Search results for: search data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25659

Search results for: search data

24849 The Hotel Logging Behavior and Factors of Tourists in Bankontee District, Samut Songkhram Province, Thailand

Authors: Aticha Kwaengsopha

Abstract:

The purpose of this research was to study the behaviour and related factors that tourists utilized for making decisions to choose their accommodations at a tourist destination, Bangkontee district, Samut Songkhran Province, Thailand. The independent variables included gender, age, income, occupation, and region, while the three important dependent variables included selection behaviour, factors related selection process, and satisfaction of the accommodation service. A total of 400 Thai and international tourists were interviewed at tourist destination of Bangkontee. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and standard deviation. The findings revealed that the majority of respondents were single, female, and with the age between 23-30 years old. Most of the international tourists were from Asia and planned to stay in Thailand about 1-6 days. In addition, the majority of tourists preferred to travel in small groups of 3 persons. The majority of respondents used internet and word of mouth as the main tool to search for information. The majority of respondents spent most of their budget on food & drink, accommodation, and travelling. Even though the majority of tourists were satisfied with the quality of accommodation, the price range of accommodation, and the image of accommodation and the facilities of the accommodation, they indicated that they were not likely to re-visit Thailand in the near future.

Keywords: behaviour, decision factors, tourists, media engineering

Procedia PDF Downloads 262
24848 Increasing the Apparent Time Resolution of Tc-99m Diethylenetriamine Pentaacetic Acid Galactosyl Human Serum Albumin Dynamic SPECT by Use of an 180-Degree Interpolation Method

Authors: Yasuyuki Takahashi, Maya Yamashita, Kyoko Saito

Abstract:

In general, dynamic SPECT data acquisition needs a few minutes for one rotation. Thus, the time-activity curve (TAC) derived from the dynamic SPECT is relatively coarse. In order to effectively shorten the interval, between data points, we adopted a 180-degree interpolation method. This method is already used for reconstruction of the X-ray CT data. In this study, we applied this 180-degree interpolation method to SPECT and investigated its effectiveness.To briefly describe the 180-degree interpolation method: the 180-degree data in the second half of one rotation are combined with the 180-degree data in the first half of the next rotation to generate a 360-degree data set appropriate for the time halfway between the first and second rotations. In both a phantom and a patient study, the data points from the interpolated images fell in good agreement with the data points tracking the accumulation of 99mTc activity over time for appropriate region of interest. We conclude that data derived from interpolated images improves the apparent time resolution of dynamic SPECT.

Keywords: dynamic SPECT, time resolution, 180-degree interpolation method, 99mTc-GSA.

Procedia PDF Downloads 484
24847 Autobiographical Memory Functions and Perceived Control in Depressive Symptoms among Young Adults

Authors: Meenu S. Babu, K. Jayasankara Reddy

Abstract:

Depression is a serious mental health concern that leads to significant distress and dysfunction in an individual. Due to the high physical, psychological, social, and economic burden it causes, it is important to study various bio-psycho-social factors that influence the onset, course, duration, intensity of depressive symptoms. The study aims to explore relationship between autobiographical memory (AM) functions, perceived control over stressful events and depressive symptoms. AM functions and perceived control were both found to be protective factors for individuals against depression and were both modifiable to predict better behavioral and affective outcomes. An extensive review of literatur, with a systematic search on Google Scholar, JSTOR, Science Direct and Springer Journals database, was conducted for the purpose of this review paper. These were used for all the aforementioned databases. The time frame used for the search was 2010-2021. An additional search was conducted with no time bar to map the development of the theoretical concepts. The relevant studies with quantitative, qualitative, experimental, and quasi- experimental research designs were included for the review. Studies including a sample with a DSM- 5 or ICD-10 diagnosis of depressive disorders were excluded from the study to focus on the behavioral patterns in a non-clinical population. The synthesis of the findings that were obtained from the review indicates there is a significant relationship between cognitive variables of AM functions and perceived control and depressive symptoms. AM functions were found to be have significant effects on once sense of self, interpersonal relationships, decision making, self- continuity and were related to better emotion regulation and lower depressive symptoms. Not all the components of AM function were equally significant in their relationships with various depressive symptoms. While self and directive functions were more related to emotion regulation, anhedonia, motivation and hence mood and affect, the social function was related to perceived social support and social engagement. Perceived control was found to be another protective cognitive factor that provides individuals a sense of agency and control over one’s life outcomes which was found to be low in individuals with depression. This was also associated to the locus of control, competency beliefs, contingency beliefs and subjective well being in individuals and acted as protective factors against depressive symptoms. AM and perceived control over stressful events serve adaptive functions, hence it is imperative to study these variables more extensively. They can be imperative in planning and implementing therapeutic interventions to foster these cognitive protective factors to mitigate or alleviate depressive symptoms. Exploring AM as a determining factor in depressive symptoms along with perceived control over stress creates a bridge between biological and cognitive factors underlying depression and increases the scope of developing a more eclectic and effective treatment plan for individuals. As culture plays a crucial role in AM functions as well as certain aspects of control such as locus of control, it is necessary to study these variables keeping in mind the cultural context to tailor culture/community specific interventions for depression.

Keywords: autobiographical memories, autobiographical memory functions, perceived control, depressive symptoms, depression, young adults

Procedia PDF Downloads 85
24846 Drivers of the Performance of Members of a Social Incubator Considering the Values of Work: A Qualitative Study with Social Entrepreneurs

Authors: Leticia Lengler, Vania Estivalete, Vivian Flores Costa, Tais De Andrade, Lisiane Fellini Faller

Abstract:

Social entrepreneurship has emerged and driven a new development perspective, and as the literature mentions, it is based on innovation, and mainly, on the creation of social value, rather than personal wealth and shareholders. In this field of study, one of the focuses of discussion refers to the distinct characteristics of the individuals responsible for socially directed initiatives, named as social entrepreneurs. To contribute to this perspective, the present study aims to identify the values related to work that guide the performance of social entrepreneurs, members of enterprises that have developed themselves within a social incubator at a federal institution of higher education in Brazil. Each person's value system is present in different facets of his life, manifesting himself in his choices and in the way he conducts the relationship with other people in society. Especially the values of work, the focus of this research, play a significant role in organizational studies, since they are considered one of the important guiding principles of the behavior of individuals in the work environment. Regarding the method of the study, a descriptive and qualitative research was carried out. In the data collection, 24 entrepreneurs, members of five different enterprises belonging to the social incubator, were interviewed. The research instrument consisted of three open questions, which could be answered with the support of a "disc of values", an artifact organized to clearly demonstrate the values of the work to the respondents. The analysis of the interviews took into account the categories defined a priori, based on the model proposed by previous authors who validated these constructs within their research contexts, contemplating the following dimensions: Self-determination and stimulation; Safety; Conformity; Universalism and benevolence; Achievement; and Power. It should be noted that, in order to provide a better understanding of the interviewees, in the "disc of values" used in the research, these dimensions were represented by the objectives that define them, being respectively: Challenge; Financial independence; Commitment; Welfare of others; Personal success; And Power. Some preliminary results show that, as guiding principles of the investigation, priority is given to work values related to Self-determination and stimulation, Conformity and Universalism and benevolence. Such findings point to the importance given by these individuals to independent thinking and acting, as well as to novelty and constant challenge. Still, they demonstrate the appreciation of commitment to their enterprise, the people who make it and the quality of their work. They also point to the relevance of the possibility of contributing to the greater social good, that is, of the search for the well-being of close people and of society, as it is implied in models of social entrepreneurship coming from literature. With a lower degree of priority, the values denominated Safety and Realization, as the financial question at work and the search for satisfaction and personal success, through the use of socially recognized skills were mentioned aspects with little emphasis by social entrepreneurs. The Power value was not considered as guiding principle of the work for the respondents.

Keywords: qualitative study, social entrepreneur, social incubator, values of work

Procedia PDF Downloads 242
24845 Genetic Data of Deceased People: Solving the Gordian Knot

Authors: Inigo de Miguel Beriain

Abstract:

Genetic data of deceased persons are of great interest for both biomedical research and clinical use. This is due to several reasons. On the one hand, many of our diseases have a genetic component; on the other hand, we share genes with a good part of our biological family. Therefore, it would be possible to improve our response considerably to these pathologies if we could use these data. Unfortunately, at the present moment, the status of data on the deceased is far from being satisfactorily resolved by the EU data protection regulation. Indeed, the General Data Protection Regulation has explicitly excluded these data from the category of personal data. This decision has given rise to a fragmented legal framework on this issue. Consequently, each EU member state offers very different solutions. For instance, Denmark considers the data as personal data of the deceased person for a set period of time while some others, such as Spain, do not consider this data as such, but have introduced some specifically focused regulations on this type of data and their access by relatives. This is an extremely dysfunctional scenario from multiple angles, not least of which is scientific cooperation at the EU level. This contribution attempts to outline a solution to this dilemma through an alternative proposal. Its main hypothesis is that, in reality, health data are, in a sense, a rara avis within data in general because they do not refer to one person but to several. Hence, it is possible to think that all of them can be considered data subjects (although not all of them can exercise the corresponding rights in the same way). When the person from whom the data were obtained dies, the data remain as personal data of his or her biological relatives. Hence, the general regime provided for in the GDPR may apply to them. As these are personal data, we could go back to thinking in terms of a general prohibition of data processing, with the exceptions provided for in Article 9.2 and on the legal bases included in Article 6. This may be complicated in practice, given that, since we are dealing with data that refer to several data subjects, it may be complex to refer to some of these bases, such as consent. Furthermore, there are theoretical arguments that may oppose this hypothesis. In this contribution, it is shown, however, that none of these objections is of sufficient substance to delegitimize the argument exposed. Therefore, the conclusion of this contribution is that we can indeed build a general framework on the processing of personal data of deceased persons in the context of the GDPR. This would constitute a considerable improvement over the current regulatory framework, although it is true that some clarifications will be necessary for its practical application.

Keywords: collective data conceptual issues, data from deceased people, genetic data protection issues, GDPR and deceased people

Procedia PDF Downloads 140
24844 The Effectiveness of Concept Mapping as a Tool for Developing Critical Thinking in Undergraduate Medical Education: A BEME Systematic Review: BEME Guide No. 81

Authors: Marta Fonseca, Pedro Marvão, Beatriz Oliveira, Bruno Heleno, Pedro Carreiro-Martins, Nuno Neuparth, António Rendas

Abstract:

Background: Concept maps (CMs) visually represent hierarchical connections among related ideas. They foster logical organization and clarify idea relationships, potentially aiding medical students in critical thinking (to think clearly and rationally about what to do or what to believe). However, there are inconsistent claims about the use of CMs in undergraduate medical education. Our three research questions are: 1) What studies have been published on concept mapping in undergraduate medical education? 2) What was the impact of CMs on students’ critical thinking? 3) How and why have these interventions had an educational impact? Methods: Eight databases were systematically searched (plus a manual and an additional search were conducted). After eliminating duplicate entries, titles, and abstracts, and full-texts were independently screened by two authors. Data extraction and quality assessment of the studies were independently performed by two authors. Qualitative and quantitative data were integrated using mixed-methods. The results were reported using the structured approach to the reporting in healthcare education of evidence synthesis statement and BEME guidance. Results: Thirty-nine studies were included from 26 journals (19 quantitative, 8 qualitative and 12 mixed-methods studies). CMs were considered as a tool to promote critical thinking, both in the perception of students and tutors, as well as in assessing students’ knowledge and/or skills. In addition to their role as facilitators of knowledge integration and critical thinking, CMs were considered both teaching and learning methods. Conclusions: CMs are teaching and learning tools which seem to help medical students develop critical thinking. This is due to the flexibility of the tool as a facilitator of knowledge integration, as a learning and teaching method. The wide range of contexts, purposes, and variations in how CMs and instruments to assess critical thinking are used increase our confidence that the positive effects are consistent.

Keywords: concept map, medical education, undergraduate, critical thinking, meaningful learning

Procedia PDF Downloads 81
24843 Safe and Scalable Framework for Participation of Nodes in Smart Grid Networks in a P2P Exchange of Short-Term Products

Authors: Maciej Jedrzejczyk, Karolina Marzantowicz

Abstract:

Traditional utility value chain is being transformed during last few years into unbundled markets. Increased distributed generation of energy is one of considerable challenges faced by Smart Grid networks. New sources of energy introduce volatile demand response which has a considerable impact on traditional middlemen in E&U market. The purpose of this research is to search for ways to allow near-real-time electricity markets to transact with surplus energy based on accurate time synchronous measurements. A proposed framework evaluates the use of secure peer-2-peer (P2P) communication and distributed transaction ledgers to provide flat hierarchy, and allow real-time insights into present and forecasted grid operations, as well as state and health of the network. An objective is to achieve dynamic grid operations with more efficient resource usage, higher security of supply and longer grid infrastructure life cycle. Methods used for this study are based on comparative analysis of different distributed ledger technologies in terms of scalability, transaction performance, pluggability with external data sources, data transparency, privacy, end-to-end security and adaptability to various market topologies. An intended output of this research is a design of a framework for safer, more efficient and scalable Smart Grid network which is bridging a gap between traditional components of the energy network and individual energy producers. Results of this study are ready for detailed measurement testing, a likely follow-up in separate studies. New platforms for Smart Grid achieving measurable efficiencies will allow for development of new types of Grid KPI, multi-smart grid branches, markets, and businesses.

Keywords: autonomous agents, Distributed computing, distributed ledger technologies, large scale systems, micro grids, peer-to-peer networks, Self-organization, self-stabilization, smart grids

Procedia PDF Downloads 282
24842 Steps towards the Development of National Health Data Standards in Developing Countries

Authors: Abdullah I. Alkraiji, Thomas W. Jackson, Ian Murray

Abstract:

The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.

Keywords: interoperabilty, medical data exchange, health data standards, case study, Saudi Arabia

Procedia PDF Downloads 323
24841 An Exploration of The Patterns of Transcendence in Indian and Hopkins’s Aesthetics

Authors: Lima Antony

Abstract:

In G. M. Hopkins’s poetics and aesthetics there is scope for a comparative study with Indian discourses on aesthetics, an area not adequately explored so far. This exploration will enrich the field of comparative study of diverse cultural expressions and their areas of similarity. A comparative study of aesthetic and religious experiences in diverse cultures will open up avenues for the discovery of similarities in self-experiences and their transcendence. Such explorations will reveal similar patterns in aesthetic and religious experiences. The present paper intends to prove this in the theories of Hopkins and Indian aesthetics. From the time of the Vedas Indian sages have believed that aesthetic enjoyment could develop into a spiritual realm. From the Natyasastra of Bharata, Indian aesthetics develops and reaches its culmination in later centuries into a consciousness of union with the mystery of the Ultimate Being, especially in Dhvanaāloka of Anandavardhana and Locana of Abhinavagupta. Dhvanyaloka elaborates the original ideas of rasa (mood or flavor) and dhvani (power of suggestion) in Indian literary theory and aesthetics. Hopkins was successful, like the ancient Indian alankarikas, in creating aesthetically superb patterns at various levels of sound and sense for which he coined the term ‘inscape’. So Hopkins’s aesthetic theory becomes suitable for transcultural comparative study with Indian aesthetics especially the dhvani theories of Anandavardhana and Abhinavagupta. Hopkins’s innovative approach to poetics and his selection of themes are quite suitable for analysis in the light of Indian literary theories. Indian philosophy views the ultimate reality called Brahman, as the 'soul,' or inner essence, of all reality. We see in Hopkins also a search for the essence of things and the chiming of their individuality with the Ultimate Being in multidimensional patterns of sound, sense and ecstatic experience. This search culminates in the realization of a synthesis of the individual self with the Ultimate Being. This is achieved through an act of surrender of the individuality of the self before the Supreme Being. Attempts to reconcile the immanent and transcendent aspects of the Ultimate Being can be traced in the Indian as well as Hopkins’s aesthetics which can contribute to greater understanding and harmony between cultures.

Keywords: Dhvani, Indian aesthetics, transcultural studies, Rasa

Procedia PDF Downloads 135
24840 A Proposal for U-City (Smart City) Service Method Using Real-Time Digital Map

Authors: SangWon Han, MuWook Pyeon, Sujung Moon, DaeKyo Seo

Abstract:

Recently, technologies based on three-dimensional (3D) space information are being developed and quality of life is improving as a result. Research on real-time digital map (RDM) is being conducted now to provide 3D space information. RDM is a service that creates and supplies 3D space information in real time based on location/shape detection. Research subjects on RDM include the construction of 3D space information with matching image data, complementing the weaknesses of image acquisition using multi-source data, and data collection methods using big data. Using RDM will be effective for space analysis using 3D space information in a U-City and for other space information utilization technologies.

Keywords: RDM, multi-source data, big data, U-City

Procedia PDF Downloads 417
24839 Decision Support Tool for Water Re-used Systems

Authors: Katarzyna Pawęska, Aleksandra Bawiec, Ewa Burszta-Adamiak, Wiesław Fiałkiewicz

Abstract:

The water shortage becomes a serious problem not only in African and Middle Eastern countries, but also recently in the European Union. Scarcity of water means that not all agricultural, industrial and municipal needs will be met. When the annual availability of renewable freshwater per capita is less than 1,700 cubic meters, countries begin to experience periodic or regular water shortages. The phenomenon of water stress is the result of an imbalance between the constantly growing demand for water and its availability. The constant development of industry, population growth, and climate changes make the situation even worse. The search for alternative water sources and independent supplies is becoming a priority for many countries. Data enabling the assessment of country’s condition regarding water resources, water consumption, water price, wastewater volume, forecasted climate changes e.g. temperature, precipitation, are scattered and their interpretation by common entrepreneurs may be difficult. For this purpose, a digital tool has been developed to support decisions related to the implementation of water and wastewater re-use systems, as a result of an international research project “Framework for organizational decision-making process in water reuse for smart cities” (SMART-WaterDomain) funded under the EIG-CONCERT Japan call on Smart Water Management for Sustainable Society. The developed geo-visualization tool graphically presents, among others, data about the capacity of wastewater treatment plants and the volume of water demand in the private and public sectors for Poland, Germany, and the Czech Republic. It is expected that such a platform, extended with economical water management data and climate forecasts (temperature, precipitation), will allow in the future independent investigation and assessment of water use rate and wastewater production on the local and regional scale. The tool is a great opportunity for small business owners, entrepreneurs, farmers, local authorities, and common users to analyze the impact of climate change on the availability of water in the regions of their business activities. Acknowledgments: The authors acknowledge the support of the Project Organisational Decision Making in Water Reuse for Smart Cities (SMART- WaterDomain), funded by The National Centre for Research and Development and supported by the EIG-Concert Japan.

Keywords: circular economy, digital tool, geo-visualization, wastewater re-use

Procedia PDF Downloads 39
24838 Agile Methodology for Modeling and Design of Data Warehouses -AM4DW-

Authors: Nieto Bernal Wilson, Carmona Suarez Edgar

Abstract:

The organizations have structured and unstructured information in different formats, sources, and systems. Part of these come from ERP under OLTP processing that support the information system, however these organizations in OLAP processing level, presented some deficiencies, part of this problematic lies in that does not exist interesting into extract knowledge from their data sources, as also the absence of operational capabilities to tackle with these kind of projects.  Data Warehouse and its applications are considered as non-proprietary tools, which are of great interest to business intelligence, since they are repositories basis for creating models or patterns (behavior of customers, suppliers, products, social networks and genomics) and facilitate corporate decision making and research. The following paper present a structured methodology, simple, inspired from the agile development models as Scrum, XP and AUP. Also the models object relational, spatial data models, and the base line of data modeling under UML and Big data, from this way sought to deliver an agile methodology for the developing of data warehouses, simple and of easy application. The methodology naturally take into account the application of process for the respectively information analysis, visualization and data mining, particularly for patterns generation and derived models from the objects facts structured.

Keywords: data warehouse, model data, big data, object fact, object relational fact, process developed data warehouse

Procedia PDF Downloads 391
24837 Identifying Model to Predict Deterioration of Water Mains Using Robust Analysis

Authors: Go Bong Choi, Shin Je Lee, Sung Jin Yoo, Gibaek Lee, Jong Min Lee

Abstract:

In South Korea, it is difficult to obtain data for statistical pipe assessment. In this paper, to address these issues, we find that various statistical model presented before is how data mixed with noise and are whether apply in South Korea. Three major type of model is studied and if data is presented in the paper, we add noise to data, which affects how model response changes. Moreover, we generate data from model in paper and analyse effect of noise. From this we can find robustness and applicability in Korea of each model.

Keywords: proportional hazard model, survival model, water main deterioration, ecological sciences

Procedia PDF Downloads 725
24836 [Keynote Speech]: Curiosity, Innovation and Technological Advancements Shaping the Future of Science, Technology, Engineering and Mathematics Education

Authors: Ana Hol

Abstract:

We live in a constantly changing environment where technology has become an integral component of our day to day life. We rely heavily on mobile devices, we search for data via web, we utilise smart home sensors to create the most suited ambiences and we utilise applications to shop, research, communicate and share data. Heavy reliance on technology therefore is creating new connections between STEM (Science, Technology, Engineering and Mathematics) fields which in turn rises a question of what the STEM education of the future should be like? This study was based on the reviews of the six Australian Information Systems students who undertook an international study tour to India where they were given an opportunity to network, communicate and meet local students, staff and business representatives and from them learn about the local business implementations, local customs and regulations. Research identifies that if we are to continue to implement and utilise electronic devices on the global scale, such as for example implement smart cars that can smoothly cross borders, we will need the workforce that will have the knowledge about the cars themselves, their parts, roads and transport networks, road rules, road sensors, road monitoring technologies, graphical user interfaces, movement detection systems as well as day to day operations, legal rules and regulations of each region and country, insurance policies, policing and processes so that the wide array of sensors can be controlled across country’s borders. In conclusion, it can be noted that allowing students to learn about the local conditions, roads, operations, business processes, customs and values in different countries is giving students a cutting edge advantage as such knowledge cannot be transferred via electronic sources alone. However once understanding of each problem or project is established, multidisciplinary innovative STEM projects can be smoothly conducted.

Keywords: STEM, curiosity, innovation, advancements

Procedia PDF Downloads 182
24835 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 222
24834 Big Data: Appearance and Disappearance

Authors: James Moir

Abstract:

The mainstay of Big Data is prediction in that it allows practitioners, researchers, and policy analysts to predict trends based upon the analysis of large and varied sources of data. These can range from changing social and political opinions, patterns in crimes, and consumer behaviour. Big Data has therefore shifted the criterion of success in science from causal explanations to predictive modelling and simulation. The 19th-century science sought to capture phenomena and seek to show the appearance of it through causal mechanisms while 20th-century science attempted to save the appearance and relinquish causal explanations. Now 21st-century science in the form of Big Data is concerned with the prediction of appearances and nothing more. However, this pulls social science back in the direction of a more rule- or law-governed reality model of science and away from a consideration of the internal nature of rules in relation to various practices. In effect Big Data offers us no more than a world of surface appearance and in doing so it makes disappear any context-specific conceptual sensitivity.

Keywords: big data, appearance, disappearance, surface, epistemology

Procedia PDF Downloads 398
24833 From Data Processing to Experimental Design and Back Again: A Parameter Identification Problem Based on FRAP Images

Authors: Stepan Papacek, Jiri Jablonsky, Radek Kana, Ctirad Matonoha, Stefan Kindermann

Abstract:

FRAP (Fluorescence Recovery After Photobleaching) is a widely used measurement technique to determine the mobility of fluorescent molecules within living cells. While the experimental setup and protocol for FRAP experiments are usually fixed, data processing part is still under development. In this paper, we formulate and solve the problem of data selection which enhances the processing of FRAP images. We introduce the concept of the irrelevant data set, i.e., the data which are almost not reducing the confidence interval of the estimated parameters and thus could be neglected. Based on sensitivity analysis, we both solve the problem of the optimal data space selection and we find specific conditions for optimizing an important experimental design factor, e.g., the radius of bleach spot. Finally, a theorem announcing less precision of the integrated data approach compared to the full data case is proven; i.e., we claim that the data set represented by the FRAP recovery curve lead to a larger confidence interval compared to the spatio-temporal (full) data.

Keywords: FRAP, inverse problem, parameter identification, sensitivity analysis, optimal experimental design

Procedia PDF Downloads 259
24832 Representation Data without Lost Compression Properties in Time Series: A Review

Authors: Nabilah Filzah Mohd Radzuan, Zalinda Othman, Azuraliza Abu Bakar, Abdul Razak Hamdan

Abstract:

Uncertain data is believed to be an important issue in building up a prediction model. The main objective in the time series uncertainty analysis is to formulate uncertain data in order to gain knowledge and fit low dimensional model prior to a prediction task. This paper discusses the performance of a number of techniques in dealing with uncertain data specifically those which solve uncertain data condition by minimizing the loss of compression properties.

Keywords: compression properties, uncertainty, uncertain time series, mining technique, weather prediction

Procedia PDF Downloads 413
24831 Data Mining As A Tool For Knowledge Management: A Review

Authors: Maram Saleh

Abstract:

Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains.

Keywords: Data Mining, Knowledge management, Knowledge discovery, Knowledge creation.

Procedia PDF Downloads 189
24830 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data

Authors: Murat Yazici

Abstract:

Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.

Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data

Procedia PDF Downloads 36
24829 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 462
24828 An Approximation of Daily Rainfall by Using a Pixel Value Data Approach

Authors: Sarisa Pinkham, Kanyarat Bussaban

Abstract:

The research aims to approximate the amount of daily rainfall by using a pixel value data approach. The daily rainfall maps from the Thailand Meteorological Department in period of time from January to December 2013 were the data used in this study. The results showed that this approach can approximate the amount of daily rainfall with RMSE=3.343.

Keywords: daily rainfall, image processing, approximation, pixel value data

Procedia PDF Downloads 372
24827 Pediatric Health Nursing Research in Jordan: Evaluating the State of Knowledge and Determining Future Research Direction

Authors: Inaam Khalaf, Nadin M. Abdel Razeq, Hamza Alduraidi, Suhaila Halasa, Omayyah S. Nassar, Eman Al-Horani, Jumana Shehadeh, Anna Talal

Abstract:

Background: Nursing researchers are responsible for generating knowledge that corresponds to national and global research priorities in order to promote, restore, and maintain the health of individuals and societies. The objectives of this scoping review of Jordanian literature are to assess the existing research on pediatric nursing in terms of evolution, authorship and collaborations, funding sources, methodologies, topics of research, and pediatric subjects' age groups so as to identify gaps in research. Methodology: A search was conducted using related keywords obtained from national and international databases. The reviewed literature included pediatric health articles published through December 2019 in English and Arabic, authored by nursing researchers. The investigators assessed the retrieved studies and extracted data using a data-mining checklist. Results: The review included 265 articles authored by Jordanian nursing researchers concerning children's health, published between 1987 and 2019; 95% were published between 2009 and 2019. The most commonly applied research methodology was the descriptive non-experimental method (76%). The main generic topics were health promotion and disease prevention (23%), chronic physical conditions (19%), mental health, behavioral disorders, and forensic issues (16%). Conclusion: The review findings identified a grave shortage of evidence concerning nursing care issues for children below five years of age, especially those between ages two and five years. The research priorities identified in this review resonate with those identified in international reports. Implications: Nursing researchers are encouraged to conduct more research targeting topics of national-level importance in collaboration with clinically involved nurses and international scholars.

Keywords: Jordan, scoping review, children health nursing, pediatric, adolescents

Procedia PDF Downloads 71
24826 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data

Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri

Abstract:

In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.

Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification

Procedia PDF Downloads 495
24825 Ni-W-P Alloy Coating as an Alternate to Electroplated Hard Cr Coating

Authors: S. K. Ghosh, C. Srivastava, P. K. Limaye, V. Kain

Abstract:

Electroplated hard chromium is widely known in coatings and surface finishing, automobile and aerospace industries because of its excellent hardness, wear resistance and corrosion properties. However, its precursor, Cr+6 is highly carcinogenic in nature and a consensus has been adopted internationally to eradicate this coating technology with an alternative one. The search for alternate coatings to electroplated hard chrome is continuing worldwide. Various alloys and nanocomposites like Co-W alloys, Ni-Graphene, Ni-diamond nanocomposites etc. have already shown promising results in this regard. Basically, in this study, electroless Ni-P alloys with excellent corrosion resistance was taken as the base matrix and incorporation of tungsten as third alloying element was considered to improve the hardness and wear resistance of the resultant alloy coating. The present work is focused on the preparation of Ni–W–P coatings by electrodeposition with different content of phosphorous and its effect on the electrochemical, mechanical and tribological performances. The results were also compared with Ni-W alloys. Composition analysis by EDS showed deposition of Ni-32.85 wt% W-3.84 wt% P (designated as Ni-W-LP) and Ni-18.55 wt% W-8.73 wt% P (designated as Ni-W-HP) alloy coatings from electrolytes containing of 0.006 and 0.01M sodium hypophosphite respectively. Inhibition of tungsten deposition in the presence of phosphorous was noted. SEM investigation showed cauliflower like growth along with few microcracks. The as-deposited Ni-W-P alloy coating was amorphous in nature as confirmed by XRD investigation and step-wise crystallization was noticed upon annealing at higher temperatures. For all the coatings, the nanohardness was found to increase after heat-treatment and typical nanonahardness values obtained for 400°C annealed samples were 18.65±0.20 GPa, 20.03±0.25 GPa, and 19.17±0.25 for alloy coatings Ni-W, Ni-W-LP and Ni-W-HP respectively. Therefore, the nanohardness data show very promising results. Wear and coefficient of friction data were recorded by applying a different normal load in reciprocating motion using a ball on plate geometry. Post experiment, the wear mechanism was established by detail investigation of wear-scar morphology. Potentiodynamic measurements showed coating with a high content of phosphorous was most corrosion resistant in 3.5wt% NaCl solution.

Keywords: corrosion, electrodeposition, nanohardness, Ni-W-P alloy coating

Procedia PDF Downloads 339
24824 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R

Authors: Jaya Mathew

Abstract:

Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.

Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R

Procedia PDF Downloads 359
24823 The Use of YouTube and Its Relation to Changing the Kuwaiti Children’s Social Values from Parents’ Perspectives: Field Study

Authors: Laila Alkhayat

Abstract:

In this study, the researcher explored the positive and negative effects of children watching YouTube on changing social values from the perspective of parents in Kuwait. This study also explored whether any correlation exists between changed values from watching YouTube and the following variables: relationship with a child, social situation, school level, gender, and age. The researcher collected data from 286 questionnaires distributed randomly to parents in Kuwait. The results of the study show that parents face many disadvantages when dealing with children watching YouTube, such as children spending too much time in front of screens, inability to organize bedtime, and children’s social isolation. However, the researcher found some positives come from watching YouTube, such as learning new information, enabling children to search for new information, and introducing children to the culture of their society and other cultures around them. Moreover, this study found that boys are more likely to have negative viewing habits than girls. Given the results, this study shows that the biggest impact on social values from children watching YouTube is that they are preoccupied with watching YouTube and they waste time, which makes them feel disturbed, and this affects the value of time management and delays children’s sleeping times. This study concludes that watching YouTube simultaneously has negative and positive effects on changing social values, but it plays a negative role in changing social values of children from the parents’ perspective.

Keywords: YouTube, children, social value, social media effects

Procedia PDF Downloads 142
24822 Trusting the Big Data Analytics Process from the Perspective of Different Stakeholders

Authors: Sven Gehrke, Johannes Ruhland

Abstract:

Data is the oil of our time, without them progress would come to a hold [1]. On the other hand, the mistrust of data mining is increasing [2]. The paper at hand shows different aspects of the concept of trust and describes the information asymmetry of the typical stakeholders of a data mining project using the CRISP-DM phase model. Based on the identified influencing factors in relation to trust, problematic aspects of the current approach are verified using various interviews with the stakeholders. The results of the interviews confirm the theoretically identified weak points of the phase model with regard to trust and show potential research areas.

Keywords: trust, data mining, CRISP DM, stakeholder management

Procedia PDF Downloads 81
24821 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 468
24820 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 228