Search results for: NFC data exchange format
25442 Polyimide Supported Membrane Made of 2D-Coordination-Crosslinked Polyimide for Rapid Molecular Separation in Multi-Solvent Environments
Authors: Netsanet Kebede Hundessa
Abstract:
Substrate modification of thin film composite (TFC) membranes with various crosslinkers is typically necessary for organic solvent nanofiltration (OSN) applications. This modification is aimed at enhancing membrane stability and solvent resistance, but it often results in a decline in permeance. This study introduces a distinct approach by developing a coordination-crosslinked polyimide substrate, which differs from the covalently-crosslinked substrates traditionally used. This developed substrate achieves enhanced solvent resistance, improved hydrophilicity, and optimized porous microstructure simultaneously. The study investigates the effects of an alkaline coagulation bath, subsequent ion exchange, and further solvent activation. The resulting TFC membrane successfully overcomes the typical permeability-selectivity trade-off of OSN membranes. It demonstrates significantly improved solvent permeance (1.5–2 times higher than previously reported data) with values of 65.2 LMH/bar for methanol, 33.1 LMH/bar for ethanol, and 59.1 LMH/bar for acetone while maintaining competitive solute rejection (>98% for Rose Bengal). This research is expected to provide a new direction for developing high-performance OSN composite membranes and other separation applications.Keywords: metal coordinatiom, thin film composite membrane, organic solvent nanofiltration, solvent activation
Procedia PDF Downloads 6925441 Clothing Features of Greek Orthodox Woman Immigrants in Konya (Iconium)
Authors: Kenan Saatcioglu, Fatma Koc
Abstract:
When the immigration is considered, it has been found that communities were continuously influenced by the immigrations from the date of the emergence of mankind until the day. The political, social and economic reasons seen at the various periods caused the communities go to new places from where they have lived before. Immigrations have occurred as a result of unequal opportunities among communities, social exclusion and imposition, compulsory homeland emerging politically, exile and war. Immigration is a social tool that is defined as a geographical relocation of people from a housing unit (city, village etc.) to another to spend all or part of their future lives. Immigrations have an effect on the history of humanity directly or indirectly, revealing new dimensions for communities to evaluate the concept of homeland. With these immigrations, communities carried their cultural values to their new settlements leading to a new interaction process. With this interaction process both migrant and native community cultures were reshaped and richer cultural values emerged. The clothes of these communities are amongst the most important visual evidence of this rich cultural interaction. As a result of these immigrations, communities affected each other culture’s clothing mutually and they started adding features of other cultures to the garments of its own, resulting new clothing cultures in time. The cultural and historical differences between these communities are seem to be the most influential factors of keeping the clothing cultures of the people alive. The most important and tragic of these immigrations took place after the Turkish War of Independence that was fought against Greece in 1922. The concept of forced immigration was a result of Lausanne Peace Treaty, which was signed between Turkish and Greek governments on 30th January 1923. As a result Greek Orthodoxes, who lived in Turkey (Anatolia and Thrace) and Muslim Turks, who lived in Greece were forced to immigrate. In this study, clothing features of Greek Orthodox woman immigrants who emigrated from Turkey to Greece in the period of the ‘1923 Greek-Turkish Population Exchange’ are aimed to be examined. In the study using the descriptive research method, before the ‘1923 Greek-Turkish Population Exchange’, the clothings belong to Greek Orthodox woman immigrants who lived in ‘Konya (Iconium)’ region in the Ottoman Empire, are discussed. In the study that is based on two different clothings belonging to ‘Konya (Iconium)’ region in the clothing collection archive at the ‘National Historical Museum’ in Greece, clothings of the Greek Orthodox woman immigrants are discussed with cultural norms, beliefs, values as well as in terms of form, ornamentation and dressing styles. Technical drawings are provided demonstrating formal features of the clothing parts that formed clothing integrity and their properties are described with the use of related literature in this study. This study is of importance that that it contains Greek Orthodox refugees’ clothings that are found in the clothing collection archive at the ‘National Historical Museum’ in Greece reflecting the cultural identities, providing information and documentation on the clothing features of the ‘1923 Greek-Turkish Population Exchange’.Keywords: clothing, Greece, Greek Orthodoxes, immigration, national historical museum, Turkey
Procedia PDF Downloads 24825440 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 35725439 Performance-Based Quality Evaluation of Database Conceptual Schemas
Authors: Janusz Getta, Zhaoxi Pan
Abstract:
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing
Procedia PDF Downloads 29225438 Design and Comparative Analysis of Grid-Connected Bipv System with Monocrystalline Silicon and Polycrystalline Silicon in Kandahar Climate
Authors: Ahmad Shah Irshad, Naqibullah Kargar, Wais Samadi
Abstract:
Building an integrated photovoltaic (BIPV) system is a new and modern technique for solar energy production in Kandahar. Due to its location, Kandahar has abundant sources of solar energy. People use both monocrystalline and polycrystalline silicon solar PV modules for the grid-connected solar PV system, and they don’t know which technology performs better for the BIPV system. This paper analyses the parameters described by IEC61724, “Photovoltaic System Performance Monitoring Guidelines for Measurement, Data Exchange and Analysis,” to evaluate which technology shows better performance for the BIPV system. The monocrystalline silicon BIPV system has a 3.1% higher array yield than the polycrystalline silicon BIPV system. The final yield is 0.2%, somewhat higher for monocrystalline silicon than polycrystalline silicon. Monocrystalline silicon has 0.2% and 4.5% greater yearly yield factor and capacity factors than polycrystalline silicon, respectively. Monocrystalline silicon shows 0.3% better performance than polycrystalline silicon. With 1.7% reduction and 0.4% addition in collection losses and useful energy produced, respectively, monocrystalline silicon solar PV system shows good performance than polycrystalline silicon solar PV system. But system losses are the same for both technologies. The monocrystalline silicon BIPV system injects 0.2% more energy into the grid than the polycrystalline silicon BIPV system.Keywords: photovoltaic technologies, performance analysis, solar energy, solar irradiance, performance ratio
Procedia PDF Downloads 37125437 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 14325436 Data Mining Approach for Commercial Data Classification and Migration in Hybrid Storage Systems
Authors: Mais Haj Qasem, Maen M. Al Assaf, Ali Rodan
Abstract:
Parallel hybrid storage systems consist of a hierarchy of different storage devices that vary in terms of data reading speed performance. As we ascend in the hierarchy, data reading speed becomes faster. Thus, migrating the application’ important data that will be accessed in the near future to the uppermost level will reduce the application I/O waiting time; hence, reducing its execution elapsed time. In this research, we implement trace-driven two-levels parallel hybrid storage system prototype that consists of HDDs and SSDs. The prototype uses data mining techniques to classify application’ data in order to determine its near future data accesses in parallel with the its on-demand request. The important data (i.e. the data that the application will access in the near future) are continuously migrated to the uppermost level of the hierarchy. Our simulation results show that our data migration approach integrated with data mining techniques reduces the application execution elapsed time when using variety of traces in at least to 22%.Keywords: hybrid storage system, data mining, recurrent neural network, support vector machine
Procedia PDF Downloads 30825435 Volatility Index, Fear Sentiment and Cross-Section of Stock Returns: Indian Evidence
Authors: Pratap Chandra Pati, Prabina Rajib, Parama Barai
Abstract:
The traditional finance theory neglects the role of sentiment factor in asset pricing. However, the behavioral approach to asset-pricing based on noise trader model and limit to arbitrage includes investor sentiment as a priced risk factor in the assist pricing model. Investor sentiment affects stock more that are vulnerable to speculation, hard to value and risky to arbitrage. It includes small stocks, high volatility stocks, growth stocks, distressed stocks, young stocks and non-dividend-paying stocks. Since the introduction of Chicago Board Options Exchange (CBOE) volatility index (VIX) in 1993, it is used as a measure of future volatility in the stock market and also as a measure of investor sentiment. CBOE VIX index, in particular, is often referred to as the ‘investors’ fear gauge’ by public media and prior literature. The upward spikes in the volatility index are associated with bouts of market turmoil and uncertainty. High levels of the volatility index indicate fear, anxiety and pessimistic expectations of investors about the stock market. On the contrary, low levels of the volatility index reflect confident and optimistic attitude of investors. Based on the above discussions, we investigate whether market-wide fear levels measured volatility index is priced factor in the standard asset pricing model for the Indian stock market. First, we investigate the performance and validity of Fama and French three-factor model and Carhart four-factor model in the Indian stock market. Second, we explore whether India volatility index as a proxy for fearful market-based sentiment indicators affect the cross section of stock returns after controlling for well-established risk factors such as market excess return, size, book-to-market, and momentum. Asset pricing tests are performed using monthly data on CNX 500 index constituent stocks listed on the National stock exchange of India Limited (NSE) over the sample period that extends from January 2008 to March 2017. To examine whether India volatility index, as an indicator of fear sentiment, is a priced risk factor, changes in India VIX is included as an explanatory variable in the Fama-French three-factor model as well as Carhart four-factor model. For the empirical testing, we use three different sets of test portfolios used as the dependent variable in the in asset pricing regressions. The first portfolio set is the 4x4 sorts on the size and B/M ratio. The second portfolio set is the 4x4 sort on the size and sensitivity beta of change in IVIX. The third portfolio set is the 2x3x2 independent triple-sorting on size, B/M and sensitivity beta of change in IVIX. We find evidence that size, value and momentum factors continue to exist in Indian stock market. However, VIX index does not constitute a priced risk factor in the cross-section of returns. The inseparability of volatility and jump risk in the VIX is a possible explanation of the current findings in the study.Keywords: India VIX, Fama-French model, Carhart four-factor model, asset pricing
Procedia PDF Downloads 25225434 Discussion on Big Data and One of Its Early Training Application
Authors: Fulya Gokalp Yavuz, Mark Daniel Ward
Abstract:
This study focuses on a contemporary and inevitable topic of Data Science and its exemplary application for early career building: Big Data and Leaving Learning Community (LLC). ‘Academia’ and ‘Industry’ have a common sense on the importance of Big Data. However, both of them are in a threat of missing the training on this interdisciplinary area. Some traditional teaching doctrines are far away being effective on Data Science. Practitioners needs some intuition and real-life examples how to apply new methods to data in size of terabytes. We simply explain the scope of Data Science training and exemplified its early stage application with LLC, which is a National Science Foundation (NSF) founded project under the supervision of Prof. Ward since 2014. Essentially, we aim to give some intuition for professors, researchers and practitioners to combine data science tools for comprehensive real-life examples with the guides of mentees’ feedback. As a result of discussing mentoring methods and computational challenges of Big Data, we intend to underline its potential with some more realization.Keywords: Big Data, computation, mentoring, training
Procedia PDF Downloads 36225433 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 33525432 Mn3O4 anchored Broccoli-Flower like Nickel Manganese Selenide Composite for Ultra-efficient Solid-State Hybrid Supercapacitors with Extended Durability
Authors: Siddhant Srivastav, Shilpa Singh, Sumanta Kumar Meher
Abstract:
Innovative renewable energy sources for energy storage/conversion is the demand of the current scenario in electrochemical machinery. In this context, choosing suitable organic precipitants for tuning the crystal characteristics and microstructures is a challenge. On the same note, herein we report broccoli flower-like porous Mn3O4/NiSe2−MnSe2 composite synthesized using a simple two step hydrothermal synthesis procedure assisted by sluggish precipitating agent and an effective cappant followed by intermediated anion exchange. The as-synthesized material was exposed to physical and chemical measurements depicting poly-crystallinity, stronger bonding and broccoli flower-like porous arrangement. The material was assessed electrochemically by cyclic voltammetry (CV), chronopotentiometry (CP) and electrochemical impedance spectroscopy (EIS) measurements. The Electrochemical studies reveal redox behavior, supercapacitive charge-discharge shape and extremely low charge transfer resistance. Further, the fabricated Mn3O4/NiSe2−MnSe2 composite based solid-state hybrid supercapacitor (Mn3O4/NiSe2−MnSe2 ||N-rGO) delivers excellent rate specific capacity, very low internal resistance, with energy density (~34 W h kg–1) of a typical rechargeable battery and power density (11995 W kg–1) of an ultra-supercapacitor. Consequently, it can be a favorable contender for supercapacitor applications for high performance energy storage utilizations. A definitive exhibition of the supercapacitor device is credited to electrolyte-ion buffering reservior alike behavior of broccoli flower like Mn3O4/NiSe2−MnSe2, enhanced by upgraded electronic and ionic conductivities of N- doped rGO (negative electrode) and PVA/KOH gel (electrolyte separator), respectivelyKeywords: electrolyte-ion buffering reservoir, intermediated-anion exchange, solid-state hybrid supercapacitor, supercapacitive charge-dischargesupercapacitive charge-discharge
Procedia PDF Downloads 7525431 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22725430 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges
Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh
Abstract:
For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.Keywords: guideline, law, data protection officer, personal data
Procedia PDF Downloads 7825429 Development of a Computer Based, Nutrition and Fitness Programme and Its Effect on Nutritional Status and Fitness of Obese Adults
Authors: Richa Soni, Vibha Bhatnagar, N. K. Jain
Abstract:
This study was conducted to develop a computer mediated programme for weight management and physical fitness and examining its efficacy in reducing weight and improving physical fitness in obese adults. A user friendly, computer based programme was developed to provide a simple, quick, easy and user-friendly method of assessing energy balance at individual level. The programme had four main sections viz. personal Profile, know about your weight, fitness and food exchange list. The computer programme was developed to provide facilities of creating individual profile, tracking meal and physical activities, suggesting nutritional and exercise requirements, planning calorie specific menus, keeping food diaries and revising the diet and exercise plans if needed. The programme was also providing information on obesity, underweight, physical fitness. An exhaustive food exchange list was also given in the programme to assist user to make right food choice decisions. The developed programme was evaluated by a panel of 15 experts comprising endocrinologists, nutritionists and diet counselors. Suggestions given by the experts were paned down and the entire programme was modified in light of suggestions given by the panel members and was reevaluated by the same panel of experts. For assessing the impact of the programme 22 obese subjects were selected purposively and randomly assigned to intervention group (n=12) and no information control group. (n=10). The programme group was asked to strictly follow the programme for one month. Significant reduction in the intake of energy, fat and carbohydrates was observed while intake of fruits, green leafy vegetables was increased. The programme was also found to be effective in reducing body weight, body fat percent and body fat mass whereas total body water and physical fitness scores improved significantly. There was no significant alteration observed in any parameters in the control group.Keywords: body composition, body weight, computer programme, physical fitness
Procedia PDF Downloads 28625428 Data Collection Based on the Questionnaire Survey In-Hospital Emergencies
Authors: Nouha Mhimdi, Wahiba Ben Abdessalem Karaa, Henda Ben Ghezala
Abstract:
The methods identified in data collection are diverse: electronic media, focus group interviews and short-answer questionnaires [1]. The collection of poor-quality data resulting, for example, from poorly designed questionnaires, the absence of good translators or interpreters, and the incorrect recording of data allow conclusions to be drawn that are not supported by the data or to focus only on the average effect of the program or policy. There are several solutions to avoid or minimize the most frequent errors, including obtaining expert advice on the design or adaptation of data collection instruments; or use technologies allowing better "anonymity" in the responses [2]. In this context, we opted to collect good quality data by doing a sizeable questionnaire-based survey on hospital emergencies to improve emergency services and alleviate the problems encountered. At the level of this paper, we will present our study, and we will detail the steps followed to achieve the collection of relevant, consistent and practical data.Keywords: data collection, survey, questionnaire, database, data analysis, hospital emergencies
Procedia PDF Downloads 10825427 Electronic, Structure and Magnetic Properties of KXF3(X= Fe, Co, Mn, V) from Ab Initio Calculations
Authors: M. Ibrir, S. Berri, S. Lakel, D. Maouche And Y. Medkour
Abstract:
We have performed first-principle calculations of the structural, electronic and magnetic properties of KFeF3, KCoF3, KMnF3, KVF3, using full-potential linearized augmented plane-wave (FP-LAPW) scheme within GGA. Features such as the lattice constant, bulk modulus and its pressure derivative are reported. Also, we have presented our results of the band structure and the density of states. The magnetic moments of KFeF3, KCoF3, KMnF3, KVF3 compounds are in most came from the exchange-splitting of X-3d orbital.Keywords: Ab initio calculations, electronic structure, magnetic materials
Procedia PDF Downloads 42025426 Federated Learning in Healthcare
Authors: Ananya Gangavarapu
Abstract:
Convolutional Neural Networks (CNN) based models are providing diagnostic capabilities on par with the medical specialists in many specialty areas. However, collecting the medical data for training purposes is very challenging because of the increased regulations around data collections and privacy concerns around personal health data. The gathering of the data becomes even more difficult if the capture devices are edge-based mobile devices (like smartphones) with feeble wireless connectivity in rural/remote areas. In this paper, I would like to highlight Federated Learning approach to mitigate data privacy and security issues.Keywords: deep learning in healthcare, data privacy, federated learning, training in distributed environment
Procedia PDF Downloads 14125425 The Utilization of Big Data in Knowledge Management Creation
Authors: Daniel Brian Thompson, Subarmaniam Kannan
Abstract:
The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.Keywords: big data, knowledge management, data driven, knowledge creation
Procedia PDF Downloads 11625424 The Usefulness and Future of Hearing Aids Technologies and Their Impact on Hearing
Authors: Amirreza Razzaghipour Sorkhab
Abstract:
Hearing loss is one of the greatest common chronic health situations of older people. Hearing aids are the common treatment, and they recover the quality of life in older adults. Even so, comparatively few older adults with simple, mild to moderate, adult-onset, sensorineural hearing loss use hearing aids. It shouldn’t be expected that more expensive hearing aids always produce better outcomes. Given the importance of quality pledge, approaches of quantifying hearing aid fitting achievement are needed. Studies showed an important reduction in handicap following 3 weeks of hearing aid use, signifying the feasibility of using the Hearing Hindrance Inventory for the Elderly as an outcome measure for hearing aid success after a brief interval of hearing aid use. The results showed important development of the quality of life after three months of using a hearing aid in all members and improvement of their most important problems, i.e., the communication and exchange of data. Hearing loss can impair the conversation of information and so decreases the quality of life. Hearing aids have progressivemeaningfully over the past decade, chiefly due to the growing of digital technology. The next decade should see an even greater number of innovations to hearing aid technology. Development in digital hearing aids will be driven by investigate advances in the next fields such as wireless technology, hearing science, and cognitive scienceMoreover, emerging trends such as connectivity and individuation will also drive new technology. We hope that the advancement of technology will be enough to meet the needs of people with hearing aids.Keywords: hearing loss, hearing aid, hearing aid technology, health
Procedia PDF Downloads 10725423 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya
Authors: Masese Chuma Benard, Martin Onsiro Ronald
Abstract:
Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)
Procedia PDF Downloads 8525422 Cloud Design for Storing Large Amount of Data
Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás
Abstract:
Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization
Procedia PDF Downloads 35325421 Estimation of Missing Values in Aggregate Level Spatial Data
Authors: Amitha Puranik, V. S. Binu, Seena Biju
Abstract:
Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis
Procedia PDF Downloads 38225420 Active Learning Management for Teacher's Professional Courses in Curriculum and Instruction, Faculty of Education Thaksin University
Authors: Chuanphit Chumkhong
Abstract:
This research aimed 1) to study the effects of the management of Active Learning among 3rd year students enrolled in teacher’s profession courses and 2) to assess the satisfaction of the students with courses using the Active Learning approach. The population for the study consisted of 442 3rd year undergraduate students enrolled in two teacher education courses in 2015: Curriculum Development and Learning Process Management. They were 442 from 11 education programs. Respondents for evaluation of satisfaction with Active Learning management comprised 432 students. The instruments used in research included a detailed course description and rating scale questionnaire on Active Learning. The data were analyzed using arithmetic mean and standard deviation. The results of the study reveal the following: 1. Overall, students gain a better understanding of the Active Learning due to their actual practice on the activity of course. Students have the opportunity to exchange learning knowledge and skills. The AL teaching activities make students interested in the contents and they seek to search for knowledge on their own. 2. Overall, 3rd year students are satisfied with the Active Learning management at a ‘high’ level with a mean score (μ) of 4.12 and standard deviation (σ) of. 51. By individual items, students are satisfied with the 10 elements in the two courses at a ‘high’ level with the mean score (μ) between 3.79 to 4.41 and a standard deviation (σ) between to 68. 79.Keywords: active learning teaching model, teacher’s professional courses, professional courses, curriculum and instruction teacher's
Procedia PDF Downloads 24825419 Association Rules Mining and NOSQL Oriented Document in Big Data
Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub
Abstract:
Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL
Procedia PDF Downloads 16225418 Task Value and Research Culture of Southern Luzon State University
Authors: Antonio V. Romana, Rizaide A. Salayo, Maria Lavinia E. Fetalino
Abstract:
This study assessed the subjective task value and research culture of SLSU faculty. It used the sequential explanatory mixed-method research design. For the quantitative phase, a questionnaire on the research culture and task value were used. While in the qualitative phase, the data was coded and thematized to interpret the focus group discussion outcome. Results showed that the dimensions of the subjective task value, intrinsic, got the highest rank while the utility value got the lowest. It is worth mentioning that all subjective task values were "Agreed." From the FGD, faculty members valued research and wanted to be involved in this undertaking. However, the limited number of faculty researchers, heavy teaching workload, inadequate information on the research process, lack of self-confidence, and low incentives received from research hindered their writing and engagement with research. Thus, a policy brief was developed. It is recommended that the institution may conduct a series of research seminar workshops for the faculty members, plan regular research idea exchange activities, and revisit the university's research thrust and agenda for faculties specialization and expertise alignment. In addition, the university may also lessen the workload and hire additional faculty members so that educators may focus on their research work. Finally, cash incentives may still be considered upon knowing that the faculty members have varied experiences in doing research tasks.Keywords: task value, interest value, attainment value, utility value, research culture
Procedia PDF Downloads 6525417 Immunization-Data-Quality in Public Health Facilities in the Pastoralist Communities: A Comparative Study Evidence from Afar and Somali Regional States, Ethiopia
Authors: Melaku Tsehay
Abstract:
The Consortium of Christian Relief and Development Associations (CCRDA), and the CORE Group Polio Partners (CGPP) Secretariat have been working with Global Alliance for Vac-cines and Immunization (GAVI) to improve the immunization data quality in Afar and Somali Regional States. The main aim of this study was to compare the quality of immunization data before and after the above interventions in health facilities in the pastoralist communities in Ethiopia. To this end, a comparative-cross-sectional study was conducted on 51 health facilities. The baseline data was collected in May 2019, while the end line data in August 2021. The WHO data quality self-assessment tool (DQS) was used to collect data. A significant improvment was seen in the accuracy of the pentavalent vaccine (PT)1 (p = 0.012) data at the health posts (HP), while PT3 (p = 0.010), and Measles (p = 0.020) at the health centers (HC). Besides, a highly sig-nificant improvment was observed in the accuracy of tetanus toxoid (TT)2 data at HP (p < 0.001). The level of over- or under-reporting was found to be < 8%, at the HP, and < 10% at the HC for PT3. The data completeness was also increased from 72.09% to 88.89% at the HC. Nearly 74% of the health facilities timely reported their respective immunization data, which is much better than the baseline (7.1%) (p < 0.001). These findings may provide some hints for the policies and pro-grams targetting on improving immunization data qaulity in the pastoralist communities.Keywords: data quality, immunization, verification factor, pastoralist region
Procedia PDF Downloads 12425416 A Method for Consensus Building between Teachers and Learners in a Value Co-Creative Learning Service
Authors: Ryota Sugino, Satoshi Mizoguchi, Koji Kimita, Keiichi Muramatsu, Tatsunori Matsui, Yoshiki Shimomura
Abstract:
Improving added value and productivity of services entails improving both value-in-exchange and value-in-use. Value-in-use is realized by value co-creation, where providers and receivers create value together. In higher education services, value-in-use comes from learners achieving learning outcomes (e.g., knowledge and skills) that are consistent with their learning goals. To enhance the learning outcomes of a learner, it is necessary to enhance and utilize the abilities of the teacher along with the abilities of the learner. To do this, however, the learner and the teacher need to build a consensus about their respective roles. Teachers need to provide effective learning content; learners need to choose the appropriate learning strategies by using the learning content through consensus building. This makes consensus building an important factor in value co-creation. However, methods to build a consensus about their respective roles may not be clearly established, making such consensus difficult. In this paper, we propose some strategies for consensus building between a teacher and a learner in value co-creation. We focus on a teacher and learner co-design and propose an analysis method to clarify a collaborative design process to realize value co-creation. We then analyze some counseling data obtained from a university class. This counseling aimed to build a consensus for value-in-use, learning outcomes, and learning strategies between the teacher and the learner.Keywords: consensus building, value co-creation, higher education, learning service
Procedia PDF Downloads 30325415 A Proposed Model of E-Marketing Service-Oriented Architecture (E-MSOA)
Authors: Hussein Moselhy, Islam Salam
Abstract:
There have been some challenges and problems which hinder the implementation of the e-marketing systems such as the high cost of information systems infrastructure and maintenance as well as their unavailability within the institution. Also, there is no system which supports all programming languages and different platforms. Another problem is the lack of integration between these systems on one hand and the operating systems and different web browsers on the other hand. No system for customer relationship management is established which recognizes their desires and puts them in consideration while performing e-marketing functions is available. Therefore, the service-oriented architecture emerged as one of the most important techniques and methodologies to build systems that integrate with various operating systems and different platforms and other technologies. This technology allows realizing the data exchange among different applications. The service-oriented architecture represents distributed computing concepts to demonstrate its success in achieving the requirements of systems through web services. It also reflects the appropriate design for the services to use different web services in supporting the requirements of business processes and software users. In a service-oriented environment, web services are deployed on the web in the form of independent services to be accessed without knowledge of the nature of the programs and systems with in. This Paper presents a proposal for a new model which contributes to the application of methods and means of e-marketing with the integration of marketing mix elements to improve marketing efficiency (E-MSOA). And apply it in the educational city of one of the Egyptian sector.Keywords: service-oriented architecture, electronic commerce, virtual retailing, unified modeling language
Procedia PDF Downloads 42825414 Sand Dollars: Sex Tourism and Coloniality of Power in the Dominican Republic
Authors: Fernando Valerio-Holguin
Abstract:
Over the recent three decades, the tourism industry in the Dominican Republic has had an enormous impact on the country’s culture. The arrival of tourists from Germany, France, Italy, Russia and the United States has rewritten Dominican cultural identity and created a cultural palimpsest in the areas of language, gastronomy, habits, fashion, values, and gender relations. As a consequence of tourism, a prostitution network has flourished across the country. In the film Sand Dollars (2015) directed by Laura Amelia Guzmán and Israel Cárdenas, Noelí (Janet Mojica), a young mulatto woman, altogether with her boyfriend (Ricardo Ariel Toribio), strips tourists of dollars and euro through prostitution. One of her frequent clients is Anne, a mature French woman (Geraldine Chaplin). While Noeli’s goal is to get all the euros she can, Anne falls in love with her and tries to bring her to France. Both the content of the film and its cinematographic languages are analyzed in light of theory of coloniality. This concept shows how European and American tourism, through the power of money, perpetuates colonial discourse, i. e., how race and ethnocentrism permeate cultural activities in their former colonies. Moreover, in the content analysis of the film the concepts of exchange value and fetishism are crucial to understanding how the colonial body becomes sexual commodity. They facilitate grasping the film’s inequity in terms of power in the relationship between the two women: the white old European woman and the young, poor, third-world mulatta. Even though the film attempts to break away from compulsory heterosexuality, the power relation between the two women persists due to the presence of the axis of race, ethnicity, age and gender. Both the novel Les dollars des sables written by Jean-Noel Pancrazi, and the film Sand Dollars offer an interesting insight into sex tourism and coloniality and shed additional light on the power relations between the former colonizers and its colonies.Keywords: coloniality, ethnocentrism, exchange value, Europe, fetishism, money, power, prostitution, sex tourism, United States of America
Procedia PDF Downloads 45025413 Identifying Critical Success Factors for Data Quality Management through a Delphi Study
Authors: Maria Paula Santos, Ana Lucas
Abstract:
Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort
Procedia PDF Downloads 217