Search results for: data source
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28346

Search results for: data source

27806 Kinetics of Cu(II) Transport through Bulk Liquid Membrane with Different Membrane Materials

Authors: Siu Hua Chang, Ayub Md Som, Jagannathan Krishnan

Abstract:

The kinetics of Cu(II) transport through a bulk liquid membrane with different membrane materials was investigated in this work. Three types of membrane materials were used: Fresh cooking oil, waste cooking oil, and kerosene each of which was mixed with di-2-ethylhexylphosphoric acid (carrier) and tributylphosphate (modifier). Kinetic models derived from the kinetic laws of two consecutive irreversible first-order reactions were used to study the facilitated transport of Cu(II) across the source, membrane, and receiving phases of bulk liquid membrane. It was found that the transport kinetics of Cu(II) across the source phase was not affected by different types of membrane materials but decreased considerably when the membrane materials changed from kerosene, waste cooking oil to fresh cooking oil. The rate constants of Cu(II) removal and recovery processes through the bulk liquid membrane were also determined.

Keywords: transport kinetics, Cu(II), bulk liquid membrane, waste cooking oil

Procedia PDF Downloads 426
27805 Achieving Maximum Performance through the Practice of Entrepreneurial Ethics: Evidence from SMEs in Nigeria

Authors: S. B. Tende, H. L. Abubakar

Abstract:

It is acknowledged that small and medium enterprises (SMEs) may encounter different ethical issues and pressures that could affect the way in which they strategize or make decisions concerning the outcome of their business. Therefore, this research aimed at assessing entrepreneurial ethics in the business of SMEs in Nigeria. Secondary data were adopted as source of corpus for the analysis. The findings conclude that a sound entrepreneurial ethics system has a significant effect on the level of performance of SMEs in Nigeria. The Nigerian Government needs to provide both guiding and physical structures; as well as learning systems that could inculcate these entrepreneurial ethics.

Keywords: culture, entrepreneurial ethics, performance, SME

Procedia PDF Downloads 383
27804 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 339
27803 Development of an EEG-Based Real-Time Emotion Recognition System on Edge AI

Authors: James Rigor Camacho, Wansu Lim

Abstract:

Over the last few years, the development of new wearable and processing technologies has accelerated in order to harness physiological data such as electroencephalograms (EEGs) for EEG-based applications. EEG has been demonstrated to be a source of emotion recognition signals with the highest classification accuracy among physiological signals. However, when emotion recognition systems are used for real-time classification, the training unit is frequently left to run offline or in the cloud rather than working locally on the edge. That strategy has hampered research, and the full potential of using an edge AI device has yet to be realized. Edge AI devices are computers with high performance that can process complex algorithms. It is capable of collecting, processing, and storing data on its own. It can also analyze and apply complicated algorithms like localization, detection, and recognition on a real-time application, making it a powerful embedded device. The NVIDIA Jetson series, specifically the Jetson Nano device, was used in the implementation. The cEEGrid, which is integrated to the open-source brain computer-interface platform (OpenBCI), is used to collect EEG signals. An EEG-based real-time emotion recognition system on Edge AI is proposed in this paper. To perform graphical spectrogram categorization of EEG signals and to predict emotional states based on input data properties, machine learning-based classifiers were used. Until the emotional state was identified, the EEG signals were analyzed using the K-Nearest Neighbor (KNN) technique, which is a supervised learning system. In EEG signal processing, after each EEG signal has been received in real-time and translated from time to frequency domain, the Fast Fourier Transform (FFT) technique is utilized to observe the frequency bands in each EEG signal. To appropriately show the variance of each EEG frequency band, power density, standard deviation, and mean are calculated and employed. The next stage is to identify the features that have been chosen to predict emotion in EEG data using the K-Nearest Neighbors (KNN) technique. Arousal and valence datasets are used to train the parameters defined by the KNN technique.Because classification and recognition of specific classes, as well as emotion prediction, are conducted both online and locally on the edge, the KNN technique increased the performance of the emotion recognition system on the NVIDIA Jetson Nano. Finally, this implementation aims to bridge the research gap on cost-effective and efficient real-time emotion recognition using a resource constrained hardware device, like the NVIDIA Jetson Nano. On the cutting edge of AI, EEG-based emotion identification can be employed in applications that can rapidly expand the research and implementation industry's use.

Keywords: edge AI device, EEG, emotion recognition system, supervised learning algorithm, sensors

Procedia PDF Downloads 105
27802 An Application for Risk of Crime Prediction Using Machine Learning

Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento

Abstract:

The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.

Keywords: crime prediction, machine learning, public safety, smart city

Procedia PDF Downloads 111
27801 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
27800 An Overview of Posterior Fossa Associated Pathologies and Segmentation

Authors: Samuel J. Ahmad, Michael Zhu, Andrew J. Kobets

Abstract:

Segmentation tools continue to advance, evolving from manual methods to automated contouring technologies utilizing convolutional neural networks. These techniques have evaluated ventricular and hemorrhagic volumes in the past but may be applied in novel ways to assess posterior fossa-associated pathologies such as Chiari malformations. Herein, we summarize literature pertaining to segmentation in the context of this and other posterior fossa-based diseases such as trigeminal neuralgia, hemifacial spasm, and posterior fossa syndrome. A literature search for volumetric analysis of the posterior fossa identified 27 papers where semi-automated, automated, manual segmentation, linear measurement-based formulas, and the Cavalieri estimator were utilized. These studies produced superior data than older methods utilizing formulas for rough volumetric estimations. The most commonly used segmentation technique was semi-automated segmentation (12 studies). Manual segmentation was the second most common technique (7 studies). Automated segmentation techniques (4 studies) and the Cavalieri estimator (3 studies), a point-counting method that uses a grid of points to estimate the volume of a region, were the next most commonly used techniques. The least commonly utilized segmentation technique was linear measurement-based formulas (1 study). Semi-automated segmentation produced accurate, reproducible results. However, it is apparent that there does not exist a single semi-automated software, open source or otherwise, that has been widely applied to the posterior fossa. Fully-automated segmentation via such open source software as FSL and Freesurfer produced highly accurate posterior fossa segmentations. Various forms of segmentation have been used to assess posterior fossa pathologies and each has its advantages and disadvantages. According to our results, semi-automated segmentation is the predominant method. However, atlas-based automated segmentation is an extremely promising method that produces accurate results. Future evolution of segmentation technologies will undoubtedly yield superior results, which may be applied to posterior fossa related pathologies. Medical professionals will save time and effort analyzing large sets of data due to these advances.

Keywords: chiari, posterior fossa, segmentation, volumetric

Procedia PDF Downloads 106
27799 Modal Composition and Tectonic Provenance of the Sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province, South Africa

Authors: Christopher Baiyegunhi, Kuiwu Liu, Oswald Gwavava

Abstract:

Petrography of the sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province of South Africa have been investigated on composition, provenance and influence of weathering conditions. Petrographic studies based on quantitative analysis of the detrital minerals revealed that the sandstones are composed mostly of quartz, feldspar and lithic fragments of metamorphic and sedimentary rocks. The sandstones have an average framework composition of 24.3% quartz, 19.3% feldspar, 26.1% rock fragments, and 81.33% of the quartz grains are monocrystalline. These sandstones are generally very fine to fine grained, moderate to well sorted, and subangular to subrounded in shape. In addition, they are compositionally immature and can be classified as feldspathic wacke and lithic wacke. The absence of major petrographically distinctive compositional variations in the sandstones perhaps indicate homogeneity of their source. As a result of this, it is inferred that the transportation distance from the source area was quite short and the main mechanism of transportation was by river systems to the basin. The QFL ternary diagrams revealed dissected and transitional arc provenance pointing to an active margin and uplifted basement preserving the signature of a recycled provenance. This is an indication that the sandstones were derived from a magmatic arc provenance. Since magmatic provenance includes transitional arc and dissected arc, it also shows that the source area of the Ecca sediments had a secondary sedimentary and metasedimentary rocks from a marginal belt that developed as a result of rifting. The weathering diagrams and semi-quantitative weathering index indicate that the Ecca sandstones are mostly from a plutonic source area, with climatic conditions ranging from arid to humid. The compositional immaturity of the sandstones is suggested to be due to weathering or recycling and low relief or short transport from the source area. The detrital modal compositions of these sandstones are related to back arc to island and continental margin arc. The origin and deposition of the Ecca sandstones are due to low-moderate weathering, recycling of pre-existing rocks, erosion and transportation of debris from the orogeny of the Cape Fold Belt.

Keywords: petrography, tectonic setting, provenance, Ecca Group, Karoo Basin

Procedia PDF Downloads 433
27798 Analysis of Possible Causes of Fukushima Disaster

Authors: Abid Hossain Khan, Syam Hasan, M. A. R. Sarkar

Abstract:

Fukushima disaster is one of the most publicly exposed accidents in a nuclear facility which has changed the outlook of people towards nuclear power. Some have used it as an example to establish nuclear energy as an unsafe source, while others have tried to find the real reasons behind this accident. Many papers have tried to shed light on the possible causes, some of which are purely based on assumptions while others rely on rigorous data analysis. To our best knowledge, none of the works can say with absolute certainty that there is a single prominent reason that has paved the way to this unexpected incident. This paper attempts to compile all the apparent reasons behind Fukushima disaster and tries to analyze and identify the most likely one.

Keywords: fuel meltdown, Fukushima disaster, Manmade calamity, nuclear facility, tsunami

Procedia PDF Downloads 266
27797 The Translation of Code-Switching in African Literature: Comparing the Two German Translations of Ngugi Wa Thiongo’s "Petals of Blood"

Authors: Omotayo Olalere

Abstract:

The relevance of code-switching for intercultural communication through literary translation cannot be overemphasized. The translation of code-switching and its implications for translations studies have been studied in the context of African literature. In these cases, code-switching was examined in the more general terms of its usage in source text and not particularly in Ngugi’s novels and its translations. In addition, the functions of translation and code-switching in the lyrics of some popular African songs have been studied, but this study is related more with oral performance than with written literature. As such, little has been done on the German translation of code-switching in African works. This study intends to fill this lacuna by examining the concept of code-switching in the German translations in Ngugi’s Petals of Blood. The aim is to highlight the significance of code-switching as a phenomenon in this African (Ngugi’s) novel written in English and to also focus on its representation in the two German translations. The target texts to be used are Verbrannte Blueten and Land der flammenden Blueten. “Abrogration“ as a concept will play an important role in the analysis of the data. Findings will show that the ideology of a translator plays a huge role in representing the concept of “abrogration” in the translation of code-switching in the selected source text. The study will contribute to knowledge in translation studies by bringing to limelight the need to foreground aspects of language contact in translation theory and practice, particularly in the African context. Relevant translation theories adopted for the study include Bandia’s (2008) postcolonial theory of translation and Snell-Hornby”s (1988) cultural translation theory.

Keywords: code switching, german translation, ngugi wa thiong’o, petals of blood

Procedia PDF Downloads 91
27796 In Search of CO₂: Gravity and Magnetic Data for Eor Prospect Generation in Central Libya

Authors: Ahmed Saheel, Milad Ahmed Elmaradi, Tim Archer, Muammer Ahmed Aboaesha, Abdulkhaliq Abdulmajid Altoubashi

Abstract:

Enhanced oil recovery using carbon dioxide (CO₂-EOR) is a method that can increase oil production beyond what is typically achievable using conventional recovery methods by injecting and hence storing, carbon dioxide (CO₂) in the oil reservoir. In Libya, plans are underway to source a proportion of this CO₂ from subsurface geology that is known from previous drilling to contain high volumes of CO₂. But first, these subsurface volumes need to be more clearly defined and understood. Focusing on the Al-Harouj region of central Libya, ground gravity and airborne magnetic data from the LPI database and the African Magnetic Mapping Project respectively have been prepared and processed by Libyan Petroleum Institute (LPI) and Reid Geophysics Limited (RGL) to produce a range of grids and related products suitable for interpreting geological structure and to make recommendations for subsequent work that will assist CO₂ exploration for purposes of enhanced oil recovery (EOR).

Keywords: gravity anomaly, magnetic anomaly, DEDUCED lineaments, Total horizontal derivative, upward-continuation

Procedia PDF Downloads 126
27795 The Improvement of Environmental Protection through Motor Vehicle Noise Abatement

Authors: Z. Jovanovic, Z. Masonicic, S. Dragutinovic, Z. Sakota

Abstract:

In this paper, a methodology for noise reduction of motor vehicles in use is presented. The methodology relies on synergic model of noise generation as a function of time. The arbitrary number of motor vehicle noise sources act in concert yielding the generation of the overall noise level of motor vehicle thereafter. The number of noise sources participating in the overall noise level of motor vehicle is subjected to the constraint of the calculation of the acoustic potential of each noise source under consideration. It is the prerequisite condition for the calculation of the acoustic potential of the whole vehicle. The recast form of pertinent set of equations describing the synergic model is laid down and solved by dint of Gauss method. The bunch of results emerged and some of them i.e. those ensuing from model application to MDD FAP Priboj motor vehicle in use are particularly elucidated.

Keywords: noise abatement, MV noise sources, noise source identification, muffler

Procedia PDF Downloads 445
27794 Chronic Renal Failure Associated with Heavy Metal Contamination of Drinking Water in Hail, Kingdom of Saudi Arabia

Authors: Elsayed A. M. Shokr, A. Alhazemi, T. Naser, Talal A. Zuhair, Adel A. Zuhair, Ahmed N. Alshamary, Thamer A. Alanazi, Hosam A. Alanazi

Abstract:

The main threats to human health from heavy metals are associated with exposure to Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. is mainly via intake of drinking water being the most important source in most populations. These metals have been extensively studied and their effects on human health regularly reviewed by international bodies such as the WHO. Heavy metals have been used by humans for thousands of years. Although several adverse health effects of heavy metals have been known for a long time, exposure to heavy metals continues, and is even increasing in some parts of the world, in particular in less developed countries, though emissions have declined in most developed countries over the last 100 years. A strong relationship between contaminated drinking water with heavy metals from some of the stations of water shopping in Hail, KSA and chronic diseases such as renal failure, liver cirrhosis, and chronic anemia has been identified in this study. These diseases are apparently related to contaminant drinking water with heavy metals such as Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. Renal failure is related to contaminate drinking water with lead and cadmium, liver cirrhosis to copper and molybdenum, and chronic anemia to copper and cadmium. Recent data indicate that adverse health effects of cadmium exposure may occur at lower exposure levels than previously anticipated, primarily in the form of kidney damage but possibly also bone effects and fractures. The general population is primarily exposed to mercury via drinking water being a major source of methyl mercury exposure, and dental amalgam. During the last century lead, cadmium, zinc, iron and arsenic is mainly via intake of drinking water being the most important source in most populations. Long-term exposure to lead, cadmium, zinc, iron and arsenic in drinking-water is mainly related to primarily in the form of kidney damage. Studies of these diseases suggest that abnormal incidence in specific areas is related to toxic materials in the groundwater and thereby led to the contamination of drinking water in these areas.

Keywords: heavy metals, liver functions, kidney functions and chronic renal failure, hail, renal, water

Procedia PDF Downloads 320
27793 Electric Propulsion System Development for High Floor Trolley Bus

Authors: Asep Andi Suryandi, Katri Yulianto, Dewi Rianti Mandasari

Abstract:

The development of environmentally friendly vehicles increasingly attracted the attention of almost all countries in the world, including Indonesia. There are various types of environmentally friendly vehicles, such as: electric vehicles, hybrid, and fuel gas. The Electric vehicle has been developed in Indonesia, a private or public vehicle. But many electric vehicles had been developed using the battery as a power source, while the battery technology for electric vehicles still constraints in capacity, dimensions of the battery itself and charging system. Trolley bus is one of the electric buses with the main power source of the network catenary / overhead line with trolley pole as the point of contact. This paper will discuss the design and manufacture electrical system in Trolleybus.

Keywords: trolley bus, electric propulsion system, design, manufacture, electric vehicle

Procedia PDF Downloads 356
27792 Search for the Sacred: A conceptual Analysis of Divine Relationship

Authors: Monir Ahmed

Abstract:

The main purpose of this paper is to analyze existing conceptual papers on the divine relationship. The primary objective of the paper is to illustrate cognitive orientation as a determinant of divine relationship. A further aim of the paper is to establish whether spiritual or religious practices, rituals, or acts alone could confirm a relationship with the sacred or the divine. Searching for the sacred or the divine is known to be a novel way of understanding the meaning and purpose of human existence, including the existence of everything around us. Inevitably, searching for the sacred provides an opportunity for human beings to form a relationship with the divine. Research suggests that discovering meaning and purpose through searching for the sacred or forming relationship with the divine enhances psychological well-being and eventually helps individuals to flourish. The search for the sacred and the discovery of the divine relationship thus have become interesting areas of study in Psychology of Religion and Spirituality. The existing conceptual papers on the relationship with the transcendent source, i.e., the divine creator, were systematically reviewed and analyzed. The outcome of the review reveals that the existing understanding of the relationship with the divine source is inadequate and that such understanding is unable to indicate or confirm a relationship with psychological well-being, including spiritual well-being. The importance of cognitive orientation, including cognitive processes as well as ‘creatio ex nihilo’ doctrine in searching for the sacred, is indicated. The author of this paper proposes that cognitive-theological understanding involving faith and belief about the creation and the divine source, the transcendent God is likely to offer a comprehensive understanding of the divine relationship.

Keywords: divine, well-being, analysis, cognitive orientation, ‘creatio ex nihilo’ doctrine

Procedia PDF Downloads 150
27791 Maximaxing the Usage of Solar Energy in an Area of Low Peak Sunlight Hours

Authors: Ohabuiro John Uwabunkeonye

Abstract:

Source of green energy is becoming a concern in developing countries where most energy source in use emits high level of carbon (IV) oxide which contributes to global warming. More so, even with the generation of energy from fossil fuel, the electricity supply is still very inadequate. Therefore, this paper examines different ways of designing and installing photovoltaic (PV) system in terms of optimal sizing of PV array and battery storage in an area of very low peak sunlight hours (PSH) and inadequate supply of electricity from utility companies. Different sample of Peak sunlight hour for selected areas in Nigeria are considered and the lowest of it all is taken. Some means of ensuring that the available solar energy is harnessed properly and converted into electrical energy are discussed for usage in such areas as mentioned above.

Keywords: green energy, fossil fuel, peak sunlight hour, photovoltaic

Procedia PDF Downloads 642
27790 Bioremediation of Paper Mill Effluent by Microbial Consortium Comprising Bacterial and Fungal Strain and Optimizing the Effect of Carbon Source

Authors: Priya Tomar, Pallavi Mittal

Abstract:

Bioremediation has been recognized as an environment friendly and less expensive method which involves the natural processes resulting in the efficient conversion of hazardous compounds into innocuous products. The pulp and paper mill effluent is one of the high polluting effluents amongst the effluents obtained from polluting industries. The colouring body present in the wastewater from pulp and paper mill is organic in nature and is comprised of wood extractives, tannin, resins, synthetic dyes, lignin, and its degradation products formed by the action of chlorine on lignin which imparts an offensive colour to the water. These mills use different chemical process for paper manufacturing due to which lignified chemicals are released into the environment. Therefore, the chemical oxygen demand (COD) of the emanating stream is quite high. For solving the above problem we present this paper with some new techniques that were developed for the efficiency of paper mill effluents. In the present study we utilized the consortia of fungal and bacterial strain and the treatment named as C1, C2, and C3 for the decolourization of paper mill effluent. During the study, role of carbon source i.e. glucose was studied for decolourization. From the results it was observed that a maximum colour reduction of 66.9%, COD reduction of 51.8%, TSS reduction of 0.34%, TDS reduction of 0.29% and pH changes of 4.2 is achieved by consortia of Aspergillus niger with Pseudomonas aeruginosa. Data indicated that consortia of Aspergillus niger with Pseudomonas aeruginosa is giving better result with glucose.

Keywords: bioremediation, decolourization, black liquor, mycoremediation

Procedia PDF Downloads 410
27789 Evaluation of Marwit Rod El Leqah Quartz Deposits As A Strategic Source of High Purity Quartz

Authors: Suzan Sami Ibrahim, Mohamed Gad Shahien, Ali Quarny Seliem, Mostafa Ragab Abukhadra

Abstract:

Pegmatite quartz deposits of Marwit Rod El Leqah area classify as medium purity quartz with 99.575 % average SiO2 content and therefore do not match the requirements of high technical applications (99.8 % SiO2 for solar cells, 99.8% SiO2 for electronics). Petrographic field and petrographic investigations reveal that, the reduction of the silica content attributed mainly to impurities of iron oxide, muscovite, rutile, orthoclase, granitic rafts and fluid inclusions. Such impurities resulted in raising Fe2O3, Al2O3, MgO, CaO, K2O and Na2O relative to the silica content. Structural impurities are the main source of trace elements in the quartz samples.

Keywords: High purity quartz, High-tech applications, solid impurities, structural impurities

Procedia PDF Downloads 500
27788 Control the Flow of Big Data

Authors: Shizra Waris, Saleem Akhtar

Abstract:

Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.

Keywords: computer, it community, industry, big data

Procedia PDF Downloads 194
27787 Using Business Intelligence Capabilities to Improve the Quality of Decision-Making: A Case Study of Mellat Bank

Authors: Jalal Haghighat Monfared, Zahra Akbari

Abstract:

Today, business executives need to have useful information to make better decisions. Banks have also been using information tools so that they can direct the decision-making process in order to achieve their desired goals by rapidly extracting information from sources with the help of business intelligence. The research seeks to investigate whether there is a relationship between the quality of decision making and the business intelligence capabilities of Mellat Bank. Each of the factors studied is divided into several components, and these and their relationships are measured by a questionnaire. The statistical population of this study consists of all managers and experts of Mellat Bank's General Departments (including 190 people) who use commercial intelligence reports. The sample size of this study was 123 randomly determined by statistical method. In this research, relevant statistical inference has been used for data analysis and hypothesis testing. In the first stage, using the Kolmogorov-Smirnov test, the normalization of the data was investigated and in the next stage, the construct validity of both variables and their resulting indexes were verified using confirmatory factor analysis. Finally, using the structural equation modeling and Pearson's correlation coefficient, the research hypotheses were tested. The results confirmed the existence of a positive relationship between decision quality and business intelligence capabilities in Mellat Bank. Among the various capabilities, including data quality, correlation with other systems, user access, flexibility and risk management support, the flexibility of the business intelligence system was the most correlated with the dependent variable of the present research. This shows that it is necessary for Mellat Bank to pay more attention to choose the required business intelligence systems with high flexibility in terms of the ability to submit custom formatted reports. Subsequently, the quality of data on business intelligence systems showed the strongest relationship with quality of decision making. Therefore, improving the quality of data, including the source of data internally or externally, the type of data in quantitative or qualitative terms, the credibility of the data and perceptions of who uses the business intelligence system, improves the quality of decision making in Mellat Bank.

Keywords: business intelligence, business intelligence capability, decision making, decision quality

Procedia PDF Downloads 112
27786 The Study of Implications on Modern Businesses Performances by Digital Communities: Case of Data Leak

Authors: Asim Majeed, Anwar Ul Haq, Ayesha Asim, Mike Lloyd-Williams, Arshad Jamal, Usman Butt

Abstract:

This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.

Keywords: Digital, communities, performance, dissemination, implications, data, exploitation

Procedia PDF Downloads 402
27785 Open Science Philosophy, Research and Innovation

Authors: C.Ardil

Abstract:

Open Science translates the understanding and application of various theories and practices in open science philosophy, systems, paradigms and epistemology. Open Science originates with the premise that universal scientific knowledge is a product of a collective scholarly and social collaboration involving all stakeholders and knowledge belongs to the global society. Scientific outputs generated by public research are a public good that should be available to all at no cost and without barriers or restrictions. Open Science has the potential to increase the quality, impact and benefits of science and to accelerate advancement of knowledge by making it more reliable, more efficient and accurate, better understandable by society and responsive to societal challenges, and has the potential to enable growth and innovation through reuse of scientific results by all stakeholders at all levels of society, and ultimately contribute to growth and competitiveness of global society. Open Science is a global movement to improve accessibility to and reusability of research practices and outputs. In its broadest definition, it encompasses open access to publications, open research data and methods, open source, open educational resources, open evaluation, and citizen science. The implementation of open science provides an excellent opportunity to renegotiate the social roles and responsibilities of publicly funded research and to rethink the science system as a whole. Open Science is the practice of science in such a way that others can collaborate and contribute, where research data, lab notes and other research processes are freely available, under terms that enable reuse, redistribution and reproduction of the research and its underlying data and methods. Open Science represents a novel systematic approach to the scientific process, shifting from the standard practices of publishing research results in scientific publications towards sharing and using all available knowledge at an earlier stage in the research process, based on cooperative work and diffusing scholarly knowledge with no barriers and restrictions. Open Science refers to efforts to make the primary outputs of publicly funded research results (publications and the research data) publicly accessible in digital format with no limitations. Open Science is about extending the principles of openness to the whole research cycle, fostering, sharing and collaboration as early as possible, thus entailing a systemic change to the way science and research is done. Open Science is the ongoing transition in how open research is carried out, disseminated, deployed, and transformed to make scholarly research more open, global, collaborative, creative and closer to society. Open Science involves various movements aiming to remove the barriers for sharing any kind of output, resources, methods or tools, at any stage of the research process. Open Science embraces open access to publications, research data, source software, collaboration, peer review, notebooks, educational resources, monographs, citizen science, or research crowdfunding. The recognition and adoption of open science practices, including open science policies that increase open access to scientific literature and encourage data and code sharing, is increasing in the open science philosophy. Revolutionary open science policies are motivated by ethical, moral or utilitarian arguments, such as the right to access digital research literature for open source research or science data accumulation, research indicators, transparency in the field of academic practice, and reproducibility. Open science philosophy is adopted primarily to demonstrate the benefits of open science practices. Researchers use open science applications for their own advantage in order to get more offers, increase citations, attract media attention, potential collaborators, career opportunities, donations and funding opportunities. In open science philosophy, open data findings are evidence that open science practices provide significant benefits to researchers in scientific research creation, collaboration, communication, and evaluation according to more traditional closed science practices. Open science considers concerns such as the rigor of peer review, common research facts such as financing and career development, and the sacrifice of author rights. Therefore, researchers are recommended to implement open science research within the framework of existing academic evaluation and incentives. As a result, open science research issues are addressed in the areas of publishing, financing, collaboration, resource management and sharing, career development, discussion of open science questions and conclusions.

Keywords: Open Science, Open Science Philosophy, Open Science Research, Open Science Data

Procedia PDF Downloads 131
27784 Production of Biodiesel Using Brine Waste as a Heterogeneous Catalyst

Authors: Hilary Rutto, Linda Sibali

Abstract:

In these modern times, we constantly search for new and innovative technologies to lift the burden of our extreme energy demand. The overall purpose of biofuel production research is to source an alternative energy source to replace the normal use of fossil fuel as liquid petroleum products. This experiment looks at the basis of biodiesel production with regards to alternative catalysts that can be used to produce biodiesel. The key factors that will be addressed during the experiments will focus on temperature variation, catalyst additions to the overall reaction, methanol to oil ratio, and the impact of agitation on the reaction. Brine samples sources from nearby plants will be evaluated and tested thoroughly and the key characteristics of these brine samples analysed for the verification of its use as a possible catalyst in biodiesel production. The one factor at a time experimental approach was used in this experiment, and the recycle and reuse characteristics of the heterogeneous catalyst was evaluated.

Keywords: brine sludge, heterogenous catalyst, biodiesel, one factor

Procedia PDF Downloads 171
27783 Source Identification Model Based on Label Propagation and Graph Ordinary Differential Equations

Authors: Fuyuan Ma, Yuhan Wang, Junhe Zhang, Ying Wang

Abstract:

Identifying the sources of information dissemination is a pivotal task in the study of collective behaviors in networks, enabling us to discern and intercept the critical pathways through which information propagates from its origins. This allows for the control of the information’s dissemination impact in its early stages. Numerous methods for source detection rely on pre-existing, underlying propagation models as prior knowledge. Current models that eschew prior knowledge attempt to harness label propagation algorithms to model the statistical characteristics of propagation states or employ Graph Neural Networks (GNNs) for deep reverse modeling of the diffusion process. These approaches are either deficient in modeling the propagation patterns of information or are constrained by the over-smoothing problem inherent in GNNs, which limits the stacking of sufficient model depth to excavate global propagation patterns. Consequently, we introduce the ODESI model. Initially, the model employs a label propagation algorithm to delineate the distribution density of infected states within a graph structure and extends the representation of infected states from integers to state vectors, which serve as the initial states of nodes. Subsequently, the model constructs a deep architecture based on GNNs-coupled Ordinary Differential Equations (ODEs) to model the global propagation patterns of continuous propagation processes. Addressing the challenges associated with solving ODEs on graphs, we approximate the analytical solutions to reduce computational costs. Finally, we conduct simulation experiments on two real-world social network datasets, and the results affirm the efficacy of our proposed ODESI model in source identification tasks.

Keywords: source identification, ordinary differential equations, label propagation, complex networks

Procedia PDF Downloads 20
27782 Monitoring of Hydrological Parameters in the Alexandra Jukskei Catchment in South Africa

Authors: Vhuhwavho Gadisi, Rebecca Alowo, German Nkhonjera

Abstract:

It has been noted that technical programming for handling groundwater resources is not accessible. The lack of these systems hinders groundwater management processes necessary for decision-making through monitoring and evaluation regarding the Jukskei River of the Crocodile River (West) Basin in Johannesburg, South Africa. Several challenges have been identified in South Africa's Jukskei Catchment concerning groundwater management. Some of those challenges will include the following: Gaps in data records; there is a need for training and equipping of monitoring staff; formal accreditation of monitoring capacities and equipment; there is no access to regulation terms (e.g., meters). Taking into consideration necessities and human requirements as per typical densities in various regions of South Africa, there is a need to construct several groundwater level monitoring stations in a particular segment; the available raw data on groundwater level should be converted into consumable products for example, short reports on delicate areas (e.g., Dolomite compartments, wetlands, aquifers, and sole source) and considering the increasing civil unrest there has been vandalism and theft of groundwater monitoring infrastructure. GIS was employed at the catchment level to plot the relationship between those identified groundwater parameters in the catchment area and the identified borehole. GIS-based maps were designed for groundwater monitoring to be pretested on one borehole in the Jukskei catchment. This data will be used to establish changes in the borehole compared to changes in the catchment area according to identified parameters.

Keywords: GIS, monitoring, Jukskei, catchment

Procedia PDF Downloads 94
27781 Unbalanced Cylindrical Magnetron for Accelerating Cavities Coating

Authors: G. Rosaz, V. Semblanet, S. Calatroni, A. Sublet, M. Taborelli

Abstract:

We report in this paper the design and qualification of a cylindrical unbalanced magnetron source. The dedicated magnetic assemblies were simulated using a finite element model. A hall-effect magnetic probe was then used to characterize those assemblies and compared to the theoretical magnetic profiles. These show a good agreement between the expected and actual values. The qualification of the different magnetic assemblies was then performed by measuring the ion flux density reaching the surface of the sample to be coated using a commercial retarding field energy analyzer. The strongest unbalanced configuration shows an increase from 0.016 A.cm-2 to 0.074 A.cm-2 of the ion flux density reaching the sample surface compared to the standard balanced configuration for a pressure 5.10-3 mbar and a plasma source power of 300 W.

Keywords: ion energy distribution function, magnetron sputtering, niobium, unbalanced, SRF cavities, thin film

Procedia PDF Downloads 256
27780 High Performance Computing and Big Data Analytics

Authors: Branci Sarra, Branci Saadia

Abstract:

Because of the multiplied data growth, many computer science tools have been developed to process and analyze these Big Data. High-performance computing architectures have been designed to meet the treatment needs of Big Data (view transaction processing standpoint, strategic, and tactical analytics). The purpose of this article is to provide a historical and global perspective on the recent trend of high-performance computing architectures especially what has a relation with Analytics and Data Mining.

Keywords: high performance computing, HPC, big data, data analysis

Procedia PDF Downloads 520
27779 AIPM:An Integrator and Pull Request Matching Model in Github

Authors: Zhifang Liao, Yanbing Li, Li Xu, Yan Zhang, Xiaoping Fan, Jinsong Wu

Abstract:

Pull Request (PR) is the primary method for code contributions from the external contributors in Github. PR review is an essential part of open source software developments for maintaining the quality of software. Matching a new PR of an appropriate integrator will make the PR review more effective. However, PR and integrator matching are now organized manually in Github. To reduce this cost, we presented an AIPM model to predict highly relevant integrator of incoming PRs. AIPM uses topic model to extract topics from the PRs, and builds a one-to-one correspondence between topics and integrators. Then, AIPM finds the most suitable integrator according to the maximum entry of the topic-document distribution. On average, AIPM can reach a precision of 60%, and even in some projects, can reach a precision of 80%.

Keywords: pull Request, integrator matching, Github, open source project, topic model

Procedia PDF Downloads 299
27778 Control and Control Systems of Administration in Nigeria

Authors: Inuwa Abdu Ibrahim

Abstract:

Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.

Keywords: Accountability, Fraud, Administration, Nigeria

Procedia PDF Downloads 367
27777 Privacy Rights of Children in the Social Media Sphere: The Benefits and Challenges Under the EU and US Legislative Framework

Authors: Anna Citterbergova

Abstract:

This study explores the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, namely the GDPR (2018) and COPPA (2000). Considering that children are online for the majority of their free time, one cannot overlook the negative side effects that may be associated with online participation, which may put children’s wellbeing and their fundamental rights at risk. The question of whether the current relevant legislative framework in relation to the responsibilities of the internet service providers (ISPs) are adequate safeguards and guarantees to children’s personal data protection has been an evolving debate both in the US and in the EU. From a children’s rights perspective, processors of personal data have certain obligations that must meet the international human rights principles (e. g. the CRC, ECHR), which require taking into account the best interest of the child. Accordingly, the need to protect children’s privacy online remains strong and relevant with the expansion of the number and importance of social media platforms to human life. At the same time, the landscape of the internet is rapidly evolving, and commercial interests are taking a more targeted approach in seeking children’s data. Therefore, it is essential to constantly evaluate the ongoing and evolving newly adopted market policies of ISPs that may misuse the gap in the current letter of the law. Previous studies in the field have already pointed out that both GDPR and COPPA may theoretically not be sufficient in protecting children’s personal data. With the focus on social media platforms, this study uses the doctrinal-descriptive method to identifiy the mechanisms enshrined in the GDPR and COPPA designed to protect children’s personal data. In its second part, the study includes a data gathering phase by the national data protection authorities responsible for monitoring and supervision of the GDPR in relation to children’s personal data protection who monitor the enforcement of the data protection rules throughout the European Union an contribute to their consistent application. These gathered primary source of data will later be used to outline the series of benefits and challenges to children’s persona lata protection faced by these institutes and the analysis that aims to suggest if and/or how to hold ISPs accountable while striking a fair balance between the commercial rights and the right to protection of the personal data of children. The preliminary results can be divided into two categories. First, conclusions in the doctrinal-descriptive part of the study. Second, specific cases and situations from the practice of national data protection authorities. While for the first part, concrete conclusions can already be presented, the second part is currently still in the data gathering phase. The result of this research is a comprehensive analysis on the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, based on doctrinal-descriptive approach and original empirical data.

Keywords: personal data of children, personal data protection, GDPR, COPPA, ISPs, social media

Procedia PDF Downloads 96