Search results for: research data sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 41077

Search results for: research data sharing

39697 Extracting Terrain Points from Airborne Laser Scanning Data in Densely Forested Areas

Authors: Ziad Abdeldayem, Jakub Markiewicz, Kunal Kansara, Laura Edwards

Abstract:

Airborne Laser Scanning (ALS) is one of the main technologies for generating high-resolution digital terrain models (DTMs). DTMs are crucial to several applications, such as topographic mapping, flood zone delineation, geographic information systems (GIS), hydrological modelling, spatial analysis, etc. Laser scanning system generates irregularly spaced three-dimensional cloud of points. Raw ALS data are mainly ground points (that represent the bare earth) and non-ground points (that represent buildings, trees, cars, etc.). Removing all the non-ground points from the raw data is referred to as filtering. Filtering heavily forested areas is considered a difficult and challenging task as the canopy stops laser pulses from reaching the terrain surface. This research presents an approach for removing non-ground points from raw ALS data in densely forested areas. Smoothing splines are exploited to interpolate and fit the noisy ALS data. The presented filter utilizes a weight function to allocate weights for each point of the data. Furthermore, unlike most of the methods, the presented filtering algorithm is designed to be automatic. Three different forested areas in the United Kingdom are used to assess the performance of the algorithm. The results show that the generated DTMs from the filtered data are accurate (when compared against reference terrain data) and the performance of the method is stable for all the heavily forested data samples. The average root mean square error (RMSE) value is 0.35 m.

Keywords: airborne laser scanning, digital terrain models, filtering, forested areas

Procedia PDF Downloads 139
39696 Data Management and Analytics for Intelligent Grid

Authors: G. Julius P. Roy, Prateek Saxena, Sanjeev Singh

Abstract:

Power distribution utilities two decades ago would collect data from its customers not later than a period of at least one month. The origin of SmartGrid and AMI has subsequently increased the sampling frequency leading to 1000 to 10000 fold increase in data quantity. This increase is notable and this steered to coin the tern Big Data in utilities. Power distribution industry is one of the largest to handle huge and complex data for keeping history and also to turn the data in to significance. Majority of the utilities around the globe are adopting SmartGrid technologies as a mass implementation and are primarily focusing on strategic interdependence and synergies of the big data coming from new information sources like AMI and intelligent SCADA, there is a rising need for new models of data management and resurrected focus on analytics to dissect data into descriptive, predictive and dictatorial subsets. The goal of this paper is to is to bring load disaggregation into smart energy toolkit for commercial usage.

Keywords: data management, analytics, energy data analytics, smart grid, smart utilities

Procedia PDF Downloads 779
39695 Green Intellectual Capital and Green Supply Chain Performance

Authors: Mohammed Ibrahim Bu Haya, Abdelmoneim Bahyeldin Mohamed Metwally

Abstract:

This paper examines the impact of Green Intellectual Capital (GIC) on Green Supply Chain Performance (GSCP). Further, the study examines the moderating role of external pressures (EP) on the relationship between GIC and GSCP. Data were collected from employees working in Egyptian hotels and tourism companies (N= 366). The collected data were analyzed using smart partial least squares (Smart-PLS) software. The current research indicated that there is a positive and significant impact of all GIC components on GSCP. The results also revealed that EP were found to moderate the relationship between GIC and GSCP. The study model was able to explain 63.1% of the variance in GSCP. The findings of this study serve as a pivotal yardstick for guiding corporate policy formulation, offering valuable insights to drive continuous improvements in supply chain management and performance. Furthermore, the research holds substantial implications for managerial strategies by shedding light on the potential of GIC and EP to elevate GSCP. Positioned as one of the initial studies to delve into the moderating role of EP in the relationship between GIC and GSCP, this research offers insights within an emerging market context.

Keywords: green intellectual capital, green supply chain, supply chain performance, external pressures, emerging economy, Egypt

Procedia PDF Downloads 56
39694 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study

Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke

Abstract:

This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.

Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management

Procedia PDF Downloads 40
39693 Exploring Women’S Leadership in China’S Sport National Governing Bodies

Authors: Han Zheng

Abstract:

This research is being conducted to explore women's leadership in China's National Governing Bodies ( in order to identify the barriers to women's leadership and provide feasible solutions. Extensive research has been undertaken internationally, which has identified and acknowledged the underrepresentation of women in leadership positions across multiple industries and global contexts. According to these studies, leadership specifically within the sports industry was both historically and is still currently male-dominated. Within China, the underrepresentation of women in leadership positions is also evident, which women only occupy 16% of the leadership in business enterprises and 5.6% in scientific and technological research institutions, yet there is limited research that has looked to examine why this is the case regarding women's leadership in China, especially within in sports industry. Therefore, this research gap drives the purpose, which aims to explore the current situation of women's leadership in sports National Governing Bodies (NGBs) in China. By using both questionnaires and interviews, data from NGBs in China will be collected. This research will achieve the following three goals: 1, determine the representation level of women's leadership in the target organizations. 2, identify barriers to women's leadership and their causes. 3, provide feasible solutions. Based on the multi-level framework, this study develops a "barrier matrix" framework: according to the analysis of the previous literature, it concludes that there are eight main barriers that hinder the development of women's leadership. The research combines qualitative and quantitative analysis, using questionnaires and interviews. Key findings according to the analysis of the primary data collected: 1. The average proportion of female occupational leadership in China's sports NGBs is less than 17.5%. 2. 50.8% of China's sports NGBs have no equal employment opportunity policy. 3. According to the preliminary qualitative analysis of the interviews, it is found that the core barriers affecting women's leadership development are mainly in the following areas: male-dominated culture and gender stereotyping (macro-level), biased organizational policies and procedures (meso-level), work-family conflicts and self-limiting behaviors (micro-level).

Keywords: women leadership, sport management, gender equality, sport leadership, sport NGBs

Procedia PDF Downloads 176
39692 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 82
39691 Adolescent Sleep Hygiene Scale and Adolescent Sleep Wake Scale: Factorial Analysis and Validation for Indian Population

Authors: Sataroopa Mishra, Mona Basker, Sneha Varkki, Ram Kumar Pandian, Grace Rebekah

Abstract:

Background: Sleep deprivation is a matter of public health importance among adolescents. We used adolescent sleep wake scale and adolescent sleep hygiene scale to determine the sleep quality and sleep hygiene respectively of school going adolescents in Vellore city of India. The objective of the study was to do factorial analysis of the scales and validate it for use in local population. Methods: Observational questionnaire based cross sectional study. Setting: Community based school survey in a semi-urban setting in three schools in Vellore city. Data collection: Non probability sample was collected form students studying in standard 9 and 11. Students filled Adolescent Sleep Wake scale (ASWS) and Adolescent Sleep Hygiene Scale (ASHS) translated into vernacular language. Data Analysis: Exploratory Factorial Analysis was used to see the factor loading of various components of the two scales. Confirmatory factorial analysis is subsequently planned for assessing the internal validity of the scales.Results: 557 adolescents were included in the study of 12 – 17 years old. Exploratory factorial analysis of adolescent sleep hygiene scale indicated significant factor loading for 18 items from 28 items originally devised by the authors and has been reconstructed to four domains instead of 9 domains in the original scale namely sleep stability, cognitive – emotional, Physiological - bed time routine - behavioural arousal factor (activites before bedtime and during bed time), Sleep environment (lighting and bed sharing). Factorial analysis of Adolescent sleep wake scale showed factor loading of 18 items out of 28 items in original scale reconstructed into 5 aspects of sleep quality. Conclusions: The factorial analysis gives a reconstructed scale useful for the local population. Further a confirmatory factorial analysis has been subsequently planned to determine the internal consistency of the scale for local population.

Keywords: factorial analysis, sleep hygiene, sleep quality, adolescent sleep scale

Procedia PDF Downloads 293
39690 Insights into the Assessment of Intercultural Competence of Female University Students in the KSA

Authors: Agnes Havril

Abstract:

The aim of this paper is to introduce some partial findings of an ongoing research project which is investigating the improvement of intercultural competence of Saudi female university students in English as a Second Language academic environment at the multicultural Jazan University. Since previous research results support the idea that this university generation has the desire to become interculturally or globally competent university students, the present-day investigation is focusing on the assessment of Saudi-specific cultural terms and intercultural competence components in comparison with the Anglo-Saxon oriented western perspective of intercultural competence theories and models. On this stage of the research quantitative research methodology is applied and a survey is being conducted among the female university students in different academic specializations. This paper discusses some empirical data with the aim of identifying and evaluating certain supplementary aspects of intercultural dimensions and components of the intercultural competence construct. The research results also highlight several gender issues in the gender separated higher education in the Kingdom of Saudi Arabia.

Keywords: gender separation, globally competent university student, intercultural competence, intercultural competence construct, higher education

Procedia PDF Downloads 338
39689 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive

Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh

Abstract:

Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.

Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data

Procedia PDF Downloads 295
39688 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 123
39687 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 368
39686 A Comparative Evaluation on the Quality of Products and Quality of Services of the Five Selected Fast Food Restaurants in Manila

Authors: M. Pagasa Nanette Rotairo

Abstract:

The research focuses on the effectiveness, responsiveness, adequacy, and appropriateness of customer service of selected fast food restaurant using William Dunn’s four evaluation criteria tantamount to the focus of the research. Due to efficiency the fast food restaurants offer and the increasing demand for acquiring its services, the researcher conducted a study on the effectiveness of customer service of five popular restaurants in Metro Manila. Using descriptive method, the research is furthered in par with evaluation and implementation of different instruments effective for data gathering to further scientific judgment. Results of this research indicate that consumers consider the quality service as the major reason in patronizing fast food restaurants while they consider cleanliness and customer satisfaction as their least concern. Details of this study provided support on how the proposed operational model can further improve the services of fast food restaurants.

Keywords: customer satisfaction, customer service, restaurant management, business operations

Procedia PDF Downloads 210
39685 A Fuzzy Kernel K-Medoids Algorithm for Clustering Uncertain Data Objects

Authors: Behnam Tavakkol

Abstract:

Uncertain data mining algorithms use different ways to consider uncertainty in data such as by representing a data object as a sample of points or a probability distribution. Fuzzy methods have long been used for clustering traditional (certain) data objects. They are used to produce non-crisp cluster labels. For uncertain data, however, besides some uncertain fuzzy k-medoids algorithms, not many other fuzzy clustering methods have been developed. In this work, we develop a fuzzy kernel k-medoids algorithm for clustering uncertain data objects. The developed fuzzy kernel k-medoids algorithm is superior to existing fuzzy k-medoids algorithms in clustering data sets with non-linearly separable clusters.

Keywords: clustering algorithm, fuzzy methods, kernel k-medoids, uncertain data

Procedia PDF Downloads 215
39684 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 134
39683 Fast Track to the Physical Internet: A Cross-Industry Project from Upper Austria

Authors: Laura Simmer, Maria Kalt, Oliver Schauer

Abstract:

Freight transport is growing fast, but many vehicles are empty or just partially loaded. The vision and concepts of the Physical Internet (PI) proposes to eliminate these inefficiencies. Aiming for a radical sustainability improvement, the PI – inspired by the Digital Internet – is a hyperconnected global logistic system, enabling seamless asset sharing and flow consolidation. The implementation of a PI in its full expression will be a huge challenge: the industry needs innovation and implementation support including change management approaches, awareness creation and good practices diffusion, legislative actions to remove antitrust and international commerce barriers, standardization and public incentives policies. In order to take a step closer to this future the project ‘Atropine - Fast Track to the Physical Internet’ funded under the Strategic Economic and Research Program ‘Innovative Upper Austria 2020’ was set up. The two-year research project unites several research partners in this field, but also industrial partners and logistics service providers. With Atropine, the consortium wants to actively shape the mobility landscape in Upper Austria and make an innovative contribution to an energy-efficient, environmentally sound and sustainable development in the transport area. This paper should, on the one hand, clarify the questions what the project Atropine is about and, on the other hand, how a proof of concept will be reached. Awareness building plays an important role in the project as the PI requires a reorganization of the supply chain and the design of completely new forms of inter-company co-operation. New business models have to be developed and should be verified by simulation. After the simulation process one of these business models will be chosen and tested in real life with the partner companies. The developed results - simulation model and demonstrator - are used to determine how the concept of the PI can be applied in Upper Austria. Atropine shall pave the way for a full-scale development of the PI vision in the next few decades and provide the basis for pushing the industry toward a new level of co-operation with more shared resources and increased standardization.

Keywords: Atropine, inter-company co-operation, Physical Internet, shared resources, sustainable logistics

Procedia PDF Downloads 223
39682 Investigating the Chemical Structure of Drinking Water in Domestic Areas of Kuwait by Appling GIS Technology

Authors: H. Al-Jabli

Abstract:

The research on the presence of heavy metals and bromate in drinking water is of immense scientific significance due to the potential risks these substances pose to public health. These contaminants are subject to regulatory limits outlined by the National Primary Drinking Water Regulations. Through a comprehensive analysis involving the compilation of existing data and the collection of new data via water sampling in residential areas of Kuwait, the aim is to create detailed maps illustrating the spatial distribution of these substances. Furthermore, the investigation will utilize GRAPHER software to explore correlations among different chemical parameters. By implementing rigorous scientific methodologies, the research will provide valuable insights for the Ministry of Electricity and Water and the Ministry of Health. These insights can inform evidence-based decision-making, facilitate the implementation of corrective measures, and support strategic planning for future infrastructure activities.

Keywords: heavy metals, bromate, ozonation, GIS

Procedia PDF Downloads 81
39681 Distance Training Packages on Providing for Learner with Special Needs

Authors: Jareeluk Ratanaphan

Abstract:

The purposed of this research were; 1.To survey the teacher’s needs on knowledge about special education management for special needs learner 2.To development of distance training packages on providing for learner with special needs. 3. To study the effects of using the packages on trainee’s achievement. 4. To study the effects of using the packages on trainee’s opinion on the distance training packages. The design of the experiment was research and development. The research sample for survey were 86 teachers, and 22 teachers for study the effects of using the packages on achievement and opinion. The research instrument comprised: 1) training packages on special education management for special needs learner 2) achievement test 3) questionnaire. Mean, percentage, standard deviation, t-test and content analysis were used for data analysis. The findings of the research were as follows: 1. The teacher’s needs on knowledge about teaching for learner with learning disability, mental retardation, autism, physical and health impairment and research in special education. 2. The package composed of special education management for special needs student document and manual of distance training packages. The efficiency of packages was established at 79.50/81.35. 3. The results of using the packages were the posttest average scores of trainee’s achievement were higher than pretest. 4. The trainee’s opinion on the package was at the highest level.

Keywords: distance training, training package, teacher, learner with special needs

Procedia PDF Downloads 339
39680 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 204
39679 Healthcare Data Mining Innovations

Authors: Eugenia Jilinguirian

Abstract:

In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.

Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database

Procedia PDF Downloads 66
39678 Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering

Authors: Yunus Doğan, Ahmet Durap

Abstract:

Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine.

Keywords: clustering algorithms, coastal engineering, data mining, data summarization, statistical methods

Procedia PDF Downloads 361
39677 Context-Aware Recommender Systems Using User's Emotional State

Authors: Hoyeon Park, Kyoung-jae Kim

Abstract:

The product recommendation is a field of research that has received much attention in the recent information overload phenomenon. The proliferation of the mobile environment and social media cannot help but affect the results of the recommendation depending on how the factors of the user's situation are reflected in the recommendation process. Recently, research has been spreading attention to the context-aware recommender system which is to reflect user's contextual information in the recommendation process. However, until now, most of the context-aware recommender system researches have been limited in that they reflect the passive context of users. It is expected that the user will be able to express his/her contextual information through his/her active behavior and the importance of the context-aware recommender system reflecting this information can be increased. The purpose of this study is to propose a context-aware recommender system that can reflect the user's emotional state as an active context information to recommendation process. The context-aware recommender system is a recommender system that can make more sophisticated recommendations by utilizing the user's contextual information and has an advantage that the user's emotional factor can be considered as compared with the existing recommender systems. In this study, we propose a method to infer the user's emotional state, which is one of the user's context information, by using the user's facial expression data and to reflect it on the recommendation process. This study collects the facial expression data of a user who is looking at a specific product and the user's product preference score. Then, we classify the facial expression data into several categories according to the previous research and construct a model that can predict them. Next, the predicted results are applied to existing collaborative filtering with contextual information. As a result of the study, it was shown that the recommended results of the context-aware recommender system including facial expression information show improved results in terms of recommendation performance. Based on the results of this study, it is expected that future research will be conducted on recommender system reflecting various contextual information.

Keywords: context-aware, emotional state, recommender systems, business analytics

Procedia PDF Downloads 229
39676 Protocol for Consumer Research in Academia for Community Marketing Campaigns

Authors: Agnes J. Otjen, Sarah Keller

Abstract:

A Montana university has used applied consumer research in experiential learning with non-profit clients for over a decade. Through trial and error, a successful protocol has been established from problem statement through formative research to integrated marketing campaign execution. In this paper, we describe the protocol and its applications. Analysis was completed to determine the effectiveness of the campaigns and the results of how pre- and post-consumer research mark societal change because of media.

Keywords: consumer, research, marketing, communications

Procedia PDF Downloads 137
39675 Experiences of Online Opportunities and Risks: Examining Internet Use and Digital Literacy of Young People in Nigeria

Authors: Isah Yahaya Aliyu

Abstract:

Research on Internet use has often approached beneficial uses (online opportunities) of the Internet as separate from the risky encounters (online risks) of young people online. However, empirical evidence from diverse contexts appears to increasingly support the fusion of the two sets of online activities. Hence, the current research investigates the correlation between Internet use (IU) and digital literacy (DL) with online opportunities (OP) and risks (OR), using data from a Nigerian context, where there appears a paucity of research and literature on integrating opportunities and risks in the same study. A web-based data collection method was used to administer a survey to 335 undergraduate students in Northeastern Nigeria. Underpinned to Livingstone and Helsper model, findings are largely consistent with existing literature; IU and DL influence OP (R2 = 0.791, SE = 0.265, F-Stats = 626.566, P-value <.001), equally IU and DL influence OR as well (R2 = 0.343, SE = 0.465, F-Stats = 86.671, P-value <.001). OP and OR were found to strongly correlate positively (r = .667, n = 335, p < 0.01). This study has provided buttressing evidence from a Nigerian context of the fusion of benefits and risks of the Internet among young people. It has also upheld the argument for improved literacy as strategy for minimizing risks/harm rather than restricting use. Other theoretical and policy implications of the findings have been discussed in line with local and global debates about the Internet and its attendant effects.

Keywords: digital, internet, literacy, opportunities, risks

Procedia PDF Downloads 87
39674 Mining Educational Data to Support Students’ Major Selection

Authors: Kunyanuth Kularbphettong, Cholticha Tongsiri

Abstract:

This paper aims to create the model for student in choosing an emphasized track of student majoring in computer science at Suan Sunandha Rajabhat University. The objective of this research is to develop the suggested system using data mining technique to analyze knowledge and conduct decision rules. Such relationships can be used to demonstrate the reasonableness of student choosing a track as well as to support his/her decision and the system is verified by experts in the field. The sampling is from student of computer science based on the system and the questionnaire to see the satisfaction. The system result is found to be satisfactory by both experts and student as well.

Keywords: data mining technique, the decision support system, knowledge and decision rules, education

Procedia PDF Downloads 423
39673 Ethiopian Women in Science, Technology, Engineering, and Mathematics Higher Education: Insights Gained Through an Onsite Culturally Embedded Workshop

Authors: Araceli Martinez Ortiz, Gillian U Bayne, Solomon Abraham

Abstract:

This paper describes research led by faculty from three American universities and four Ethiopian universities on the delivery of professional leadership development for early-career female Ethiopian university instructors in the Science, Technology, Engineering, and Mathematics (STEM) fields. The objective was to carry out a case study focused on the impact of an innovative intervention program designed to assist in the empowerment and leadership development related to teaching effectiveness, scholarly activity participation, and professional service participation by female instructors. This research was conducted utilizing a case study methodology for the weeklong intervention and a survey to capture the voices of the leadership program participants. The data regarding insights into the challenges and opportunities for women in these fields is presented. The research effort project expands upon existing linkages between universities to support professional development and research effort in this region of the world. Findings indicate the positive reception of this kind of professional development by the participating women. Survey data also reflects the educational technology and cultural challenges professional women in STEM education face in Ethiopia as well as the global challenges of balancing family expectations with career development.

Keywords: women, STEM education, higher education, Ethiopia

Procedia PDF Downloads 67
39672 Empirical Study of Health Behaviors of Employees in Information Technology and Business Process Outsourcing

Authors: Yogesh Pawar

Abstract:

The purpose of this paper is to investigate the behaviors of information technology (IT) and business process outsourcing (BPO) employees in relation to diet, exercise, sleep, stress, and social habits. This was a qualitative research study, using in-depth,semi-structured interviews. Descriptive data were collected from a two-stage purposive sample of 28 IT-BPO employees from two IT companies and one BPOs in Pune. The majority of interviewees reported having an unhealthy diet and/or sedentary lifestyle. Lack of time due to demanding work schedules was the largest barrier to diet and exercise. Given the qualitative study design and limited sampling frame, results may not be generalizable. However, the qualitative data suggests that Pune’s young IT-BPO employees may be at greater risk of lifestyle-related diseases than the general population. The data also suggests that interventions incorporating social influence may be a promising solution, particularly at international call centers. The results from this study provide qualitative insight on the motives for health behaviors of IT-BPO employees, as well as the barriers and facilitators for leading a healthy lifestyle in this industry. The findings provide the framework for future workplace wellness interventions.

Keywords: exercise, information technology, qualitative research, wellness

Procedia PDF Downloads 334
39671 Factors Affecting the Critical Understanding of the Strategies Which Children Use to Motivate Parents in the Family Buying Process: Case of British Bangladeshi Children in the UK

Authors: Salma Akter, Mohammad M. Haque, Lawrence Akwetey

Abstract:

An empirical research design will analyze different factors/predictors children use to influence their parents in the family buying decision process in the unexplored area of British Bangladeshi children in the United Kingdom. The proposed conceptual model of factors- buying decision making process will be tested by the Structure Equation Model. A structured Questionnaire and secondary sources will employ to collect data and analyse and measure the validity by Statistical tools (SPSS) and Microsoft Excel. The Contemporary research aims to use the deductive approach developing the research questions and testing the hypothesis to identify the impact of different strategies British Bangladeshi children used to influence their parents in the family buying decision which was overlooked in the previous research.

Keywords: British Bangladeshi children, buying decision process, children influence, influential factors

Procedia PDF Downloads 269
39670 The Education Quality Management by the Participation of the Community in Northern Part of Thailand

Authors: Preecha Pongpeng

Abstract:

This research aims to study the education quality management to solve the problem of teachers shortage by the communities participation. This research is action research by using the tools is questionnaire to collect the data whit, students and community representatives and final will interview to ask the opinions of people in the community to help and support instruction in problems in teaching. Results found that people in the community are aware and working together to solve the lack the of teachers by collaboration between school personnel and community members by finding people who are knowledgeable, organized into local wisdom in the community, compound money to donate and hire someone in the community to teaching between classroom with people in the community. In addition, researcher discovered this research project contributes to cooperation between the school and community and there was a problem including administrative expenses and the school's academic quality management.

Keywords: education quality management, local wisdom, northern part of Thailand, participation of the community

Procedia PDF Downloads 293
39669 Information Exchange Process Analysis between Authoring Design Tools and Lighting Simulation Tools

Authors: Rudan Xue, Annika Moscati, Rehel Zeleke Kebede, Peter Johansson

Abstract:

Successful buildings’ simulation and analysis inevitably require information exchange between multiple building information modeling (BIM) software. The BIM infor-mation exchange based on IFC is widely used. However, Industry Foundation Classifi-cation (IFC) files are not always reliable and information can get lost when using dif-ferent software for modeling and simulations. In this research, interviews with lighting simulation experts and a case study provided by a company producing lighting devices have been the research methods used to identify the necessary steps and data for suc-cessful information exchange between lighting simulation tools and authoring design tools. Model creation, information exchange, and model simulation have been identi-fied as key aspects for the success of information exchange. The paper concludes with recommendations for improved information exchange and more reliable simulations that take all the needed parameters into consideration.

Keywords: BIM, data exchange, interoperability issues, lighting simulations

Procedia PDF Downloads 239
39668 Climate Change and Sustainable Development among Agricultural Communities in Tanzania; An Analysis of Southern Highland Rural Communities

Authors: Paschal Arsein Mugabe

Abstract:

This paper examines sustainable development planning in the context of environmental concerns in rural areas of the Tanzania. It challenges mainstream approaches to development, focusing instead upon transformative action for environmental justice. The goal is to help shape future sustainable development agendas in local government, international agencies and civil society organisations. Research methods: The approach of the study is geographical, but also involves various Trans-disciplinary elements, particularly from development studies, sociology and anthropology, management, geography, agriculture and environmental science. The research methods included thematic and questionnaire interviews, participatory tools such as focus group discussion, participatory research appraisal and expert interviews for primary data. Secondary data were gathered through the analysis of land use/cover data and official documents on climate, agriculture, marketing and health. Also several earlier studies that were made in the area provided an important reference base. Findings: The findings show that, agricultural sustainability in Tanzania appears likely to deteriorate as a consequence of climate change. Noteworthy differences in impacts across households are also present both by district and by income category. Also food security cannot be explained by climate as the only influencing factor. A combination of economic, political and socio-cultural context of the community are crucial. Conclusively, it is worthy knowing that people understand their relationship between climate change and their livelihood.

Keywords: agriculture, climate change, environment, sustainable development

Procedia PDF Downloads 325