Search results for: data bank
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25013

Search results for: data bank

24503 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive

Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh

Abstract:

Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.

Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data

Procedia PDF Downloads 284
24502 A Fuzzy Kernel K-Medoids Algorithm for Clustering Uncertain Data Objects

Authors: Behnam Tavakkol

Abstract:

Uncertain data mining algorithms use different ways to consider uncertainty in data such as by representing a data object as a sample of points or a probability distribution. Fuzzy methods have long been used for clustering traditional (certain) data objects. They are used to produce non-crisp cluster labels. For uncertain data, however, besides some uncertain fuzzy k-medoids algorithms, not many other fuzzy clustering methods have been developed. In this work, we develop a fuzzy kernel k-medoids algorithm for clustering uncertain data objects. The developed fuzzy kernel k-medoids algorithm is superior to existing fuzzy k-medoids algorithms in clustering data sets with non-linearly separable clusters.

Keywords: clustering algorithm, fuzzy methods, kernel k-medoids, uncertain data

Procedia PDF Downloads 207
24501 A Modified Diminishing Partnership for Home Financing

Authors: N. Yachou, R. Aboulaich

Abstract:

Home is a basic necessity for human life, that why home financing takes a large chunk of people’s income. Therefore, Islamic and Conventional Banks try to offer new product in order to respond to customer needs related to home financing. Basing on this fact, we propose a Modified Diminishing Partnership model based on profit and loss sharing to reduce the duration of getting the full shares in the house property. Our proposition will be represented by the rental that customer has to give every month to the bank with redemption to increase his shares on the property of the house.

Keywords: home financing, interest rate, rental rate, modified diminishing partnership

Procedia PDF Downloads 339
24500 Study of Land Use Changes around an Archaeological Site Using Satellite Imagery Analysis: A Case Study of Hathnora, Madhya Pradesh, India

Authors: Pranita Shivankar, Arun Suryawanshi, Prabodhachandra Deshmukh, S. V. C. Kameswara Rao

Abstract:

Many undesirable significant changes in landscapes and the regions in the vicinity of historically important structures occur as impacts due to anthropogenic activities over a period of time. A better understanding of such influences using recently developed satellite remote sensing techniques helps in planning the strategies for minimizing the negative impacts on the existing environment. In 1982, a fossilized hominid skull cap was discovered at a site located along the northern bank of the east-west flowing river Narmada in the village Hathnora. Close to the same site, the presence of Late Acheulian and Middle Palaeolithic tools have been discovered in the immediately overlying pebbly gravel, suggesting that the ‘Narmada skull’ may be from the Middle Pleistocene age. The reviews of recently carried out research studies relevant to hominid remains all over the world from Late Acheulian and Middle Palaeolithic sites suggest succession and contemporaneity of cultures there, enhancing the importance of Hathnora as a rare precious site. In this context, the maximum likelihood classification using digital interpretation techniques was carried out for this study area using the satellite imagery from Landsat ETM+ for the year 2006 and Landsat TM (OLI and TIRS) for the year 2016. The overall accuracy of Land Use Land Cover (LULC) classification of 2016 imagery was around 77.27% based on ground truth data. The significant reduction in the main river course and agricultural activities and increase in the built-up area observed in remote sensing data analysis are undoubtedly the outcome of human encroachments in the vicinity of the eminent heritage site.

Keywords: cultural succession, digital interpretation, Hathnora, Homo Sapiens, Late Acheulian, Middle Palaeolithic

Procedia PDF Downloads 162
24499 COVID-19 Pandemic and Disruptions in Nigeria’s Domestic Economic Activities: A Pre-post Empirical Investigation

Authors: Amaefule, Leonard Ifeanyi

Abstract:

The study evaluated the disruptions in Nigeria’s domestic economic activities occasioned by the COVID-19 pandemic: a pre and post-pandemic investigation approach. Domestic economic activities were measured with composite manufacturing purchasing managers index (PMI) and composite non-manufacturing PMI. Production and employment levels indices were proxies for composite manufacturing PMI, while business activities and employment level indices were proxies for non-manufacturing PMI. Data for these indices were sourced from monthly and quarterly publications of the Central Bank of Nigeria for periods covering fifteen (15) months before and 15 months after the outbreak of the virus in Nigeria. Test of equality of means was employed in establishing the significance of the difference of means between the pre and post-pandemic domestic economic activities. Results from the analysis indicated that a significant negative difference exists in each of the measures of domestic economic activities between the pre and post-pandemic periods. These findings, therefore, offer empirical evidence that the COVID-19 pandemic has disrupted domestic economic activities in Nigeria; thus, it exerts a negative influence on the measures of the nation’s domestic economic activities. The study thus recommended (among other things) that the Nigerian government should focus on policies that would enhance domestic production, employment and enhance business activities.

Keywords: COVID-19, domestic economic activities, composite manufacturing indices, composite non-manufacturing indices

Procedia PDF Downloads 162
24498 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 192
24497 Healthcare Data Mining Innovations

Authors: Eugenia Jilinguirian

Abstract:

In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.

Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database

Procedia PDF Downloads 59
24496 Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering

Authors: Yunus Doğan, Ahmet Durap

Abstract:

Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine.

Keywords: clustering algorithms, coastal engineering, data mining, data summarization, statistical methods

Procedia PDF Downloads 356
24495 Biopotential of Introduced False Indigo and Albizia’s Weevils in Host Plant Control and Duration of Its Development Stages in Southern Regions of Panonian Basin

Authors: Renata Gagić-Serdar, Miroslava Markovic, Ljubinko Rakonjac, Aleksandar Lučić

Abstract:

The paper present the results of the entomological experimental studies of the biological, ecological, and (bionomic) insect performances, such as seasonal adaptation of introduced monophagous false indigo and albizias weevil’s Acanthoscelides pallidipennis Motschulsky. and Bruchidius terrenus (Sharp), Coleoptera: Chrysomelidae: Bruchinae, to phenological phases of aggressive invasive host plant Amorpha fruticosa L. and Albizia julibrissin (Fabales: Fabaceae) on the territory of Republic of Serbia with special attention on assessing and monitoring of new formed and detected inter species relations between autochthons parasite wasps from fauna (Hymenoptera: Chalcidoidea) and herbaceous seed weevil beetle. During 15 years (2006-2021), on approximately 30 localities, data analyses were done for observed experimental host plants from samples with statistical significance. Status of genera from families Hymenoptera: Chalcidoidea.: Pteromalidae and Eulophidae, after intensive investigations, has been trophicly identified. Recorded seed pest species of A. fruticosa or A. julibrissin (Fabales: Fabaceae) was introduced in Serbia and planted as ornamental trees, they also were put undergo different kinds of laboratory and field research tests during this period in a goal of collecting data about lasting each of develop stage of their seed beetles. Field generations in different stages were also monitored by continuous infested seed collecting and its disection. Established host plant-seed predator linkage was observed in correlation with different environment parameters, especially water level fluctuations in bank corridor formation stands and riparian cultures.

Keywords: amorpha, albizia, chalcidoid wasp, invasiveness, weevils

Procedia PDF Downloads 84
24494 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 77
24493 Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises

Authors: Martin Böhmer, Agatha Dabrowski, Boris Otto

Abstract:

The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a “data knowledge model”. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research.

Keywords: data management, digitization, industry 4.0, knowledge engineering, metamodel

Procedia PDF Downloads 348
24492 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 350
24491 An Empirical Research on Customer Knowledge Management in the Iranian Banks

Authors: Ebrahim Gharleghi

Abstract:

This paper aims to examine how customer knowledge management (CKM) can be implemented in Iranian Banks in practice, with the focus on the human resource (people, technology and processes) as important factors of CKM. A conceptual model of an analytical CKM strategy for CKM in this Iranian Banks is developed from the findings and literature review. This article has been based on interviews and distributing the questionnaire. Data were collected from 260 managers from bank managers. The paper finds that hypotheses were tested using student’s t-test (one-sample t-test), Pearson correlation analysis and regression analysis. Test of hypotheses revealed that human, technology and processes factors positively and significantly influenced the implementation of CKM practices. These findings tend to corroborate our conceptual model. Human factor of CKM was found to be more significantly affecting appropriate CKM implementation than others CKM factors, indicating that this factor is more important than the others aspects of CKM. On the other hand, this factor is appropriate in Iranian Banks. Process is in second part and technology is in final part. This indicates that technology infrastructures are so weak in Iranian Banks for CKM implementation. In this paper there is little or no empirical evidence investigating the amount of the execution of the CKM in Iranian Banks. This paper rectifies this imbalance by clarifying the significance human, technology and processes factors in CKM implementation.

Keywords: knowledge management, customer relationship management, customer knowledge management, integration, people, technology, process

Procedia PDF Downloads 264
24490 Challenging Shariah-Compliant Contract: A Latest Insight into the Malaysian Court Cases

Authors: Noor Suhaida Kasri

Abstract:

In the last three decades, Malaysia has developed fundamental legal and regulatory structures that aim to accommodate and facilitate the growth of Islamic banking and finance industry. Important building blocks have been put in place, to cite a few, the elevation of the position of the Malaysian Central Bank Shariah Advisory Council (SAC) as the apex advisory body and the empowerment of their Shariah resolutions through the Central Bank Act 1958; the promulgation of the Islamic Financial Services Act 2013 that regulate and govern Islamic finance market with a robust statutory requirement of Shariah governance and Shariah compliance. Notwithstanding these achievements, enforceability of Shariah-compliant contract remains a contentious subject. The validity of Al Bai Bithaman Ajil concept that was commonly used by the Islamic financial institutions in their financing facilities structures and documentation has been unabatedly challenged by the customers in courts. The challenge was due to the manner in which the Al Bai Bithaman Ajil transactions were carried out. Due to this legal challenge, Al Bai Bithaman Ajil financing structure seems to no longer be the practitioners’ favourite in Malaysia, though its substitute tawarruq and commodity murabahah financing structure may potentially face similar legal challenges. This paper examines the legal challenges affecting the enforceability of these underlying Shariah contracts. The examination of these cases highlights the manner in which these contracts were being implemented and applied by the Malaysian Islamic financial institutions that triggered Shariah and legal concern. The analysis also highlights the approach adopted by the Malaysian courts in determining the Shariah issues as well as the SAC in ascertaining the rulings on the Shariah issues referred to it by the courts. The paper adopts a qualitative research methodology by using textual and documentary analysis approach. The outcome of this study underlines factors that require consideration by industry stakeholder in order to ameliorate the efficacy of the existing building blocks that would eventually strengthens the validity and enforceability of Shariah-compliant contracts. This, in the long run, will further reinforce financial stability and trust into the Islamic banking and finance industry in Malaysia.

Keywords: enforceability of Shariah compliant contract, legal challenge, legal and regulatory framework, Shariah Advisory Council

Procedia PDF Downloads 227
24489 Congenital Sublingual Dermoid Cyst with Cutaneous Fistula

Authors: Rafael Ricieri, Rogerio Barros, Francisco Clovis

Abstract:

Objective– The Objective of this is study is to report a rare case of dermoid cyst, with a sublingual location and cutaneous fistula in a 4 year-old child.Methods: This study is a case report. The main study instrument was the medical record and the radiological and intraoperative image bank. Results: Infants with congenital cervical lesions eventually need tomography for diagnostic elucidation, and health services should be structured to perform sedation and thin tomographic sections in order to reduce morbidity.

Keywords: congenital, sublingual dermoid cyst, fistula, pediatric surgery, head and kneck surgery

Procedia PDF Downloads 78
24488 On the Combination of Patient-Generated Data with Data from a Secure Clinical Network Environment: A Practical Example

Authors: Jeroen S. de Bruin, Karin Schindler, Christian Schuh

Abstract:

With increasingly more mobile health applications appearing due to the popularity of smartphones, the possibility arises that these data can be used to improve the medical diagnostic process, as well as the overall quality of healthcare, while at the same time lowering costs. However, as of yet there have been no reports of a successful combination of patient-generated data from smartphones with data from clinical routine. In this paper, we describe how these two types of data can be combined in a secure way without modification to hospital information systems, and how they can together be used in a medical expert system for automatic nutritional classification and triage.

Keywords: mobile health, data integration, expert systems, disease-related malnutrition

Procedia PDF Downloads 471
24487 Morphological Characteristics and Development of the Estuary Area of Lam River, Vietnam

Authors: Hai Nguyen Tien

Abstract:

On the basis of the structure of alluvial sediments explained by echo sounding data and remote sensing images, the following results can be given: The estuary of Lam river (from Ben Thuy bridge to Cua Hoi) is divided into 3 channel (location is calculated according to the river bank on the Nghe An province) : i) channel I (from Ben Thuy bridge to Hung Hoa) is the branching river; ii) channel II (from Hung Hoa to Nghi Thai is a channel develops in a meandering direction with a concave side toward Ha Tinh province; iii) channel III, from Nghi Thai to Cua Hoi is a channel develops in a meandering direction with a concave side toward Nghe An province. This estuary area is formed in the period from after the sea level dropped below 0m (current water level) to the present: i) Chanel II developed moving towards Ha Tinh provnce; ii) Chanel III developed moving towards Nghe An province; iii) In chanel I, a second river branch is formed because the flow of river cuts through the Hong Lam- Hong Nhat mudflat, at the same time creating an island. Morphological characteristics of the estuary area of Lam River are the main result of erosion and deposition activities corresponding to two water levels: low water level below 0 m and water level 0 m (current water level). Characteristics of the sediment layers on the riverbed in the estuary can be used to determine the sea levels in Late Holocene–Present.

Keywords: Lam River, development, Cua Hoi, river morphology

Procedia PDF Downloads 120
24486 The Prospects of Leveraging (Big) Data for Accelerating a Just Sustainable Transition around Different Contexts

Authors: Sombol Mokhles

Abstract:

This paper tries to show the prospects of utilising (big)data for enabling just the transition of diverse cities. Our key purpose is to offer a framework of applications and implications of utlising (big) data in comparing sustainability transitions across different cities. Relying on the cosmopolitan comparison, this paper explains the potential application of (big) data but also its limitations. The paper calls for adopting a data-driven and just perspective in including different cities around the world. Having a just and inclusive approach at the front and centre ensures a just transition with synergistic effects that leave nobody behind.

Keywords: big data, just sustainable transition, cosmopolitan city comparison, cities

Procedia PDF Downloads 93
24485 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 376
24484 Acceptance of Big Data Technologies and Its Influence towards Employee’s Perception on Job Performance

Authors: Jia Yi Yap, Angela S. H. Lee

Abstract:

With the use of big data technologies, organization can get result that they are interested in. Big data technologies simply load all the data that is useful for the organizations and provide organizations a better way of analysing data. The purpose of this research is to get employees’ opinion from films in Malaysia to explore the use of big data technologies in their organization in order to provide how it may affect the perception of the employees on job performance. Therefore, in order to identify will accepting big data technologies in the organization affect the perception of the employee, questionnaire will be distributed to different employee from different Small and medium-sized enterprises (SME) organization listed in Malaysia. The conceptual model proposed will test with other variables in order to see the relationship between variables.

Keywords: big data technologies, employee, job performance, questionnaire

Procedia PDF Downloads 286
24483 Female Entrepreneurship in Egypt: Barriers and Challenges in the Aftermath of the Arab Spring

Authors: Kate Ebere Maduforo

Abstract:

Examining the constraints faced by female entrepreneurs is an important subject which most literature on female entrepreneurship is centered on. However, the majority of the existing literature has focused on studying female entrepreneurs in developed societies. Recently, a sense of urgency that has emerged in trying to understand the challenges and motivations of female entrepreneurs in developing countries. The arousal of such interest has been attributed to women entrepreneurs in developing countries being identified as catalysts of economic development at a national level and champions of poverty eradication at the domestic level. This paper, therefore, examines the peculiar constraints faced by women-owned businesses in the mist of political chaos and instability. In this case, the issues experienced by female entrepreneurs in Egypt during the aftermath of the Arab Spring is the focus. Using the logit and probit regression models, data from the World Bank Middle East North Africa Enterprise Survey (MENA ES) are analyzed. The results identified that female entrepreneurs still lack business funding through financial institutions, but get significant funding assistance from family, friends, and money lenders. In addition, women-owned businesses promote and hire mostly women. Female entrepreneurs showed a preference for an impartial judicial system as a contributor to business growth.

Keywords: female entrepreneurship, development, Middle East, developing countries

Procedia PDF Downloads 113
24482 The Importance of Changing the Traditional Mode of Higher Education in Bangladesh: Creating Huge Job Opportunities for Home and Abroad

Authors: M. M. Shahidul Hassan, Omiya Hassan

Abstract:

Bangladesh has set its goal to reach upper middle-income country status by 2024. To attain this status, the country must satisfy the World Bank requirement of achieving minimum Gross National Income (GNI). Number of youth job seekers in the country is increasing. University graduates are looking for decent jobs. So, the vital issue of this country is to understand how the GNI and jobs can be increased. The objective of this paper is to address these issues and find ways to create more job opportunities for youths at home and abroad which will increase the country’s GNI. The paper studies proportion of different goods Bangladesh exported, and also the percentage of employment in different sectors. The data used here for the purpose of analysis have been collected from the available literature. These data are then plotted and analyzed. Through these studies, it is concluded that growth in sectors like agricultural, ready-made garments (RMG), jute industries and fisheries are declining and the business community is not interested in setting up capital-intensive industries. Under this situation, the country needs to explore other business opportunities for a higher economic growth rate. Knowledge can substitute the physical resource. Since the country consists of the large youth population, higher education will play a key role in economic development. It now needs graduates with higher-order skills with innovative quality. Such dispositions demand changes in a university’s curriculum, teaching and assessment method which will function young generations as active learners and creators. By bringing these changes in higher education, a knowledge-based society can be created. The application of such knowledge and creativity will then become the commodity of Bangladesh which will help to reach its goal as an upper middle-income country.

Keywords: Bangladesh, economic sectors, economic growth, higher education, knowledge-based economy, massifcation of higher education, teaching and learning, universities’ role in society

Procedia PDF Downloads 156
24481 Critical Factors Boosting the Future Economy of Eritrea: An Empirical Approach

Authors: Biniam Tedros Kahsay, Yohannes Yebabe Tesfay

Abstract:

Eritrea is a country in the East of Africa. The country is a neighbor of Djibouti, Ethiopia, and Sudan and is bordered by the Red Sea. The country declared its independence from Ethiopia in 1993. Thus, Eritrea has a lot of commonalities with the Northern Part of Ethiopia's tradition, religion, and languages. Many economists suggested that Eritrea is in a very strategic position for world trade roots and has an impact on geopolitics. This study focused on identifying the most important factor in boosting the Eritrean Economy. The paper collected big secondary data from the World Bank, International Trade and Tariff Data (WTO), East African Community (EAC), Ethiopian Statistical Agency (ESA), and the National Statistics Office (Eritrea). Economists consider economic and population growth in determining trade belts in East Africa. One of the most important Trade Belt that will potentially boost the Eritrean economy is the root of Eritrea (Massawa)->Eritea, (Asmara)->Tigray, (Humora)->Tigray, (Dansha)-> Gondar-> Gojjam-> Benshangual Gumuz => {Oromia, South Sudan}->Uganda. The estimate showed that this is one of the biggest trade roots in East Africa and has a participation of more than 150 million people. We employed various econometric analyses to predict the GDP of Eritrea, considering the future trade belts in East Africa. The result showed that the economy of Eritrea from the Trade Belt will have an elasticity estimate of 65.87% of the GDP of Ethiopia, 3.32% of the GDP of South Sudan, and 0.09% of the GDP of Uganda. The result showed that the existence of war has an elasticity of -93% to the GDP of the country. Thus, if Eritrea wants to strengthen its economy from the East African Trade Belt, the country needs to permanently avoid war in the region. Essentially, the country needs to establish a collaborative platform with the Northern part of Ethiopia (Tigray). Thus, establishing a mutual relationship with Tigray will boost the Eritrean economy. In that regard, Eritrean scholars and policymakers need to work on establishing the East African Trade Belt to boost their economy.

Keywords: Eritrea, east Africa trade belt, GDP, cointegration analysis, critical path analysis

Procedia PDF Downloads 49
24480 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 78
24479 Simulation and Hardware Implementation of Data Communication Between CAN Controllers for Automotive Applications

Authors: R. M. Kalayappan, N. Kathiravan

Abstract:

In automobile industries, Controller Area Network (CAN) is widely used to reduce the system complexity and inter-task communication. Therefore, this paper proposes the hardware implementation of data frame communication between one controller to other. The CAN data frames and protocols will be explained deeply, here. The data frames are transferred without any collision or corruption. The simulation is made in the KEIL vision software to display the data transfer between transmitter and receiver in CAN. ARM7 micro-controller is used to transfer data’s between the controllers in real time. Data transfer is verified using the CRO.

Keywords: control area network (CAN), automotive electronic control unit, CAN 2.0, industry

Procedia PDF Downloads 392
24478 Improving the Statistics Nature in Research Information System

Authors: Rajbir Cheema

Abstract:

In order to introduce an integrated research information system, this will provide scientific institutions with the necessary information on research activities and research results in assured quality. Since data collection, duplication, missing values, incorrect formatting, inconsistencies, etc. can arise in the collection of research data in different research information systems, which can have a wide range of negative effects on data quality, the subject of data quality should be treated with better results. This paper examines the data quality problems in research information systems and presents the new techniques that enable organizations to improve their quality of research information.

Keywords: Research information systems (RIS), research information, heterogeneous sources, data quality, data cleansing, science system, standardization

Procedia PDF Downloads 149
24477 Data Mining Meets Educational Analysis: Opportunities and Challenges for Research

Authors: Carla Silva

Abstract:

Recent development of information and communication technology enables us to acquire, collect, analyse data in various fields of socioeconomic – technological systems. Along with the increase of economic globalization and the evolution of information technology, data mining has become an important approach for economic data analysis. As a result, there has been a critical need for automated approaches to effective and efficient usage of massive amount of educational data, in order to support institutions to a strategic planning and investment decision-making. In this article, we will address data from several different perspectives and define the applied data to sciences. Many believe that 'big data' will transform business, government, and other aspects of the economy. We discuss how new data may impact educational policy and educational research. Large scale administrative data sets and proprietary private sector data can greatly improve the way we measure, track, and describe educational activity and educational impact. We also consider whether the big data predictive modeling tools that have emerged in statistics and computer science may prove useful in educational and furthermore in economics. Finally, we highlight a number of challenges and opportunities for future research.

Keywords: data mining, research analysis, investment decision-making, educational research

Procedia PDF Downloads 345
24476 Architectural Identity in Manifestation of Tall-buildings' Design

Authors: Huda Arshadlamphon

Abstract:

Advancing frontiers of technology and industry is moving rapidly fast influenced by the economic and political phenomena. One vital phenomenon,which has had consolidated the world to a one single village, is Globalization. In response, architecture and the built-environment have faced numerous changes, adjustments, and developments. Tall-buildings, as a product of globalization, represent prestigious icons, symbols, and landmarks for highly economics and advanced countries. Despite the fact, this trend has been encountering several design challenges incorporating architectural identity, traditions, and characteristics that enhance the built-environments' sociocultural values and traditions. The necessity of these values and traditionsform self-solitarily, leading to visual and spatial creativity, independency, and individuality. In other words, they maintain the inherited identity and avoid replications in all means and aspects. This paper, firstly, defines globalization phenomenon, architectural identity, and the concerns of sociocultural values in relation to the traditional characteristics of the built-environment. Secondly, through three case-studies of tall-buildings located in Jeddah city, Saudi Arabia, the Queen's Building, the National Commercial Bank Building (NCB), and the Islamic Development Bank Building; design strategies and methodologies in acclimating architectural identity and characteristics in tall-buildings are discussed. The case-studies highlight buildings' sites and surroundings, concepts and inspirations, design elements, architectural forms and compositions, characteristics, issues, barriers, and trammels facing the designs' decisions, representation of facades, and selection of materials and colors. Furthermore, the research will elucidate briefs of the dominant factors that shape the architectural identity of Jeddah city. In conclusion, the study manifests four tall-buildings' design standards guideline in preserving and developing architectural identity in Jeddah city; the scale of urban and natural environment, the scale of architectural design elements, the integration of visual images, and the creation of spatial scenes and scenarios. The prosed guideline will encourage the development of architectural identity aligned with zeitgeist demands and requirements, supports the contemporary architectural movement toward tall-buildings, and shoresself-solitarily in representing sociocultural values and traditions of the built-environment.

Keywords: architectural identity, built-environment, globalization, sociocultural values and traditions, tall-buildings

Procedia PDF Downloads 156
24475 Policy Implications of Cashless Banking on Nigeria’s Economy

Authors: Oluwabiyi Adeola Ayodele

Abstract:

This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.

Keywords: cashless-banking, Nigeria, policies, laws

Procedia PDF Downloads 483
24474 A Method of Detecting the Difference in Two States of Brain Using Statistical Analysis of EEG Raw Data

Authors: Digvijaysingh S. Bana, Kiran R. Trivedi

Abstract:

This paper introduces various methods for the alpha wave to detect the difference between two states of brain. One healthy subject participated in the experiment. EEG was measured on the forehead above the eye (FP1 Position) with reference and ground electrode are on the ear clip. The data samples are obtained in the form of EEG raw data. The time duration of reading is of one minute. Various test are being performed on the alpha band EEG raw data.The readings are performed in different time duration of the entire day. The statistical analysis is being carried out on the EEG sample data in the form of various tests.

Keywords: electroencephalogram(EEG), biometrics, authentication, EEG raw data

Procedia PDF Downloads 454