Search results for: survival data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26148

Search results for: survival data

25428 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 433
25427 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 296
25426 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 125
25425 Maternal Risk Factors Associated with Low Birth Weight Neonates in Pokhara, Nepal: A Hospital Based Case Control Study

Authors: Dipendra Kumar Yadav, Nabaraj Paudel, Anjana Yadav

Abstract:

Background: Low Birth weight (LBW) is defined as the weight at birth less than 2500 grams, irrespective of the period of their gestation. LBW is an important indicator of general health status of population and is considered as the single most important predictors of infant mortality especially of deaths within the first month of life that is birth weight determines the chances of newborn survival. Objective of this study was to identify the maternal risk factors associated with low birth weight neonates. Materials and Methods: A hospital based case-control study was conducted in maternity ward of Manipal Teaching Hospital, Pokhara, Nepal from 23 September 2014 to 12 November 2014. During study period 59 cases were obtained and twice number of control group were selected with frequency matching of the mother`s age with ± 3 years and total controls were 118. Interview schedule was used for data collection along with record review. Data were entered in Epi-data program and analysis was done with help of SPSS software program. Results: From bivariate logistic regression analysis, eighteen variables were found significantly associated with LBW and these were place of residence, family monthly income, education, previous still birth, previous LBW, history of STD, history of vaginal bleeding, anemia, ANC visits, less than four ANC visits, de-worming status, counseling during pregnancy, CVD, physical workload, stress, extra meal during pregnancy, smoking and alcohol consumption status. However after adjusting confounding variables, only six variables were found significantly associated with LBW. Mothers who had family monthly income up to ten thousand rupees were 4.83 times more likely to deliver LBW with CI (1.5-40.645) and p value 0.014 compared to mothers whose family income NRs.20,001-60,000. Mothers who had previous still birth were 2.01 times more likely to deliver LBW with CI (0.69-5.87) and p value 0.02 compared to mothers who did not has previous still birth. Mothers who had previous LBW were 5.472 times more likely to deliver LBW with CI (1.2-24.93) and p value 0.028 compared to mothers who did not has previous LBW. Mothers who had anemia during pregnancy were 3.36 times more likely to deliver LBW with CI (0.77-14.57) and p value 0.014 compared to mothers who did not has anemia. Mothers who delivered female newborn were 2.96 times more likely to have LBW with 95% CI (1.27-7.28) and p value 0.01 compared to mothers who deliver male newborn. Mothers who did not get extra meal during pregnancy were 6.04 times more likely to deliver LBW with CI (1.11-32.7) and p value 0.037 compared to mothers who getting the extra meal during pregnancy. Mothers who consumed alcohol during pregnancy were 4.83 times more likely to deliver LBW with CI (1.57-14.83) and p value 0.006 compared to mothers who did not consumed alcohol during pregnancy. Conclusions: To reduce low birth weight baby through economic empowerment of family and individual women. Prevention and control of anemia during pregnancy is one of the another strategy to control the LBW baby and mothers should take full dose of iron supplements with screening of haemoglobin level. Extra nutritional food should be provided to women during pregnancy. Health promotion program will be focused on avoidance of alcohol and strengthen of health services that leads increasing use of maternity services.

Keywords: low birth weight, case-control, risk factors, hospital based study

Procedia PDF Downloads 303
25424 Sublethal Effects of Thiamethoxam-Lambda Cyhalothrin on the Life Table Parameters and Population Projection of Trialeurodes vaporariorum (Hemiptera: Aleyrodidae) and Its Parasitoid, Encarsia formosa (Hymenoptera: Aphelinidae)

Authors: Sevda Ddras, Fariba Mehrkhou, Remzi Atlihan, Maryam Fourouzan

Abstract:

The greenhouse whitefly, Trialeurodes vaporariorum Westwood (Hemiptera: Aleyrodidae), is one of the most important pest on vegetables and ornamental host plants. In this research, the sub-lethal concentration (LC30) of thiamethoxam-lambda cyhalothrin (TLC) on the biological properties, life table parameters and population projection of T. vaporarium and its parasitoid, Encarsia formosa Gahan, were studied at controlled condition (25 ±5 ℃, R.H. 60 ±10 % and a photoperiod of 16:8 h (L:D). Bioassays were conducted by dipping tomato leaves containing third instar nymphs of the whitefly T. vaporariorum, in the obtained LC30 concentration of eforia. The life table data were analyzed using the computer program TWOSEX–MSChart based on the age-stage, two-sex life table theory. The results showed that, usage of sublethal concentration of TLC effected the biological properties and population growth parameters of greenhouse whitefly by shortening the developmentl time, adult longevity, decreasing the fecundity and population growth paramters. Also, the LC30 concentration of TLC had negative effects on life history and life table parameters of E.formosa. The obtained results illustrated that the sublethal concentration of TLC resulted in prolonging of developmental time, decreasing of adult longevity, survival rate and population growth parameters of E.formosa. Additionally, the population projection results were accordance with the population growth rate of either greenhouse whitefly or E.formosa. We conclude that, TLC should not be used in integrated pest management programs where E. formosa exists.

Keywords: greenhouse whitefly, Encarsia formosa, thiamethoxam-lambda cyhalothrin, population projection, life table parameters

Procedia PDF Downloads 75
25423 Experiments on Weakly-Supervised Learning on Imperfect Data

Authors: Yan Cheng, Yijun Shao, James Rudolph, Charlene R. Weir, Beth Sahlmann, Qing Zeng-Treitler

Abstract:

Supervised predictive models require labeled data for training purposes. Complete and accurate labeled data, i.e., a ‘gold standard’, is not always available, and imperfectly labeled data may need to serve as an alternative. An important question is if the accuracy of the labeled data creates a performance ceiling for the trained model. In this study, we trained several models to recognize the presence of delirium in clinical documents using data with annotations that are not completely accurate (i.e., weakly-supervised learning). In the external evaluation, the support vector machine model with a linear kernel performed best, achieving an area under the curve of 89.3% and accuracy of 88%, surpassing the 80% accuracy of the training sample. We then generated a set of simulated data and carried out a series of experiments which demonstrated that models trained on imperfect data can (but do not always) outperform the accuracy of the training data, e.g., the area under the curve for some models is higher than 80% when trained on the data with an error rate of 40%. Our experiments also showed that the error resistance of linear modeling is associated with larger sample size, error type, and linearity of the data (all p-values < 0.001). In conclusion, this study sheds light on the usefulness of imperfect data in clinical research via weakly-supervised learning.

Keywords: weakly-supervised learning, support vector machine, prediction, delirium, simulation

Procedia PDF Downloads 203
25422 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security

Authors: Kenneth Harper

Abstract:

Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.

Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs

Procedia PDF Downloads 25
25421 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads

Authors: Dražen Cvitanić, Biljana Maljković

Abstract:

This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.

Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency

Procedia PDF Downloads 453
25420 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data

Authors: S. Nickolas, Shobha K.

Abstract:

The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.

Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing

Procedia PDF Downloads 278
25419 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast

Authors: Ruixia Liu

Abstract:

Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.

Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI

Procedia PDF Downloads 238
25418 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies

Authors: Sook Ching Yee, Angela Siew Hoong Lee

Abstract:

Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.

Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)

Procedia PDF Downloads 365
25417 Big Data Analysis with Rhipe

Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim

Abstract:

Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.

Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe

Procedia PDF Downloads 502
25416 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 148
25415 Vitex agnus-castus Anti-Inflammatory, Antioxidants Characters and Anti-Tumor Effect in Ehrlich Ascites Carcinoma Model

Authors: Abeer Y. Ibrahim, Faten M. Ibrahim, Samah A. El-Newary, Saber F. Hendawy

Abstract:

Objective: Appreciation of in-vitro anti-inflammatory and antioxidant characters of Vitex agnus-castus berries alcoholic extract and fractions, as well as in-vivo antitumor ability of alcoholic extract and chloroform fraction against Ehrlich ascites carcinoma is the aim of this study. Material and methods: Antioxidant properties of crude alcoholic extract of vitex berries as well as petroleum ether, chloroform, ethyl acetate and butanol fractions were evaluated, in-vitro assessments, as compared with standard materials, l-ascorbic acid (vitamin C) and butylated hydroxyl toluene(BHT). The anti-inflammatory activity was investigated in cyclooxygenase (COX)-1 and COX-2 inhibition assays. Moreover, in-vivo antitumor effect of vitex berries alcoholic and chloroform extracts were evaluated using Ehrlich ascites carcinoma model. Data were presented as mean±SE, and data were analyzed by one-way analysis of variance test. Results and conclusion: Berries crude extract showed potent antioxidant activity followed with its fractions ethyl acetate and chloroform as compared with standard (V.C and BHT). Ethyl acetate fraction showed good reduction capability, metal ion chelation, hydrogen peroxide scavenging, nitric oxide scavenging and superoxide anion scavenging. Meanwhile, chloroform fraction produced the highest free radical scavenging activity and total antioxidant capacity. In respectable of lipid peroxidation inhibition, crude alcoholic extract and its fractions cleared weak inhibition in comparing with standard materials. Anti-inflammatory activity of V. agnus-castus berries chloroform fraction of vitex was best COX-2 inhibitor (IC₅₀, 135.41 µg/ ml) as compared to vitex alcoholic extract or ethyl acetate fraction with weak inhibitory effect on COX-1 (IC50, 778.432 µg/ ml), where the lowest effect on COX-1 was recorded with alcoholic extract. Alcoholic extract and its fractions showed weak COX-1 inhibition activity, whereas COX-2 was inhibited (100%), compared with celecoxib drug (72% at 1000ppm). The crude alcoholic and chloroform extracts of V. agnus-castus barries significantly reduced the viable Ehrlich cell count and increased nonviable count with amelioration of all hematological parameters. This amelioration was reflected on increasing median survival time and significant increase (P < 0.05) in lifespan.

Keywords: anti-inflammatory, antioxidants, ehrlich ascites carcinoma, Vitex agnus-castus

Procedia PDF Downloads 150
25414 Targeting Glucocorticoid Receptor Eliminate Dormant Chemoresistant Cancer Stem Cells in Glioblastoma

Authors: Aoxue Yang, Weili Tian, Haikun Liu

Abstract:

Brain tumor stem cells (BTSCs) are resistant to therapy and give rise to recurrent tumors. These rare and elusive cells are likely to disseminate during cancer progression, and some may enter dormancy, remaining viable but not increasing. The identification of dormant BTSCs is thus necessary to design effective therapies for glioblastoma (GBM) patients. Glucocorticoids (GCs) are used to treat GBM-associated edema. However, glucocorticoids participate in the physiological response to psychosocial stress, linked to poor cancer prognosis. This raises concern that glucocorticoids affect the tumor and BTSCs. Identifying markers specifically expressed by brain tumor stem cells (BTSCs) may enable specific therapies that spare their regular tissue-resident counterparts. By ribosome profiling analysis, we have identified that glycerol-3-phosphate dehydrogenase 1 (GPD1) is expressed by dormant BTSCs but not by NSCs. Through different stress-induced experiments in vitro, we found that only dexamethasone (DEXA) can significantly increase the expression of GPD1 in NSCs. Adversely, mifepristone (MIFE) which is classified as glucocorticoid receptors antagonists, could decrease GPD1 protein level and weaken the proliferation and stemness in BTSCs. Furthermore, DEXA can induce GPD1 expression in tumor-bearing mice brains and shorten animal survival, whereas MIFE has a distinct adverse effect that prolonged mice lifespan. Knocking out GR in NSC can block the upregulation of GPD1 inducing by DEXA, and we find the specific sequences on GPD1 promotor combined with GR, thus improving the efficiency of GPD1 transcription from CHIP-Seq. Moreover, GR and GPD1 are highly co-stained on GBM sections obtained from patients and mice. All these findings confirmed that GR could regulate GPD1 and loss of GPD1 Impairs Multiple Pathways Important for BTSCs Maintenance GPD1 is also a critical enzyme regulating glycolysis and lipid synthesis. We observed that DEXA and MIFE could change the metabolic profiles of BTSCs by regulating GPD1 to shift the transition of cell dormancy. Our transcriptome and lipidomics analysis demonstrated that cell cycle signaling and phosphoglycerides synthesis pathways contributed a lot to the inhibition of GPD1 caused by MIFE. In conclusion, our findings raise concern that treatment of GBM with GCs may compromise the efficacy of chemotherapy and contribute to BTSC dormancy. Inhibition of GR can dramatically reduce GPD1 and extend the survival duration of GBM-bearing mice. The molecular link between GPD1 and GR may give us an attractive therapeutic target for glioblastoma.

Keywords: cancer stem cell, dormancy, glioblastoma, glycerol-3-phosphate dehydrogenase 1, glucocorticoid receptor, dexamethasone, RNA-sequencing, phosphoglycerides

Procedia PDF Downloads 136
25413 A Study of Blockchain Oracles

Authors: Abdeljalil Beniiche

Abstract:

The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.

Keywords: blockchain, oracles, oracles design, human oracles

Procedia PDF Downloads 142
25412 Mariculture Trials of the Philippine Blue Sponge Xestospongia sp.

Authors: Clairecynth Yu, Geminne Manzano

Abstract:

The mariculture potential of the Philippine blue sponge, Xestospongia sp. was assessed through the pilot sponge culture in the open-sea at two different biogeographic regions in the Philippines. Thirty explants were randomly allocated for the Puerto Galera, Oriental Mindoro culture setup and the other nine were transported to Lucero, Bolinao, Pangasinan. Two different sponge culture methods of the sponge explants- the lantern and the wall method, were employed to assess the production of the Renieramycin M. Both methods have shown to be effective in growing the sponge explants and that the Thin Layer Chromatography (TLC) results have shown that Renieramycin M is present on the sponges. The effect of partial harvesting in the growth and survival rates of the blue sponge in the Puerto Galera setup was also determined. Results showed that a higher growth rate was observed on the partially harvested explants on both culture methods as compared to the unharvested explants.

Keywords: chemical ecology, porifera, sponge, Xestospongia sp.

Procedia PDF Downloads 278
25411 The Effect of Cinnamaldehyde on Escherichia coli Survival during Low Temperature Long Time Cooking

Authors: Fuji Astuti, Helen Onyeaka

Abstract:

The aim of the study was to investigate the combine effects of cinnamaldehyde (0.25 and 0.45% v/v) on thermal resistance of pathogenic Escherichia coli during low temperature long time (LT-LT) cooking below 60℃. Three different static temperatures (48, 53 and 50℃) were performed, and the number of viable cells was studied. The starting concentrations of cells were 10⁸ CFU/ml. In this experiment, heat treatment efficiency for safe reduction indicated by decimal logarithm reduction of viable recovered cells, which was monitored for heating over 6 hours. Thermal inactivation was measured by means of establishing the death curves between the mean log surviving cells (log₁₀ CFU/ml) and designated time points (minutes) for each temperature test. The findings depicted that addition of cinnamaldehyde exhibited to elevate the thermal sensitivity of E. coli. However, the injured cells found to be well-adapted to all temperature tests after certain time point of cooking, in which they grew to more than 10⁵ CFU/ml.

Keywords: cinnamaldehyde, decimal logarithm reduction, Escherichia coli, LT-LT cooking

Procedia PDF Downloads 360
25410 Metastatic Papillary Thyroid Carcinoma in Pleural Effusion- A Very Rare Case

Authors: Mohammed A. Abutalib

Abstract:

Papillary thyroid carcinoma (PTC) accounts for the most common type of thyroid cancer, a well-differentiated type. PTC is featured by biologically low-grade and less aggressive tumors with a survival rate of 10 years in most of the diagnosed cases. PTC can be presented with the involvement of cervical lymph nodes in about 50% of the patients, yet the distant spread is very uncommon. Herein, we discussed an early 50-year-old male patient with a history of PTC that presented to the emergency department complaining of shortness of breath and a radiological finding of hydrothorax. Cytologic examination, together with immune-histochemical staining and molecular studies of pleural effusion aspiration, concluded the definitive diagnosis of metastatic papillary thyroid carcinoma in the pleural space. PTC seldom causes metastatic niches in the pleural space, and this is a rare clinical presentation; nevertheless, a differential diagnosis of thyroid metastasis needs to be excluded.

Keywords: thyroid cancer, malignant pleural effusion, cytology aspiration, papillary thyroid carcinoma

Procedia PDF Downloads 110
25409 Multi Data Management Systems in a Cluster Randomized Trial in Poor Resource Setting: The Pneumococcal Vaccine Schedules Trial

Authors: Abdoullah Nyassi, Golam Sarwar, Sarra Baldeh, Mamadou S. K. Jallow, Bai Lamin Dondeh, Isaac Osei, Grant A. Mackenzie

Abstract:

A randomized controlled trial is the "gold standard" for evaluating the efficacy of an intervention. Large-scale, cluster-randomized trials are expensive and difficult to conduct, though. To guarantee the validity and generalizability of findings, high-quality, dependable, and accurate data management systems are necessary. Robust data management systems are crucial for optimizing and validating the quality, accuracy, and dependability of trial data. Regarding the difficulties of data gathering in clinical trials in low-resource areas, there is a scarcity of literature on this subject, which may raise concerns. Effective data management systems and implementation goals should be part of trial procedures. Publicizing the creative clinical data management techniques used in clinical trials should boost public confidence in the study's conclusions and encourage further replication. In the ongoing pneumococcal vaccine schedule study in rural Gambia, this report details the development and deployment of multi-data management systems and methodologies. We implemented six different data management, synchronization, and reporting systems using Microsoft Access, RedCap, SQL, Visual Basic, Ruby, and ASP.NET. Additionally, data synchronization tools were developed to integrate data from these systems into the central server for reporting systems. Clinician, lab, and field data validation systems and methodologies are the main topics of this report. Our process development efforts across all domains were driven by the complexity of research project data collected in real-time data, online reporting, data synchronization, and ways for cleaning and verifying data. Consequently, we effectively used multi-data management systems, demonstrating the value of creative approaches in enhancing the consistency, accuracy, and reporting of trial data in a poor resource setting.

Keywords: data management, data collection, data cleaning, cluster-randomized trial

Procedia PDF Downloads 31
25408 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering

Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining

Abstract:

DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.

Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)

Procedia PDF Downloads 283
25407 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 395
25406 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 24
25405 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Authors: Nathainail Bashir, Neil Anderson

Abstract:

The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.

Keywords: dipole-dipole, ERT, Karst terrains, MASW

Procedia PDF Downloads 320
25404 Data Science in Military Decision-Making: A Semi-Systematic Literature Review

Authors: H. W. Meerveld, R. H. A. Lindelauf

Abstract:

In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.

Keywords: data science, decision-making, information superiority, literature review, military

Procedia PDF Downloads 180
25403 Supply Chain Control and Inventory Management in Garment Industry

Authors: Nisa Nur Duman, Sümeyya Kiliç

Abstract:

In global competition conditions, survival of the plants by obtaining competitive advantage relies on the effective usage of existing sources. By this way, the plants can minimize their costs without losing their quality. They also take advantage took advantage on their competitors and enlarge customer portfolio by increasing profit margins. Changing structure of market and customer demands also change the structure of the competition between companies. Furthermore, competition is not only between the companies. By this manner, supply chain and supply chain management get importance by considering company performances. Companies that want to survive, search the ways of decreasing costs and the ways of meeting customer expectations. One of the important tools for reaching these goals is inventory managemet. The best inventory management system is meeting the demands by considering plant goals.

Keywords: Supply chain, inventory management, apparel sector, garment industry

Procedia PDF Downloads 374
25402 Agro-Forestry Expansion in Middle Gangetic Basin: Adopters' Motivations and Experiences in Bihar, India

Authors: Rakesh Tiwary, D. M. Diwakar, Sandhya Mahapatro

Abstract:

Agro-forestry offers huge opportunities for diversification of agriculture in middle Gangetic Basin of India, particularly in the state of Bihar as the region is identified with traditional & stagnant agriculture, low productivity, high population pressure, rural poverty and lack of agro- industrial development. The region is endowed with favourable agro-climatic, soil & drainage conditions; interestingly, there has been an age old tradition of agro-forestry in the state. However, due to demographic pressures, declining land holdings and other socio- economic factors, agro forestry practices have declined in recent decades. The government of Bihar has initiated a special program for expansion of agro-forestry based on modern practices with an aim to raise income level of farmers, make available raw material for wood based industries and increase green cover in the state. The Agro-forestry Schemes – Poplar & Other Species are the key components of the program being implemented by Department of Environment & Forest, Govt. of Bihar. The paper is based on fieldwork based evaluation study on experiences of implementation of the agro-forestry schemes. Understanding adoption patterns, identification of key motives for practising agro-forestry, experiences of farmers well analysing the barriers in expansion constituted the major themes of the research study. This paper is based on primary as well as secondary data. The primary data consists of beneficiary household survey, Focus Group Discussions among beneficiary communities, dialogue and multi stakeholder meetings and field visit to the sites. The secondary data information was collected and analysed from official records, policy documents and reports. Primary data was collected from about 500 beneficiary households of Muzaffarpur & Saharsa- two populous, large and agriculture dominated districts of middle Gangetic basin of North Bihar. Survey also covers 100 households of non-beneficiaries. Probability Proportionate to Size method was used to determine the number of samples to be covered in different blocks of two districts. Qualitative tools were also implemented to have better insights about key research questions. Present paper discusses socio-economic background of farmers practising agro-forestry; the adoption patterns of agro- forestry (choice of plants, methods of plantation and others); and motivation behind adoption of agro-forestry and the comparative benefits of agro-forestry (vis-a-vis traditional agriculture). Experience of beneficiary farmers with agro-forestry based on government programs & promotional campaigns (in terms of awareness, ease of access, knowhow and others) have been covered in the paper. Different aspects of survival of plants have been closely examined. Non beneficiaries but potential adopters were also interviewed to understand barriers of adoption of agro- forestry. Paper provides policy recommendations and interventions required for effective expansion of the agro- forestry and realisation of its future prospects for agricultural diversification in the region.

Keywords: agro-forestry adoption patterns, farmers’ motivations & experiences, Indian middle Gangetic plains, strategies for expansion

Procedia PDF Downloads 209
25401 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 67
25400 Wavelets Contribution on Textual Data Analysis

Authors: Habiba Ben Abdessalem

Abstract:

The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.

Keywords: textual data, wavelet, denoising, contingency table

Procedia PDF Downloads 280
25399 Customer Churn Analysis in Telecommunication Industry Using Data Mining Approach

Authors: Burcu Oralhan, Zeki Oralhan, Nilsun Sariyer, Kumru Uyar

Abstract:

Data mining has been becoming more and more important and a wide range of applications in recent years. Data mining is the process of find hidden and unknown patterns in big data. One of the applied fields of data mining is Customer Relationship Management. Understanding the relationships between products and customers is crucial for every business. Customer Relationship Management is an approach to focus on customer relationship development, retention and increase on customer satisfaction. In this study, we made an application of a data mining methods in telecommunication customer relationship management side. This study aims to determine the customers profile who likely to leave the system, develop marketing strategies, and customized campaigns for customers. Data are clustered by applying classification techniques for used to determine the churners. As a result of this study, we will obtain knowledge from international telecommunication industry. We will contribute to the understanding and development of this subject in Customer Relationship Management.

Keywords: customer churn analysis, customer relationship management, data mining, telecommunication industry

Procedia PDF Downloads 321