Search results for: data analyses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27402

Search results for: data analyses

26232 Mapping Tunnelling Parameters for Global Optimization in Big Data via Dye Laser Simulation

Authors: Sahil Imtiyaz

Abstract:

One of the biggest challenges has emerged from the ever-expanding, dynamic, and instantaneously changing space-Big Data; and to find a data point and inherit wisdom to this space is a hard task. In this paper, we reduce the space of big data in Hamiltonian formalism that is in concordance with Ising Model. For this formulation, we simulate the system using dye laser in FORTRAN and analyse the dynamics of the data point in energy well of rhodium atom. After mapping the photon intensity and pulse width with energy and potential we concluded that as we increase the energy there is also increase in probability of tunnelling up to some point and then it starts decreasing and then shows a randomizing behaviour. It is due to decoherence with the environment and hence there is a loss of ‘quantumness’. This interprets the efficiency parameter and the extent of quantum evolution. The results are strongly encouraging in favour of the use of ‘Topological Property’ as a source of information instead of the qubit.

Keywords: big data, optimization, quantum evolution, hamiltonian, dye laser, fermionic computations

Procedia PDF Downloads 194
26231 Study of Surface Water Quality in the Wadi El Harrach for Its Use in the Artificial Groundwater Recharge of the Mitidja, North Algeria

Authors: M. Meddi, A. Boufekane

Abstract:

The Mitidja coastal groundwater which extends over an area of 1450 km2 is a strategic resource in the Algiers region. The high dependence of the regional economy on the use of this groundwater forces us to have recourse to its artificial recharge from the Wadi El Harrach in its upstream part. This system of artificial recharge has shown its effectiveness in the development of water resource mentioned in the succeeding works in several regions of the world. The objective of this study is to: Increase the reserves of water inputs by infiltration, raise the water level and its good quality in wells and boreholes, reduce losses to the sea, and address seawater intrusion by maintaining balance in the freshwater-saltwater interface in the downstream part of the groundwater basin. After analyzing the situation, it was noticed that a qualitative monitoring of the Wadi water for the groundwater recharge has to be done. For this purpose, we proceeded during three successive years (2010, 2011, and 2012) to the monthly sampling of water in the upstream part of the Wadi El Harrach for chemical analysis. The variation of the sediment transport concentration will be also measured. This monitoring aims to characterize the water quality and avoid clogging in the proposed recharge area. The results of these analyses showed the good chemical quality according to the analyses we performed in the laboratory during the three years, but they are too loaded with suspended matters. We noticed that these fine particles come from the grinding of limestone of sandpit located upstream of the area of the proposed recharge system. This problem can be solved by a water supply upstream of sandpit. For the recharge, we propose the method of using two wells for dual use, which means that it can be used for water supply and extraction. This solution is inexpensive in our case and could easily be used as wells are already drilled in the upstream part. This solution increases over time the piezometric level and also reduce groundwater contamination by saltwater in the downstream part.

Keywords: water quality, artificial groundwater recharge, Mitidja, North Algeria

Procedia PDF Downloads 287
26230 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 192
26229 Investigation on Performance of Change Point Algorithm in Time Series Dynamical Regimes and Effect of Data Characteristics

Authors: Farhad Asadi, Mohammad Javad Mollakazemi

Abstract:

In this paper, Bayesian online inference in models of data series are constructed by change-points algorithm, which separated the observed time series into independent series and study the change and variation of the regime of the data with related statistical characteristics. variation of statistical characteristics of time series data often represent separated phenomena in the some dynamical system, like a change in state of brain dynamical reflected in EEG signal data measurement or a change in important regime of data in many dynamical system. In this paper, prediction algorithm for studying change point location in some time series data is simulated. It is verified that pattern of proposed distribution of data has important factor on simpler and smother fluctuation of hazard rate parameter and also for better identification of change point locations. Finally, the conditions of how the time series distribution effect on factors in this approach are explained and validated with different time series databases for some dynamical system.

Keywords: time series, fluctuation in statistical characteristics, optimal learning, change-point algorithm

Procedia PDF Downloads 427
26228 The Effect of Interpersonal Relationships on Eating Patterns and Physical Activity among Asian-American and European-American Adolescents

Authors: Jamil Lane, Jason Freeman

Abstract:

Background: The role of interpersonal relationships is vital predictors of adolescents’ eating habits, exercise activity, and health problems including obesity. The effect of interpersonal relationships (i.e. family, friends, and intimate partners) on individual health behaviors and development have gained considerable attention during the past 10 years. Teenagers eating habits and exercise activities are established through a dynamic course involving internal and external factors such as food preferences, body weight perception, and parental and peer influence. When conceptualizing one’s interpersonal relationships, it is important to understand that how one relates to others is shaped by their culture. East-Asian culture has been characterized as collectivistic, which describes the significant role intergroup relationships play in their construction of the self. Cultures found in North America, on the other hand, can be characterized as individualistic, meaning that these cultures encourage individuals to prioritize their interest over the needs and want of their compatriots. Individuals from collectivistic cultures typically have stronger boundaries between in-group and out-group membership, whereas those from individualistic cultures see themselves as distinct and separate from strangers as well as family or friends. Objective: The purpose of this study is to examine the effect of collectivism and individualism on interpersonal relationships that shapes eating patterns and physical activity among Asian-American and European-American adolescents. Design/Methods: Analyses were based on data from the National Longitudinal Study of Adolescent Health, a nationally representative sample of adolescents in the United States who were surveyed from 1994 through 2008. This data will be used to examine interpersonal relationship factors that shape dietary intake and physical activity patterns within the Asian-American and European-American population in the United States. Factors relating to relationship strength, eating, and exercise behaviors were reported by participants in this first wave of data collection (1995). We plan to analyze our data using intragroup comparisons among those who identified as 'Asian-American' (n = 270) and 'White or European American' (n = 4,294) among the domains of positivity of peer influence and level of physical activity / healthy eating. Further, intergroup comparisons of these relationships will be made to extricate how the role positive peer influence in maintaining healthy eating and exercise habits differs with cultural variation. Results: We hypothesize that East-Asian participants with a higher degree of positivity in their peer and family relationships will experience a significantly greater rise in healthy eating and exercise behaviors than European-American participants with similar degrees of relationship positivity.

Keywords: interpersonal relationships, eating patterns, physical activity, adolescent health

Procedia PDF Downloads 198
26227 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 356
26226 Bayesian Borrowing Methods for Count Data: Analysis of Incontinence Episodes in Patients with Overactive Bladder

Authors: Akalu Banbeta, Emmanuel Lesaffre, Reynaldo Martina, Joost Van Rosmalen

Abstract:

Including data from previous studies (historical data) in the analysis of the current study may reduce the sample size requirement and/or increase the power of analysis. The most common example is incorporating historical control data in the analysis of a current clinical trial. However, this only applies when the historical control dataare similar enough to the current control data. Recently, several Bayesian approaches for incorporating historical data have been proposed, such as the meta-analytic-predictive (MAP) prior and the modified power prior (MPP) both for single control as well as for multiple historical control arms. Here, we examine the performance of the MAP and the MPP approaches for the analysis of (over-dispersed) count data. To this end, we propose a computational method for the MPP approach for the Poisson and the negative binomial models. We conducted an extensive simulation study to assess the performance of Bayesian approaches. Additionally, we illustrate our approaches on an overactive bladder data set. For similar data across the control arms, the MPP approach outperformed the MAP approach with respect to thestatistical power. When the means across the control arms are different, the MPP yielded a slightly inflated type I error (TIE) rate, whereas the MAP did not. In contrast, when the dispersion parameters are different, the MAP gave an inflated TIE rate, whereas the MPP did not.We conclude that the MPP approach is more promising than the MAP approach for incorporating historical count data.

Keywords: count data, meta-analytic prior, negative binomial, poisson

Procedia PDF Downloads 118
26225 Strategic Citizen Participation in Applied Planning Investigations: How Planners Use Etic and Emic Community Input Perspectives to Fill-in the Gaps in Their Analysis

Authors: John Gaber

Abstract:

Planners regularly use citizen input as empirical data to help them better understand community issues they know very little about. This type of community data is based on the lived experiences of local residents and is known as "emic" data. What is becoming more common practice for planners is their use of data from local experts and stakeholders (known as "etic" data or the outsider perspective) to help them fill in the gaps in their analysis of applied planning research projects. Utilizing international Health Impact Assessment (HIA) data, I look at who planners invite to their citizen input investigations. Research presented in this paper shows that planners access a wide range of emic and etic community perspectives in their search for the “community’s view.” The paper concludes with how planners can chart out a new empirical path in their execution of emic/etic citizen participation strategies in their applied planning research projects.

Keywords: citizen participation, emic data, etic data, Health Impact Assessment (HIA)

Procedia PDF Downloads 484
26224 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network

Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang

Abstract:

As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.

Keywords: GUI, deep learning, GAN, data augmentation

Procedia PDF Downloads 184
26223 Modelling Rainfall-Induced Shallow Landslides in the Northern New South Wales

Authors: S. Ravindran, Y.Liu, I. Gratchev, D.Jeng

Abstract:

Rainfall-induced shallow landslides are more common in the northern New South Wales (NSW), Australia. From 2009 to 2017, around 105 rainfall-induced landslides occurred along the road corridors and caused temporary road closures in the northern NSW. Rainfall causing shallow landslides has different distributions of rainfall varying from uniform, normal, decreasing to increasing rainfall intensity. The duration of rainfall varied from one day to 18 days according to historical data. The objective of this research is to analyse slope instability of some of the sites in the northern NSW by varying cumulative rainfall using SLOPE/W and SEEP/W and compare with field data of rainfall causing shallow landslides. The rainfall data and topographical data from public authorities and soil data obtained from laboratory tests will be used for this modelling. There is a likelihood of shallow landslides if the cumulative rainfall is between 100 mm to 400 mm in accordance with field data.

Keywords: landslides, modelling, rainfall, suction

Procedia PDF Downloads 180
26222 Machine Learning-Enabled Classification of Climbing Using Small Data

Authors: Nicholas Milburn, Yu Liang, Dalei Wu

Abstract:

Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.

Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence

Procedia PDF Downloads 143
26221 Malignancy in Venous Thromboembolism

Authors: Naser Shagerdi Esmaeli, Mohsen Hamidpour

Abstract:

Purposes: The activation of coagulation in patients with cancer contributes significantly to morbidity and mortality rates and may play a fundamental role in the host response to growing tumor’s. Patients with cancer are clearly at high risk for the development of venous thromboembolism (VTE), particularly during chemotherapy and surgery. This situation is aggravated by the use of venous access catheters and possibly growth factors. Methods: Data derived from large, randomized, controlled trials have been used to determine the true incidence of this complication of cancer and its treatment. The incidence based on the analyses of these randomized controlled trials varies from 1% for limited stage patients with breast cancer treated with tamoxifen to 60% for patients with any type of cancer who are subjected to orthopedic surgery and do not receive prophylactic therapy. Results: In view of the morbidity and mortality attributable to VTE in cancer, widespread utilization of prophylactic anticoagulation therapy, which has proven safe and effective in a variety of situations, should be considered. While migratory thrombophlebitis is a clear indicator of an underlying neoplasm, the risk of cancer in patients with the more typical form of VTE has been the subject of intense debate over recent years. Conclusion: Some investigators have suggested that the relative risk of being diagnosed with occult cancer within six months of an episode of VTE (particularly recurrent VTE) could be up to 10-fold. However, the cost-effectiveness of aggressive screening for cancer in patients with VTE has not yet been defined adequately.

Keywords: venous thromboembolism, malignancy, cancer, tumor, heparin

Procedia PDF Downloads 94
26220 Thermal Ageing of a 316 Nb Stainless Steel: From Mechanical and Microstructural Analyses to Thermal Ageing Models for Long Time Prediction

Authors: Julien Monnier, Isabelle Mouton, Francois Buy, Adrien Michel, Sylvain Ringeval, Joel Malaplate, Caroline Toffolon, Bernard Marini, Audrey Lechartier

Abstract:

Chosen to design and assemble massive components for nuclear industry, the 316 Nb austenitic stainless steel (also called 316 Nb) suits well this function thanks to its mechanical, heat and corrosion handling properties. However, these properties might change during steel’s life due to thermal ageing causing changes within its microstructure. Our main purpose is to determine if the 316 Nb will keep its mechanical properties after an exposition to industrial temperatures (around 300 °C) during a long period of time (< 10 years). The 316 Nb is composed by different phases, which are austenite as main phase, niobium-carbides, and ferrite remaining from the ferrite to austenite transformation during the process. Our purpose is to understand thermal ageing effects on the material microstructure and properties and to submit a model predicting the evolution of 316 Nb properties as a function of temperature and time. To do so, based on Fe-Cr and 316 Nb phase diagrams, we studied the thermal ageing of 316 Nb steel alloys (1%v of ferrite) and welds (10%v of ferrite) for various temperatures (350, 400, and 450 °C) and ageing time (from 1 to 10.000 hours). Higher temperatures have been chosen to reduce thermal treatment time by exploiting a kinetic effect of temperature on 316 Nb ageing without modifying reaction mechanisms. Our results from early times of ageing show no effect on steel’s global properties linked to austenite stability, but an increase of ferrite hardness during thermal ageing has been observed. It has been shown that austenite’s crystalline structure (cfc) grants it a thermal stability, however, ferrite crystalline structure (bcc) favours iron-chromium demixion and formation of iron-rich and chromium-rich phases within ferrite. Observations of thermal ageing effects on ferrite’s microstructure were necessary to understand the changes caused by the thermal treatment. Analyses have been performed by using different techniques like Atomic Probe Tomography (APT) and Differential Scanning Calorimetry (DSC). A demixion of alloy’s elements leading to formation of iron-rich (α phase, bcc structure), chromium-rich (α’ phase, bcc structure), and nickel-rich (fcc structure) phases within the ferrite have been observed and associated to the increase of ferrite’s hardness. APT results grant information about phases’ volume fraction and composition, allowing to associate hardness measurements to the volume fractions of the different phases and to set up a way to calculate α’ and nickel-rich particles’ growth rate depending on temperature. The same methodology has been applied to DSC results, which allowed us to measure the enthalpy of α’ phase dissolution between 500 and 600_°C. To resume, we started from mechanical and macroscopic measurements and explained the results through microstructural study. The data obtained has been match to CALPHAD models’ prediction and used to improve these calculations and employ them to predict 316 Nb properties’ change during the industrial process.

Keywords: stainless steel characterization, atom probe tomography APT, vickers hardness, differential scanning calorimetry DSC, thermal ageing

Procedia PDF Downloads 93
26219 Analysis of Expression Data Using Unsupervised Techniques

Authors: M. A. I Perera, C. R. Wijesinghe, A. R. Weerasinghe

Abstract:

his study was conducted to review and identify the unsupervised techniques that can be employed to analyze gene expression data in order to identify better subtypes of tumors. Identifying subtypes of cancer help in improving the efficacy and reducing the toxicity of the treatments by identifying clues to find target therapeutics. Process of gene expression data analysis described under three steps as preprocessing, clustering, and cluster validation. Feature selection is important since the genomic data are high dimensional with a large number of features compared to samples. Hierarchical clustering and K Means are often used in the analysis of gene expression data. There are several cluster validation techniques used in validating the clusters. Heatmaps are an effective external validation method that allows comparing the identified classes with clinical variables and visual analysis of the classes.

Keywords: cancer subtypes, gene expression data analysis, clustering, cluster validation

Procedia PDF Downloads 149
26218 Learning Analytics in a HiFlex Learning Environment

Authors: Matthew Montebello

Abstract:

Student engagement within a virtual learning environment generates masses of data points that can significantly contribute to the learning analytics that lead to decision support. Ideally, similar data is collected during student interaction with a physical learning space, and as a consequence, data is present at a large scale, even in relatively small classes. In this paper, we report of such an occurrence during classes held in a HiFlex modality as we investigate the advantages of adopting such a methodology. We plan to take full advantage of the learner-generated data in an attempt to further enhance the effectiveness of the adopted learning environment. This could shed crucial light on operating modalities that higher education institutions around the world will switch to in a post-COVID era.

Keywords: HiFlex, big data in higher education, learning analytics, virtual learning environment

Procedia PDF Downloads 201
26217 Friend or Foe: Decoding the Legal Challenges Posed by Artificial Intellegence in the Era of Intellectual Property

Authors: Latika Choudhary

Abstract:

“The potential benefits of Artificial Intelligence are huge, So are the dangers.” - Dave Water. Artificial intelligence is one of the facet of Information technology domain which despite several attempts does not have a clear definition or ambit. However it can be understood as technology to solve problems via automated decisions and predictions. Artificial intelligence is essentially an algorithm based technology which analyses the large amounts of data and then solves problems by detecting useful patterns. Owing to its automated feature it will not be wrong to say that humans & AI have more utility than humans alone or computers alone.1 For many decades AI experienced enthusiasm as well as setbacks, yet it has today become part and parcel of our everyday life, making it convenient or at times problematic. AI and related technology encompass Intellectual Property in multiple ways, the most important being AI technology for management of Intellectual Property, IP for protecting AI and IP as a hindrance to the transparency of AI systems. Thus the relationship between the two is of reciprocity as IP influences AI and vice versa. While AI is a recent concept, the IP laws for protection or even dealing with its challenges are relatively older, raising the need for revision to keep up with the pace of technological advancements. This paper will analyze the relationship between AI and IP to determine how beneficial or conflictual the same is, address how the old concepts of IP are being stretched to its maximum limits so as to accommodate the unwanted consequences of the Artificial Intelligence and propose ways to mitigate the situation so that AI becomes the friend it is and not turn into a potential foe it appears to be.

Keywords: intellectual property rights, information technology, algorithm, artificial intelligence

Procedia PDF Downloads 87
26216 Li-Fi Technology: Data Transmission through Visible Light

Authors: Shahzad Hassan, Kamran Saeed

Abstract:

People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.

Keywords: communication, LED, Li-Fi, Wi-Fi

Procedia PDF Downloads 347
26215 Cognitive Stereotype Behaviors and Their Imprinting on the Individuals with Autism

Authors: Li-Ju Chen, Hsiang-Lin Chan, Hsin-Yi Kathy Cheng, Hui-Ju Chen

Abstract:

Stereotype behavior is one of the maladaptive syndromes of the individuals with autism. Most of the previous researches focused on the stereotype behavior with stimulating type, while less on the stereotype behavior about cognition (This research names it cognitive stereotype behavior; CSB). This research explored CSB and the rationality to explain CSB with imprinting phenomenon. After excluding the samples without CSB described, the data that came from 271 individuals with autism were recruited and analyzed with quantitative and qualitative analyses. This research discovers that : (1) Most of the individuals with autism originally came out CSB at 3 years old and more than a half of them appeared before 4 years old; The average age which firstly came out CSB was 6.10 years old, the average time insisting or ossifying CSB was 31.71 minutes each time and the average longest time which they last was 358.35 minutes (5.97 hours). (2) CSB demonstrates various aspects, this research classified them into 4 fields with 26 categories. They were categorized into sudden CSB or habitual CSB by imprinting performance. (3) Most of the autism commented that their CSBs were not necessary but they could not control them well. One-third of them appeared CSB suddenly and the first occurrence accompanied a strong emotional or behavioral response. (4) Whether respondent is the person with autism himself/herself or not was the critical element: on the awareness of the severity degree, disturbance degree, and the emotional /behavioral intensity at the first-time CSB happened. This study concludes imprinting could reasonably explain the phenomenon CSB forms. There are implications leading the individuals with autism and their family to develop coping strategies to promote individuals with autism having a better learning accomplishment and life quality in their future.

Keywords: autism, cognitive stereotype behavior, constructivism, imprinting, stereotype

Procedia PDF Downloads 130
26214 A Critical Discourse Analysis of Protesters in the Debates of Al Jazeera Channel of the Yemeni Revolution

Authors: Raya Sulaiman

Abstract:

Critical discourse analysis investigates how discourse is used to abuse power relationships. Political debates constitute discourses which mirror aspects of ideologies. The Arab world has been one of the most unsettled zones in the world and has dominated global politics due to the Arab revolutions which started in 2010. This study aimed at uncovering the ideological intentions in the formulation and circulation of hegemonic political ideology in the TV political debates of the 2011 to 2012 Yemen revolution, how ideology was used as a tool of hegemony. The study specifically examined the ideologies associated with the use of protesters as a social actor. Data of the study consisted of four debates (17350 words) from four live debate programs: The Opposite Direction, In Depth, Behind the News and the Revolution Talk that were staged at Al Jazeera TV channel between 2011 and 2012. Data was readily transcribed by Al Jazeera online. Al Jazeera was selected for the study because it is the most popular TV network in the Arab world and has a strong presence, especially during the Arab revolutions. Al Jazeera has also been accused of inciting protests across the Arab region. Two debate sites were identified in the data: government and anti-government. The government side represented the president Ali Abdullah Saleh and his regime while the anti-government side represented the gathering squares who demanded the president to ‘step down’. The study analysed verbal discourse aspects of the debates using critical discourse analysis: aspects from the Social Actor Network model of van Leeuwen. This framework provides a step-by-step analysis model, and analyses discourse from specific grammatical processes into broader semantic issues. It also provides representative findings since it considers discourse as representative and reconstructed in social practice. Study findings indicated that Al Jazeera and the anti-government had similarities in terms of the ideological intentions related to the protesters. Al Jazeera victimized and incited the protesters which were similar to the anti-government. Al Jazeera used assimilation, nominalization, and active role allocation as the linguistic aspects in order to reach its ideological intentions related to the protesters. Government speakers did not share the same ideological intentions with Al Jazeera. Study findings indicated that Al Jazeera had excluded the government from its debates causing a violation to its slogan, the opinion, and the other opinion. This study implies the powerful role of discourse in shaping ideological media intentions and influencing the media audience.

Keywords: Al Jazeera network, critical discourse analysis, ideology, Yemeni revolution

Procedia PDF Downloads 224
26213 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 92
26212 An Approach for Estimation in Hierarchical Clustered Data Applicable to Rare Diseases

Authors: Daniel C. Bonzo

Abstract:

Practical considerations lead to the use of unit of analysis within subjects, e.g., bleeding episodes or treatment-related adverse events, in rare disease settings. This is coupled with data augmentation techniques such as extrapolation to enlarge the subject base. In general, one can think about extrapolation of data as extending information and conclusions from one estimand to another estimand. This approach induces hierarchichal clustered data with varying cluster sizes. Extrapolation of clinical trial data is being accepted increasingly by regulatory agencies as a means of generating data in diverse situations during drug development process. Under certain circumstances, data can be extrapolated to a different population, a different but related indication, and different but similar product. We consider here the problem of estimation (point and interval) using a mixed-models approach under an extrapolation. It is proposed that estimators (point and interval) be constructed using weighting schemes for the clusters, e.g., equally weighted and with weights proportional to cluster size. Simulated data generated under varying scenarios are then used to evaluate the performance of this approach. In conclusion, the evaluation result showed that the approach is a useful means for improving statistical inference in rare disease settings and thus aids not only signal detection but risk-benefit evaluation as well.

Keywords: clustered data, estimand, extrapolation, mixed model

Procedia PDF Downloads 136
26211 Ground Response Analyses in Budapest Based on Site Investigations and Laboratory Measurements

Authors: Zsolt Szilvágyi, Jakub Panuska, Orsolya Kegyes-Brassai, Ákos Wolf, Péter Tildy, Richard P. Ray

Abstract:

Near-surface loose sediments and local ground conditions in general have a major influence on seismic response of structures. It is a difficult task to model ground behavior in seismic soil-structure-foundation interaction problems, fully account for them in seismic design of structures, or even properly consider them in seismic hazard assessment. In this study, we focused on applying seismic soil investigation methods, used for determining soil stiffness and damping properties, to response analysis used in seismic design. A site in Budapest, Hungary was investigated using Multichannel Analysis of Surface Waves, Seismic Cone Penetration Tests, Bender Elements, Resonant Column and Torsional Shear tests. Our aim was to compare the results of the different test methods and use the resulting soil properties for 1D ground response analysis. Often in practice, there are little-to no data available on dynamic soil properties and estimated parameters are used for design. Therefore, a comparison is made between results based on estimated parameters and those based on detailed investigations. Ground response results are also compared to Eurocode 8 design spectra.

Keywords: MASW, resonant column test, SCPT, site response analysis, torsional shear test

Procedia PDF Downloads 400
26210 Authorization of Commercial Communication Satellite Grounds for Promoting Turkish Data Relay System

Authors: Celal Dudak, Aslı Utku, Burak Yağlioğlu

Abstract:

Uninterrupted and continuous satellite communication through the whole orbit time is becoming more indispensable every day. Data relay systems are developed and built for various high/low data rate information exchanges like TDRSS of USA and EDRSS of Europe. In these missions, a couple of task-dedicated communication satellites exist. In this regard, for Turkey a data relay system is attempted to be defined exchanging low data rate information (i.e. TTC) for Earth-observing LEO satellites appointing commercial GEO communication satellites all over the world. First, justification of this attempt is given, demonstrating duration enhancements in the link. Discussion of preference of RF communication is, also, given instead of laser communication. Then, preferred communication GEOs – including TURKSAT4A already belonging to Turkey- are given, together with the coverage enhancements through STK simulations and the corresponding link budget. Also, a block diagram of the communication system is given on the LEO satellite.

Keywords: communication, GEO satellite, data relay system, coverage

Procedia PDF Downloads 442
26209 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product

Authors: Tanawat Hongthai, Dusit Thanapatay

Abstract:

This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.

Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC

Procedia PDF Downloads 280
26208 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 364
26207 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: anomaly detection, autoencoder, data centers, deep learning

Procedia PDF Downloads 194
26206 Carbohydrate Intake and Physical Activity Levels Modify the Association between FTO Gene Variants and Obesity and Type 2 Diabetes: First Nutrigenetics Study in an Asian Indian Population

Authors: K. S. Vimal, D. Bodhini, K. Ramya, N. Lakshmipriya, R. M. Anjana, V. Sudha, J. A. Lovegrove, V. Mohan, V. Radha

Abstract:

Gene-lifestyle interaction studies have been carried out in various populations. However, to date there are no studies in an Asian Indian population. Hence, we examined whether lifestyle factors such as diet and physical activity modify the association between fat mass and obesity–associated (FTO) gene variants and obesity and type 2 diabetes (T2D) in an Asian Indian population. We studied 734 unrelated T2D and 884 normal glucose-tolerant (NGT) participants randomly selected from the Chennai Urban Rural Epidemiology Study (CURES) in Southern India. Obesity was defined according to the World Health Organization Asia Pacific Guidelines (non-obese, BMI < 25 kg/m2; obese, BMI ≥ 25 kg/m2). Six single nucleotide polymorphisms (SNPs) in the FTO gene (rs9940128, rs7193144, rs8050136, rs918031, rs1588413 and rs11076023) identified from recent genome-wide association studies for T2D were genotyped by polymerase chain reaction-restriction fragment length polymorphism and direct sequencing. Dietary assessment was carried out using a validated food frequency questionnaire and physical activity was based upon the self-report. Interaction analyses were performed by including the interaction terms in the model. A joint likelihood ratio test of the main SNP effects and the SNP-diet/physical activity interaction effects was used in the linear regression analyses to maximize statistical power. Statistical analyses were performed using STATA version 13. There was a significant interaction between FTO SNP rs8050136 and carbohydrate energy percentage (Pinteraction=0.04) on obesity, where the ‘A’ allele carriers of the SNP rs8050136 had 2.46 times higher risk of obesity than those with ‘CC’ genotype (P=3.0x10-5) among individuals in the highest tertile of carbohydrate energy percentage. Furthermore, among those who had lower levels of physical activity, the ‘A’ allele carriers of the SNP rs8050136 had 1.89 times higher risk of obesity than those with ‘CC’ genotype (P=4.0x10-5). We also found a borderline interaction between SNP rs11076023 and carbohydrate energy percentage (Pinteraction=0.08) on T2D, where the ‘A’ allele carriers in the highest tertile of carbohydrate energy percentage, had 1.57 times higher risk of T2D than those with ‘TT’ genotype (P=0.002). There was also a significant interaction between SNP rs11076023 and physical activity (Pinteraction=0.03) on T2D. No further significant interactions between SNPs and macronutrient intake or physical activity on obesity and T2D were observed. In conclusion, this is the first study to provide evidence for a gene-diet and gene-physical activity interaction on obesity and T2D in an Asian Indian population. These findings suggest that the association between FTO gene variants and obesity and T2D is influenced by carbohydrate intake and physical activity levels. Greater understanding of how FTO gene influences obesity and T2D through dietary and exercise interventions will advance the development of behavioral intervention and personalised lifestyle strategies predicted to reduce the development of metabolic diseases in ‘A’ allele carriers of both SNPs in this Asian Indian population.

Keywords: dietary intake, FTO, obesity, physical activity, type 2 diabetes, Asian Indian.

Procedia PDF Downloads 531
26205 GC-MS Analysis of Essential Oil from the Leaves and Fruits of Artemesia Campestris from Algeria

Authors: B. Bakchiche, H. Guenane, M. Bireche, A. Noureddinne, A. Gherib

Abstract:

The chemical composition of the essential oils obtained by hydrodistillation from Artemisia campestris L (family Asteraceae) collected in Djebel Amour (Sahara Atlas, Algeria). Aerial parts were also evaluated by gas chromatography (GC) and gas chromatography coupled to mass spectrometry (GC-MS). The analyses for leaves and fruits of A. campestris resulted in the identification of thirty-one compounds, representing 91.8 % of the total oil and the yields were 0.33% (v/dry weight). The main components were β-pinene and sabinene (25.6% and 17% respectively) followed by α-pinene (9.9%), limonene (6.6 %) and p-cymene (4.1%).

Keywords: essential oil, GC-MS, Artemesia campestris, Algeria

Procedia PDF Downloads 445
26204 Clinical Empathy: The Opportunity to Offer Optimal Treatment to People with Serious Illness

Authors: Leonore Robieux, Franck Zenasni, Marc Pocard, Clarisse Eveno

Abstract:

Empirical data in health psychology studies show the necessity to consider the doctor-patient communication and its positive impact on outcomes such as patients’ satisfaction, treatment adherence, physical and psychological wellbeing. In this line, the present research aims to define the role and determinants of an effective doctor–patient communication during the treatment of patients with serious illness (peritoneal carcinomatosis). We carried out a prospective longitudinal study including patients treated for peritoneal carcinomatosis of various origins. From November 2016, to date, data were collected using validated questionnaires at two times of evaluation: one month before the surgery (T0) and one month after (T1). Thus, patients reported their (a) anxiety and depression levels, (b) standardized and individualized quality of life and (c) how they perceived communication, attitude and empathy of the surgeon. 105 volunteer patients (Mean age = 58.18 years, SD = 10.24, 62.2% female) participated to the study. PC arose from rare diseases (14%), colorectal (38%), eso-gastric (24%) and ovarian (8%) cancer. Three groups are defined according to the severity of their pathology and the treatment offered to them: (1) important surgical treatment with the goal of healing (53%), (2) repeated palliative surgical treatment (17%), and (3) the patients recused for surgical treatment, only palliative approach (30%). Results are presented according to Baron and Kenny recommendations. The regressions analyses show that only depression and anxiety are sensitive to the communication and empathy of surgeon. The main results show that a good communication and high level of empathy at T0 and T1 limit depression and anxiety of the patients in T1. Results also indicate that the severity of the disease modulates this positive impact of communication: better is the communication the less are the level of depression and anxiety of the patients. This effect is higher for patients treated for the more severe disease. These results confirm that, even in the case severe disease a good communication between patient and physician remains a significant factor in promoting the well-being of patients. More specific training need to be developed to promote empathic care.

Keywords: clinical empathy, determinants, healthcare, psychological wellbeing

Procedia PDF Downloads 122
26203 Online Bakery Management System Proposal

Authors: Alexander Musyoki, Collins Odour

Abstract:

Over the past few years, the bakery industry in Kenya has experienced significant growth largely in part to the increased adoption of technology and automation in their processes; more specifically due to the adoption of bakery management systems to help in running bakeries. While they have been largely responsible for the improved productivity and efficiency in bakeries, most of them are now outdated and pose more challenges than benefits. The proposed online bakery management system mentioned in this paper aims to address this by allowing bakery owners to track inventory, budget, job progress, and data analytics on each job and in doing so, promote the Sustainable Development Goals 3 and 12, which aim to ensure healthy lives and promote sustainable economic growth as the proposed benefits of these features include scalability, easy accessibility, reduced acquisition costs, better reliability, and improved functionality that will allow bakeries to become more competitive, reduce waste and track inventory more efficiently. To better understand the challenges, a comprehensive study has been performed to assess these traditional systems and try to understand if an online bakery management system can prove to be advantageous to bakery owners. The study conducted gathered feedback from bakery owners and employees in Nairobi County, Kenya using an online survey with a response rate of about 86% from the target population. The responses cited complex and hard to use bakery management systems (59.7%), lack of portability from one device to the other (58.1%) and high acquisition costs (51.6%) as the top challenges of traditional bakery management systems. On the other hand, some of the top benefits that most of the respondents would realize from the online bakery management system was better reliability (58.1%) and reduced acquisition costs (58.1%). Overall, the findings suggest that an online bakery management system has a lot of advantages over traditional systems and is likely to be well-received in the market. In conclusion, the proposed online bakery management system has the potential to improve the efficiency and competitiveness of small-sized bakeries in Nairobi County. Further research is recommended to expand the sample size and diversity of respondents and to conduct more in-depth analyses of the data collected.

Keywords: ICT, technology and automation, bakery management systems, food innovation

Procedia PDF Downloads 78