Search results for: web usage data
25675 Assessment of Psychological Needs and Characteristics of Elderly Population for Developing Information and Communication Technology Services
Authors: Seung Ah Lee, Sunghyun Cho, Kyong Mee Chung
Abstract:
Rapid population aging became a worldwide demographic phenomenon due to rising life expectancy and declining fertility rates. Considering the current increasing rate of population aging, it is assumed that Korean society enters into a ‘super-aged’ society in 10 years, in which people aged 65 years or older account for more than 20% of entire population. In line with this trend, ICT services aimed to help elderly people to improve the quality of life have been suggested. However, existing ICT services mainly focus on supporting health or nursing care and are somewhat limited to meet a variety of specialized needs and challenges of this population. It is pointed out that the majority of services have been driven by technology-push policies. Given that the usage of ICT services greatly vary on individuals’ socio-economic status (SES), physical and psychosocial needs, this study systematically categorized elderly population into sub-groups and identified their needs and characteristics related to ICT usage in detail. First, three assessment criteria (demographic variables including SES, cognitive functioning level, and emotional functioning level) were identified based on previous literature, experts’ opinions, and focus group interview. Second, survey questions for needs assessment were developed based on the criteria and administered to 600 respondents from a national probability sample. The questionnaire consisted of 67 items concerning demographic information, experience on ICT services and information technology (IT) devices, quality of life and cognitive functioning, etc. As the result of survey, age (60s, 70s, 80s), education level (college graduates or more, middle and high school, less than primary school) and cognitive functioning level (above the cut-off, below the cut-off) were considered the most relevant factors for categorization and 18 sub-groups were identified. Finally, 18 sub-groups were clustered into 3 groups according to following similarities; computer usage rate, difficulties in using ICT, and familiarity with current or previous job. Group 1 (‘active users’) included those who with high cognitive function and educational level in their 60s and 70s. They showed favorable and familiar attitudes toward ICT services and used the services for ‘joyful life’, ‘intelligent living’ and ‘relationship management’. Group 2 (‘potential users’), ranged from age of 60s to 80s with high level of cognitive function and mostly middle to high school graduates, reported some difficulties in using ICT and their expectations were lower than in group 1 despite they were similar to group 1 in areas of needs. Group 3 (‘limited users’) consisted of people with the lowest education level or cognitive function, and 90% of group reported difficulties in using ICT. However, group 3 did not differ from group 2 regarding the level of expectation for ICT services and their main purpose of using ICT was ‘safe living’. This study developed a systematic needs assessment tool and identified three sub-groups of elderly ICT users based on multi-criteria. It is implied that current cognitive function plays an important role in using ICT and determining needs among the elderly population. Implications and limitations were further discussed.Keywords: elderly population, ICT, needs assessment, population aging
Procedia PDF Downloads 14325674 Association Rules Mining and NOSQL Oriented Document in Big Data
Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub
Abstract:
Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL
Procedia PDF Downloads 16225673 Immunization-Data-Quality in Public Health Facilities in the Pastoralist Communities: A Comparative Study Evidence from Afar and Somali Regional States, Ethiopia
Authors: Melaku Tsehay
Abstract:
The Consortium of Christian Relief and Development Associations (CCRDA), and the CORE Group Polio Partners (CGPP) Secretariat have been working with Global Alliance for Vac-cines and Immunization (GAVI) to improve the immunization data quality in Afar and Somali Regional States. The main aim of this study was to compare the quality of immunization data before and after the above interventions in health facilities in the pastoralist communities in Ethiopia. To this end, a comparative-cross-sectional study was conducted on 51 health facilities. The baseline data was collected in May 2019, while the end line data in August 2021. The WHO data quality self-assessment tool (DQS) was used to collect data. A significant improvment was seen in the accuracy of the pentavalent vaccine (PT)1 (p = 0.012) data at the health posts (HP), while PT3 (p = 0.010), and Measles (p = 0.020) at the health centers (HC). Besides, a highly sig-nificant improvment was observed in the accuracy of tetanus toxoid (TT)2 data at HP (p < 0.001). The level of over- or under-reporting was found to be < 8%, at the HP, and < 10% at the HC for PT3. The data completeness was also increased from 72.09% to 88.89% at the HC. Nearly 74% of the health facilities timely reported their respective immunization data, which is much better than the baseline (7.1%) (p < 0.001). These findings may provide some hints for the policies and pro-grams targetting on improving immunization data qaulity in the pastoralist communities.Keywords: data quality, immunization, verification factor, pastoralist region
Procedia PDF Downloads 12425672 GC-MS Analysis of Bioactive Compounds in the Ethanolic Extract of Nest Material of Mud Wasp, Sceliphron caementarium
Authors: P. Susheela, Mary Rosaline, R. Radha
Abstract:
This research was designed to determine the bioactive compounds present in the nest samples of the mud dauber wasp, Sceliophron caementarium. Insects and insect-based products have been used for the treatment of various ailments from a very long time. It has been found that all over the world including the western societies and the indigenous populations, the usage of insect-based medicine plays an important role in various healing practices and magic rituals. Studies on the therapeutic usage of insects are negligible when compared to plants, the. In the present scenario, it is important to explore bioactive compounds from natural sources rather than depending on synthetic drugs that have adverse effects on human body. Keeping this in view, an attempt was made to analyze and identify bioactive components from the nest sample of the mud dauber wasp, Sceliophron caementarium. The nests of the mud dauber wasp, Sceliophron caementarium were collected from Coimbatore, Tamil Nadu, India. The nest sample was extracted with ethanol for 6-8 hours using Soxhlet apparatus. The final residue was obtained by filtering the extract through Whatman filter paper No.41. The GCMS analysis of the nest sample was performed using Perkin Elmer Elite - 5 capillary column. The resultant compounds were compared with the database of National Institute Standard and Technology (NIST), WILEY8, FAME. The GC-MS analysis of the concentrated ethanol extract revealed the presence of eight constituents like Methylene chloride, Eicosanoic acid, 1, 1’:3’, 1’’-Terphenyl, 5'-Phenyl, Di-N-Decylsulfone, 1, 2-Bis (Trimethylsilyl) Benzene, Androstane-11, 17-Dione, 3-[(Trimethylsilyl) Oxy]-, 17-[O-(Phenylmethyl) O. Most of the identified compounds were reported as having biological activities viz. anti-inflammatory, antibacterial and antifungal properties that can be of pharmaceutical importance and further study of these isolated compounds may prove their medicinal importance in future.Keywords: Sceliophron caementarium, Gas chromatography-mass spectrometry, ethanol extract, bioactive compounds
Procedia PDF Downloads 29525671 Online Social Network Vital to Hospitality and Tourism Marketing and Management
Authors: Nureni Asafe Yekini, Olawale Nasiru Lawal, Bola Dada, Gabriel Adeyemi Okunlola
Abstract:
This study is focused on the strengths and challenges associated with using the online social network as a rapidly evolving medium in marketing tourism services and businesses among the youths in Nigeria. The paper examines the Nigerian tourists’ attitude, mainly towards three aspects: application of Internet for travel and tourism; usage of online social networks in sharing travel and tourism experiences; and trust in electronic-media for marketing tourism businesses and services. The aim of this research is to determine the level of application of internet tools in marketing tourism businesses and services in Nigeria. This study reports an empirical analysis based on data obtained from a survey among 1004 Nigerian tourists. The outcome confirms the research hypothesis and points to crucial importance of introducing online social network site for marketing tourism businesses and services in Nigeria, and increasing the awareness for Nigeria as a tourist destination. Moreover, the paper strongly recommends the use of online social network as a tool for marketing tourism businesses and services, and the need for identifying effective framework for application of ICT tools in marketing tourism businesses and services in Nigeria at large.Keywords: tourism business, internet, online social networks, tourism services, ICT
Procedia PDF Downloads 35625670 Identifying Critical Success Factors for Data Quality Management through a Delphi Study
Authors: Maria Paula Santos, Ana Lucas
Abstract:
Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort
Procedia PDF Downloads 21725669 Creativity in the Use of Sinhala and English in Advertisements in Sri Lanka: A Morphological Analysis
Authors: Chamindi Dilkushi Senaratne
Abstract:
Sri Lanka has lived with the English language for more than 200 years. Although officially considered a link language, the phenomenal usage of English by the Sinhala-English bilingual has given rise to a mixed code with identifiable structural characteristics. The extensive use of the mixed language by the average Sri Lankan bilingual has resulted in it being used as a medium of communication by creative writers of bilingual advertisements in Sri Lanka. This study analyses the way in which English is used in bilingual advertisements in both print and electronic media in Sri Lanka. The theoretical framework for the study is based on Kachru’s analysis of the use of English by the bilingual, Muysken’s typology on code mixing theories in colonial settings and Myers-Scotton’s theory on the Matrix Language Framework Model. The study will look at a selection of Sinhala-English advertisements published in newspapers from 2015 to 2016. Only advertisements using both Sinhala and English are used for the analysis. To substantiate data collected from the newspapers, the study will select bilingual advertisements from television advertisements. The objective of the study is to analyze the mixed patterns used for creative purposes by advertisers. The results of the study will reveal the creativity used by the Sinhala –English bilingual and the morphological processes used by the creators of Sinhala-English bilingual advertisements to attract the masses.Keywords: bilingual, code mixing, morphological processes, mixed code
Procedia PDF Downloads 28525668 Digital Antimicrobial Thermometer for Axilliary Usage: A New Device for Measuring the Temperature of the Body for the Reduction of Cross-Infections
Authors: P. Efstathiou, E. Kouskouni, Z. Manolidou, K. Karageorgou, M. Tseroni, A. Efstathiou, V. Karyoti, I. Agrafa
Abstract:
Aim: The aim of this prospective comparative study is to evaluate the reduction of microbial flora on the surface of an axillary digital thermometer, made of antimicrobial copper, in relation with a common digital thermometer. Material – Methods: A brand new digital electronic thermometer implemented with antimicrobial copper (Cu 70% - Nic 30%, low lead) on the two edges of the device (top and bottom: World Patent Number WO2013064847 and Register Number by the Hellenic Copper Development Institute No 11/2012) was manufactured and a comparative study with common digital electronic thermometer was conducted on 18 ICU (Intensive Care Unit) patients of three different hospitals. The thermometry was performed in accordance with the projected International Nursing Protocols for body temperature measurement. A total of 216 microbiological samples were taken from the axillary area of the patients, using both of the investigated body temperature devises. Simultaneously the “Halo” phenomenon (phenomenon “Stefanis”) was studied at the non-antimicrobial copper-implemented parts of the antimicrobial digital electronic thermometer. Results: In all samples collected from the surface of the antimicrobial electronic digital thermometer, the reduction of microbial flora (Klebsiella spp, Staphylococcus aureus, Staphylococcus epidermitis, Candida spp, Pneudomonas spp) was progressively reduced to 99% in two hours after the thermometry. The above flora was found in the axillary cavity remained the same in common thermometer. The statistical analysis (SPSS 21) showed a statistically significant reduction of the microbial load (N = 216, < 0.05). Conclusions: The hospital-acquired infections are linked to the transfer of pathogens due to the multi-usage of medical devices from both health professionals and patients, such as axillary thermometers. The use of antimicrobial digital electronic thermometer minimizes microbes' transportation between patients and health professionals while having all the conditions of reliability, proper functioning, security, ease of use and reduced cost.Keywords: antimicrobial copper, cross infections, digital thermometers, ICU
Procedia PDF Downloads 40325667 The Effect of Smartphones on Human Health Relative to User’s Addiction: A Study on a Wide Range of Audiences in Jordan
Authors: T. Qasim, M. Obeidat, S. Al-Sharairi
Abstract:
The objective of this study is to investigate the effect of the excessive use of smartphones. Smartphones have enormous effects on the human body in that some musculoskeletal disorders (MSDs) and health problems might evolve. These days, there is a wide use of the smartphones among all age groups of society, thus, the focus on smartphone effects on human behavior and health, especially on the young and elderly people, becomes a crucial issue. This study was conducted in Jordan on smartphone users for different genders and ages, by conducting a survey to collect data related to the symptoms and MSDs that are resulted from the excessive use of smartphones. A total of 357 responses were used in the analysis. The main related symptoms were numbness, fingers pain, and pain in arm, all linked to age and gender for comparative reasons. A statistical analysis was performed to find the effects of extensive usage of a smartphone for long periods of time on the human body. Results show that the significant variables were the vision problems and the time spent when using the smartphone that cause vision problems. Other variables including age of user and ear problems due to the use of the headsets were found to be a border line significant.Keywords: smart phone, age group, musculoskeletal disorders (MSDs), health problems
Procedia PDF Downloads 25325666 Application Programming Interface Security in Embedded and Open Finance
Authors: Andrew John Zeller, Artjoms Formulevics
Abstract:
Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management
Procedia PDF Downloads 4225665 Perception of Mass Media Usage in Educational Development of Rural Communities in Nigeria
Authors: Aniekan James Akpan, Inemesit Akpan Umoren, Uduak Iwok
Abstract:
From prehistoric and primitive cultures, education was seen as a process of culture transmission by way of guiding children into becoming good members of their local communities. Even in modern cultures, education is seen as a systematic discipline aimed at cultivating genuine values to improve oneself and society. Without education, the chances of realizing the desired vision are marred as it is believed that nations that invest much in education are able to reap the desired benefits technologically, economically, socially, politically, and otherwise. In this sense, the moulding of character is considered the primary purpose of education, and until the audience of mass media through its various vehicles is seen as tools for improving the overall development of society. It is believed that a media-friendly person is likely to perform better than someone who is less friendly. This work, therefore, examines the role media play in educational development. As highlighted by the study, a summary of the functions of media shows that they widen horizon by acting as a liberating force, breaking distance, bonds, and transforming a traditional society into a modern one. With the use of technological development theory, agenda-setting theory as well as uses and gratification theory and multiple intelligence theory, the work identifies different ways in which mass media help in educational development and draws attention to the audience’s perception of media functions in terms of educational development. With a survey method and a population of 6,903,321 people, the work sampled 220 respondents using purposive technique drawn from rural communities in the South-South region of Nigeria. The work concludes that mass media are potent vehicles for teaching and learning and therefore recommends that government should provide basic infrastructures to the rural communities to aid full utilization of media potentials in educational development and equally urge media owners and practitioners to as a matter of urgency increase coverage time on issues bordering on education as it is done for political and other issues.Keywords: educational, development, media usage, perception
Procedia PDF Downloads 12825664 Non-Centrifugal Cane Sugar Production: Heat Transfer Study to Optimize the Use of Energy
Authors: Fabian Velasquez, John Espitia, Henry Hernadez, Sebastian Escobar, Jader Rodriguez
Abstract:
Non-centrifuged cane sugar (NCS) is a concentrated product obtained through the evaporation of water contain from sugarcane juice inopen heat exchangers (OE). The heat supplied to the evaporation stages is obtained from the cane bagasse through the thermochemical process of combustion, where the thermal energy released is transferred to OE by the flue gas. Therefore, the optimization of energy usage becomes essential for the proper design of the production process. For optimize the energy use, it is necessary modeling and simulation of heat transfer between the combustion gases and the juice and to understand the major mechanisms involved in the heat transfer. The main objective of this work was simulated heat transfer phenomena between the flue gas and open heat exchangers using Computational Fluid Dynamics model (CFD). The simulation results were compared to field measured data. Numerical results about temperature profile along the flue gas pipeline at the measurement points are in good accordance with field measurements. Thus, this study could be of special interest in design NCS production process and the optimization of the use of energy.Keywords: mathematical modeling, design variables, computational fluid dynamics, overall thermal efficiency
Procedia PDF Downloads 12525663 Technological Loneliness; The Effect on Loneliness of Internet Addiction of University Students; The Case of Turkey
Authors: Adem Pala, Mustafa Biner
Abstract:
Nowadays, despite the fact that technology and internet shorten the virtual distance, too much use and misuse of internet create distance among people. There is a considerable number of people living in the same house even sitting at the same table but busy themselves with mobiles and computers for long hours without talking to each other. Internet usage is very common among young people especially university students. Evolving out of this problem, internet addiction of university students and effect on their loneliness, and relationship between them consist of the purpose of this study. The study is important because it discusses what can be done in order to make the young people more social via determining the university students’ loneliness and their internet addiction. The study was carried out with 440 university students studying at different universities and departments. The group consists of 200 female and 240 male students with average of age 20,9. In the study, 19 questions, “internet addiction scale” consisting of 3 subscales, and UCLA loneliness scale were used as data collection tools. As a result, it is found out that the loneliness of individuals with internet addiction is higher than the other individuals. The males’ loneliness related to internet addiction is higher than the females; on the other hand, it is determined females feel more lonesome in general loneliness. It is thought that the findings of the study will determine the individuals under risk, prevent them, help researchers and people doing clinical studies during rehabilitation progress.Keywords: internet addiction, loneliness, Turkey, university students
Procedia PDF Downloads 33025662 Data Mining in Medicine Domain Using Decision Trees and Vector Support Machine
Authors: Djamila Benhaddouche, Abdelkader Benyettou
Abstract:
In this paper, we used data mining to extract biomedical knowledge. In general, complex biomedical data collected in studies of populations are treated by statistical methods, although they are robust, they are not sufficient in themselves to harness the potential wealth of data. For that you used in step two learning algorithms: the Decision Trees and Support Vector Machine (SVM). These supervised classification methods are used to make the diagnosis of thyroid disease. In this context, we propose to promote the study and use of symbolic data mining techniques.Keywords: biomedical data, learning, classifier, algorithms decision tree, knowledge extraction
Procedia PDF Downloads 55925661 Analysis of Different Classification Techniques Using WEKA for Diabetic Disease
Authors: Usama Ahmed
Abstract:
Data mining is the process of analyze data which are used to predict helpful information. It is the field of research which solve various type of problem. In data mining, classification is an important technique to classify different kind of data. Diabetes is most common disease. This paper implements different classification technique using Waikato Environment for Knowledge Analysis (WEKA) on diabetes dataset and find which algorithm is suitable for working. The best classification algorithm based on diabetic data is Naïve Bayes. The accuracy of Naïve Bayes is 76.31% and take 0.06 seconds to build the model.Keywords: data mining, classification, diabetes, WEKA
Procedia PDF Downloads 14725660 Comparative Canadian Online News Coverage Analysis of Sex Trafficking Reported Cases in Ontario, and Nova Scotia
Authors: Alisha Fisher
Abstract:
Sex trafficking is a worldwide crisis that requires trauma-informed and survivor-centered media attention to accurate disseminate information. Much of the previous literature on sex trafficking tends to focus on the frequency of incidents, intervention, and support strategies for survivors, with few of them looking to how the media is conducting their reporting on sex trafficking cases to the public. Utilizing data of reports from the media of cases of sex trafficking in the two Canadian provinces with the highest cases of sex trafficking, Ontario and Nova Scotia, the authors sought to analyze the similarities and differences of how sex trafficking cases were being reported. A total of twenty articles were examined, with ten based within the province of Ontario and the remaining ten from the province of Nova Scotia. The authors coded in two processes, first, who the article was about, and second, the framing and content inclusion. The results suggest that there is high usage and reliance of voices and images of authority, with male people of color being shown as the perpetrators and white women being shown as the survivors. These findings can aid in the expansion of trauma-informed, survivor-centered media literacy of reports of sex trafficking to provide accurate insights and further developing robust methods to intersectional approaches to reporting cases of sex trafficking.Keywords: sex trafficking, media coverage, Canada sex trafficking, content analysis
Procedia PDF Downloads 18925659 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 36725658 The Relation between Vitamin C and Oral Health
Authors: Mai Ashraf Talaat
Abstract:
Background: Vitamin C (ascorbic acid) is an essential nutrient for the development and repair of all body tissues. It can be obtained from a healthy diet or through supplementation. Due to its importance, vitamin C has become a mainstay in the treatment and prevention of many diseases and in maintaining immune, skin, bone and overall health. This review article aims to discuss the studies and case reports conducted to evaluate the effect of Vitamin C on oral health and the recent advances in oral medicine that involve the use of vitamin C. Data/Sources: The review was conducted for clinical studies, case reports and published literature in the English language that addresses this topic. An extensive search in the electronic databases of PubMed, PubMed Central, Web of Science, National Library of Medicine and ResearchGate was performed. Conclusion: Vitamin C is thought to treat periodontal diseases and gingival enlargement. It also affects biofilm formation and therefore, it helps in reducing caries incidence. Recently, vitamin C mesotherapy has been used to treat inflamed gingiva, bleeding gums and gingival hyperpigmentation. More research and randomized controlled trials are needed on this specific topic for more accurate judgment. Clinical significance: A minimally invasive approach - the usage of vitamin C in dental care could drastically reduce the need for surgical intervention.Keywords: oral health, periodontology, vitamin C, Gingivitis
Procedia PDF Downloads 7825657 Application of Artificial Neural Network Technique for Diagnosing Asthma
Authors: Azadeh Bashiri
Abstract:
Introduction: Lack of proper diagnosis and inadequate treatment of asthma leads to physical and financial complications. This study aimed to use data mining techniques and creating a neural network intelligent system for diagnosis of asthma. Methods: The study population is the patients who had visited one of the Lung Clinics in Tehran. Data were analyzed using the SPSS statistical tool and the chi-square Pearson's coefficient was the basis of decision making for data ranking. The considered neural network is trained using back propagation learning technique. Results: According to the analysis performed by means of SPSS to select the top factors, 13 effective factors were selected, in different performances, data was mixed in various forms, so the different models were made for training the data and testing networks and in all different modes, the network was able to predict correctly 100% of all cases. Conclusion: Using data mining methods before the design structure of system, aimed to reduce the data dimension and the optimum choice of the data, will lead to a more accurate system. Therefore, considering the data mining approaches due to the nature of medical data is necessary.Keywords: asthma, data mining, Artificial Neural Network, intelligent system
Procedia PDF Downloads 27325656 The Role of Demographics and Service Quality in the Adoption and Diffusion of E-Government Services: A Study in India
Authors: Sayantan Khanra, Rojers P. Joseph
Abstract:
Background and Significance: This study is aimed at analyzing the role of demographic and service quality variables in the adoption and diffusion of e-government services among the users in India. The study proposes to examine the users' perception about e-Government services and investigate the key variables that are most salient to the Indian populace. Description of the Basic Methodologies: The methodology to be adopted in this study is Hierarchical Regression Analysis, which will help in exploring the impact of the demographic variables and the quality dimensions on the willingness to use e-government services in two steps. First, the impact of demographic variables on the willingness to use e-government services is to be examined. In the second step, quality dimensions would be used as inputs to the model for explaining variance in excess of prior contribution by the demographic variables. Present Status: Our study is in the data collection stage in collaboration with a highly reliable, authentic and adequate source of user data. Assuming that the population of the study comprises all the Internet users in India, a massive sample size of more than 10,000 random respondents is being approached. Data is being collected using an online survey questionnaire. A pilot survey has already been carried out to refine the questionnaire with inputs from an expert in management information systems and a small group of users of e-government services in India. The first three questions in the survey pertain to the Internet usage pattern of a respondent and probe whether the person has used e-government services. If the respondent confirms that he/she has used e-government services, then an aggregate of 15 indicators are used to measure the quality dimensions under consideration and the willingness of the respondent to use e-government services, on a five-point Likert scale. If the respondent reports that he/she has not used e-government services, then a few optional questions are asked to understand the reason(s) behind the same. Last four questions in the survey are dedicated to collect data related to the demographic variables. An indication of the Major Findings: Based on the extensive literature review carried out to develop several propositions; a research model is prescribed to start with. A major outcome expected at the completion of the study is the development of a research model that would help to understand the relationship involving the demographic variables and service quality dimensions, and the willingness to adopt e-government services, particularly in an emerging economy like India. Concluding Statement: Governments of emerging economies and other relevant agencies can use the findings from the study in designing, updating, and promoting e-government services to enhance public participation, which in turn, would help to improve efficiency, convenience, engagement, and transparency in implementing these services.Keywords: adoption and diffusion of e-government services, demographic variables, hierarchical regression analysis, service quality dimensions
Procedia PDF Downloads 26725655 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 21925654 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 19525653 Machine Learning Analysis of Student Success in Introductory Calculus Based Physics I Course
Authors: Chandra Prayaga, Aaron Wade, Lakshmi Prayaga, Gopi Shankar Mallu
Abstract:
This paper presents the use of machine learning algorithms to predict the success of students in an introductory physics course. Data having 140 rows pertaining to the performance of two batches of students was used. The lack of sufficient data to train robust machine learning models was compensated for by generating synthetic data similar to the real data. CTGAN and CTGAN with Gaussian Copula (Gaussian) were used to generate synthetic data, with the real data as input. To check the similarity between the real data and each synthetic dataset, pair plots were made. The synthetic data was used to train machine learning models using the PyCaret package. For the CTGAN data, the Ada Boost Classifier (ADA) was found to be the ML model with the best fit, whereas the CTGAN with Gaussian Copula yielded Logistic Regression (LR) as the best model. Both models were then tested for accuracy with the real data. ROC-AUC analysis was performed for all the ten classes of the target variable (Grades A, A-, B+, B, B-, C+, C, C-, D, F). The ADA model with CTGAN data showed a mean AUC score of 0.4377, but the LR model with the Gaussian data showed a mean AUC score of 0.6149. ROC-AUC plots were obtained for each Grade value separately. The LR model with Gaussian data showed consistently better AUC scores compared to the ADA model with CTGAN data, except in two cases of the Grade value, C- and A-.Keywords: machine learning, student success, physics course, grades, synthetic data, CTGAN, gaussian copula CTGAN
Procedia PDF Downloads 4425652 Data Access, AI Intensity, and Scale Advantages
Authors: Chuping Lo
Abstract:
This paper presents a simple model demonstrating that ceteris paribus countries with lower barriers to accessing global data tend to earn higher incomes than other countries. Therefore, large countries that inherently have greater data resources tend to have higher incomes than smaller countries, such that the former may be more hesitant than the latter to liberalize cross-border data flows to maintain this advantage. Furthermore, countries with higher artificial intelligence (AI) intensity in production technologies tend to benefit more from economies of scale in data aggregation, leading to higher income and more trade as they are better able to utilize global data.Keywords: digital intensity, digital divide, international trade, scale of economics
Procedia PDF Downloads 6825651 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data
Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju
Abstract:
Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding
Procedia PDF Downloads 41225650 Identity Verification Using k-NN Classifiers and Autistic Genetic Data
Authors: Fuad M. Alkoot
Abstract:
DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN).Keywords: biometrics, genetic data, identity verification, k nearest neighbor
Procedia PDF Downloads 25825649 A Review on Intelligent Systems for Geoscience
Authors: R Palson Kennedy, P.Kiran Sai
Abstract:
This article introduces machine learning (ML) researchers to the hurdles that geoscience problems present, as well as the opportunities for improvement in both ML and geosciences. This article presents a review from the data life cycle perspective to meet that need. Numerous facets of geosciences present unique difficulties for the study of intelligent systems. Geosciences data is notoriously difficult to analyze since it is frequently unpredictable, intermittent, sparse, multi-resolution, and multi-scale. The first half addresses data science’s essential concepts and theoretical underpinnings, while the second section contains key themes and sharing experiences from current publications focused on each stage of the data life cycle. Finally, themes such as open science, smart data, and team science are considered.Keywords: Data science, intelligent system, machine learning, big data, data life cycle, recent development, geo science
Procedia PDF Downloads 13525648 Antimycobacterial Activity of Ethanolic Extract of Artemisia absinthium
Authors: T. Hojageldiyev, Y. Bolmammedov, S. Gurbanaliyev
Abstract:
It is known that drugs used in the treatment of tuberculosis show toxic effect to organism especially to liver besides its therapeutic effect. Because of ineffectiveness of drugs used in the treatment regimen of tuberculosis against multidrug resistance (MDR) and extensively drug-resistance (XDR) tuberculosis requires the development of new treatment methods and new, novel drugs. Considering the usage of Artemisia absinthium in traditional medicine in treatment of wounds which suggests its antibacterial activity it seems that, also it may have significant antimycobacterial activity. The objective of present study was to evaluate antibacterial activity of ethanolic extract of A. absinthium against M. tuberculosis. In this study, the effect of ethanolic extract of A. absinthium was tested against tuberculosis and pharmaco-toxicological properties evaluated on laboratory animals. The 20%, 40%, 70% and 96% ethanolic extracts of A. absinthium prepared then its bacteriostatic and bactericidal activities were evaluated by validated methods. Data were analyzed by GraphPad Prism 7.0 at the level P < 0.05. Results showed that ethanolic extracts of A. absinthium show no toxicological properties with having high LD50. All concentrations of extract show high bacteriostatic activity on M. tuberculosis. 96% ethanolic extract has highest bactericidal effect among other concentrations. By conducting further studies, as a result of our study, antimycobacterial drug can be prepared from A. absinthium.Keywords: Artemisia absinthium, antimycobacterial, ethanolic extract, Mycobacteria tuberculosis
Procedia PDF Downloads 29225647 Crafting Robust Business Model Innovation Path with Generative Artificial Intelligence in Start-up SMEs
Authors: Ignitia Motjolopane
Abstract:
Small and medium enterprises (SMEs) play an important role in economies by contributing to economic growth and employment. In the fourth industrial revolution, the convergence of technologies and the changing nature of work created pressures on economies globally. Generative artificial intelligence (AI) may support SMEs in exploring, exploiting, and transforming business models to align with their growth aspirations. SMEs' growth aspirations fall into four categories: subsistence, income, growth, and speculative. Subsistence-oriented firms focus on meeting basic financial obligations and show less motivation for business model innovation. SMEs focused on income, growth, and speculation are more likely to pursue business model innovation to support growth strategies. SMEs' strategic goals link to distinct business model innovation paths depending on whether SMEs are starting a new business, pursuing growth, or seeking profitability. Integrating generative artificial intelligence in start-up SME business model innovation enhances value creation, user-oriented innovation, and SMEs' ability to adapt to dynamic changes in the business environment. The existing literature may lack comprehensive frameworks and guidelines for effectively integrating generative AI in start-up reiterative business model innovation paths. This paper examines start-up business model innovation path with generative artificial intelligence. A theoretical approach is used to examine start-up-focused SME reiterative business model innovation path with generative AI. Articulating how generative AI may be used to support SMEs to systematically and cyclically build the business model covering most or all business model components and analyse and test the BM's viability throughout the process. As such, the paper explores generative AI usage in market exploration. Moreover, market exploration poses unique challenges for start-ups compared to established companies due to a lack of extensive customer data, sales history, and market knowledge. Furthermore, the paper examines the use of generative AI in developing and testing viable value propositions and business models. In addition, the paper looks into identifying and selecting partners with generative AI support. Selecting the right partners is crucial for start-ups and may significantly impact success. The paper will examine generative AI usage in choosing the right information technology, funding process, revenue model determination, and stress testing business models. Stress testing business models validate strong and weak points by applying scenarios and evaluating the robustness of individual business model components and the interrelation between components. Thus, the stress testing business model may address these uncertainties, as misalignment between an organisation and its environment has been recognised as the leading cause of company failure. Generative AI may be used to generate business model stress-testing scenarios. The paper is expected to make a theoretical and practical contribution to theory and approaches in crafting a robust business model innovation path with generative artificial intelligence in start-up SMEs.Keywords: business models, innovation, generative AI, small medium enterprises
Procedia PDF Downloads 7125646 Biomass Availability Matrix: Methodology to Define High Level Biomass Availability for Bioenergy Purposes, a Quebec Case Study
Authors: Camilo Perez Lee, Mark Lefsrud, Edris Madadian, Yves Roy
Abstract:
Biomass availability is one of the most important aspects to consider when determining the proper location of potential bioenergy plants. Since this aspect has a direct impact on biomass transportation and storage, biomass availability greatly influences the operational cost. Biomass availability is more than the quantity available on a specific region; other elements such as biomass accessibility and potential play an important role. Accessibility establishes if the biomass could be extracted and conveyed easily considering factors such as biomass availability, infrastructure condition and other operational issues. On the other hand, biomass potential is defined as the capacity of a specific region to scale the usage of biomass as an energy source, move from another energy source or to switch the type of biomass to increase their biomass availability in the future. This paper defines methodologies and parameters in order to determine the biomass availability within the administrative regions of the province of Quebec; firstly by defining the forestry, agricultural, municipal solid waste and energy crop biomass availability per administrative region, next its infrastructure accessibility and lastly defining the region potential. Thus, these data are processed to create a biomass availability matrix allowing to define the overall biomass availability per region and to determine the most optional candidates for bioenergy plant location.Keywords: biomass, availability, bioenergy, accessibility, biomass potential
Procedia PDF Downloads 319