Search results for: big data interpretation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25801

Search results for: big data interpretation

24691 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 201
24690 Unsupervised Text Mining Approach to Early Warning System

Authors: Ichihan Tai, Bill Olson, Paul Blessner

Abstract:

Traditional early warning systems that alarm against crisis are generally based on structured or numerical data; therefore, a system that can make predictions based on unstructured textual data, an uncorrelated data source, is a great complement to the traditional early warning systems. The Chicago Board Options Exchange (CBOE) Volatility Index (VIX), commonly referred to as the fear index, measures the cost of insurance against market crash, and spikes in the event of crisis. In this study, news data is consumed for prediction of whether there will be a market-wide crisis by predicting the movement of the fear index, and the historical references to similar events are presented in an unsupervised manner. Topic modeling-based prediction and representation are made based on daily news data between 1990 and 2015 from The Wall Street Journal against VIX index data from CBOE.

Keywords: early warning system, knowledge management, market prediction, topic modeling.

Procedia PDF Downloads 338
24689 The Role of Synthetic Data in Aerial Object Detection

Authors: Ava Dodd, Jonathan Adams

Abstract:

The purpose of this study is to explore the characteristics of developing a machine learning application using synthetic data. The study is structured to develop the application for the purpose of deploying the computer vision model. The findings discuss the realities of attempting to develop a computer vision model for practical purpose, and detail the processes, tools, and techniques that were used to meet accuracy requirements. The research reveals that synthetic data represents another variable that can be adjusted to improve the performance of a computer vision model. Further, a suite of tools and tuning recommendations are provided.

Keywords: computer vision, machine learning, synthetic data, YOLOv4

Procedia PDF Downloads 225
24688 Lung Disease Detection from the Chest X Ray Images Using Various Transfer Learning

Authors: Aicha Akrout, Amira Echtioui, Mohamed Ghorbel

Abstract:

Pneumonia remains a significant global health concern, posing a substantial threat to human lives due to its contagious nature and potentially fatal respiratory complications caused by bacteria, fungi, or viruses. The reliance on chest X-rays for diagnosis, although common, often necessitates expert interpretation, leading to delays and potential inaccuracies in treatment. This study addresses these challenges by employing transfer learning techniques to automate the detection of lung diseases, with a focus on pneumonia. Leveraging three pre-trained models, VGG-16, ResNet50V2, and MobileNetV2, we conducted comprehensive experiments to evaluate their performance. Our findings reveal that the proposed model based on VGG-16 demonstrates superior accuracy, precision, recall, and F1 score, achieving impressive results with an accuracy of 93.75%, precision of 94.50%, recall of 94.00%, and an F1 score of 93.50%. This research underscores the potential of transfer learning in enhancing pneumonia diagnosis and treatment outcomes, offering a promising avenue for improving healthcare delivery and reducing mortality rates associated with this debilitating respiratory condition.

Keywords: chest x-ray, lung diseases, transfer learning, pneumonia detection

Procedia PDF Downloads 43
24687 Perception-Oriented Model Driven Development for Designing Data Acquisition Process in Wireless Sensor Networks

Authors: K. Indra Gandhi

Abstract:

Wireless Sensor Networks (WSNs) have always been characterized for application-specific sensing, relaying and collection of information for further analysis. However, software development was not considered as a separate entity in this process of data collection which has posed severe limitations on the software development for WSN. Software development for WSN is a complex process since the components involved are data-driven, network-driven and application-driven in nature. This implies that there is a tremendous need for the separation of concern from the software development perspective. A layered approach for developing data acquisition design based on Model Driven Development (MDD) has been proposed as the sensed data collection process itself varies depending upon the application taken into consideration. This work focuses on the layered view of the data acquisition process so as to ease the software point of development. A metamodel has been proposed that enables reusability and realization of the software development as an adaptable component for WSN systems. Further, observing users perception indicates that proposed model helps in improving the programmer's productivity by realizing the collaborative system involved.

Keywords: data acquisition, model-driven development, separation of concern, wireless sensor networks

Procedia PDF Downloads 434
24686 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 497
24685 Scientific Interpretation of “Fertilizing Winds” Mentioned in Verse 15:22 of Al-Quran

Authors: Md. Mamunur Rashid

Abstract:

Allah (SWT) bestowed us with the Divine blessing, providing the wonderful source of water as stated in verse 15:22 of Al-Quran. Arabic “Ar-Riaaha Lawaaqiha (ٱلرِّيَـٰحَ لَوَٰقِحَ)” of this verse is translated as “fertilizing winds.” The “fertilizing winds” literally, refer the winds of having the roles: to fertilize something similar to the “zygotes” in humans and animals (formation of clouds in the sky in this case); to produce fertilizers for the plants, crops, etc.; and to pollinate the plants. In this paper, these roles of “fertilizing winds” have been validated by presenting the modern knowledge of science in this regard. Existing interpretations are mostly focused on the “formation of clouds in the sky” while few of them mention about the pollination of trees. However, production of fertilizers, in this regard, has not been considered by any translator or interpreter. It has been observed that the winds contain, the necessary components of forming the clouds; the necessary components of producing the fertilizers; and the necessary components to pollinate the plants. The Science of Meteorology gives us the clear understanding of the formation of clouds. Moreover, we know that the lightning bolts breaks the nitrogen molecules of winds and the water molecules of vapor to form fertilizers. Pollination is a common role of winds in plants fertilization. All the scientific phenomena presented here give us the better interpretations of “fertilizing winds.”

Keywords: Al-Quran, fertilizing winds, meteorology, scientific

Procedia PDF Downloads 120
24684 Status and Results from EXO-200

Authors: Ryan Maclellan

Abstract:

EXO-200 has provided one of the most sensitive searches for neutrinoless double-beta decay utilizing 175 kg of enriched liquid xenon in an ultra-low background time projection chamber. This detector has demonstrated excellent energy resolution and background rejection capabilities. Using the first two years of data, EXO-200 has set a limit of 1.1x10^25 years at 90% C.L. on the neutrinoless double-beta decay half-life of Xe-136. The experiment has experienced a brief hiatus in data taking during a temporary shutdown of its host facility: the Waste Isolation Pilot Plant. EXO-200 expects to resume data taking in earnest this fall with upgraded detector electronics. Results from the analysis of EXO-200 data and an update on the current status of EXO-200 will be presented.

Keywords: double-beta, Majorana, neutrino, neutrinoless

Procedia PDF Downloads 414
24683 A Fundamental Study on the Molecular Chemistry of Agarwood Water Mixture

Authors: Fatmawati Adam, Saidatul Syaima Mat Tari, Saiful Nizam Tajuddin, Nurul Salwa Azliyana Hamzah

Abstract:

Essential oil of agarwood or known as Gaharu in Malay is highly prized for its value as luxury fragrances and incense. However, the complexities of the chemical composition of agarwood itself is the main challenge for establishment of an effective recovery method, which is able to ensure uniform qualities and standard for each batch of essential oil production. Agarwood markers are actually a blend of volatile and non-volatile compounds. While volatile molecules could be easily retrieved by the present distillation technique, the high solubility properties are the limiting factor for the latter. With regard to this, an elementary chemistry resolution study had been performed on commercial agarwood essential oil-water mixture, by the application of preparative HPLC and FTIR. Interpretation of the results leads to the theoretical postulation that, agarwood water mixture comprise of agarospirol, jinkohol, jinkoh eremol and khusenol. This study provides a pinpoint on the chemical characteristics of water soluble (non-volatile) agarwood compounds, therefore, will be an insight for researchers to develop a more strategic technique for their extraction. Thereafter the optimum quality of this essential oil could be controlled in a more improved way.

Keywords: Agarwood, Aquillaria Malaccensis, agarospirol, jinkohol, jinkoh eremol, khusenol

Procedia PDF Downloads 550
24682 Remaining Useful Life (RUL) Assessment Using Progressive Bearing Degradation Data and ANN Model

Authors: Amit R. Bhende, G. K. Awari

Abstract:

Remaining useful life (RUL) prediction is one of key technologies to realize prognostics and health management that is being widely applied in many industrial systems to ensure high system availability over their life cycles. The present work proposes a data-driven method of RUL prediction based on multiple health state assessment for rolling element bearings. Bearing degradation data at three different conditions from run to failure is used. A RUL prediction model is separately built in each condition. Feed forward back propagation neural network models are developed for prediction modeling.

Keywords: bearing degradation data, remaining useful life (RUL), back propagation, prognosis

Procedia PDF Downloads 436
24681 Spatio-Temporal Data Mining with Association Rules for Lake Van

Authors: Tolga Aydin, M. Fatih Alaeddinoğlu

Abstract:

People, throughout the history, have made estimates and inferences about the future by using their past experiences. Developing information technologies and the improvements in the database management systems make it possible to extract useful information from knowledge in hand for the strategic decisions. Therefore, different methods have been developed. Data mining by association rules learning is one of such methods. Apriori algorithm, one of the well-known association rules learning algorithms, is not commonly used in spatio-temporal data sets. However, it is possible to embed time and space features into the data sets and make Apriori algorithm a suitable data mining technique for learning spatio-temporal association rules. Lake Van, the largest lake of Turkey, is a closed basin. This feature causes the volume of the lake to increase or decrease as a result of change in water amount it holds. In this study, evaporation, humidity, lake altitude, amount of rainfall and temperature parameters recorded in Lake Van region throughout the years are used by the Apriori algorithm and a spatio-temporal data mining application is developed to identify overflows and newly-formed soil regions (underflows) occurring in the coastal parts of Lake Van. Identifying possible reasons of overflows and underflows may be used to alert the experts to take precautions and make the necessary investments.

Keywords: apriori algorithm, association rules, data mining, spatio-temporal data

Procedia PDF Downloads 374
24680 Building Data Infrastructure for Public Use and Informed Decision Making in Developing Countries-Nigeria

Authors: Busayo Fashoto, Abdulhakeem Shaibu, Justice Agbadu, Samuel Aiyeoribe

Abstract:

Data has gone from just rows and columns to being an infrastructure itself. The traditional medium of data infrastructure has been managed by individuals in different industries and saved on personal work tools; one of such is the laptop. This hinders data sharing and Sustainable Development Goal (SDG) 9 for infrastructure sustainability across all countries and regions. However, there has been a constant demand for data across different agencies and ministries by investors and decision-makers. The rapid development and adoption of open-source technologies that promote the collection and processing of data in new ways and in ever-increasing volumes are creating new data infrastructure in sectors such as lands and health, among others. This paper examines the process of developing data infrastructure and, by extension, a data portal to provide baseline data for sustainable development and decision making in Nigeria. This paper employs the FAIR principle (Findable, Accessible, Interoperable, and Reusable) of data management using open-source technology tools to develop data portals for public use. eHealth Africa, an organization that uses technology to drive public health interventions in Nigeria, developed a data portal which is a typical data infrastructure that serves as a repository for various datasets on administrative boundaries, points of interest, settlements, social infrastructure, amenities, and others. This portal makes it possible for users to have access to datasets of interest at any point in time at no cost. A skeletal infrastructure of this data portal encompasses the use of open-source technology such as Postgres database, GeoServer, GeoNetwork, and CKan. These tools made the infrastructure sustainable, thus promoting the achievement of SDG 9 (Industries, Innovation, and Infrastructure). As of 6th August 2021, a wider cross-section of 8192 users had been created, 2262 datasets had been downloaded, and 817 maps had been created from the platform. This paper shows the use of rapid development and adoption of technologies that facilitates data collection, processing, and publishing in new ways and in ever-increasing volumes. In addition, the paper is explicit on new data infrastructure in sectors such as health, social amenities, and agriculture. Furthermore, this paper reveals the importance of cross-sectional data infrastructures for planning and decision making, which in turn can form a central data repository for sustainable development across developing countries.

Keywords: data portal, data infrastructure, open source, sustainability

Procedia PDF Downloads 98
24679 Formal Development of Electronic Identity Card System Using Event-B

Authors: Tomokazu Nagata, Jawid Ahmad Baktash

Abstract:

The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.

Keywords: eID, event-B, Pro-B, formal method, message passing

Procedia PDF Downloads 237
24678 Process Data-Driven Representation of Abnormalities for Efficient Process Control

Authors: Hyun-Woo Cho

Abstract:

Unexpected operational events or abnormalities of industrial processes have a serious impact on the quality of final product of interest. In terms of statistical process control, fault detection and diagnosis of processes is one of the essential tasks needed to run the process safely. In this work, nonlinear representation of process measurement data is presented and evaluated using a simulation process. The effect of using different representation methods on the diagnosis performance is tested in terms of computational efficiency and data handling. The results have shown that the nonlinear representation technique produced more reliable diagnosis results and outperforms linear methods. The use of data filtering step improved computational speed and diagnosis performance for test data sets. The presented scheme is different from existing ones in that it attempts to extract the fault pattern in the reduced space, not in the original process variable space. Thus this scheme helps to reduce the sensitivity of empirical models to noise.

Keywords: fault diagnosis, nonlinear technique, process data, reduced spaces

Procedia PDF Downloads 247
24677 Text-to-Speech in Azerbaijani Language via Transfer Learning in a Low Resource Environment

Authors: Dzhavidan Zeinalov, Bugra Sen, Firangiz Aslanova

Abstract:

Most text-to-speech models cannot operate well in low-resource languages and require a great amount of high-quality training data to be considered good enough. Yet, with the improvements made in ASR systems, it is now much easier than ever to collect data for the design of custom text-to-speech models. In this work, our work on using the ASR model to collect data to build a viable text-to-speech system for one of the leading financial institutions of Azerbaijan will be outlined. NVIDIA’s implementation of the Tacotron 2 model was utilized along with the HiFiGAN vocoder. As for the training, the model was first trained with high-quality audio data collected from the Internet, then fine-tuned on the bank’s single speaker call center data. The results were then evaluated by 50 different listeners and got a mean opinion score of 4.17, displaying that our method is indeed viable. With this, we have successfully designed the first text-to-speech model in Azerbaijani and publicly shared 12 hours of audiobook data for everyone to use.

Keywords: Azerbaijani language, HiFiGAN, Tacotron 2, text-to-speech, transfer learning, whisper

Procedia PDF Downloads 45
24676 An Empirical Evaluation of Performance of Machine Learning Techniques on Imbalanced Software Quality Data

Authors: Ruchika Malhotra, Megha Khanna

Abstract:

The development of change prediction models can help the software practitioners in planning testing and inspection resources at early phases of software development. However, a major challenge faced during the training process of any classification model is the imbalanced nature of the software quality data. A data with very few minority outcome categories leads to inefficient learning process and a classification model developed from the imbalanced data generally does not predict these minority categories correctly. Thus, for a given dataset, a minority of classes may be change prone whereas a majority of classes may be non-change prone. This study explores various alternatives for adeptly handling the imbalanced software quality data using different sampling methods and effective MetaCost learners. The study also analyzes and justifies the use of different performance metrics while dealing with the imbalanced data. In order to empirically validate different alternatives, the study uses change data from three application packages of open-source Android data set and evaluates the performance of six different machine learning techniques. The results of the study indicate extensive improvement in the performance of the classification models when using resampling method and robust performance measures.

Keywords: change proneness, empirical validation, imbalanced learning, machine learning techniques, object-oriented metrics

Procedia PDF Downloads 418
24675 Dynamic Balance and Functional Performance in Total Hip Arthroplasty

Authors: Mahmoud Ghazy, Ahmed R. Z. Baghdadi

Abstract:

Background: With the perceived pain and poor function experienced following total hip Arthroplasty (THA), patients usually feel un-satisfied. Methods: Thirty patients with THA (group I) and thirty indicated for arthroplasty but weren’t operated on yet (group II) participated in the study. The mean age was 54.53±3.44 and 55.33±2.32 years and BMI 35.7±3.03 and 35.73±1.03 kg/m2 for group I and III respectively. The Berg Balance Scale (BBS), Timed Up-and-Go (TUG) and Stair-Climbing (SC) tests were used for assessment. Assessments were conducted four weeks pre- and post-operatively and three months post-operatively with the control group being assessed at the same time intervals. The post-operative rehabilitation involved hospitalization (1st week), home-based (2nd-4th weeks), and outpatient clinic (5th-12th weeks) programs. Results: group I had significantly lower TUG and SC time compared with group II four weeks and three months post-operatively. Moreover, the BBS scores increased significantly and the pain scores and TUG and SC time decreased significantly four weeks and three months post-operatively compared with four weeks pre- operatively in group. But no significant differences in BBS scores four weeks and three months post-operatively in group I compared with group II. Interpretation/Conclusion : Patients with THA still have defects in proprioception, so they needs more concentration on proprioception training.

Keywords: dynamic balance, functional performance, hip arthroplasty, total

Procedia PDF Downloads 372
24674 Define Immersive Need Level for Optimal Adoption of Virtual Words with BIM Methodology

Authors: Simone Balin, Cecilia M. Bolognesi, Paolo Borin

Abstract:

In the construction industry, there is a large amount of data and interconnected information. To manage this information effectively, a transition to the immersive digitization of information processes is required. This transition is important to improve knowledge circulation, product quality, production sustainability and user satisfaction. However, there is currently a lack of a common definition of immersion in the construction industry, leading to misunderstandings and limiting the use of advanced immersive technologies. Furthermore, the lack of guidelines and a common vocabulary causes interested actors to abandon the virtual world after the first collaborative steps. This research aims to define the optimal use of immersive technologies in the AEC sector, particularly for collaborative processes based on the BIM methodology. Additionally, the research focuses on creating classes and levels to structure and define guidelines and a vocabulary for the use of the " Immersive Need Level." This concept, matured by recent technological advancements, aims to enable a broader application of state-of-the-art immersive technologies, avoiding misunderstandings, redundancies, or paradoxes. While the concept of "Informational Need Level" has been well clarified with the recent UNI EN 17412-1:2021 standard, when it comes to immersion, current regulations and literature only provide some hints about the technology and related equipment, leaving the procedural approach and the user's free interpretation completely unexplored. Therefore, once the necessary knowledge and information are acquired (Informational Need Level), it is possible to transition to an Immersive Need Level that involves the practical application of the acquired knowledge, exploring scenarios and solutions in a more thorough and detailed manner, with user involvement, via different immersion scales, in the design, construction or management process of a building or infrastructure. The need for information constitutes the basis for acquiring relevant knowledge and information, while the immersive need can manifest itself later, once a solid information base has been solidified, using the senses and developing immersive awareness. This new approach could solve the problem of inertia among AEC industry players in adopting and experimenting with new immersive technologies, expanding collaborative iterations and the range of available options.

Keywords: AECindustry, immersive technology (IMT), virtual reality, augmented reality, building information modeling (BIM), decision making, collaborative process, information need level, immersive level of need

Procedia PDF Downloads 99
24673 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 84
24672 The Characteristics of Islamic Concept In Contemporary Mosque Design With The Case Modulation of Study: Kauman Mosque Yogyakarta Indonesia

Authors: Sulihantoro, Muhamad Irga Fahreza

Abstract:

Age of onset of the crisis makes more advanced understanding of the values of Islam that has been etched in architectural design. The majority Muslim mosque architecture designing buildings when they designed the architecture of Islam has always stuck in a cultural symbol, the shape of the facade, carving calligraphy, and all things that are closely related to the culture of the Middle East. As well as the interpretation of symbols, by designing a dome in every mosque, calligraphy carvings inside the mosque, and the other elements in the building which is interpreted by middle eastern culture. So here we have a problem understanding the meaning of Islam with kaf fah (overall), which appears distorted understanding to distinguish between cultural values and theological in design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with a case study in Masjid Kauman Yogyakarta Indonesia. building characteristics focused on the function of the building, history, aesthetics, comfort, and safety. The results of this study should be found on the evaluation of the integrated design of contemporary mosques are based on a study of the Quran and Hadith.

Keywords: characteristics, Islamic concept, culture, Kauman Mosque

Procedia PDF Downloads 225
24671 Quality of Age Reporting from Tanzania 2012 Census Results: An Assessment Using Whipple’s Index, Myer’s Blended Index, and Age-Sex Accuracy Index

Authors: A. Sathiya Susuman, Hamisi F. Hamisi

Abstract:

Background: Many socio-economic and demographic data are age-sex attributed. However, a variety of irregularities and misstatement are noted with respect to age-related data and less to sex data because of its biological differences between the genders. Noting the misstatement/misreporting of age data regardless of its significance importance in demographics and epidemiological studies, this study aims at assessing the quality of 2012 Tanzania Population and Housing Census Results. Methods: Data for the analysis are downloaded from Tanzania National Bureau of Statistics. Age heaping and digit preference were measured using summary indices viz., Whipple’s index, Myers’ blended index, and Age-Sex Accuracy index. Results: The recorded Whipple’s index for both sexes was 154.43; male has the lowest index of about 152.65 while female has the highest index of about 156.07. For Myers’ blended index, the preferences were at digits ‘0’ and ‘5’ while avoidance were at digits ‘1’ and ‘3’ for both sexes. Finally, Age-sex index stood at 59.8 where sex ratio score was 5.82 and age ratio scores were 20.89 and 21.4 for males and female respectively. Conclusion: The evaluation of the 2012 PHC data using the demographic techniques has qualified the data inaccurate as the results of systematic heaping and digit preferences/avoidances. Thus, innovative methods in data collection along with measuring and minimizing errors using statistical techniques should be used to ensure accuracy of age data.

Keywords: age heaping, digit preference/avoidance, summary indices, Whipple’s index, Myer’s index, age-sex accuracy index

Procedia PDF Downloads 476
24670 Exploring the Prevailing Unfairness in Muslim Marriage and Divorce Laws in Singapore's Dual Court System

Authors: J. Jayaletchmi

Abstract:

In seeking to manage a multiracial and multi-religious society, Singapore provides a unique solution – a dual court system whereby a common law system co-exists with a Syariah law system that administers Syariah law for the Muslim population. In this respect, Singapore seems to provide a feasible example of legal pluralism to countries grappling with a burgeoning Muslim population. However, problems have arisen regarding this peaceful coexistence of secular and religious laws that seek to balance the rights of women and religious freedom. Singapore’s interpretation of Syariah law in the context of marriage and divorce has resulted in certain inequalities for Muslim women, which are exemplified in light of the Women’s Charter, a landmark piece of legislation which provides the legal basis for equity between husband and wife, but excludes Muslims from its ambit. The success of Singapore’s dual court system has largely been at the expense of Muslim women’s rights, and, as a result, the Muslim community as a whole has begun trailing behind the progressive society it forms a part of. This paper explores the prevailing unfairness of rules governing Muslim marriage and divorce in Singapore, and puts forth bold reforms.

Keywords: legal pluralism, Singapore, Syariah law, women’s rights

Procedia PDF Downloads 254
24669 Maternal Adverse Childhood Experiences and Preschool Children’s Behavioural Problems: Mediation via Adult Attachment and Moderation by Maternal Mental Health, Social Support, and Child Sex

Authors: Stefan Kurbatfinski, Aliyah Dosani, Andrew F. Hayes, Deborah Dewey, Nicole Letourneau

Abstract:

Background: Maternal adverse childhood experiences (ACEs) have been associated with internalizing and externalizing behavioral problems in preschool children. However, little is known about the influence of maternal adult attachment patterns on this association. Further, potential moderation by maternal mental health, maternal social support, or child sex is poorly understood. Therefore, this study examined associations between 1) maternal ACEs and preschool children’s behavioural problems, with mediation through maternal attachment patterns and moderation by maternal mental health, maternal social support, and child sex; and 2) maternal attachment patterns and children’s behavioural problems, with mediation through maternal mental health and social support and moderation by child sex. Methods: This secondary analysis used data (n=625) from a high socioeconomic, longitudinally prospective cohort (Alberta Pregnancy Outcomes and Nutrition). Child behaviour (BASC-2) and maternal adult attachment (ECR-Q) were measured at five years of child age, maternal ACEs (ACEs Questionnaire) at around 12 months, and maternal mental health (CESD and SCL-90-R) and social support (SSQ) across various prenatal and postnatal time points. All moderation and mediation analyses occurred through RStudio using PROCESS, interpreting significant interactions through Johnson-Neyman plots. Findings: Maternal ACEs interacted with maternal anxiety symptoms to predict both behavioural problems (pexternalizing=0.007; pinternalizing=0.0159). An indirect pathway via dismissive attachment was moderated by maternal social support ([0.0058, 0.0596]). Attachment patterns predicted all behavioural problems (p<0.05) and interacted with maternal anxiety symptoms to predict internalizing behaviours among male children ([0.0321, 0.1307]; [0.0321, 0.1291]). Interpretation: Maternal attachment patterns may predict children’s behavioural problems more than ACEs. Social support interventions may not always be beneficial for highly dismissively attached mothers. Implications for policy and child health include mandatory sex and gender education for teachers; assessing attachment patterns prior to recommending social support as an intervention; and anxiety-focused interventions for mothers in higher socioeconomic populations.

Keywords: maternal adverse childhood experiences, internalizing behaviours, externalizing behaviours, mediators and moderators, attachment patterns, child health

Procedia PDF Downloads 71
24668 Social Enterprise Strategies for Financial Sustainability in the Economic Literature

Authors: Adam Bereczk

Abstract:

Due to persistent socioeconomic problems regarding sustainability and labour market equilibrium in Europe, the subjects of social economy gained considerable academic attention recently. At the meantime, social enterprises pursuing the double bottom line criteria, struggling to find the proper management philosophies and strategies to make their social purpose business financially sustainable. Despite the strategic management literature was developed mainly on the bases of large corporations, in the past years, the interpretation of strategy concepts became a frequent topic in scientific discussions in the case of small and medium-sized enterprises also. The topic of strategic orientations is a good example of the trend. However, less is known about the case of social enterprises, despite the fact, the majority of them are small businesses engaged in real business activities. The main purpose of this work is to give a comprehensive summary of different perspectives regarding the interpretations of strategic orientations of social enterprises. The novelty of this work is it shows the previous outcomes and models of scholars from various fields of economic science who tried to intertwine the two spheres in different forms, methodize the findings and draw attention to the shortcomings.

Keywords: social enterprises, business sustainability, strategic orientations, literature review

Procedia PDF Downloads 278
24667 Mechanical and Hydraulic Behavior of Arid Zone Soils Treated with Lime: Case of Abadla, Bechar Clays, South of Algeria

Authors: Sadek Younes, Fali Leyla, Rikioui Tayeb, Zizouni Khaled

Abstract:

Stabilization of clay with lime as bearing stratum is an alternative to replacement of original soil. By adding lime to clay soil, the soil workability is improved due to the combination of calcium ions to the clay minerals, which means, modified soil properties. The paper investigates the effect of hydrated lime on the behaviour of lime treated, arid zones clay (Abadla Clay). A number of mechanical and hydraulic tests were performed to identify the effect of lime dosage and compaction water content on the compressibility, permeability, and shear strength parameters of the soil. Test results show that the soil parameters can be improved through additives such as lime. Overall, the addition percentages of 6% and 9% lime give the best desired results. Also, results revealed that the compressibility behavior of lime-treated soil strongly affected by lime content. The results are presented in terms of modern interpretation of the behaviour of treated soils, in comparison with the parameters of the untreated soil.

Keywords: arid zones, compressibility, lime, soil behaviour, soil stabilization, unsaturated soil

Procedia PDF Downloads 180
24666 Jurisprudencial Analysis of Torture in Spain and in the European Human Rights System

Authors: María José Benítez Jiménez

Abstract:

Article 3 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (E.C.H.R.) proclaims that no one may be subjected to torture, punishment or degrading treatment. The legislative correlate in Spain is embodied in Article 15 of the Spanish Constitution, and there must be an overlapping interpretation of both precepts on the ideal plane. While it is true that there are not many cases in which the European Court of Human Rights (E.C.t.H.R. (The Strasbourg Court)) has sanctioned Spain for its failure to investigate complaints of torture, it must be emphasized that the tendency to violate Article 3 of the Convention appears to be on the rise, being necessary to know possible factors that may be affecting it. This paper addresses the analysis of sentences that directly or indirectly reveal the violation of Article 3 of the European Convention. To carry out the analysis, sentences of the Strasbourg Court have been consulted from 2012 to 2016, being able to address any previous sentences to this period if it provided justified information necessary for the study. After the review it becomes clear that there are two key groups of subjects that request a response to the Strasbourg Court on the understanding that they have been tortured or degradingly treated. These are: immigrants and terrorists. Both phenomena, immigration and terrorism, respond to patterns that have mutated in recent years, and it is important for this study to know if national regulations begin to be dysfunctional.

Keywords: E.C.H.R., E.C.t.H.R. sentences, Spanish Constitution, torture

Procedia PDF Downloads 160
24665 Model for Introducing Products to New Customers through Decision Tree Using Algorithm C4.5 (J-48)

Authors: Komol Phaisarn, Anuphan Suttimarn, Vitchanan Keawtong, Kittisak Thongyoun, Chaiyos Jamsawang

Abstract:

This article is intended to analyze insurance information which contains information on the customer decision when purchasing life insurance pay package. The data were analyzed in order to present new customers with Life Insurance Perfect Pay package to meet new customers’ needs as much as possible. The basic data of insurance pay package were collect to get data mining; thus, reducing the scattering of information. The data were then classified in order to get decision model or decision tree using Algorithm C4.5 (J-48). In the classification, WEKA tools are used to form the model and testing datasets are used to test the decision tree for the accurate decision. The validation of this model in classifying showed that the accurate prediction was 68.43% while 31.25% were errors. The same set of data were then tested with other models, i.e. Naive Bayes and Zero R. The results showed that J-48 method could predict more accurately. So, the researcher applied the decision tree in writing the program used to introduce the product to new customers to persuade customers’ decision making in purchasing the insurance package that meets the new customers’ needs as much as possible.

Keywords: decision tree, data mining, customers, life insurance pay package

Procedia PDF Downloads 428
24664 Exploring the Role of Data Mining in Crime Classification: A Systematic Literature Review

Authors: Faisal Muhibuddin, Ani Dijah Rahajoe

Abstract:

This in-depth exploration, through a systematic literature review, scrutinizes the nuanced role of data mining in the classification of criminal activities. The research focuses on investigating various methodological aspects and recent developments in leveraging data mining techniques to enhance the effectiveness and precision of crime categorization. Commencing with an exposition of the foundational concepts of crime classification and its evolutionary dynamics, this study details the paradigm shift from conventional methods towards approaches supported by data mining, addressing the challenges and complexities inherent in the modern crime landscape. Specifically, the research delves into various data mining techniques, including K-means clustering, Naïve Bayes, K-nearest neighbour, and clustering methods. A comprehensive review of the strengths and limitations of each technique provides insights into their respective contributions to improving crime classification models. The integration of diverse data sources takes centre stage in this research. A detailed analysis explores how the amalgamation of structured data (such as criminal records) and unstructured data (such as social media) can offer a holistic understanding of crime, enriching classification models with more profound insights. Furthermore, the study explores the temporal implications in crime classification, emphasizing the significance of considering temporal factors to comprehend long-term trends and seasonality. The availability of real-time data is also elucidated as a crucial element in enhancing responsiveness and accuracy in crime classification.

Keywords: data mining, classification algorithm, naïve bayes, k-means clustering, k-nearest neigbhor, crime, data analysis, sistematic literature review

Procedia PDF Downloads 66
24663 Assessing Supply Chain Performance through Data Mining Techniques: A Case of Automotive Industry

Authors: Emin Gundogar, Burak Erkayman, Nusret Sazak

Abstract:

Providing effective management performance through the whole supply chain is critical issue and hard to applicate. The proper evaluation of integrated data may conclude with accurate information. Analysing the supply chain data through OLAP (On-Line Analytical Processing) technologies may provide multi-angle view of the work and consolidation. In this study, association rules and classification techniques are applied to measure the supply chain performance metrics of an automotive manufacturer in Turkey. Main criteria and important rules are determined. The comparison of the results of the algorithms is presented.

Keywords: supply chain performance, performance measurement, data mining, automotive

Procedia PDF Downloads 513
24662 Multimodal Data Fusion Techniques in Audiovisual Speech Recognition

Authors: Hadeer M. Sayed, Hesham E. El Deeb, Shereen A. Taie

Abstract:

In the big data era, we are facing a diversity of datasets from different sources in different domains that describe a single life event. These datasets consist of multiple modalities, each of which has a different representation, distribution, scale, and density. Multimodal fusion is the concept of integrating information from multiple modalities in a joint representation with the goal of predicting an outcome through a classification task or regression task. In this paper, multimodal fusion techniques are classified into two main classes: model-agnostic techniques and model-based approaches. It provides a comprehensive study of recent research in each class and outlines the benefits and limitations of each of them. Furthermore, the audiovisual speech recognition task is expressed as a case study of multimodal data fusion approaches, and the open issues through the limitations of the current studies are presented. This paper can be considered a powerful guide for interested researchers in the field of multimodal data fusion and audiovisual speech recognition particularly.

Keywords: multimodal data, data fusion, audio-visual speech recognition, neural networks

Procedia PDF Downloads 112