Search results for: data exchange
25534 Data Mining Approach for Commercial Data Classification and Migration in Hybrid Storage Systems
Authors: Mais Haj Qasem, Maen M. Al Assaf, Ali Rodan
Abstract:
Parallel hybrid storage systems consist of a hierarchy of different storage devices that vary in terms of data reading speed performance. As we ascend in the hierarchy, data reading speed becomes faster. Thus, migrating the application’ important data that will be accessed in the near future to the uppermost level will reduce the application I/O waiting time; hence, reducing its execution elapsed time. In this research, we implement trace-driven two-levels parallel hybrid storage system prototype that consists of HDDs and SSDs. The prototype uses data mining techniques to classify application’ data in order to determine its near future data accesses in parallel with the its on-demand request. The important data (i.e. the data that the application will access in the near future) are continuously migrated to the uppermost level of the hierarchy. Our simulation results show that our data migration approach integrated with data mining techniques reduces the application execution elapsed time when using variety of traces in at least to 22%.Keywords: hybrid storage system, data mining, recurrent neural network, support vector machine
Procedia PDF Downloads 30925533 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22825532 Development of a Computer Based, Nutrition and Fitness Programme and Its Effect on Nutritional Status and Fitness of Obese Adults
Authors: Richa Soni, Vibha Bhatnagar, N. K. Jain
Abstract:
This study was conducted to develop a computer mediated programme for weight management and physical fitness and examining its efficacy in reducing weight and improving physical fitness in obese adults. A user friendly, computer based programme was developed to provide a simple, quick, easy and user-friendly method of assessing energy balance at individual level. The programme had four main sections viz. personal Profile, know about your weight, fitness and food exchange list. The computer programme was developed to provide facilities of creating individual profile, tracking meal and physical activities, suggesting nutritional and exercise requirements, planning calorie specific menus, keeping food diaries and revising the diet and exercise plans if needed. The programme was also providing information on obesity, underweight, physical fitness. An exhaustive food exchange list was also given in the programme to assist user to make right food choice decisions. The developed programme was evaluated by a panel of 15 experts comprising endocrinologists, nutritionists and diet counselors. Suggestions given by the experts were paned down and the entire programme was modified in light of suggestions given by the panel members and was reevaluated by the same panel of experts. For assessing the impact of the programme 22 obese subjects were selected purposively and randomly assigned to intervention group (n=12) and no information control group. (n=10). The programme group was asked to strictly follow the programme for one month. Significant reduction in the intake of energy, fat and carbohydrates was observed while intake of fruits, green leafy vegetables was increased. The programme was also found to be effective in reducing body weight, body fat percent and body fat mass whereas total body water and physical fitness scores improved significantly. There was no significant alteration observed in any parameters in the control group.Keywords: body composition, body weight, computer programme, physical fitness
Procedia PDF Downloads 28625531 Discussion on Big Data and One of Its Early Training Application
Authors: Fulya Gokalp Yavuz, Mark Daniel Ward
Abstract:
This study focuses on a contemporary and inevitable topic of Data Science and its exemplary application for early career building: Big Data and Leaving Learning Community (LLC). ‘Academia’ and ‘Industry’ have a common sense on the importance of Big Data. However, both of them are in a threat of missing the training on this interdisciplinary area. Some traditional teaching doctrines are far away being effective on Data Science. Practitioners needs some intuition and real-life examples how to apply new methods to data in size of terabytes. We simply explain the scope of Data Science training and exemplified its early stage application with LLC, which is a National Science Foundation (NSF) founded project under the supervision of Prof. Ward since 2014. Essentially, we aim to give some intuition for professors, researchers and practitioners to combine data science tools for comprehensive real-life examples with the guides of mentees’ feedback. As a result of discussing mentoring methods and computational challenges of Big Data, we intend to underline its potential with some more realization.Keywords: Big Data, computation, mentoring, training
Procedia PDF Downloads 36325530 Electronic, Structure and Magnetic Properties of KXF3(X= Fe, Co, Mn, V) from Ab Initio Calculations
Authors: M. Ibrir, S. Berri, S. Lakel, D. Maouche And Y. Medkour
Abstract:
We have performed first-principle calculations of the structural, electronic and magnetic properties of KFeF3, KCoF3, KMnF3, KVF3, using full-potential linearized augmented plane-wave (FP-LAPW) scheme within GGA. Features such as the lattice constant, bulk modulus and its pressure derivative are reported. Also, we have presented our results of the band structure and the density of states. The magnetic moments of KFeF3, KCoF3, KMnF3, KVF3 compounds are in most came from the exchange-splitting of X-3d orbital.Keywords: Ab initio calculations, electronic structure, magnetic materials
Procedia PDF Downloads 42125529 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 33525528 Ontological Modeling Approach for Statistical Databases Publication in Linked Open Data
Authors: Bourama Mane, Ibrahima Fall, Mamadou Samba Camara, Alassane Bah
Abstract:
At the level of the National Statistical Institutes, there is a large volume of data which is generally in a format which conditions the method of publication of the information they contain. Each household or business data collection project includes a dissemination platform for its implementation. Thus, these dissemination methods previously used, do not promote rapid access to information and especially does not offer the option of being able to link data for in-depth processing. In this paper, we present an approach to modeling these data to publish them in a format intended for the Semantic Web. Our objective is to be able to publish all this data in a single platform and offer the option to link with other external data sources. An application of the approach will be made on data from major national surveys such as the one on employment, poverty, child labor and the general census of the population of Senegal.Keywords: Semantic Web, linked open data, database, statistic
Procedia PDF Downloads 17625527 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges
Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh
Abstract:
For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.Keywords: guideline, law, data protection officer, personal data
Procedia PDF Downloads 7825526 The Usefulness and Future of Hearing Aids Technologies and Their Impact on Hearing
Authors: Amirreza Razzaghipour Sorkhab
Abstract:
Hearing loss is one of the greatest common chronic health situations of older people. Hearing aids are the common treatment, and they recover the quality of life in older adults. Even so, comparatively few older adults with simple, mild to moderate, adult-onset, sensorineural hearing loss use hearing aids. It shouldn’t be expected that more expensive hearing aids always produce better outcomes. Given the importance of quality pledge, approaches of quantifying hearing aid fitting achievement are needed. Studies showed an important reduction in handicap following 3 weeks of hearing aid use, signifying the feasibility of using the Hearing Hindrance Inventory for the Elderly as an outcome measure for hearing aid success after a brief interval of hearing aid use. The results showed important development of the quality of life after three months of using a hearing aid in all members and improvement of their most important problems, i.e., the communication and exchange of data. Hearing loss can impair the conversation of information and so decreases the quality of life. Hearing aids have progressivemeaningfully over the past decade, chiefly due to the growing of digital technology. The next decade should see an even greater number of innovations to hearing aid technology. Development in digital hearing aids will be driven by investigate advances in the next fields such as wireless technology, hearing science, and cognitive scienceMoreover, emerging trends such as connectivity and individuation will also drive new technology. We hope that the advancement of technology will be enough to meet the needs of people with hearing aids.Keywords: hearing loss, hearing aid, hearing aid technology, health
Procedia PDF Downloads 10825525 Data Collection Based on the Questionnaire Survey In-Hospital Emergencies
Authors: Nouha Mhimdi, Wahiba Ben Abdessalem Karaa, Henda Ben Ghezala
Abstract:
The methods identified in data collection are diverse: electronic media, focus group interviews and short-answer questionnaires [1]. The collection of poor-quality data resulting, for example, from poorly designed questionnaires, the absence of good translators or interpreters, and the incorrect recording of data allow conclusions to be drawn that are not supported by the data or to focus only on the average effect of the program or policy. There are several solutions to avoid or minimize the most frequent errors, including obtaining expert advice on the design or adaptation of data collection instruments; or use technologies allowing better "anonymity" in the responses [2]. In this context, we opted to collect good quality data by doing a sizeable questionnaire-based survey on hospital emergencies to improve emergency services and alleviate the problems encountered. At the level of this paper, we will present our study, and we will detail the steps followed to achieve the collection of relevant, consistent and practical data.Keywords: data collection, survey, questionnaire, database, data analysis, hospital emergencies
Procedia PDF Downloads 10825524 Active Learning Management for Teacher's Professional Courses in Curriculum and Instruction, Faculty of Education Thaksin University
Authors: Chuanphit Chumkhong
Abstract:
This research aimed 1) to study the effects of the management of Active Learning among 3rd year students enrolled in teacher’s profession courses and 2) to assess the satisfaction of the students with courses using the Active Learning approach. The population for the study consisted of 442 3rd year undergraduate students enrolled in two teacher education courses in 2015: Curriculum Development and Learning Process Management. They were 442 from 11 education programs. Respondents for evaluation of satisfaction with Active Learning management comprised 432 students. The instruments used in research included a detailed course description and rating scale questionnaire on Active Learning. The data were analyzed using arithmetic mean and standard deviation. The results of the study reveal the following: 1. Overall, students gain a better understanding of the Active Learning due to their actual practice on the activity of course. Students have the opportunity to exchange learning knowledge and skills. The AL teaching activities make students interested in the contents and they seek to search for knowledge on their own. 2. Overall, 3rd year students are satisfied with the Active Learning management at a ‘high’ level with a mean score (μ) of 4.12 and standard deviation (σ) of. 51. By individual items, students are satisfied with the 10 elements in the two courses at a ‘high’ level with the mean score (μ) between 3.79 to 4.41 and a standard deviation (σ) between to 68. 79.Keywords: active learning teaching model, teacher’s professional courses, professional courses, curriculum and instruction teacher's
Procedia PDF Downloads 24925523 Sand Dollars: Sex Tourism and Coloniality of Power in the Dominican Republic
Authors: Fernando Valerio-Holguin
Abstract:
Over the recent three decades, the tourism industry in the Dominican Republic has had an enormous impact on the country’s culture. The arrival of tourists from Germany, France, Italy, Russia and the United States has rewritten Dominican cultural identity and created a cultural palimpsest in the areas of language, gastronomy, habits, fashion, values, and gender relations. As a consequence of tourism, a prostitution network has flourished across the country. In the film Sand Dollars (2015) directed by Laura Amelia Guzmán and Israel Cárdenas, Noelí (Janet Mojica), a young mulatto woman, altogether with her boyfriend (Ricardo Ariel Toribio), strips tourists of dollars and euro through prostitution. One of her frequent clients is Anne, a mature French woman (Geraldine Chaplin). While Noeli’s goal is to get all the euros she can, Anne falls in love with her and tries to bring her to France. Both the content of the film and its cinematographic languages are analyzed in light of theory of coloniality. This concept shows how European and American tourism, through the power of money, perpetuates colonial discourse, i. e., how race and ethnocentrism permeate cultural activities in their former colonies. Moreover, in the content analysis of the film the concepts of exchange value and fetishism are crucial to understanding how the colonial body becomes sexual commodity. They facilitate grasping the film’s inequity in terms of power in the relationship between the two women: the white old European woman and the young, poor, third-world mulatta. Even though the film attempts to break away from compulsory heterosexuality, the power relation between the two women persists due to the presence of the axis of race, ethnicity, age and gender. Both the novel Les dollars des sables written by Jean-Noel Pancrazi, and the film Sand Dollars offer an interesting insight into sex tourism and coloniality and shed additional light on the power relations between the former colonizers and its colonies.Keywords: coloniality, ethnocentrism, exchange value, Europe, fetishism, money, power, prostitution, sex tourism, United States of America
Procedia PDF Downloads 45125522 Federated Learning in Healthcare
Authors: Ananya Gangavarapu
Abstract:
Convolutional Neural Networks (CNN) based models are providing diagnostic capabilities on par with the medical specialists in many specialty areas. However, collecting the medical data for training purposes is very challenging because of the increased regulations around data collections and privacy concerns around personal health data. The gathering of the data becomes even more difficult if the capture devices are edge-based mobile devices (like smartphones) with feeble wireless connectivity in rural/remote areas. In this paper, I would like to highlight Federated Learning approach to mitigate data privacy and security issues.Keywords: deep learning in healthcare, data privacy, federated learning, training in distributed environment
Procedia PDF Downloads 14225521 Task Value and Research Culture of Southern Luzon State University
Authors: Antonio V. Romana, Rizaide A. Salayo, Maria Lavinia E. Fetalino
Abstract:
This study assessed the subjective task value and research culture of SLSU faculty. It used the sequential explanatory mixed-method research design. For the quantitative phase, a questionnaire on the research culture and task value were used. While in the qualitative phase, the data was coded and thematized to interpret the focus group discussion outcome. Results showed that the dimensions of the subjective task value, intrinsic, got the highest rank while the utility value got the lowest. It is worth mentioning that all subjective task values were "Agreed." From the FGD, faculty members valued research and wanted to be involved in this undertaking. However, the limited number of faculty researchers, heavy teaching workload, inadequate information on the research process, lack of self-confidence, and low incentives received from research hindered their writing and engagement with research. Thus, a policy brief was developed. It is recommended that the institution may conduct a series of research seminar workshops for the faculty members, plan regular research idea exchange activities, and revisit the university's research thrust and agenda for faculties specialization and expertise alignment. In addition, the university may also lessen the workload and hire additional faculty members so that educators may focus on their research work. Finally, cash incentives may still be considered upon knowing that the faculty members have varied experiences in doing research tasks.Keywords: task value, interest value, attainment value, utility value, research culture
Procedia PDF Downloads 6625520 A Method for Consensus Building between Teachers and Learners in a Value Co-Creative Learning Service
Authors: Ryota Sugino, Satoshi Mizoguchi, Koji Kimita, Keiichi Muramatsu, Tatsunori Matsui, Yoshiki Shimomura
Abstract:
Improving added value and productivity of services entails improving both value-in-exchange and value-in-use. Value-in-use is realized by value co-creation, where providers and receivers create value together. In higher education services, value-in-use comes from learners achieving learning outcomes (e.g., knowledge and skills) that are consistent with their learning goals. To enhance the learning outcomes of a learner, it is necessary to enhance and utilize the abilities of the teacher along with the abilities of the learner. To do this, however, the learner and the teacher need to build a consensus about their respective roles. Teachers need to provide effective learning content; learners need to choose the appropriate learning strategies by using the learning content through consensus building. This makes consensus building an important factor in value co-creation. However, methods to build a consensus about their respective roles may not be clearly established, making such consensus difficult. In this paper, we propose some strategies for consensus building between a teacher and a learner in value co-creation. We focus on a teacher and learner co-design and propose an analysis method to clarify a collaborative design process to realize value co-creation. We then analyze some counseling data obtained from a university class. This counseling aimed to build a consensus for value-in-use, learning outcomes, and learning strategies between the teacher and the learner.Keywords: consensus building, value co-creation, higher education, learning service
Procedia PDF Downloads 30425519 A Proposed Model of E-Marketing Service-Oriented Architecture (E-MSOA)
Authors: Hussein Moselhy, Islam Salam
Abstract:
There have been some challenges and problems which hinder the implementation of the e-marketing systems such as the high cost of information systems infrastructure and maintenance as well as their unavailability within the institution. Also, there is no system which supports all programming languages and different platforms. Another problem is the lack of integration between these systems on one hand and the operating systems and different web browsers on the other hand. No system for customer relationship management is established which recognizes their desires and puts them in consideration while performing e-marketing functions is available. Therefore, the service-oriented architecture emerged as one of the most important techniques and methodologies to build systems that integrate with various operating systems and different platforms and other technologies. This technology allows realizing the data exchange among different applications. The service-oriented architecture represents distributed computing concepts to demonstrate its success in achieving the requirements of systems through web services. It also reflects the appropriate design for the services to use different web services in supporting the requirements of business processes and software users. In a service-oriented environment, web services are deployed on the web in the form of independent services to be accessed without knowledge of the nature of the programs and systems with in. This Paper presents a proposal for a new model which contributes to the application of methods and means of e-marketing with the integration of marketing mix elements to improve marketing efficiency (E-MSOA). And apply it in the educational city of one of the Egyptian sector.Keywords: service-oriented architecture, electronic commerce, virtual retailing, unified modeling language
Procedia PDF Downloads 42825518 The Utilization of Big Data in Knowledge Management Creation
Authors: Daniel Brian Thompson, Subarmaniam Kannan
Abstract:
The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.Keywords: big data, knowledge management, data driven, knowledge creation
Procedia PDF Downloads 11725517 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya
Authors: Masese Chuma Benard, Martin Onsiro Ronald
Abstract:
Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)
Procedia PDF Downloads 8525516 Cloud Design for Storing Large Amount of Data
Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás
Abstract:
Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization
Procedia PDF Downloads 35325515 Dominant Correlation Effects in Atomic Spectra
Authors: Hubert Klar
Abstract:
High double excitation of two-electron atoms has been investigated using hyperpherical coordinates within a modified adiabatic expansion technique. This modification creates a novel fictitious force leading to a spontaneous exchange symmetry breaking at high double excitation. The Pauli principle must therefore be regarded as approximation valid only at low excitation energy. Threshold electron scattering from high Rydberg states shows an unexpected time reversal symmetry breaking. At threshold for double escape we discover a broad (few eV) Cooper pair.Keywords: correlation, resonances, threshold ionization, Cooper pair
Procedia PDF Downloads 34825514 Estimation of Missing Values in Aggregate Level Spatial Data
Authors: Amitha Puranik, V. S. Binu, Seena Biju
Abstract:
Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis
Procedia PDF Downloads 38225513 Theoretical Study of Structural and Electronic Properties of Matlockite CaFX (X = I and Br) Compounds
Authors: Meriem Harmel, Houari Khachai
Abstract:
The full potential linearized augmented plane wave (FP-LAPW)method within density functional theory is applied to study, for the first time, the structural and electronic properties of CaFI and to compare them with CaFCl and CaFBr, all compounds belonging to the tetragonal PbFCl structure group with space group P4/nmm. We used the generalized gradient approximation (GGA) based on exchange–correlation energy optimization to calculate the total energy and also the Engel– Vosko GGA formalism, which optimizes the corresponding potential for band structure calculations. Ground state properties such as the lattice parameters, c/a ratio, bulk modulus, pressure derivative of the bulk modulus and cohesive energy are calculated, as well as the optimized internal parameters, by relaxing the atomic position in the force directions. The variations of the calculated interatomic distances and angles between different atomic bonds are discussed. CaFCl was found to have a direct band gap at whereas CaFBr and BaFI have indirect band gaps. From these computed bands, all three materials are found to be insulators having band gaps of 6.28, 5.46, and 4.50 eV, respectively. We also calculated the valence charge density and the total density of states at equilibrium volume for each compound. The results are in reasonable agreement with the available experimental data.Keywords: DFT, matlockite, structural properties, electronic structure
Procedia PDF Downloads 32525512 Association Rules Mining and NOSQL Oriented Document in Big Data
Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub
Abstract:
Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL
Procedia PDF Downloads 16325511 Farmers’ Perception and Response to Climate Change Across Agro-ecological Zones in Conflict-Ridden Communities in Cameroon
Authors: Lotsmart Fonjong
Abstract:
The livelihood of rural communities in the West African state of Cameroon, which is largely dictated by natural forces (rainfall, temperatures, and soil), is today threatened by climate change and armed conflict. This paper investigates the extent to which rural communities are aware of climate change, how their perceptions of changes across different agro-ecological zones have impacted farming practices, output, and lifestyles, on the one hand, and the extent to which local armed conflicts are confounding their efforts and adaptation abilities. The paper is based on a survey conducted among small farmers in selected localities within the forest and savanna ecological zones of the conflict-ridden Northwest and Southwest Cameroon. Attention is paid to farmers’ gender, scale, and type of farming. Farmers’ perception of/and response to climate change are analysed alongside local rainfall and temperature data and mobilization for climate justice. Findings highlight the fact that farmers’ perception generally corroborates local climatic data. Climatic instability has negatively affected farmers’ output, food prices, standards of living, and food security. However, the vulnerability of the population varies across ecological zones, gender, and crop types. While these factors also account for differences in local response and adaptation to climate change, ongoing armed conflicts in these regions have further complicated opportunities for climate-driven agricultural innovations, inputs, and exchange of information among farmers. This situation underlines how poor communities, as victims, are forced into many complex problems outsider their making. It is therefore important to mainstream farmers’ perceptions and differences into policy strategies that consider both climate change and Anglophone conflict as national security concerns foe sustainable development in Cameroon.Keywords: adaptation policies, climate change, conflict, small farmers, cameroon
Procedia PDF Downloads 15825510 Immunization-Data-Quality in Public Health Facilities in the Pastoralist Communities: A Comparative Study Evidence from Afar and Somali Regional States, Ethiopia
Authors: Melaku Tsehay
Abstract:
The Consortium of Christian Relief and Development Associations (CCRDA), and the CORE Group Polio Partners (CGPP) Secretariat have been working with Global Alliance for Vac-cines and Immunization (GAVI) to improve the immunization data quality in Afar and Somali Regional States. The main aim of this study was to compare the quality of immunization data before and after the above interventions in health facilities in the pastoralist communities in Ethiopia. To this end, a comparative-cross-sectional study was conducted on 51 health facilities. The baseline data was collected in May 2019, while the end line data in August 2021. The WHO data quality self-assessment tool (DQS) was used to collect data. A significant improvment was seen in the accuracy of the pentavalent vaccine (PT)1 (p = 0.012) data at the health posts (HP), while PT3 (p = 0.010), and Measles (p = 0.020) at the health centers (HC). Besides, a highly sig-nificant improvment was observed in the accuracy of tetanus toxoid (TT)2 data at HP (p < 0.001). The level of over- or under-reporting was found to be < 8%, at the HP, and < 10% at the HC for PT3. The data completeness was also increased from 72.09% to 88.89% at the HC. Nearly 74% of the health facilities timely reported their respective immunization data, which is much better than the baseline (7.1%) (p < 0.001). These findings may provide some hints for the policies and pro-grams targetting on improving immunization data qaulity in the pastoralist communities.Keywords: data quality, immunization, verification factor, pastoralist region
Procedia PDF Downloads 12525509 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro
Authors: Safwan Mawlood Hussien
Abstract:
Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro
Procedia PDF Downloads 12025508 Hardships Faced by Entrepreneurs in Marketing Projects for Acquiring Business Loans
Authors: Sudipto Sarkar
Abstract:
Capital is the primary fuel for starting and running a business. Since capital is crucial for every business, entrepreneurs must successfully acquire adequate capital for executing their projects. Sources for the necessary capital for entrepreneurs include their own personal funds from existing bank accounts, or lines of credit or loans from banks or financial institutions, or equity funding from investors. The most commonly selected source of capital is a bank loan. However, acquiring a loan by any entrepreneur requires adhering to strict guidelines, conditions and norms. Because not only they have to show evidence for viability of the project, but also the means to return the acquired loan. On the bank’s part, it requires that every loan officer performs a thorough credit appraisal of the prospective borrowers and makes decisions about whether or not to lend money, how much to lend, and what conditions should be attached to it. Moreover, these credit decisions in general were often based on biases, analytical techniques, or prior experience. A loan can either turn out to be good or poor, irrespective of what type of credit decisions were followed. However, based on prior experience, the loan officers seem to differentiate between a good and a bad loan by examining the borrower’s credit history, pattern of borrowing, volume of borrowing, frequency of borrowing, and reasons for borrowing. As per an article written by Maureen Wallenfang on postcrescent.com dated May 10, 2010, it is observed that borrowers with good credit, solid business plans and adequate collateral security were able to procure loans very easily in the Fox Valley region. Since loans are required to run businesses, and also with the propensity of loans to become bad, loan officers tend to be very critical and cautious before approving and disbursing the loans. The pressure to be critical and cautious, at least partly, is a result of increased scrutiny by the Securities and Exchange Commission. As per Wall Street Journal (Sidel & Eaglesham, March, 3 2011, online), the Securities and Exchange Commission scrutinized banks that have restructured troubled loans in order to make them appear healthier than they really are. Therefore, loan officers’ loan criteria are of immense importance for entrepreneurs and banks alike.Keywords: entrepreneur, loans, marketing, banks
Procedia PDF Downloads 25825507 Identifying Critical Success Factors for Data Quality Management through a Delphi Study
Authors: Maria Paula Santos, Ana Lucas
Abstract:
Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort
Procedia PDF Downloads 21825506 Analysis of Financial Performance Measurement and Financial Distress Assessment of Highway Companies Listed on Indonesia Stock Exchange before and during COVID-19 Pandemic
Authors: Ari Prasetyo, Taufik Faturohman
Abstract:
The COVID-19 pandemic in Indonesia is part of the ongoing worldwide pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was confirmed to have spread to Indonesia on 2 March 2020. Moreover, the government of Indonesia has been conducting a local lockdown to limit people's movement from one city to another city. Therefore, this situation has impact on business operation, especially on highway companies listed on the Indonesia stock exchange. This study evaluates and measures three companies’ financial performance and health conditions before and during the COVID-19 pandemic from 2016 – 2020. The measurement is conducted by using financial ratio analysis and the Altman Z-score method. The ratio used to measure the financial ratio analysis is taken from the decree of the Ministry of SOE’s KEP-100/MBU/2002 about the company’s health level condition. From the decree, there are eight financial ratios used such as return on equity (ROE), return on investment (ROI), current ratio, cash ratio, collection period, inventory turnover, total asset turnover, and total equity to total asset. Altman Z-score is used to calculate the financial distress condition. The result shows that the highway companies for the period 2016 – 2020 are as follows: PT Jasa Marga (Persero) Tbk (AA, BB, BB, BB, C), PT Citra Marga Nusaphala Persada Tbk (BB, AA, BB, BBB, C), and PT Nusantara Infrastructure Tbk (BB, BB, AA, BBB, C). In addition, the Altman Z-score assessment performed in 2016-2020 shows that PT Jasa Marga (Persero) Tbk was in the grey zone area for 2015-2018 and in the distress zone for 2019-2020. PT Citra Marga Nusaphala Persada Tbk was in the grey zone area for 2015-2019 and in the distress zone for 2020. PT Nusantara Infrastructure Tbk was in the grey zone area for 2015-2018 and in the distress zone for 2019-2020.Keywords: financial performance, financial ratio, Altman Z-score, financial distress, highway company
Procedia PDF Downloads 19125505 Central Energy Management for Optimizing Utility Grid Power Exchange with a Network of Smart Homes
Authors: Sima Aznavi, Poria Fajri, Hanif Livani
Abstract:
Smart homes are small energy systems which may be equipped with renewable energy sources, storage devices, and loads. Energy management strategy plays a main role in the efficient operation of smart homes. Effective energy scheduling of the renewable energy sources and storage devices guarantees efficient energy management in households while reducing the energy imports from the grid. Nevertheless, despite such strategies, independently day ahead energy schedules for multiple households can cause undesired effects such as high power exchange with the grid at certain times of the day. Therefore, the interactions between multiple smart home day ahead energy projections is a challenging issue in a smart grid system and if not managed appropriately, the imported energy from the power network can impose additional burden on the distribution grid. In this paper, a central energy management strategy for a network consisting of multiple households each equipped with renewable energy sources, storage devices, and Plug-in Electric Vehicles (PEV) is proposed. The decision-making strategy alongside the smart home energy management system, minimizes the energy purchase cost of the end users, while at the same time reducing the stress on the utility grid. In this approach, the smart home energy management system determines different operating scenarios based on the forecasted household daily load and the components connected to the household with the objective of minimizing the end user overall cost. Then, selected projections for each household that are within the same cost range are sent to the central decision-making system. The central controller then organizes the schedules to reduce the overall peak to average ratio of the total imported energy from the grid. To validate this approach simulations are carried out for a network of five smart homes with different load requirements and the results confirm that by applying the proposed central energy management strategy, the overall power demand from the grid can be significantly flattened. This is an effective approach to alleviate the stress on the network by distributing its energy to a network of multiple households over a 24- hour period.Keywords: energy management, renewable energy sources, smart grid, smart home
Procedia PDF Downloads 248