventricle and an inserted ventricular catheter connected to the ICP monitoring system. The bag simulating the ventricle can also be changed for others containing bloody or infected simulated cerebrospinal fluid. On the mannequin's ear, there is a blue point indicating the right place to set the "zero point" for accurate pressure reading. The educational program includes four steps: 1st - Students receive a script on ICP measurement for reading before training; 2nd - Students watch a video about the subject created in the Simulation Center demonstrating each step of the ICP monitoring and the proper care, such as: correct positioning of the patient, anatomical structures to establish the zero point for ICP measurement and a secure range of ICP; 3rd - Students train the procedure in the model. Teachers help students during training; 4th - Student assessment based on a checklist form. Feedback and correction of wrong actions. Results: Students expressed interest in learning ICP monitoring. Tests concerning the hit rate are still being performed. ICP's final results and video will be shown at the event. Conclusion: The study of intracranial pressure measurement based on an experimental model consists of an effective and controlled method of learning and research, more appropriate for teaching neurointensive care practices. Assessment based on a checklist form helps teachers keep track of student learning progress. This project offers medical students a safe method to develop intensive neurological monitoring skills for clinical assessment of patients with neurological disorders.

Keywords: neurology, intracranial pressure, medical education, simulation

Procedia PDF Downloads 145
24283 Impact of Intelligent Transportation System on Planning, Operation and Safety of Urban Corridor

Authors: Sourabh Jain, S. S. Jain

Abstract:

Intelligent transportation system (ITS) is the application of technologies for developing a user–friendly transportation system to extend the safety and efficiency of urban transportation systems in developing countries. These systems involve vehicles, drivers, passengers, road operators, managers of transport services; all interacting with each other and the surroundings to boost the security and capacity of road systems. The goal of urban corridor management using ITS in road transport is to achieve improvements in mobility, safety, and the productivity of the transportation system within the available facilities through the integrated application of advanced monitoring, communications, computer, display, and control process technologies, both in the vehicle and on the road. Intelligent transportation system is a product of the revolution in information and communications technologies that is the hallmark of the digital age. The basic ITS technology is oriented on three main directions: communications, information, integration. Information acquisition (collection), processing, integration, and sorting are the basic activities of ITS. In the paper, attempts have been made to present the endeavor that was made to interpret and evaluate the performance of the 27.4 Km long study corridor having eight intersections and four flyovers. The corridor consisting of six lanes as well as eight lanes divided road network. Two categories of data have been collected such as traffic data (traffic volume, spot speed, delay) and road characteristics data (no. of lanes, lane width, bus stops, mid-block sections, intersections, flyovers). The instruments used for collecting the data were video camera, stop watch, radar gun, and mobile GPS (GPS tracker lite). From the analysis, the performance interpretations incorporated were the identification of peak and off-peak hours, congestion and level of service (LOS) at midblock sections and delay followed by plotting the speed contours. The paper proposed the urban corridor management strategies based on sensors integrated into both vehicles and on the roads that those have to be efficiently executable, cost-effective, and familiar to road users. It will be useful to reduce congestion, fuel consumption, and pollution so as to provide comfort, safety, and efficiency to the users.

Keywords: ITS strategies, congestion, planning, mobility, safety

Procedia PDF Downloads 158
24282 Bag of Local Features for Person Re-Identification on Large-Scale Datasets

Authors: Yixiu Liu, Yunzhou Zhang, Jianning Chi, Hao Chu, Rui Zheng, Libo Sun, Guanghao Chen, Fangtong Zhou

Abstract:

In the last few years, large-scale person re-identification has attracted a lot of attention from video surveillance since it has a potential application prospect in public safety management. However, it is still a challenging job considering the variation in human pose, the changing illumination conditions and the lack of paired samples. Although the accuracy has been significantly improved, the data dependence of the sample training is serious. To tackle this problem, a new strategy is proposed based on bag of visual words (BoVW) model of designing the feature representation which has been widely used in the field of image retrieval. The local features are extracted, and more discriminative feature representation is obtained by cross-view dictionary learning (CDL), then the assignment map is obtained through k-means clustering. Finally, the BoVW histograms are formed which encodes the images with the statistics of the feature classes in the assignment map. Experiments conducted on the CUHK03, Market1501 and MARS datasets show that the proposed method performs favorably against existing approaches.

Keywords: bag of visual words, cross-view dictionary learning, person re-identification, reranking

Procedia PDF Downloads 166
24281 The Economic Limitations of Defining Data Ownership Rights

Authors: Kacper Tomasz Kröber-Mulawa

Abstract:

This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.

Keywords: antitrust, data, data ownership, digital economy, property rights

Procedia PDF Downloads 51
24280 Difficulties for Implementation of Telenursing: An Experience Report

Authors: Jacqueline A. G. Sachett, Cláudia S. Nogueira, Diana C. P. Lima, Jessica T. S. Oliveira, Guilherme K. M. Salazar, Lílian K. Aguiar

Abstract:

The Polo Amazon Telehealth offers several tools for professionals working in Primary Health Care as a second formative opinion, teleconsulting and training between the different areas, whether medicine, dentistry, nursing, physiotherapy, among others. These activities have a monthly schedule of free access to the municipalities of Amazonas registered. With this premise, and in partnership with the University of the State of Amazonas (UEA), is promoting the practice of the triad; teaching-research-extension in order to collaborate with the enrichment and acquisition of knowledge through educational practices carried out through teleconferences. Therefore, nursing is to join efforts and inserts as a collaborator of this project running, contributing to the education and training of these professionals who are part of the health system in full Amazon. The aim of this study is to report the experience of academic of Amazonas State University nursing course, about the experience in the extension project underway in Polo Telemedicine Amazon. This was a descriptive study, the experience report type, about the experience of nursing academic UEA, by extension 'Telenursing: teleconsulting and second formative opinion for FHS professionals in the state of Amazonas' project, held in Polo Telemedicine Amazon, through an agreement with the UEA and funded by the Foundation of Amazonas Research from July / 2012 to July / 2016. Initially developed active search of members of the Family Health Strategy professionals, in order to provide training and training teams to use the virtual clinic, as well as the virtual environment is the focus of this tool design. The election period was an aggravating factor for the implementation of teleconsulting proposal, due to change of managers in each municipality, requiring the stoppage until they assume their positions. From this definition, we established the need for new training. The first video conference took place on 03.14.2013 for learning and training in the use of Virtual Learning Environment and Virtual Clinic, with the participation of municipalities of Novo Aripuanã, São Paulo de Olivença and Manacapuru. During the whole project was carried out literature about what is being done and produced at the national level about the subject. By the time the telenursing project has received twenty-five (25) consultancy requests. The consultants sent by nursing professionals, all have been answered to date. Faced with the lived experience, particularly in video conferencing, face to cause difficulties issues, such as the fluctuation in the number of participants in activities, difficulty of participants to reconcile the opening hours of the units with the schedule of video conferencing, transmission difficulties and changes schedule. It was concluded that the establishment of connection between the Telehealth points is one of the main factors for the implementation of Telenursing and that this feature is still new for nursing. However, effective training and updating, may provide to these professional category subsidies to quality health care in the Amazon.

Keywords: Amazon, teleconsulting, telehealth, telenursing

Procedia PDF Downloads 283
24279 Consumer Behaviour and Experience When Purchasing Cage-Free Eggs in China

Authors: M. Chen, H. Lee, D. M. Weary

Abstract:

China is the world’s largest egg producer, with more than 90% of production occurring in conventional cages. Cage-free housing systems offer the potential for improving hen welfare, but the growth of this system requires consumer demand, making it is important to understand consumers’ willingness to engage with cage-free eggs. Previous survey research indicates that the majority of Chinese consumers have a basic understanding of cage-free eggs and that some are willing to pay a price premium for these eggs. The aim of this research is to understand consumer behaviour, experience, and motivations when purchasing cage-free eggs in China. Purposive sampling will be used to select 20 participants from each of 2 groups: 1) consumers of cage-free eggs and 2) sales representatives who promote these eggs directly to consumers in supermarkets. This 4-month study will use methods of virtual ethnography to interact with participants repeatedly. Consumers will be asked to share their egg shopping, cooking, and eating experiences, and sales representatives will be asked to share their experiences promoting the eggs to consumers. Data collection will involve audio-recorded interviews, informal conversations (casual texts and calls), participant observation (video calling during shopping, cooking, and eating), and informant diaries (written reflections, photos, videos). All data (field notes, transcripts, diaries, photos, and videos) will be analyzed using Thematic Analysis. We expect that these will result in a nuanced understanding of consumer purchasing behaviour and motivation and will thus help identify strategies to promote higher animal welfare and cage-free egg products in China.

Keywords: animal welfare, cage-free eggs, China, consumer behaviour, ethnography

Procedia PDF Downloads 78
24278 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 58
24277 Missing Link Data Estimation with Recurrent Neural Network: An Application Using Speed Data of Daegu Metropolitan Area

Authors: JaeHwan Yang, Da-Woon Jeong, Seung-Young Kho, Dong-Kyu Kim

Abstract:

In terms of ITS, information on link characteristic is an essential factor for plan or operation. But in practical cases, not every link has installed sensors on it. The link that does not have data on it is called “Missing Link”. The purpose of this study is to impute data of these missing links. To get these data, this study applies the machine learning method. With the machine learning process, especially for the deep learning process, missing link data can be estimated from present link data. For deep learning process, this study uses “Recurrent Neural Network” to take time-series data of road. As input data, Dedicated Short-range Communications (DSRC) data of Dalgubul-daero of Daegu Metropolitan Area had been fed into the learning process. Neural Network structure has 17 links with present data as input, 2 hidden layers, for 1 missing link data. As a result, forecasted data of target link show about 94% of accuracy compared with actual data.

Keywords: data estimation, link data, machine learning, road network

Procedia PDF Downloads 487
24276 Customer Data Analysis Model Using Business Intelligence Tools in Telecommunication Companies

Authors: Monica Lia

Abstract:

This article presents a customer data analysis model using business intelligence tools for data modelling, transforming, data visualization and dynamic reports building. Economic organizational customer’s analysis is made based on the information from the transactional systems of the organization. The paper presents how to develop the data model starting for the data that companies have inside their own operational systems. The owned data can be transformed into useful information about customers using business intelligence tool. For a mature market, knowing the information inside the data and making forecast for strategic decision become more important. Business Intelligence tools are used in business organization as support for decision-making.

Keywords: customer analysis, business intelligence, data warehouse, data mining, decisions, self-service reports, interactive visual analysis, and dynamic dashboards, use cases diagram, process modelling, logical data model, data mart, ETL, star schema, OLAP, data universes

Procedia PDF Downloads 398
24275 Using Electronic Portfolio to Promote English Speaking Ability of EFL Undergraduate Students

Authors: Jiraporn Lao-Un, Dararat Khampusaen

Abstract:

Lack of exposure to English language in the authentic English setting naturally leads to a lack of fluency in the language. As a result, Thai EFL learners are struggling in meeting with the communication 'can do' descriptors of the Common European Framework of References (CEFR) required by the Ministry of Education. This initial phase of the ongoing study, employing the e-portfolio to promote the English speaking ability, probed into the effects of the use of e-portfolio on Thai EFL nursing students' speaking ability. Also, their opinions towards the use of e-portfolio to enhance their speaking ability were investigated. The participants were 44 undergraduate nursing students at a Thai College of Nursing. The participants undertook four lessons to promote their communication skills according to the CEFR criteria. Throughout the semester, the participants videotaped themselves while completing the four speaking tasks. The videos were then uploaded onto the e-portfolio website where the researcher provided them with the feedbacks. The video records were analyzed by the speaking rubric designed according to the CEFR 'can do' descriptors. Also, students were required to record self-reflections in video format and upload onto the same URL Students' oral self-reflections were coded to find out the perceptions towards the use of the e-portfolio in promoting their speaking ability. The results from the two research instruments suggested the effectiveness of the tool on improving speaking ability, learner autonomy and media literacy skills. In addition, the oral reflection videos revealed positive opinion towards the tool. The discussion offers the current status of English speaking ability among Thai EFL students. This reveals the gaps between the EFL speaking ability and the CEFR ‘can do’ descriptors. In addition, the author raises the light on integration of the 21st century IT tool to enhance these students’ speaking ability. Lastly, the theoretical implications and recommendation for further study in integrating electronic tools to promote language skills in the EFL context are offered for further research.

Keywords: EFL communication, EFL speaking, English communication, E-learning, E-portfolio, speaking ability, Thai EFL learners

Procedia PDF Downloads 137
24274 Opening up Government Datasets for Big Data Analysis to Support Policy Decisions

Authors: K. Hardy, A. Maurushat

Abstract:

Policy makers are increasingly looking to make evidence-based decisions. Evidence-based decisions have historically used rigorous methodologies of empirical studies by research institutes, as well as less reliable immediate survey/polls often with limited sample sizes. As we move into the era of Big Data analytics, policy makers are looking to different methodologies to deliver reliable empirics in real-time. The question is not why did these people do this for the last 10 years, but why are these people doing this now, and if the this is undesirable, and how can we have an impact to promote change immediately. Big data analytics rely heavily on government data that has been released in to the public domain. The open data movement promises greater productivity and more efficient delivery of services; however, Australian government agencies remain reluctant to release their data to the general public. This paper considers the barriers to releasing government data as open data, and how these barriers might be overcome.

Keywords: big data, open data, productivity, data governance

Procedia PDF Downloads 343
24273 A Review on Existing Challenges of Data Mining and Future Research Perspectives

Authors: Hema Bhardwaj, D. Srinivasa Rao

Abstract:

Technology for analysing, processing, and extracting meaningful data from enormous and complicated datasets can be termed as "big data." The technique of big data mining and big data analysis is extremely helpful for business movements such as making decisions, building organisational plans, researching the market efficiently, improving sales, etc., because typical management tools cannot handle such complicated datasets. Special computational and statistical issues, such as measurement errors, noise accumulation, spurious correlation, and storage and scalability limitations, are brought on by big data. These unique problems call for new computational and statistical paradigms. This research paper offers an overview of the literature on big data mining, its process, along with problems and difficulties, with a focus on the unique characteristics of big data. Organizations have several difficulties when undertaking data mining, which has an impact on their decision-making. Every day, terabytes of data are produced, yet only around 1% of that data is really analyzed. The idea of the mining and analysis of data and knowledge discovery techniques that have recently been created with practical application systems is presented in this study. This article's conclusion also includes a list of issues and difficulties for further research in the area. The report discusses the management's main big data and data mining challenges.

Keywords: big data, data mining, data analysis, knowledge discovery techniques, data mining challenges

Procedia PDF Downloads 84
24272 Video Processing of a Football Game: Detecting Features of a Football Match for Automated Calculation of Statistics

Authors: Rishabh Beri, Sahil Shah

Abstract:

We have applied a range of filters and processing in order to extract out the various features of the football game, like the field lines of a football field. Another important aspect was the detection of the players in the field and tagging them according to their teams distinguished by their jersey colours. This extracted information combined about the players and field helped us to create a virtual field that consists of the playing field and the players mapped to their locations in it.

Keywords: Detect, Football, Players, Virtual

Procedia PDF Downloads 304
24271 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 163
24270 A Systematic Review on Challenges in Big Data Environment

Authors: Rimmy Yadav, Anmol Preet Kaur

Abstract:

Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.

Keywords: big data, privacy, data management, network and energy consumption

Procedia PDF Downloads 279
24269 Survey on Big Data Stream Classification by Decision Tree

Authors: Mansoureh Ghiasabadi Farahani, Samira Kalantary, Sara Taghi-Pour, Mahboubeh Shamsi

Abstract:

Nowadays, the development of computers technology and its recent applications provide access to new types of data, which have not been considered by the traditional data analysts. Two particularly interesting characteristics of such data sets include their huge size and streaming nature .Incremental learning techniques have been used extensively to address the data stream classification problem. This paper presents a concise survey on the obstacles and the requirements issues classifying data streams with using decision tree. The most important issue is to maintain a balance between accuracy and efficiency, the algorithm should provide good classification performance with a reasonable time response.

Keywords: big data, data streams, classification, decision tree

Procedia PDF Downloads 489
24268 A Development of Producing eBooks Competency of Teachers in Chachengsao, Thailand

Authors: Boonrat Plangsorn

Abstract:

Using ebooks can make not only a meaningful learning and achievement for students, but also can help teacher effectively enhance and improve their teaching. Nowadays, teachers try to develop ebooks for their class but it does not success in some cases because they do not have clear understanding on how to design, develop, and using ebooks that align with their teaching and learning objectives. Thus, the processes of using, designing, and producing ebooks have become one of important competency for teacher because it will enhance teacher’s knowledge for ebooks production. The purposes of this research were: (1) to develop the competency of producing and using ebooks of teachers in Chachengsao and (2) to promote the using ebooks of teachers in Chachengsao. The research procedures were divided into four phases. Phase I (study components and process of the designing and development of ebooks) was an interview in which the qualitative data were collected from five experts in instructional media. Phase II (develop teachers’ competency of producing ebooks) was a workshop for 28 teachers in Chachengsao. Phase III (study teachers’ using ebooks) was an interview in which the qualitative data were collected from seven teachers. Phase IV (study teachers’ using ebooks) was an interview in which the qualitative data were collected from six teachers. The research findings were as follows: 1. The components of ebooks comprised three components: ebooks structure, multimedia, and hyperlink. The eleven processes of design ebooks for education included (1) analyze the ebooks objective, (2) analyze learner characteristics, (3) set objective, (4) set learning content, (5) learner’s motivation, (6) design and construct activity, (7) design hyperlink, (8) produce script and storyboard, (9) confirm storyboard by expert, (10) develop ebooks, and (11) evaluate ebooks. 2. The evaluation of designing and development of ebooks for teacher workshop revealed the participants’ highest satisfaction (M = 4.65). 3. The teachers’ application of ebooks were found that obstacles of producing an ebooks: Time period of producing ebooks, a readiness of school resources, and small teacher network of producing and using ebooks. The result of using ebooks was students’ motivation. 4. The teachers’ ebooks utilization through educational research network of teacher in Chachengsao revealed that the characteristic of ebooks consist of picture, multimedia, voice, music, video, and hyperlink. The application of ebooks caused students interested in the contents; enjoy learning, and enthusiastic learning.

Keywords: ebooks, producing ebooks competency, using ebooks competency, educational research network

Procedia PDF Downloads 327
24267 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication

Authors: Aishwarya Shekhar, Himanshu Sharma

Abstract:

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.

Keywords: confidentiality, deduplication, data compression, hybridity of cloud

Procedia PDF Downloads 360
24266 Melodic and Temporal Structure of Indonesian Sentences of Sitcom "International Class" Actors: Prosodic Study with Experimental Phonetics Approach

Authors: Tri Sulistyaningtyas, Yani Suryani, Dana Waskita, Linda Handayani Sukaemi, Ferry Fauzi Hermawan

Abstract:

The enthusiasm of foreigners studying the Indonesian language by Foreign Speakers (BIPA) was documented in a sitcom "International Class". Tone and stress when they speak the Indonesian language is unique and different from Indonesian pronunciation. By using the Praat program, this research aims to describe prosodic Indonesian language which is spoken by ‘International Class” actors consisting of Abbas from Nigeria, Lee from Korea, and Kotaro from Japan. Data for the research are taken from the video sitcom "International Class" that aired on Indonesian television. The results of this study revealed that pitch movement that arises when pronouncing Indonesian sentences was up and down gradually, there is also a rise and fall sharply. In terms of stress, respondents tend to contain a lot of stress when pronouncing Indonesian sentences. Meanwhile, in terms of temporal structure, the duration pronouncing Indonesian sentences tends to be longer than that of Indonesian speakers.

Keywords: melodic structure, temporal structure, prosody, experimental phonetics, international class

Procedia PDF Downloads 280
24265 A Review of Machine Learning for Big Data

Authors: Devatha Kalyan Kumar, Aravindraj D., Sadathulla A.

Abstract:

Big data are now rapidly expanding in all engineering and science and many other domains. The potential of large or massive data is undoubtedly significant, make sense to require new ways of thinking and learning techniques to address the various big data challenges. Machine learning is continuously unleashing its power in a wide range of applications. In this paper, the latest advances and advancements in the researches on machine learning for big data processing. First, the machine learning techniques methods in recent studies, such as deep learning, representation learning, transfer learning, active learning and distributed and parallel learning. Then focus on the challenges and possible solutions of machine learning for big data.

Keywords: active learning, big data, deep learning, machine learning

Procedia PDF Downloads 409
24264 Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights

Authors: Tomy Prihananto, Damar Apri Sudarmadi

Abstract:

Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.

Keywords: Indonesia, protection, personal data, privacy, human rights, encryption

Procedia PDF Downloads 155
24263 Small-Sided Games in Football: Effect of Field Sizes on Technical Parameters

Authors: Faruk Guven, Nurtekin Erkmen, Samet Aktas, Cengiz Taskin

Abstract:

The aim of this study was to determine effects of field sizes on technical parameters of small-sided games in football players. Eight amateur football players (27.23±3.08 years, heigth: 171.01±5.36 cm, body weigth: 66.86±4.54 kg, sports experience: 12.88±3.28 years) performed 4-a-side small-sided games (SSG) with different field sizes. In SSGs, field sizes were 30 x 40 m and 26 mx24 m. SSGs was conducted as a series of 3 bouts of 6 min with 5 min recovery durations. All SSGs were video recorded using two digital video camcorder positioned on a tripot. Shoot on taget, passes, succesful passes, unsuccesful passes, dripling, tackle, possession in SSGs were counted by Mathball Match Analysis System. The effects of bouts on technical score were examined separately using a Friedman’s test. Mann Whitney U test was applied to analyse differences between field sizes. There were no significant differences in shoots on target, total pass, successful pass, tackle, interception, possession between bouts in 30x40 m field size (p>0.05). Unsuccessful pass in bout 3 for 30x40 m field size was lower than bout 1 and bout 2 (p<0.05) and dripling in bout 3 was lower than bout 2 (p<0.05). There was no significant difference in technical actions between bouts for 26x34 m field size (p>0.05). Shoot on target in SSG with 26 x 34 m field size was higher than SSG with 30x40 m field size (p<0.05). Unsuccessful pass for 26x34 m field size in bout 3 was higher than SSG with 30x40 m field size (p<0.05). There was no significant difference in technical actions between field sizes (p>0.05). In conclusion; in this study demonstrates that technical actions in a-4-side SSG are not influenced by different field sizes (for 30x40 m and 26x34 m field sizes). This consequence is same for both total SSG time and each bout. Dripling and unsuccessful pass decrease in bout 3 during SSG in 30 x 40 m field size.

Keywords: small-sided games, football, technical actions, sport science

Procedia PDF Downloads 524
24262 The Various Legal Dimensions of Genomic Data

Authors: Amy Gooden

Abstract:

When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.

Keywords: artificial intelligence, data, law, genomics, rights

Procedia PDF Downloads 116
24261 Big Brain: A Single Database System for a Federated Data Warehouse Architecture

Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf

Abstract:

Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.

Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)

Procedia PDF Downloads 216
24260 A Review Paper on Data Mining and Genetic Algorithm

Authors: Sikander Singh Cheema, Jasmeen Kaur

Abstract:

In this paper, the concept of data mining is summarized and its one of the important process i.e KDD is summarized. The data mining based on Genetic Algorithm is researched in and ways to achieve the data mining Genetic Algorithm are surveyed. This paper also conducts a formal review on the area of data mining tasks and genetic algorithm in various fields.

Keywords: data mining, KDD, genetic algorithm, descriptive mining, predictive mining

Procedia PDF Downloads 567
24259 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring

Authors: Seung-Lock Seo

Abstract:

This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.

Keywords: data mining, process data, monitoring, safety, industrial processes

Procedia PDF Downloads 372
24258 Recognition of Objects in a Maritime Environment Using a Combination of Pre- and Post-Processing of the Polynomial Fit Method

Authors: R. R. Hordijk, O. J. G. Somsen

Abstract:

Traditionally, radar systems are the eyes and ears of a ship. However, these systems have their drawbacks and nowadays they are extended with systems that work with video and photos. Processing of data from these videos and photos is however very labour-intensive and efforts are being made to automate this process. A major problem when trying to recognize objects in water is that the 'background' is not homogeneous so that traditional image recognition technics do not work well. Main question is, can a method be developed which automate this recognition process. There are a large number of parameters involved to facilitate the identification of objects on such images. One is varying the resolution. In this research, the resolution of some images has been reduced to the extreme value of 1% of the original to reduce clutter before the polynomial fit (pre-processing). It turned out that the searched object was clearly recognizable as its grey value was well above the average. Another approach is to take two images of the same scene shortly after each other and compare the result. Because the water (waves) fluctuates much faster than an object floating in the water one can expect that the object is the only stable item in the two images. Both these methods (pre-processing and comparing two images of the same scene) delivered useful results. Though it is too early to conclude that with these methods all image problems can be solved they are certainly worthwhile for further research.

Keywords: image processing, image recognition, polynomial fit, water

Procedia PDF Downloads 510
24257 A Survey of Semantic Integration Approaches in Bioinformatics

Authors: Chaimaa Messaoudi, Rachida Fissoune, Hassan Badir

Abstract:

Technological advances of computer science and data analysis are helping to provide continuously huge volumes of biological data, which are available on the web. Such advances involve and require powerful techniques for data integration to extract pertinent knowledge and information for a specific question. Biomedical exploration of these big data often requires the use of complex queries across multiple autonomous, heterogeneous and distributed data sources. Semantic integration is an active area of research in several disciplines, such as databases, information-integration, and ontology. We provide a survey of some approaches and techniques for integrating biological data, we focus on those developed in the ontology community.

Keywords: biological ontology, linked data, semantic data integration, semantic web

Procedia PDF Downloads 418