Search results for: data center
24952 The Dynamic Metadata Schema in Neutron and Photon Communities: A Case Study of X-Ray Photon Correlation Spectroscopy
Authors: Amir Tosson, Mohammad Reza, Christian Gutt
Abstract:
Metadata stands at the forefront of advancing data management practices within research communities, with particular significance in the realms of neutron and photon scattering. This paper introduces a groundbreaking approach—dynamic metadata schema—within the context of X-ray Photon Correlation Spectroscopy (XPCS). XPCS, a potent technique unravelling nanoscale dynamic processes, serves as an illustrative use case to demonstrate how dynamic metadata can revolutionize data acquisition, sharing, and analysis workflows. This paper explores the challenges encountered by the neutron and photon communities in navigating intricate data landscapes and highlights the prowess of dynamic metadata in addressing these hurdles. Our proposed approach empowers researchers to tailor metadata definitions to the evolving demands of experiments, thereby facilitating streamlined data integration, traceability, and collaborative exploration. Through tangible examples from the XPCS domain, we showcase how embracing dynamic metadata standards bestows advantages, enhancing data reproducibility, interoperability, and the diffusion of knowledge. Ultimately, this paper underscores the transformative potential of dynamic metadata, heralding a paradigm shift in data management within the neutron and photon research communities.Keywords: metadata, FAIR, data analysis, XPCS, IoT
Procedia PDF Downloads 6224951 Representational Conference Profile of Secondary Students in Understanding Selected Chemical Principles
Authors: Ryan Villafuerte Lansangan
Abstract:
Assessing students’ understanding in the microscopic level of an abstract subject like chemistry poses a challenge to teachers. Literature reveals that the use of representations serves as an essential avenue of measuring the extent of understanding in the discipline as an alternative to traditional assessment methods. This undertaking explored the representational competence profile of high school students from the University of Santo Tomas High School in understanding selected chemical principles and correlate this with their academic profile in chemistry based on their performance in the academic achievement examination in chemistry administered by the Center for Education Measurement (CEM). The common misconceptions of the students on the selected chemistry principles based on their representations were taken into consideration as well as the students’ views regarding their understanding of the role of chemical representations in their learning. The students’ level of representation task instrument consisting of the main lessons in chemistry with a corresponding scoring guide was prepared and utilized in the study. The study revealed that most of the students under study are unanimously rated as Level 2 (symbolic level) in terms of their representational competence in understanding the selected chemical principles through the use of chemical representations. Alternative misrepresentations were most observed on the students’ representations on chemical bonding concepts while the concept of chemical equation appeared to be the most comprehensible topic in chemistry for the students. Data implies that teachers’ representations play an important role in helping the student understand the concept in a microscopic level. Results also showed that the academic achievement in the chemistry of the students based on the standardized CEM examination has a significant association with the students’ representational competence. In addition, the students’ responses on the students’ views in chemical representations questionnaire evidently showed a good understanding of what a chemical representation or a mental model is by drawing a negative response that these tools should be an exact replica. Moreover, the students confirmed a greater appreciation that chemical representations are explanatory tools.Keywords: chemical representations, representational competence, academic profile in chemistry, secondary students
Procedia PDF Downloads 40624950 Phelipanche Ramosa (L. - Pomel) Control in Field Tomato Crop
Authors: G. Disciglio, F. Lops, A. Carlucci, G. Gatta, A. Tarantino, L. Frabboni, F. Carriero, F. Cibelli, M. L. Raimondo, E. Tarantino
Abstract:
The Phelipanche ramosa is is an important crop whose cultivation in the Mediterranean basin is severely contained the phitoparasitic weed Phelipanche ramose. The semiarid regions of the world are considered the main center of this parasitic weed, where heavy infestation is due to the ability to produce high numbers of seeds (up to 500,000 per plant), that remain viable for extended period (more than 19 years). In this paper 12 treatments of parasitic weed control including chemical, agronomic, biological and biotechnological methods have been carried out. In 2014 a trial was performed at Foggia (southern Italy). on processing tomato (cv Docet), grown in field infested by Phelipanche ramosa, Tomato seedlings were transplant on May 5, 2014 on a clay-loam soil (USDA) fertilized by 100 kg ha-1 of N; 60 kg ha-1 of P2O5 and 20 kg ha-1 of S. Afterwards, top dressing was performed with 70 kg ha-1 of N. The randomized block design with 3 replicates was adopted. During the growing cycle of the tomato, at 56-78 and 92 days after transplantation, the number of parasitic shoots emerged in each pot was detected. At harvesting, on August 18, the major quantity-quality yield parameters were determined (marketable yield, mean weight, dry matter, pH, soluble solids and color of fruits). All data were subjected to analysis of variance (ANOVA), using the JMP software (SAS Institute Inc., Cary, NC, USA), and for comparison of means was used Tukey's test. Each treatment studied did not provide complete control against Phelipanche ramosa. However among the 12 tested methods, Fusarium, gliphosate, radicon biostimulant and Red Setter tomato cv (improved genotypes obtained by Tilling technology) proved to mitigate the virulence of the attacks of Phelipanche ramose. It is assumed that these effects can be improved by combining some of these treatments each other, especially for a gradual and continuing reduction of the “seed bank” of the parasite in the soil.Keywords: control methods, Phelipanche ramosa, tomato crop, mediterranean basin
Procedia PDF Downloads 56324949 Exploring SSD Suitable Allocation Schemes Incompliance with Workload Patterns
Authors: Jae Young Park, Hwansu Jung, Jong Tae Kim
Abstract:
Whether the data has been well parallelized is an important factor in the Solid-State-Drive (SSD) performance. SSD parallelization is affected by allocation scheme and it is directly connected to SSD performance. There are dynamic allocation and static allocation in representative allocation schemes. Dynamic allocation is more adaptive in exploiting write operation parallelism, while static allocation is better in read operation parallelism. Therefore, it is hard to select the appropriate allocation scheme when the workload is mixed read and write operations. We simulated conditions on a few mixed data patterns and analyzed the results to help the right choice for better performance. As the results, if data arrival interval is long enough prior operations to be finished and continuous read intensive data environment static allocation is more suitable. Dynamic allocation performs the best on write performance and random data patterns.Keywords: dynamic allocation, NAND flash based SSD, SSD parallelism, static allocation
Procedia PDF Downloads 33924948 Automatic Battery Charging for Rotor Wings Type Unmanned Aerial Vehicle
Authors: Jeyeon Kim
Abstract:
This paper describes the development of the automatic battery charging device for the rotor wings type unmanned aerial vehicle (UAV) and the positioning method that can be accurately landed on the charging device when landing. The developed automatic battery charging device is considered by simple maintenance, durability, cost and error of the positioning when landing. In order to for the UAV accurately land on the charging device, two kinds of markers (a color marker and a light marker) installed on the charging device is detected by the camera mounted on the UAV. And then, the UAV is controlled so that the detected marker becomes the center of the image and is landed on the device. We conduct the performance evaluation of the proposal positioning method by the outdoor experiments at day and night, and show the effectiveness of the system.Keywords: unmanned aerial vehicle, automatic battery charging, positioning
Procedia PDF Downloads 36424947 Social Data Aggregator and Locator of Knowledge (STALK)
Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat
Abstract:
Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.Keywords: social network, analysis, Facebook, Linkedin, git, big data
Procedia PDF Downloads 44424946 Data Integrity between Ministry of Education and Private Schools in the United Arab Emirates
Authors: Rima Shishakly, Mervyn Misajon
Abstract:
Education is similar to other businesses and industries. Achieving data integrity is essential in order to attain a significant supporting for all the stakeholders in the educational sector. Efficient data collect, flow, processing, storing and retrieving are vital in order to deliver successful solutions to the different stakeholders. Ministry of Education (MOE) in United Arab Emirates (UAE) has adopted ‘Education 2020’ a series of five-year plans designed to introduce advanced education management information systems. As part of this program, in 2010 MOE implemented Student Information Systems (SIS) to manage and monitor the students’ data and information flow between MOE and international private schools in UAE. This paper is going to discuss data integrity concerns between MOE, and private schools. The paper will clarify the data integrity issues and will indicate the challenges that face private schools in UAE.Keywords: education management information systems (EMIS), student information system (SIS), United Arab Emirates (UAE), ministry of education (MOE), (KHDA) the knowledge and human development authority, Abu Dhabi educational counsel (ADEC)
Procedia PDF Downloads 22224945 Prevalence of Sexually Transmitted Infections in Pregnancy, Preterm Birth, Low Birthweight, and the Importance of Prenatal Care: Data from the 2020 United States Birth Certificate
Authors: Anthony J. Kondracki, Bonzo Reddick, Jennifer L. Barkin
Abstract:
Background: Many pregnancies in the United States are affected each year with the most common sexually transmitted infections (STIs), including Chlamydia trachomatis (CT), Neisseria gonorrhoeae (NG), and Treponema pallidum (TP, syphilis), and the rate of congenital syphilis has reached a 20-year high. We sought to estimate the prevalence of CT, NG, and TP in pregnancy and the risk of preterm birth (PTB) (<37 weeks gestation) and low birthweight (LBW) (<2500g) deliveries according to utilization of prenatal care (PNC) during the COVID-19 pandemic. Methods: This study was based on the 2020 National Center for Health Statistics (NCHS) Natality File restricted to singleton births (N=3,512,858). We estimated the prevalence of CT, NG, TP, PTBand LBW across timing and the number of prenatal care (PNC) visits attended. In multivariable logistic regression models, adjusted odds ratios of PTB and LBW were assessed according to STIs and PNC status. E-values, based on effect size estimates and the lower bound of the 95% confidence intervals (CIs) of the association, examined the potential impact of unmeasured confounding. Results: CT (1.8%) was most prevalent in pregnancy, followed by NG (0.3%) and TP (0.1%). The strongest predictors of PTB and LBW were maternal NG (12.2% and 12.1%, respectively), late initiation/no PNC (8.5% and 7.6%, respectively), and ≤10 prenatal visits (13.1% and 10.3%, respectively). The odds of PTB and LBW were 2.5- to 3-fold greater for each STI in women who received ≤10 compared to >10 prenatal visits. E-values demonstrated the minimum strength of potential unmeasured confounding necessary to explain away observed associations. Conclusions: Timely initiation and receipt of recommended number of prenatal visits benefits screening and treatment of all women for STIs, including NG to substantially reduce infant morbidity and mortality related to PTB and LBW among infants born during the COVID-19 pandemic.Keywords: COVID-19 pandemic, sexually transmitted infections, preterm birth, low birthweight, prenatal care
Procedia PDF Downloads 15224944 Towards a Balancing Medical Database by Using the Least Mean Square Algorithm
Authors: Kamel Belammi, Houria Fatrim
Abstract:
imbalanced data set, a problem often found in real world application, can cause seriously negative effect on classification performance of machine learning algorithms. There have been many attempts at dealing with classification of imbalanced data sets. In medical diagnosis classification, we often face the imbalanced number of data samples between the classes in which there are not enough samples in rare classes. In this paper, we proposed a learning method based on a cost sensitive extension of Least Mean Square (LMS) algorithm that penalizes errors of different samples with different weight and some rules of thumb to determine those weights. After the balancing phase, we applythe different classifiers (support vector machine (SVM), k- nearest neighbor (KNN) and multilayer neuronal networks (MNN)) for balanced data set. We have also compared the obtained results before and after balancing method.Keywords: multilayer neural networks, k- nearest neighbor, support vector machine, imbalanced medical data, least mean square algorithm, diabetes
Procedia PDF Downloads 53224943 Representation of the Kurdish Opposition: From Periphery to Center
Authors: Songul Miftakhov
Abstract:
This study explores political representation and engagement of Eastern and Southeastern Anatolia regions, known to have dense Kurdish population and referred further to as Eastern region, in the Turkish parliament between 1946 and 1980. Traditional local notables had most of the privileges to be represented given their connectedness with political parties. Traditional local notables integrated into right-wing parties considering political and economic aspects. At the same time, they kept control over local political involvement channels. As a result, political representation and presence were monopolized at central, local and civil society levels. One part of Kurdish intellectuals was marginalized from the parliament after addressing issues in Eastern Anatolia and trying to develop solutions apart from the mainstream. Some of them took part in Kurdish oppositional left wing in the 1960s and jounced power of settled notables in 1970s in local administrations or as independent members of the parliament.Keywords: Kurdish representation, parliament, local nobles, Eastern and Southeastern Anatolia
Procedia PDF Downloads 15324942 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 5924941 Review of the Road Crash Data Availability in Iraq
Authors: Abeer K. Jameel, Harry Evdorides
Abstract:
Iraq is a middle income country where the road safety issue is considered one of the leading causes of deaths. To control the road risk issue, the Iraqi Ministry of Planning, General Statistical Organization started to organise a collection system of traffic accidents data with details related to their causes and severity. These data are published as an annual report. In this paper, a review of the available crash data in Iraq will be presented. The available data represent the rate of accidents in aggregated level and classified according to their types, road users’ details, and crash severity, type of vehicles, causes and number of causalities. The review is according to the types of models used in road safety studies and research, and according to the required road safety data in the road constructions tasks. The available data are also compared with the road safety dataset published in the United Kingdom as an example of developed country. It is concluded that the data in Iraq are suitable for descriptive and exploratory models, aggregated level comparison analysis, and evaluation and monitoring the progress of the overall traffic safety performance. However, important traffic safety studies require disaggregated level of data and details related to the factors of the likelihood of traffic crashes. Some studies require spatial geographic details such as the location of the accidents which is essential in ranking the roads according to their level of safety, and name the most dangerous roads in Iraq which requires tactic plan to control this issue. Global Road safety agencies interested in solve this problem in low and middle-income countries have designed road safety assessment methodologies which are basing on the road attributes data only. Therefore, in this research it is recommended to use one of these methodologies.Keywords: road safety, Iraq, crash data, road risk assessment, The International Road Assessment Program (iRAP)
Procedia PDF Downloads 25624940 Eliciting and Confirming Data, Information, Knowledge and Wisdom in a Specialist Health Care Setting - The Wicked Method
Authors: Sinead Impey, Damon Berry, Selma Furtado, Miriam Galvin, Loretto Grogan, Orla Hardiman, Lucy Hederman, Mark Heverin, Vincent Wade, Linda Douris, Declan O'Sullivan, Gaye Stephens
Abstract:
Healthcare is a knowledge-rich environment. This knowledge, while valuable, is not always accessible outside the borders of individual clinics. This research aims to address part of this problem (at a study site) by constructing a maximal data set (knowledge artefact) for motor neurone disease (MND). This data set is proposed as an initial knowledge base for a concurrent project to develop an MND patient data platform. It represents the domain knowledge at the study site for the duration of the research (12 months). A knowledge elicitation method was also developed from the lessons learned during this process - the WICKED method. WICKED is an anagram of the words: eliciting and confirming data, information, knowledge, wisdom. But it is also a reference to the concept of wicked problems, which are complex and challenging, as is eliciting expert knowledge. The method was evaluated at a second site, and benefits and limitations were noted. Benefits include that the method provided a systematic way to manage data, information, knowledge and wisdom (DIKW) from various sources, including healthcare specialists and existing data sets. Limitations surrounded the time required and how the data set produced only represents DIKW known during the research period. Future work is underway to address these limitations.Keywords: healthcare, knowledge acquisition, maximal data sets, action design science
Procedia PDF Downloads 36124939 AI-Driven Strategies for Sustainable Electronics Repair: A Case Study in Energy Efficiency
Authors: Badiy Elmabrouk, Abdelhamid Boujarif, Zhiguo Zeng, Stephane Borrel, Robert Heidsieck
Abstract:
In an era where sustainability is paramount, this paper introduces a machine learning-driven testing protocol to accurately predict diode failures, merging reliability engineering with failure physics to enhance repair operations efficiency. Our approach refines the burn-in process, significantly curtailing its duration, which not only conserves energy but also elevates productivity and mitigates component wear. A case study from GE HealthCare’s repair center vividly demonstrates the method’s effectiveness, recording a high prediction of diode failures and a substantial decrease in energy consumption that translates to an annual reduction of 6.5 Tons of CO2 emissions. This advancement sets a benchmark for environmentally conscious practices in the electronics repair sector.Keywords: maintenance, burn-in, failure physics, reliability testing
Procedia PDF Downloads 6824938 Market-Power, Stability, and Risk-Taking: An Analysis Surrounding the Riba-Free Banking
Authors: Louati Salma, Louhichi Awatef, Boujelbene Younes
Abstract:
Analysis of the trade-off between competition and financial stability has been at the center of academic and policy debate for over two decades and especially since the 2007-2008 global financial crises. We use information on 10 OIC countries from 2005 to 2014 to investigate the influence of bank competition on individual bank stability and risk-taking. Alternatively, we explore whether the quality of prudential regulation may affect the nexus between competition and banking stability/risk-taking. We provide a particular attention to the Islamic banking system which principally involves with the Riba-free instruments as compared to the conventional interest-based system. We first run a dynamic panel regression (GMM), and then we apply a panel vector autoregressive (PVAR) methodology to compare both banking business models.Keywords: Lerner index, Islamic banks, non-performing loans, prudential regulations, z-score
Procedia PDF Downloads 29724937 Tool for Metadata Extraction and Content Packaging as Endorsed in OAIS Framework
Authors: Payal Abichandani, Rishi Prakash, Paras Nath Barwal, B. K. Murthy
Abstract:
Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this.Keywords: digital preservation, metadata, OAIS, PDI, XML
Procedia PDF Downloads 39324936 The Trigger-DAQ System in the Mu2e Experiment
Authors: Antonio Gioiosa, Simone Doanti, Eric Flumerfelt, Luca Morescalchi, Elena Pedreschi, Gianantonio Pezzullo, Ryan A. Rivera, Franco Spinella
Abstract:
The Mu2e experiment at Fermilab aims to measure the charged-lepton flavour violating neutrino-less conversion of a negative muon into an electron in the field of an aluminum nucleus. With the expected experimental sensitivity, Mu2e will improve the previous limit of four orders of magnitude. The Mu2e data acquisition (DAQ) system provides hardware and software to collect digitized data from the tracker, calorimeter, cosmic ray veto, and beam monitoring systems. Mu2e’s trigger and data acquisition system (TDAQ) uses otsdaq as its solution. developed at Fermilab, otsdaq uses the artdaq DAQ framework and art analysis framework, under-the-hood, for event transfer, filtering, and processing. Otsdaq is an online DAQ software suite with a focus on flexibility and scalability while providing a multi-user, web-based interface accessible through the Chrome or Firefox web browser. The detector read out controller (ROC) from the tracker and calorimeter stream out zero-suppressed data continuously to the data transfer controller (DTC). Data is then read over the PCIe bus to a software filter algorithm that selects events which are finally combined with the data flux that comes from a cosmic ray veto system (CRV).Keywords: trigger, daq, mu2e, Fermilab
Procedia PDF Downloads 15524935 An Improved Parallel Algorithm of Decision Tree
Authors: Jiameng Wang, Yunfei Yin, Xiyu Deng
Abstract:
Parallel optimization is one of the important research topics of data mining at this stage. Taking Classification and Regression Tree (CART) parallelization as an example, this paper proposes a parallel data mining algorithm based on SSP-OGini-PCCP. Aiming at the problem of choosing the best CART segmentation point, this paper designs an S-SP model without data association; and in order to calculate the Gini index efficiently, a parallel OGini calculation method is designed. In addition, in order to improve the efficiency of the pruning algorithm, a synchronous PCCP pruning strategy is proposed in this paper. In this paper, the optimal segmentation calculation, Gini index calculation, and pruning algorithm are studied in depth. These are important components of parallel data mining. By constructing a distributed cluster simulation system based on SPARK, data mining methods based on SSP-OGini-PCCP are tested. Experimental results show that this method can increase the search efficiency of the best segmentation point by an average of 89%, increase the search efficiency of the Gini segmentation index by 3853%, and increase the pruning efficiency by 146% on average; and as the size of the data set increases, the performance of the algorithm remains stable, which meets the requirements of contemporary massive data processing.Keywords: classification, Gini index, parallel data mining, pruning ahead
Procedia PDF Downloads 12424934 Study on Dynamic Stiffness Matching and Optimization Design Method of a Machine Tool
Authors: Lu Xi, Li Pan, Wen Mengmeng
Abstract:
The stiffness of each component has different influences on the stiffness of the machine tool. Taking the five-axis gantry machining center as an example, we made the modal analysis of the machine tool, followed by raising and lowering the stiffness of the pillar, slide plate, beam, ram and saddle so as to study the stiffness matching among these components on the standard of whether the stiffness of the modified machine tool changes more than 50% relative to the stiffness of the original machine tool. The structural optimization of the machine tool can be realized by changing the stiffness of the components whose stiffness is mismatched. For example, the stiffness of the beam is mismatching. The natural frequencies of the first six orders of the beam increased by 7.70%, 0.38%, 6.82%, 7.96%, 18.72% and 23.13%, with the weight increased by 28Kg, leading to the natural frequencies of several orders which had a great influence on the dynamic performance of the whole machine increased by 1.44%, 0.43%, 0.065%, which verified the correctness of the optimization method based on stiffness matching proposed in this paper.Keywords: machine tool, optimization, modal analysis, stiffness matching
Procedia PDF Downloads 10224933 Analytical Formulae for Parameters Involved in Side Slopes of Embankments Stability
Authors: Abdulrahman Abdulrahman, Abir Abdulrahman
Abstract:
The stability of slopes of earthen embankments is usually examined by Swedish slip circle method or the slices method. The factor of safety against sliding using Fellenius procedure depends upon the angle formed by the arc of sliding at the center ψ and the radius of the slip circle r. The values of both mentioned parameters ψ and r aren't precisely predicted because they are measured from the drawing. In this paper, analytical formulae were derived for finding the exact values of both ψ and r. Also this paper presents the different conditions of intersections the slip circle with the body of an earthen dam and the coordinate of intersection points. Numerical examples are chosen for demonstration the proposed solutionKeywords: earthen dams stability, , earthen embankments stability, , Fellenius method, hydraulic structures, , side slopes stability, , slices method, Swedish slip circle
Procedia PDF Downloads 16524932 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 8924931 Improving Patient Outcomes for Aspiration Pneumonia
Authors: Mary Farrell, Maria Soubra, Sandra Vega, Dorothy Kakraba, Joanne Fontanilla, Moira Kendra, Danielle Tonzola, Stephanie Chiu
Abstract:
Pneumonia is the most common infectious cause of hospitalizations in the United States, with more than one million admissions annually and costs of $10 billion every year, making it the 8th leading cause of death. Aspiration pneumonia is an aggressive type of pneumonia that results from inhalation of oropharyngeal secretions and/or gastric contents and is preventable. The authors hypothesized that an evidence-based aspiration pneumonia clinical care pathway could reduce 30-day hospital readmissions and mortality rates, while improving the overall care of patients. We conducted a retrospective chart review on 979 patients discharged with aspiration pneumonia from January 2021 to December 2022 at Overlook Medical Center. The authors identified patients who were coded with aspiration pneumonia and/or stable sepsis. Secondarily, we identified 30-day readmission rates for aspiration pneumonia from a SNF. The Aspiration Pneumonia Clinical Care Pathway starts in the emergency department (ED) with the initiation of antimicrobials within 4 hours of admission and early recognition of aspiration. Once this is identified, a swallow test is initiated by the bedside nurse, and if the patient demonstrates dysphagia, they are maintained on strict nothing by mouth (NPO) followed by a speech and language pathologist (SLP) referral for an appropriate modified diet recommendation. Aspiration prevention techniques included the avoidance of straws, 45-degree positioning, no talking during meals, taking small bites, placement of the aspiration wrist band, and consuming meals out of the bed in a chair. Nursing education was conducted with a newly created online learning module about aspiration pneumonia. The authors identified 979 patients, with an average age of 73.5 years old, who were diagnosed with aspiration pneumonia on the index hospitalization. These patients were reviewed for a 30-day readmission for aspiration pneumonia or stable sepsis, and mortality rates from January 2021 to December 2022 at Overlook Medical Center (OMC). The 30-day readmission rates were significantly lower in the cohort that received the clinical care pathway (35.0% vs. 27.5%, p = 0.011). When evaluating the mortality rates in the pre and post intervention cohort the authors discovered the mortality rates were lower in the post intervention cohort (23.7% vs 22.4%, p = 0.61) Mortality among non-white (self-reported as non-white) patients were lower in the post intervention cohort (34.4% vs. 21.0% , p = 0.05). Patients who reported as a current smoker/vaper in the pre and post cohorts had increased mortality rates (5.9% vs 22%). There was a decrease in mortality for the male population but an increase in mortality for women in the pre and post cohorts (19% vs. 25%). The authors attributed this increase in mortality in the post intervention cohort to more active smokers, more former smokers, and more being admitted from a SNF. This research identified that implementation of an Aspiration Pneumonia Clinical Care Pathway showed a statistically significant decrease in readmission rates and mortality rates in non-whites. The 30-day readmission rates were lower in the cohort that received the clinical care pathway (35.0% vs. 27.5%, p = 0.011).Keywords: aspiration pneumonia, mortality, quality improvement, 30-day pneumonia readmissions
Procedia PDF Downloads 6224930 The Analogy of Visual Arts and Visual Literacy
Authors: Lindelwa Pepu
Abstract:
Visual Arts and Visual Literacy are defined with distinction from one another. Visual Arts are known for art forms such as drawing, painting, and photography, just to name a few. At the same time, Visual Literacy is known for learning through images. The Visual Literacy phenomenon may be attributed to the use of images was first established for creating memories and enjoyment. As time evolved, images became the center and essential means of making contact between people. Gradually, images became a means for interpreting and understanding words through visuals, that being Visual Arts. The purpose of this study is to present the analogy of the two terms Visual Arts and Visual Literacy, which are defined and compared through early practicing visual artists as well as relevant researchers to reveal how they interrelate with one another. This is a qualitative study that uses an interpretive approach as it seeks to understand and explain the interest of the study. The results reveal correspondence of the analogy between the two terms through various writers of early and recent years. This study recommends the significance of the two terms and the role they play in relation to other fields of study.Keywords: visual arts, visual literacy, pictures, images
Procedia PDF Downloads 16624929 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 13624928 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning
Procedia PDF Downloads 15124927 Testing the Change in Correlation Structure across Markets: High-Dimensional Data
Authors: Malay Bhattacharyya, Saparya Suresh
Abstract:
The Correlation Structure associated with a portfolio is subjected to vary across time. Studying the structural breaks in the time-dependent Correlation matrix associated with a collection had been a subject of interest for a better understanding of the market movements, portfolio selection, etc. The current paper proposes a methodology for testing the change in the time-dependent correlation structure of a portfolio in the high dimensional data using the techniques of generalized inverse, singular valued decomposition and multivariate distribution theory which has not been addressed so far. The asymptotic properties of the proposed test are derived. Also, the performance and the validity of the method is tested on a real data set. The proposed test performs well for detecting the change in the dependence of global markets in the context of high dimensional data.Keywords: correlation structure, high dimensional data, multivariate distribution theory, singular valued decomposition
Procedia PDF Downloads 12524926 Development and Evaluation of a Portable Ammonia Gas Detector
Authors: Jaheon Gu, Wooyong Chung, Mijung Koo, Seonbok Lee, Gyoutae Park, Sangguk Ahn, Hiesik Kim, Jungil Park
Abstract:
In this paper, we present a portable ammonia gas detector for performing the gas safety management efficiently. The display of the detector is separated from its body. The display module is received the data measured from the detector using ZigBee. The detector has a rechargeable li-ion battery which can be use for 11~12 hours, and a Bluetooth module for sending the data to the PC or the smart devices. The data are sent to the server and can access using the web browser or mobile application. The range of the detection concentration is 0~100ppm.Keywords: ammonia, detector, gas, portable
Procedia PDF Downloads 41724925 Heeled Shoes and The Sexes: Differences in Gait Implications
Authors: Jonathan de Rothewelle
Abstract:
Heeled shoes are notoriously bad for physical health. The vast majority of Americans have suffered lower extremity pain at some point in their lives; women have been in pain for centuries. More recently, however, with an increase in number due to cultural shifts in acceptability, more men wear heeled shoes. Men who wear heels (MWWH) also suffer lower limb pain. In my hypothesis, their pathologies should be treated as unique due to males’ difference in body mass, center of gravity, posture, gait, and foot anatomy when compared with their female counterparts. These differences alone warrant a closer examination of the pathologies associated with the wearing of heeled shoes among male populations. This research performs a broad literature review on the differences between male and female anatomy and discusses implications on heel wearing. This research discusses the need for further inquiry and makes recommendations for future study.Keywords: heeled shoes, gait, pathologies, biological sex
Procedia PDF Downloads 11924924 Development of a Shape Based Estimation Technology Using Terrestrial Laser Scanning
Authors: Gichun Cha, Byoungjoon Yu, Jihwan Park, Minsoo Park, Junghyun Im, Sehwan Park, Sujung Sin, Seunghee Park
Abstract:
The goal of this research is to estimate a structural shape change using terrestrial laser scanning. This study proceeds with development of data reduction and shape change estimation algorithm for large-capacity scan data. The point cloud of scan data was converted to voxel and sampled. Technique of shape estimation is studied to detect changes in structure patterns, such as skyscrapers, bridges, and tunnels based on large point cloud data. The point cloud analysis applies the octree data structure to speed up the post-processing process for change detection. The point cloud data is the relative representative value of shape information, and it used as a model for detecting point cloud changes in a data structure. Shape estimation model is to develop a technology that can detect not only normal but also immediate structural changes in the event of disasters such as earthquakes, typhoons, and fires, thereby preventing major accidents caused by aging and disasters. The study will be expected to improve the efficiency of structural health monitoring and maintenance.Keywords: terrestrial laser scanning, point cloud, shape information model, displacement measurement
Procedia PDF Downloads 23524923 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging
Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury
Abstract:
This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server
Procedia PDF Downloads 220