Search results for: operational data
25160 Hierarchical Checkpoint Protocol in Data Grids
Authors: Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed
Abstract:
Grid of computing nodes has emerged as a representative means of connecting distributed computers or resources scattered all over the world for the purpose of computing and distributed storage. Since fault tolerance becomes complex due to the availability of resources in decentralized grid environment, it can be used in connection with replication in data grids. The objective of our work is to present fault tolerance in data grids with data replication-driven model based on clustering. The performance of the protocol is evaluated with Omnet++ simulator. The computational results show the efficiency of our protocol in terms of recovery time and the number of process in rollbacks.Keywords: data grids, fault tolerance, clustering, chandy-lamport
Procedia PDF Downloads 34225159 Behaviour of Non-local Correlations and Quantum Information Theoretic Measures in Frustrated Molecular Wheels
Authors: Amit Tribedi
Abstract:
Genuine Quantumness present in Quantum Systems is the resource for implementing Quantum Information and Computation Protocols which can outperform the classical counterparts. These Quantumness measures encompass non-local ones known as quantum entanglement (QE) and quantum information theoretic (QIT) ones, e.g. Quantum Discord (QD). In this paper, some well-known measures of QE and QD in some wheel-like frustrated molecular magnetic systems have been studied. One of the systems has already been synthesized using coordination chemistry, and the other is hypothetical, where the dominant interaction is the spin-spin exchange interaction. Exact analytical methods and exact numerical diagonalization methods have been used. Some counter-intuitive non-trivial features, like non-monotonicity of quantum correlations with temperature, persistence of multipartite entanglement over bipartite ones etc. indicated by the behaviour of the correlations and the QIT measures have been found. The measures, being operational ones, can be used to realize the resource of Quantumness in experiments.Keywords: 0D Magnets, discord, entanglement, frustration
Procedia PDF Downloads 22925158 Elucidating Microstructural Evolution Mechanisms in Tungsten via Layerwise Rolling in Additive Manufacturing: An Integrated Simulation and Experimental Approach
Authors: Sadman Durlov, Aditya Ganesh-Ram, Hamidreza Hekmatjou, Md Najmus Salehin, Nora Shayesteh Ameri
Abstract:
In the field of additive manufacturing, tungsten stands out for its exceptional resistance to high temperatures, making it an ideal candidate for use in extreme conditions. However, its inherent brittleness and vulnerability to thermal cracking pose significant challenges to its manufacturability. This study explores the microstructural evolution of tungsten processed through layer-wise rolling in laser powder bed fusion additive manufacturing, utilizing a comprehensive approach that combines advanced simulation techniques with empirical research. We aim to uncover the complex processes of plastic deformation and microstructural transformations, with a particular focus on the dynamics of grain size, boundary evolution, and phase distribution. Our methodology employs a combination of simulation and experimental data, allowing for a detailed comparison that elucidates the key mechanisms influencing microstructural alterations during the rolling process. This approach facilitates a deeper understanding of the material's behavior under additive manufacturing conditions, specifically in terms of deformation and recrystallization. The insights derived from this research not only deepen our theoretical knowledge but also provide actionable strategies for refining manufacturing parameters to improve the tungsten components' mechanical properties and functional performance. By integrating simulation with practical experimentation, this study significantly enhances the field of materials science, offering a robust framework for the development of durable materials suited for challenging operational environments. Our findings pave the way for optimizing additive manufacturing techniques and expanding the use of tungsten across various demanding sectors.Keywords: additive manufacturing, layer wise rolling, refractory materials, in-situ microstructure modifications
Procedia PDF Downloads 6125157 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct
Authors: Muhammet Dursun Kaya, Hasan Asil
Abstract:
One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.Keywords: information technology, data mining, scientific development, clustering
Procedia PDF Downloads 27825156 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 14525155 Data Mining Techniques for Anti-Money Laundering
Authors: M. Sai Veerendra
Abstract:
Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.Keywords: data mining, clustering, money laundering, anti-money laundering solutions
Procedia PDF Downloads 53925154 Appraisal of Maintenance Practices in Selected Tourist Attraction in Bauchi State, Nigeria
Authors: Eldah Ephraim Buba, Amina Bata Zoaka, Aishatu Ibrahim
Abstract:
This study appraised maintenance practices in selected tourist attractions in Bauchi state, Nigeria. Four tourist attractions were used for the research. Checklists were used to assess operations and repairs maintenance practices in the different attractions. The study carried out personal assessment thrice in six months without prior knowledge of the staff in charge for operational maintenance. Records of repairs maintenance from the attractions maintenance unit for a period of ten years were assessed using the checklists. The findings of the study show that operations maintenance was not adequately carried out in the four tourists attractions. Repairs maintenance was carried out in Yankari game reserve and safari, but repairs maintenance was poor in the other three attractions. The study therefore, recommends that adequate maintenance should be practiced in tourist attractions to expand the lifespan of the facilities and also encourage tourist patronage.Keywords: appraisal, maintenance, practices, tourist attraction
Procedia PDF Downloads 30125153 A Serious Game to Upgrade the Learning of Organizational Skills in Nursing Schools
Authors: Benoit Landi, Hervé Pingaud, Jean-Benoit Culie, Michel Galaup
Abstract:
Serious games have been widely disseminated in the field of digital learning. They have proved their utility in improving skills through virtual environments that simulate the field where new competencies have to be improved and assessed. This paper describes how we created CLONE, a serious game whose purpose is to help nurses create an efficient work plan in a hospital care unit. In CLONE, the number of patients to take care of is similar to the reality of their job, going far beyond what is currently practiced in nurse school classrooms. This similarity with the operational field increases proportionally the number of activities to be scheduled. Moreover, very often, the team of nurses is composed of regular nurses and nurse assistants that must share the work with respect to the regulatory obligations. Therefore, on the one hand, building a short-term planning is a complex task with a large amount of data to deal with, and on the other, good clinical practices have to be systematically applied. We present how reference planning has been defined by addressing an optimization problem formulation using the expertise of teachers. This formulation ensures the gameplay feasibility for the scenario that has been produced and enhanced throughout the game design process. It was also crucial to steer a player toward a specific gaming strategy. As one of our most important learning outcomes is a clear understanding of the workload concept, its factual calculation for each caregiver along time and its inclusion in the nurse reasoning during planning elaboration are focal points. We will demonstrate how to modify the game scenario to create a digital environment in which these somewhat abstract principles can be understood and applied. Finally, we give input on an experience we had on a pilot of a thousand undergraduate nursing students.Keywords: care planning, workload, game design, hospital nurse, organizational skills, digital learning, serious game
Procedia PDF Downloads 19125152 Plane of Equal Settlement above HDD’s Borehole before Operational Condition
Authors: Shokoufeh Sadeghifard
Abstract:
This study is a review of the nature of soil arching that develops in the upper layer of soil during drilling processes before pulling product pipe inside the hole. This study is based on the results of some parametric studies which are investigating the behavior of drained sandy soil above HDD borehole using Plaxis finite element solution. The influence of drilling mud injection in these series of analyses has been ignored. However, a suitable drilling mud pressure helps to achieve stable arch when the height of soil cover over the drilling borehole is not enough. In this study, the soil response to the formation of a HDD borehole is compared to arching theory developed by Terzaghi (1943). It is found that Terzaghi’s approach is capable of describing all of the behaviour seen when a stable arch forms. According to the numerical results, a suitable safe depth of 4D, D is borehole diameter, is suggested for typical range of HDD borehole in sandy soil.Keywords: HDD, Plaxis, finite element, arching, settlement, drilling
Procedia PDF Downloads 35925151 Minimizing Ship’S Breakdown Maintenance Due to Rope Entangled In Propeller With “Si Kuman” On Mooring Boat PSC I in Surabaya
Authors: Jogi Prayogo, Dwi Qaqa Prasetyatama, Rahmad Dwi Afandi, Kunto Arief Prasetyo, Viorel Herniza Leksono
Abstract:
PT. Pertamina Trans Kontinental managed a fleet of 364 ships in 2018 - 2020. In that period, there were 8 incidents of ship damage, causing breakdown maintenance on 6 ships belonging to PT Pertamina Trans Kontinental throughout Indonesia's operational areas due to ropes entangled in propellers. The company's losses that were caused by the fouled propellers amounted to 306.35 Million Rupiah. Of the 8 incidents, Mooring Boat PSC I was taken as a pilot project for further analysis considering the location of the ship which is in Surabaya and Mooring Boat PSC I has experienced 2 incidents of rope entanglement that caused the company's losses due to the largest Breakdown Maintenance amounted to 200.99 Million Rupiah. After analyzing the rope entanglement in the ship's propeller based on the data of Mooring Boat PSC I related to the location of propellers that are often fouled in the conventional propulsion system, it was found that there is a suitable location for the implementation of SI KUMAN tool that serves to cut ropes to prevent the occurrence of rope entangled in ship propellers. The determination of SI KUMAN tool is based on the strength of the ship's material to be installed and a suitable design to prevent the occurrence of ropes being entangled in propellers. After the installation of the "SI KUMAN" tool and monitoring carried out for 1 year period (August 2020 - August 2021), it was found that SI KUMAN tool can eliminate the risk of fouled propeller incidents which previously occurred twice in one year so that the company's loss amounted to 200.99 Million Rupiah can be eliminated and SI KUMAN tool can still operate optimally.Keywords: breakdown maintenance, mooring boat, fleet, fouled propeller, rope entangled, cut
Procedia PDF Downloads 18125150 Development of New Technology Evaluation Model by Using Patent Information and Customers' Review Data
Authors: Kisik Song, Kyuwoong Kim, Sungjoo Lee
Abstract:
Many global firms and corporations derive new technology and opportunity by identifying vacant technology from patent analysis. However, previous studies failed to focus on technologies that promised continuous growth in industrial fields. Most studies that derive new technology opportunities do not test practical effectiveness. Since previous studies depended on expert judgment, it became costly and time-consuming to evaluate new technologies based on patent analysis. Therefore, research suggests a quantitative and systematic approach to technology evaluation indicators by using patent data to and from customer communities. The first step involves collecting two types of data. The data is used to construct evaluation indicators and apply these indicators to the evaluation of new technologies. This type of data mining allows a new method of technology evaluation and better predictor of how new technologies are adopted.Keywords: data mining, evaluating new technology, technology opportunity, patent analysis
Procedia PDF Downloads 37825149 Anomaly Detection Based on System Log Data
Authors: M. Kamel, A. Hoayek, M. Batton-Hubert
Abstract:
With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.Keywords: logs, anomaly detection, ML, scoring, NLP
Procedia PDF Downloads 9625148 Failure Analysis Using Rtds for a Power System Equipped with Thyristor-Controlled Series Capacitor in Korea
Authors: Chur Hee Lee, Jae in Lee, Minh Chau Diah, Jong Su Yoon, Seung Wan Kim
Abstract:
This paper deals with Real Time Digital Simulator (RTDS) analysis about effects of transmission lines failure in power system equipped with Thyristor Controlled Series Capacitance (TCSC) in Korea. The TCSC is firstly applied in Korea to compensate real power in case of 765 kV line faults. Therefore, It is important to analyze with TCSC replica using RTDS. In this test, all systems in Korea, other than those near TCSC, were abbreviated to Thevenin equivalent. The replica was tested in the case of a line failure near the TCSC, a generator failure, and a 765-kV line failure. The effects of conventional operated STATCOM, SVC and TCSC were also analyzed. The test results will be used for the actual TCSC operational impact analysis.Keywords: failure analysis, power system, RTDS, TCSC
Procedia PDF Downloads 12025147 Carboxylic Acid-Functionalized Multi-Walled Carbon Nanotubes-Polyindole/Ti2O3 Nanocomposite: Electrochemical Nanomolar Detection of α-Lipoic Acid in Vegetables
Authors: Ragu Sasikumar, Palraj Ranganathan, Shen-Ming Chen, Syang-Peng Rwei
Abstract:
A highly sensitive, and selective α-Lipoic acid (ALA) sensor based on a functionalized multi-walled carbon nanotubes-polyindole/Ti2O3 (f-MWCNTs-PIN/Ti2O3) nanocomposite modified glassy carbon electrode (GCE) was developed. The fabricated f-MWCNTs-PIN/Ti2O3/GCE displayed an enhanced voltammetric response for oxidation towards ALA relative to that of a f-MWCNTs/GCE, f-MWCNTs-PIN/GCE, Ti2O3/GCE, and a bare GCE. Under optimum conditions, the f-MWCNTs-PIN/Ti2O3/GCE showed a wide linear range at ALA concentrations of 0.39-115.8 µM. The limit of detection of 12 nM and sensitivity of about 6.39 µA µM-1cm-2. The developed sensor showed anti-interference, reproducibility, good repeatability, and operational stability. Applied possibility of the sensor has been confirmed in vegetable samples.Keywords: f-MWCNT, polyindole, Ti2O3, Alzheimer’s diseases, ALA sensor
Procedia PDF Downloads 22625146 EnumTree: An Enumerative Biclustering Algorithm for DNA Microarray Data
Authors: Haifa Ben Saber, Mourad Elloumi
Abstract:
In a number of domains, like in DNA microarray data analysis, we need to cluster simultaneously rows (genes) and columns (conditions) of a data matrix to identify groups of constant rows with a group of columns. This kind of clustering is called biclustering. Biclustering algorithms are extensively used in DNA microarray data analysis. More effective biclustering algorithms are highly desirable and needed. We introduce a new algorithm called, Enumerative tree (EnumTree) for biclustering of binary microarray data. is an algorithm adopting the approach of enumerating biclusters. This algorithm extracts all biclusters consistent good quality. The main idea of EnumLat is the construction of a new tree structure to represent adequately different biclusters discovered during the process of enumeration. This algorithm adopts the strategy of all biclusters at a time. The performance of the proposed algorithm is assessed using both synthetic and real DNA micryarray data, our algorithm outperforms other biclustering algorithms for binary microarray data. Biclusters with different numbers of rows. Moreover, we test the biological significance using a gene annotation web tool to show that our proposed method is able to produce biologically relevent biclusters.Keywords: DNA microarray, biclustering, gene expression data, tree, datamining.
Procedia PDF Downloads 37225145 The Impact of Financial Reporting on Sustainability
Authors: Lynn Ruggieri
Abstract:
The worldwide pandemic has only increased sustainability awareness. The public is demanding that businesses be held accountable for their impact on the environment. While financial data enjoys uniformity in reporting requirements, there are no uniform reporting requirements for non-financial data. Europe is leading the way with some standards being implemented for reporting non-financial sustainability data; however, there is no uniformity globally. And without uniformity, there is not a clear understanding of what information to include and how to disclose it. Sustainability reporting will provide important information to stakeholders and will enable businesses to understand their impact on the environment. Therefore, there is a crucial need for this data. This paper looks at the history of sustainability reporting in the countries of the European Union and throughout the world and makes a case for worldwide reporting requirements for sustainability.Keywords: financial reporting, non-financial data, sustainability, global financial reporting
Procedia PDF Downloads 18025144 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 9625143 Mapping Tunnelling Parameters for Global Optimization in Big Data via Dye Laser Simulation
Authors: Sahil Imtiyaz
Abstract:
One of the biggest challenges has emerged from the ever-expanding, dynamic, and instantaneously changing space-Big Data; and to find a data point and inherit wisdom to this space is a hard task. In this paper, we reduce the space of big data in Hamiltonian formalism that is in concordance with Ising Model. For this formulation, we simulate the system using dye laser in FORTRAN and analyse the dynamics of the data point in energy well of rhodium atom. After mapping the photon intensity and pulse width with energy and potential we concluded that as we increase the energy there is also increase in probability of tunnelling up to some point and then it starts decreasing and then shows a randomizing behaviour. It is due to decoherence with the environment and hence there is a loss of ‘quantumness’. This interprets the efficiency parameter and the extent of quantum evolution. The results are strongly encouraging in favour of the use of ‘Topological Property’ as a source of information instead of the qubit.Keywords: big data, optimization, quantum evolution, hamiltonian, dye laser, fermionic computations
Procedia PDF Downloads 19525142 Creating Entrepreneurs through Contribution of Individuals and Corporations: An Insight on Persons with Disabilities in Bangladesh
Authors: Saptarshi Dhar, Tahira Farzana
Abstract:
In Bangladesh, particularly in rural areas, persons with disabilities are generally isolated from the mainstream and are pushed to the margins of society. They are seen as an individual problem, not as a social responsibility. As a result, persons with disabilities face challenges to actively participate in social and economic activities. The country is experiencing a steady economic and per capita growth over the past few years and entrepreneurial opportunities are also increasing. However, involvement of persons with disabilities in entrepreneurship is yet to increase. The aim of this paper is to explore the issue of entrepreneurship for persons with disabilities through contribution of individuals and corporations in the context of social responsibility. The paper is exploratory in nature and is approached through a three-month research project 'Shwanirbhor' run by the authors in Pakshi area of Pabna District in Bangladesh. The authors collected data through semi structured questionnaire, interviews and focus group discussions. Through the project, persons with disabilities were provided with financial capital (collected through contribution of individuals and corporations), business plans and advisory assistance on a need basis to help them start entrepreneurial ventures. The findings of the study indicate that in terms of contribution toward a social cause, individuals and corporations have positive attitude and are willing to offer monetary and nonmonetary assistance. When provided with entrepreneurial opportunity, persons with disabilities showed motivation in joining entrepreneurship to improve their economic standing and to be financially independent. In addition to that, the study also found that factors such as social inclusion and acceptance, economic empowerment, breaking the social and family barrier are also the reasons that drive persons with disabilities into embracing entrepreneurship. Moreover, while starting and running the entrepreneurial activities, they face constraints that range from personal, environmental, operational and infrastructural to informational barriers. The paper also proposes a strategy framework for entrepreneurship creation in Bangladesh which could be supportive for policy development for persons with disabilities.Keywords: Bangladesh, entrepreneurship, persons with disabilities (PWD), social responsibility
Procedia PDF Downloads 24025141 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 19325140 Investigation on Performance of Change Point Algorithm in Time Series Dynamical Regimes and Effect of Data Characteristics
Authors: Farhad Asadi, Mohammad Javad Mollakazemi
Abstract:
In this paper, Bayesian online inference in models of data series are constructed by change-points algorithm, which separated the observed time series into independent series and study the change and variation of the regime of the data with related statistical characteristics. variation of statistical characteristics of time series data often represent separated phenomena in the some dynamical system, like a change in state of brain dynamical reflected in EEG signal data measurement or a change in important regime of data in many dynamical system. In this paper, prediction algorithm for studying change point location in some time series data is simulated. It is verified that pattern of proposed distribution of data has important factor on simpler and smother fluctuation of hazard rate parameter and also for better identification of change point locations. Finally, the conditions of how the time series distribution effect on factors in this approach are explained and validated with different time series databases for some dynamical system.Keywords: time series, fluctuation in statistical characteristics, optimal learning, change-point algorithm
Procedia PDF Downloads 42825139 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 35825138 Bayesian Borrowing Methods for Count Data: Analysis of Incontinence Episodes in Patients with Overactive Bladder
Authors: Akalu Banbeta, Emmanuel Lesaffre, Reynaldo Martina, Joost Van Rosmalen
Abstract:
Including data from previous studies (historical data) in the analysis of the current study may reduce the sample size requirement and/or increase the power of analysis. The most common example is incorporating historical control data in the analysis of a current clinical trial. However, this only applies when the historical control dataare similar enough to the current control data. Recently, several Bayesian approaches for incorporating historical data have been proposed, such as the meta-analytic-predictive (MAP) prior and the modified power prior (MPP) both for single control as well as for multiple historical control arms. Here, we examine the performance of the MAP and the MPP approaches for the analysis of (over-dispersed) count data. To this end, we propose a computational method for the MPP approach for the Poisson and the negative binomial models. We conducted an extensive simulation study to assess the performance of Bayesian approaches. Additionally, we illustrate our approaches on an overactive bladder data set. For similar data across the control arms, the MPP approach outperformed the MAP approach with respect to thestatistical power. When the means across the control arms are different, the MPP yielded a slightly inflated type I error (TIE) rate, whereas the MAP did not. In contrast, when the dispersion parameters are different, the MAP gave an inflated TIE rate, whereas the MPP did not.We conclude that the MPP approach is more promising than the MAP approach for incorporating historical count data.Keywords: count data, meta-analytic prior, negative binomial, poisson
Procedia PDF Downloads 11925137 Strategic Citizen Participation in Applied Planning Investigations: How Planners Use Etic and Emic Community Input Perspectives to Fill-in the Gaps in Their Analysis
Authors: John Gaber
Abstract:
Planners regularly use citizen input as empirical data to help them better understand community issues they know very little about. This type of community data is based on the lived experiences of local residents and is known as "emic" data. What is becoming more common practice for planners is their use of data from local experts and stakeholders (known as "etic" data or the outsider perspective) to help them fill in the gaps in their analysis of applied planning research projects. Utilizing international Health Impact Assessment (HIA) data, I look at who planners invite to their citizen input investigations. Research presented in this paper shows that planners access a wide range of emic and etic community perspectives in their search for the “community’s view.” The paper concludes with how planners can chart out a new empirical path in their execution of emic/etic citizen participation strategies in their applied planning research projects.Keywords: citizen participation, emic data, etic data, Health Impact Assessment (HIA)
Procedia PDF Downloads 48425136 Quantification of Uncertainties Related to the Implementation of Reverse Logistics Process
Authors: Dnaya Soukaina
Abstract:
It’s over six decades that Reverse logistics had appeared as a research area, and it is emerging again and again in the scientific fields. As reverse logistics presents real potential for value recovery and environmental impacts decrease, it’s still necessary to extend this concept more in the industrial and commercial field especially in developing countries. The process of reverse logistics is a progression of steps beginning with the customer and finishing with the organization or even the customer, however the issue is that this cycle must be adjustable to the organization concerned, in addition of legislative, operational, financial and social obstacles. Literature had demonstrated that there are many other uncertainties while the implementation of this process that vary in function of the sector concerned and the kind of activity. Besides, even if literature is developing this topic over the last years, reseraches about uncertainties quantification in reverse logistics process still being few. the paper has the objective to fill this gap, and carry out a study to identify sustainable strategies that can be adapted to different industrial or commercial sectors to facilitate the implementation of reverse logistics.Keywords: reverse logistics, implementation, unceratinties quantification, mathematical model
Procedia PDF Downloads 2325135 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 18525134 Modelling Rainfall-Induced Shallow Landslides in the Northern New South Wales
Authors: S. Ravindran, Y.Liu, I. Gratchev, D.Jeng
Abstract:
Rainfall-induced shallow landslides are more common in the northern New South Wales (NSW), Australia. From 2009 to 2017, around 105 rainfall-induced landslides occurred along the road corridors and caused temporary road closures in the northern NSW. Rainfall causing shallow landslides has different distributions of rainfall varying from uniform, normal, decreasing to increasing rainfall intensity. The duration of rainfall varied from one day to 18 days according to historical data. The objective of this research is to analyse slope instability of some of the sites in the northern NSW by varying cumulative rainfall using SLOPE/W and SEEP/W and compare with field data of rainfall causing shallow landslides. The rainfall data and topographical data from public authorities and soil data obtained from laboratory tests will be used for this modelling. There is a likelihood of shallow landslides if the cumulative rainfall is between 100 mm to 400 mm in accordance with field data.Keywords: landslides, modelling, rainfall, suction
Procedia PDF Downloads 18425133 Machine Learning-Enabled Classification of Climbing Using Small Data
Authors: Nicholas Milburn, Yu Liang, Dalei Wu
Abstract:
Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence
Procedia PDF Downloads 14425132 Analysis of Expression Data Using Unsupervised Techniques
Authors: M. A. I Perera, C. R. Wijesinghe, A. R. Weerasinghe
Abstract:
his study was conducted to review and identify the unsupervised techniques that can be employed to analyze gene expression data in order to identify better subtypes of tumors. Identifying subtypes of cancer help in improving the efficacy and reducing the toxicity of the treatments by identifying clues to find target therapeutics. Process of gene expression data analysis described under three steps as preprocessing, clustering, and cluster validation. Feature selection is important since the genomic data are high dimensional with a large number of features compared to samples. Hierarchical clustering and K Means are often used in the analysis of gene expression data. There are several cluster validation techniques used in validating the clusters. Heatmaps are an effective external validation method that allows comparing the identified classes with clinical variables and visual analysis of the classes.Keywords: cancer subtypes, gene expression data analysis, clustering, cluster validation
Procedia PDF Downloads 14925131 Learning Analytics in a HiFlex Learning Environment
Authors: Matthew Montebello
Abstract:
Student engagement within a virtual learning environment generates masses of data points that can significantly contribute to the learning analytics that lead to decision support. Ideally, similar data is collected during student interaction with a physical learning space, and as a consequence, data is present at a large scale, even in relatively small classes. In this paper, we report of such an occurrence during classes held in a HiFlex modality as we investigate the advantages of adopting such a methodology. We plan to take full advantage of the learner-generated data in an attempt to further enhance the effectiveness of the adopted learning environment. This could shed crucial light on operating modalities that higher education institutions around the world will switch to in a post-COVID era.Keywords: HiFlex, big data in higher education, learning analytics, virtual learning environment
Procedia PDF Downloads 201