Search results for: linked data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25904

Search results for: linked data

25334 Adverse Childhood Experiences and the Sense of Effectiveness and Coping with Emotions among Adolescents Taking Drugs

Authors: Monika Szpringer, Aneta Pawlinska

Abstract:

Adverse childhood experiences are linked to various types of health and adapt problems at different stages of life. They include various types of abuse, neglect, and dysfunctional environment. They have an unfavorable impact on the development of a child and his future functioning in society. Adolescents who were exposed to bad treatment may suffer from health problems during adulthood, like chronic diseases, psychological disorders, drug addiction, and suicide attempts. Objective: The aim of the project is to assess the relationship between adverse childhood experiences and the sense of efficacy and coping with emotions among teenagers aged 16-18 taking drugs. Material And Methods: The research was carried out in the period from March to December 2018 in Mazowieckie, Świętokrzyskie, Łódzkie, and Lubelskie Voivodship. The group consisted of 600 people aged 16-18 (M=16,58; SD=0, 78), men (63,2%) aged 16-18 (M=16,60;SD= 0,78) and women (35,5%) aged 16-18 (M16,55;SD=0,79). Participants included residents from Youth Educational Centers and Youth Sociotherapy Centers. Each participant filled in Author's Questionnaire, Adverse Childhood Questionnaire, then Courtland Emotional Control Scale-CECS and Generalized Self Efficacy Scale-GSES. Results and conclusions: The most common adverse experiences, according to teenagers, were family abuse, divorce/separation/parent's death, overuse of alcohol or drugs by an inmate, and emotional neglect. Adolescents who suffered from five to twelve adverse experiences had a higher level of depression's control. Adverse childhood experiences have an importance for the level of anger and depression's control among teenagers taking drugs. The greatest importance of the level of anger's control has emotional neglect. A higher level of emotional neglect is linked to a lower ability to control anger. The greatest importance of the level of depression's control has physical abuse and emotional neglect. The higher physical abuse during childhood, and the higher frequency of emotional neglect, the bigger the depression's control. The sense of efficacy in the group of people who suffered from one to four adverse experiences is close to the sense of efficacy that suffered people from five to twelve adverse experiences. The most important factor lowering the sense of one's efficacy was the intensification of sexual abuse. It was confirmed that the intensification and frequency of adverse childhood experiences were higher among women than men. Women also characterized lower anger control and greater depression's control. The authors’ own analyses confirmed the relationship between adverse childhood experiences and the sense of efficacy and coping with emotions among teenagers aged 16-18 taking drugs.

Keywords: adolescences, adverse childhood experiences, coping with emotions, drugs

Procedia PDF Downloads 100
25333 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 477
25332 Stability of a Self-Excited Machine Due to the Mechanical Coupling

Authors: M. Soltan Rezaee, M. R. Ghazavi, A. Najafi, W.-H. Liao

Abstract:

Generally, different rods in shaft systems can be misaligned based on the mechanical system usages. These rods can be linked together via U-coupling easily. The system is self-stimulated and may cause instabilities due to the inherent behavior of the coupling. In this study, each rod includes an elastic shaft with an angular stiffness and structural damping. Moreover, the mass of shafts is considered via attached solid disks. The impact of the system architecture and shaft mass on the instability of such mechanism are studied. Stability charts are plotted via a method based on Floquet theory. Eventually, the unstable points have been found and analyzed in detail. The results show that stabilizing the driveline is feasible by changing the system characteristics which include shaft mass and architecture.

Keywords: coupling, mechanical systems, oscillations, rotating shafts

Procedia PDF Downloads 178
25331 An Approximation of Daily Rainfall by Using a Pixel Value Data Approach

Authors: Sarisa Pinkham, Kanyarat Bussaban

Abstract:

The research aims to approximate the amount of daily rainfall by using a pixel value data approach. The daily rainfall maps from the Thailand Meteorological Department in period of time from January to December 2013 were the data used in this study. The results showed that this approach can approximate the amount of daily rainfall with RMSE=3.343.

Keywords: daily rainfall, image processing, approximation, pixel value data

Procedia PDF Downloads 383
25330 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management

Authors: Kenneth Harper

Abstract:

The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.

Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups

Procedia PDF Downloads 12
25329 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data

Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri

Abstract:

In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.

Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification

Procedia PDF Downloads 507
25328 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R

Authors: Jaya Mathew

Abstract:

Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.

Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R

Procedia PDF Downloads 370
25327 Trusting the Big Data Analytics Process from the Perspective of Different Stakeholders

Authors: Sven Gehrke, Johannes Ruhland

Abstract:

Data is the oil of our time, without them progress would come to a hold [1]. On the other hand, the mistrust of data mining is increasing [2]. The paper at hand shows different aspects of the concept of trust and describes the information asymmetry of the typical stakeholders of a data mining project using the CRISP-DM phase model. Based on the identified influencing factors in relation to trust, problematic aspects of the current approach are verified using various interviews with the stakeholders. The results of the interviews confirm the theoretically identified weak points of the phase model with regard to trust and show potential research areas.

Keywords: trust, data mining, CRISP DM, stakeholder management

Procedia PDF Downloads 90
25326 Prenatal Paraben Exposure Impacts Infant Overweight Development and in vitro Adipogenesis

Authors: Beate Englich, Linda Schlittenbauer, Christiane Pfeifer, Isabel Kratochvil, Michael Borte, Gabriele I. Stangl, Martin von Bergen, Thorsten Reemtsma, Irina Lehmann, Kristin M. Junge

Abstract:

The worldwide production of endocrine disrupting compounds (EDC) has risen dramatically over the last decades, as so has the prevalence for obesity. Many EDCs are believed to contribute to this obesity epidemic, by enhancing adipogenesis or disrupting relevant metabolism. This effect is most tremendous in the early prenatal period when priming effects find a highly vulnerable time window. Therefore, we investigate the impact of parabens on childhood overweight development and adipogenesis in general. Parabens are ester of 4-hydroxy-benzoic acid and part of many cosmetic products or food packing. Therefore, ubiquitous exposure can be found in the westernized world, with exposure already starting during the sensitive prenatal period. We assessed maternal cosmetic product consumption, prenatal paraben exposure and infant BMI z-scores in the prospective German LINA cohort. In detail, maternal urinary concentrations (34 weeks of gestation) of methyl paraben (MeP), ethyl paraben (EtP), n-propyl paraben (PrP) and n-butyl paraben (BuP) were quantified using UPLC-MS/MS. Body weight and height of their children was assessed during annual clinical visits. Further, we investigated the direct influence of those parabens on adipogenesis in-vitro using a human mesenchymal stem cell (MSC) differentiation assay to mimic a prenatal exposure scenario. MSC were exposed to 0.1 – 50 µM paraben during the entire differentiation period. Differentiation outcome was monitored by impedance spectrometry, real-time PCR and triglyceride staining. We found that maternal cosmetic product consumption was highly correlated with urinary paraben concentrations at pregnancy. Further, prenatal paraben exposure was linked to higher BMI Z-scores in children. Our in-vitro analysis revealed that especially the long chained paraben BuP stimulates adipogenesis by increasing the expression of adipocyte specific genes (PPARγ, ADIPOQ, LPL, etc.) and triglyceride storage. Moreover, we found that adiponectin secretion is increased whereas leptin secretion is reduced under BuP exposure in-vitro. Further mechanistic analysis for receptor binding and activation of PPARγ and other key players in adipogenesis are currently in process. We conclude that maternal cosmetic product consumption is linked to prenatal paraben exposure of children and contributes to the development of infant overweight development by triggering key pathways of adipogenesis.

Keywords: adipogenesis, endocrine disruptors, paraben, prenatal exposure

Procedia PDF Downloads 268
25325 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 483
25324 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 238
25323 Assessing Pain Using Morbid Motion Monitor System in the Pain Management of Nurse Practitioner

Authors: Mohammad Reza Dawoudi

Abstract:

With the increasing rate of patients suffering from chronic pain, several methods for evaluating of chronic pain are suggested. Motion of morbid has been defined as the rate of pine and it is linked with various co-morbid conditions. This study provides a summary of procedure useful to statistics performing direct behavioral observation in hospital settings. We describe the need for and usefulness of comprehensive “morbid motions” observations; provide a primer on the identification, definition, and assessment of morbid behaviors; and outline and discuss specific statistical procedures, including formulating referral motions, describing and conducting the observation. We also provide practical devices for observing and analyzing the obtained information into a report that guides clinical intervention.

Keywords: assessing pain, DNA modeling, image matching technique, pain scale

Procedia PDF Downloads 403
25322 Preparation of Allyl BODIPY for the Click Reaction with Thioglycolic Acid

Authors: Chrislaura Carmo, Luca Deiana, Mafalda Laranjo, Abilio Sobral, Armando Cordova

Abstract:

Photodynamic therapy (PDT) is currently used for the treatment of malignancies and premalignant tumors. It is based on the capture of a photosensitizing molecule (PS) which, when excited by light at a certain wavelength, reacts with oxygen and generates oxidizing species (radicals, singlet oxygen, triplet species) in target tissues, leading to cell death. BODIPY (4,4-difluoro-4-bora-3a,4a-diaza-s-indaceno) derivatives are emerging as important candidates for photosensitizer in photodynamic therapy of cancer cells due to their high triplet quantum yield. Today these dyes are relevant molecules in photovoltaic materials and fluorescent sensors. In this study, it will be demonstrated the possibility that BODIPY can be covalently linked to thioglycolic acid through the click reaction. Thiol−ene click chemistry has become a powerful synthesis method in materials science and surface modification. The design of biobased allyl-terminated precursors with high renewable carbon content for the construction of the thiol-ene polymer networks is essential for sustainable development and green chemistry. The work aims to synthesize the BODIPY (10-(4-(allyloxy) phenyl)-2,8-diethyl-5,5-difluoro-1,3,7,9-tetramethyl-5H-dipyrrolo[1,2-c:2',1'-f] [1,3,2] diazaborinin-4-ium-5-uide) and to click reaction with Thioglycolic acid. BODIPY was synthesized by the condensation reaction between aldehyde and pyrrole in dichloromethane, followed by in situ complexation with BF3·OEt2 in the presence of the base. Then it was functionalized with allyl bromide to achieve the double bond and thus be able to carry out the click reaction. The thiol−ene click was performed using DMPA (2,2-Dimethoxy-2-phenylacetophenone) as a photo-initiator in the presence of UV light (320–500 nm) in DMF at room temperature for 24 hours. Compounds were characterized by standard analytical techniques, including UV-Vis Spectroscopy, 1H, 13C, 19F NMR and mass spectroscopy. The results of this study will be important to link BODIPY to polymers through the thiol group offering a diversity of applications and functionalization. This new molecule can be tested as third-generation photosensitizers, in which the dye is targeted by antibodies or nanocarriers by cells, mainly in cancer cells, PDT and Photodynamic Antimicrobial Chemotherapy (PACT). According to our studies, it was possible to visualize a click reaction between allyl BODIPY and thioglycolic acid. Our team will also test the reaction with other thiol groups for comparison. Further, we will do the click reaction of BODIPY with a natural polymer linked with a thiol group. The results of the above compounds will be tested in PDT assays on various lung cancer cell lines.

Keywords: bodipy, click reaction, thioglycolic acid, allyl, thiol-ene click

Procedia PDF Downloads 131
25321 Extreme Temperature Forecast in Mbonge, Cameroon Through Return Level Analysis of the Generalized Extreme Value (GEV) Distribution

Authors: Nkongho Ayuketang Arreyndip, Ebobenow Joseph

Abstract:

In this paper, temperature extremes are forecast by employing the block maxima method of the generalized extreme value (GEV) distribution to analyse temperature data from the Cameroon Development Corporation (CDC). By considering two sets of data (raw data and simulated data) and two (stationary and non-stationary) models of the GEV distribution, return levels analysis is carried out and it was found that in the stationary model, the return values are constant over time with the raw data, while in the simulated data the return values show an increasing trend with an upper bound. In the non-stationary model, the return levels of both the raw data and simulated data show an increasing trend with an upper bound. This clearly shows that although temperatures in the tropics show a sign of increase in the future, there is a maximum temperature at which there is no exceedance. The results of this paper are very vital in agricultural and environmental research.

Keywords: forecasting, generalized extreme value (GEV), meteorology, return level

Procedia PDF Downloads 475
25320 Impact of Stack Caches: Locality Awareness and Cost Effectiveness

Authors: Abdulrahman K. Alshegaifi, Chun-Hsi Huang

Abstract:

Treating data based on its location in memory has received much attention in recent years due to its different properties, which offer important aspects for cache utilization. Stack data and non-stack data may interfere with each other’s locality in the data cache. One of the important aspects of stack data is that it has high spatial and temporal locality. In this work, we simulate non-unified cache design that split data cache into stack and non-stack caches in order to maintain stack data and non-stack data separate in different caches. We observe that the overall hit rate of non-unified cache design is sensitive to the size of non-stack cache. Then, we investigate the appropriate size and associativity for stack cache to achieve high hit ratio especially when over 99% of accesses are directed to stack cache. The result shows that on average more than 99% of stack cache accuracy is achieved by using 2KB of capacity and 1-way associativity. Further, we analyze the improvement in hit rate when adding small, fixed, size of stack cache at level1 to unified cache architecture. The result shows that the overall hit rate of unified cache design with adding 1KB of stack cache is improved by approximately, on average, 3.9% for Rijndael benchmark. The stack cache is simulated by using SimpleScalar toolset.

Keywords: hit rate, locality of program, stack cache, stack data

Procedia PDF Downloads 299
25319 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 502
25318 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 423
25317 An Evaluation of Neuropsychiatric Manifestations in Systemic Lupus Erythematosus Patients in Saudi Arabia and Their Associated Factors

Authors: Yousef M. Alammari, Mahmoud A. Gaddoury, Reem A. Almohaini, Sara A. Alharbi, Lena S. Alsaleem, Lujain H. Allowaihiq, Maha H. Alrashid, Abdullah H. Alghamdi, Abdullah A. Alaryni

Abstract:

Objective: The goal of this study was to establish the prevalence of neuropsychiatric symptoms in systemic lupus erythematosus (NPSLE) patients in Saudi Arabia and the variables that are linked to it. Methods: During June 2021, this cross-sectional study was carried out among SLE patients in Saudi Arabia. The Saudi Rheumatism Association exploited social media platforms to provide a self-administered online questionnaire to SLE patients. All data analyses were performed using the Statistical Packages for Social Sciences (SPSS) version 26. Results: Two hundred and five SLE patients participated in the study (females 91.3 % vs. males 8.7 %). In addition, 13.5 % of patients had a family history of SLE, and 26% had SLE for one to three years. Alteration or loss of sensation (53.4%), Fear (52.4%), and headache (48.1%) were the most prevalent signs of neuropsychiatric symptoms in systemic lupus erythematosus (NPSLE) patients. The prevalence of patients with NPSLE was 40%. In a multivariate regression model, fear, altered sensations, cerebrovascular illness, sleep disruption, and diminished interest in routine activities were identified as independent risk variables for NPSLE. Conclusion: Nearly half of SLE patients demonstrated NP manifestations, with significant symptoms including fear, alteration of sensation, cerebrovascular disease, sleep disturbance, and reduced interest in normal activities. To detect the pathophysiology of NPSLE, it is necessary to understand the relationship between neuropsychiatric morbidity and other relevant rheumatic disorders in the SLE population.

Keywords: neuropsychiatric, systemic lupus erythematosus, NPSLE, prevalence, SLE patients

Procedia PDF Downloads 74
25316 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 284
25315 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 111
25314 Experiments on Weakly-Supervised Learning on Imperfect Data

Authors: Yan Cheng, Yijun Shao, James Rudolph, Charlene R. Weir, Beth Sahlmann, Qing Zeng-Treitler

Abstract:

Supervised predictive models require labeled data for training purposes. Complete and accurate labeled data, i.e., a ‘gold standard’, is not always available, and imperfectly labeled data may need to serve as an alternative. An important question is if the accuracy of the labeled data creates a performance ceiling for the trained model. In this study, we trained several models to recognize the presence of delirium in clinical documents using data with annotations that are not completely accurate (i.e., weakly-supervised learning). In the external evaluation, the support vector machine model with a linear kernel performed best, achieving an area under the curve of 89.3% and accuracy of 88%, surpassing the 80% accuracy of the training sample. We then generated a set of simulated data and carried out a series of experiments which demonstrated that models trained on imperfect data can (but do not always) outperform the accuracy of the training data, e.g., the area under the curve for some models is higher than 80% when trained on the data with an error rate of 40%. Our experiments also showed that the error resistance of linear modeling is associated with larger sample size, error type, and linearity of the data (all p-values < 0.001). In conclusion, this study sheds light on the usefulness of imperfect data in clinical research via weakly-supervised learning.

Keywords: weakly-supervised learning, support vector machine, prediction, delirium, simulation

Procedia PDF Downloads 195
25313 Serological Screening of Barrier Maintained Rodent Colony

Authors: R. Posia, J. Mistry, K. Kamani

Abstract:

The health screening of laboratory rodents is essential for ensuring animal health and the validity of biomedical research data. Routine health monitoring is necessary to verify the effectiveness of biosecurity and the specific pathogen free (SPF) status of the colony. The present screening was performed in barrier maintained rat (Rattus norvegicus) colony. Rats were maintained under a controlled environment and strict biosecurity in the facility. The screening was performed on quarterly bases from randomly selected animals from breeding and or maintenance colonies. Selected animals were subject to blood collection under isoflurane anaesthesia. Serum was separated from the collected blood and stored samples at -60 ± 10 °C until further use. A total of 88 samples were collected quarterly bases from animals in a year. In the serological test, enzyme-linked immunosorbent assay (ELISA) was used for screening of serum samples against sialodacryoadenitis virus (SDAV), Sendai virus (SV), and Kilham’s rat virus (KRV). ELISA kits were procured from XpressBio, USA. Test serum samples were run along with positive control, negative control serum in 96 well ELISA plates as per the procedure recommended by the vendor. Test ELISA plate reading was taken in the microplate reader. This screening observed that none of the samples was observed positive for the sialodacryoadenitis virus (SDAV), Sendai virus (SV), and Kilham’s rat virus (KRV), indicating that effectiveness of biosecurity practices followed in the rodent colony. The result of serological screening helps us to declare that our rodent colony is specifically pathogen free for these pathogens.

Keywords: biosecurity, ELISA, specific pathogen free, serological screening, serum

Procedia PDF Downloads 74
25312 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security

Authors: Kenneth Harper

Abstract:

Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.

Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs

Procedia PDF Downloads 10
25311 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads

Authors: Dražen Cvitanić, Biljana Maljković

Abstract:

This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.

Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency

Procedia PDF Downloads 451
25310 Political Regimes, Political Stability and Debt Dependence in African Countries of Franc Zone: A Logistic Modeling

Authors: Nounamo Nguedie Yann Harold

Abstract:

The factors behind the debt have been the subject of several studies in the literature. Pioneering studies based on the 'double deficit' approach linked indebtedness to the imbalance between savings and investment, the budget deficit and the current account deficit. Most studies on identifying factors that may stimulate or reduce the level of external public debt agree that the following variables are important explanatory variables in leveraging debt: the budget deficit, trade opening, current account and exchange rate, import, export, interest rate, term variation exchange rate, economic growth rate and debt service, capital flight, and over-indebtedness. Few studies addressed the impact of political factors on the level of external debt. In general, however, the IMF's stabilization programs in developing countries following the debt crisis have resulted in economic recession and the advent of political crises that have resulted in changes in governments. In this sense, political institutions are recognised as factors of accumulation of external debt in most developing countries. This paper assesses the role of political factors on the external debt level of African countries in the Franc Zone over the period 1985-2016. Data used come from World Bank and ICRG. Using a logit in panel, the results show that the more a country is politically stable, the lower the external debt compared to the gross domestic product. Political stability multiplies 1.18% the chances of being in the sustainable debt zone. For example, countries with good political institutions experience less severe external debt burdens than countries with bad political institutions.

Keywords: African countries, external debt, Franc Zone, political factors

Procedia PDF Downloads 216
25309 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data

Authors: S. Nickolas, Shobha K.

Abstract:

The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.

Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing

Procedia PDF Downloads 272
25308 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast

Authors: Ruixia Liu

Abstract:

Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.

Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI

Procedia PDF Downloads 229
25307 Uncommon Case of Falx Subdural Hematoma

Authors: Thu Nguyen, Jane Daugherty-Luck

Abstract:

Falx subdural hematoma is a life-threatening condition associated with high mortality. We present a patient case who had fallen with no head injury or loss of conspicuousness. She had tenderness along cervical and thoracic lumbar spine. CT head revealed falx subdural hematoma. The patient was managed medically. The pathophysiology of falx subdural hematoma is linked to laceration of bridging veins provoked by frontal or occipital impact. Posttraumatic subdural hematoma is commonly caused by inertia instead of facture or cerebral contusion resulting from direct impact. The theory is consistent with the lack of fracture in most cases in the literature. Our patient had neither contusion nor fracture.

Keywords: falx subdural hematoma, traumatic head injury, CT head scan, bridging veins, inertia

Procedia PDF Downloads 135
25306 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies

Authors: Sook Ching Yee, Angela Siew Hoong Lee

Abstract:

Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.

Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)

Procedia PDF Downloads 356
25305 Big Data Analysis with Rhipe

Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim

Abstract:

Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.

Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe

Procedia PDF Downloads 493