Search results for: data subject rights
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27967

Search results for: data subject rights

26317 Effectiveness of High-Intensity Interval Training in Overweight Individuals between 25-45 Years of Age Registered in Sports Medicine Clinic, General Hospital Kalutara

Authors: Dimuthu Manage

Abstract:

Introduction: The prevalence of obesity and obesity-related non-communicable diseases are becoming a massive health concern in the whole world. Physical activity is recognized as an effective solution for this matter. The published data on the effectiveness of High-Intensity Interval Training (HIIT) in improving health parameters in overweight and obese individuals in Sri Lanka is sparse. Hence this study is conducted. Methodology: This is a quasi-experimental study that was conducted at the Sports medicine clinic, General Hospital, Kalutara. Participants have engaged in a programme of HIIT three times per week for six weeks. Data collection was based on precise measurements by using structured and validated methods. Ethical clearance was obtained. Results: Registered number for the study was 48, and only 52% have completed the study. The mean age was 32 (SD=6.397) years, with 64% males. All the anthropometric measurements which were assessed (i.e. waist circumference(P<0.001), weight(P<0.001) and BMI(P<0.001)), body fat percentage(P<0.001), VO2 max(P<0.001), and lipid profile (ie. HDL(P=0.016), LDL(P<0.001), cholesterol(P<0.001), triglycerides(P<0.010) and LDL: HDL(P<0.001)) had shown statistically significant improvement after the intervention with the HIIT programme. Conclusions: This study confirms HIIT as a time-saving and effective exercise method, which helps in preventing obesity as well as non-communicable diseases. HIIT ameliorates body anthropometry, fat percentage, cardiopulmonary status, and lipid profile in overweight and obese individuals markedly. As with the majority of studies, the design of the current study is subject to some limitations. The first is the study focused on a correlational study. If it is a comparative study, comparing it with other methods of training programs would have given more validity. Although the validated tools used to measure variables and the same tools used in pre and post-exercise occasions with the available facilities, it would have been better to measure some of them using gold-standard methods. However, this evidence should be further assessed in larger-scale trials using comparative groups to generalize the efficacy of the HIIT exercise program.

Keywords: HIIT, lipid profile, BMI, VO2 max

Procedia PDF Downloads 64
26316 Relative Influence of Self-Regulation, Emotional Intelligence, Self-Efficacy, and Goal Orientation on School Engagement among Public Secondary School Students in Ibadan, Nigeria

Authors: Ogunremi Beatrice, Oluwole David Adebayo

Abstract:

Public secondary school students are face with some challenges from the parents, government and teachers in school. Some of the challenges that arises from the parents are lack of attention and adequate communication. From the government are unavailability of useful instructional materials, competent and professionally trained teachers for each subject the students do in school. The challenges that arise from the teachers most often are mismanagement of time, inability to understand the capacity of the student and lack class management and follow up. This study investigated self-regulation, emotional intelligence, self-efficacy and goal orientation as predictors of school engagement among public secondary school students in Ibadan. A structured questionnaire was administered on 258 students from six mixed secondary schools in Ibadan. Pearson Product Moment Correlation method was used for data analysis. Four hypothesis were raised and answered, the results showed there is positive and significant relationships between school engagement among public secondary school students and each of the independent variable: Self-regulation, Emotional intelligence, Self-efficacy, Goal orientation. On the basis of these findings, it was recommended that the parents have to encourage their children on how to be goal oriented ,build their self-efficacy skill, to be self-regulated and emotionally intelligent in order to be effective in school and be able to increase their intellectual ability.

Keywords: emotional intelligence, self-efficacy, goal orientation, school engagement, self-regulation

Procedia PDF Downloads 487
26315 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies

Authors: Sook Ching Yee, Angela Siew Hoong Lee

Abstract:

Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.

Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)

Procedia PDF Downloads 363
26314 Big Data Analysis with Rhipe

Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim

Abstract:

Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.

Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe

Procedia PDF Downloads 498
26313 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 144
26312 EcoTeka, an Open-Source Software for Urban Ecosystem Restoration through Technology

Authors: Manon Frédout, Laëtitia Bucari, Mathias Aloui, Gaëtan Duhamel, Olivier Rovellotti, Javier Blanco

Abstract:

Ecosystems must be resilient to ensure cleaner air, better water and soil quality, and thus healthier citizens. Technology can be an excellent tool to support urban ecosystem restoration projects, especially when based on Open Source and promoting Open Data. This is the goal of the ecoTeka application: one single digital tool for tree management which allows decision-makers to improve their urban forestry practices, enabling more responsible urban planning and climate change adaptation. EcoTeka provides city councils with three main functionalities tackling three of their challenges: easier biodiversity inventories, better green space management, and more efficient planning. To answer the cities’ need for reliable tree inventories, the application has been first built with open data coming from the websites OpenStreetMap and OpenTrees, but it will also include very soon the possibility of creating new data. To achieve this, a multi-source algorithm will be elaborated, based on existing artificial intelligence Deep Forest, integrating open-source satellite images, 3D representations from LiDAR, and street views from Mapillary. This data processing will permit identifying individual trees' position, height, crown diameter, and taxonomic genus. To support urban forestry management, ecoTeka offers a dashboard for monitoring the city’s tree inventory and trigger alerts to inform about upcoming due interventions. This tool was co-constructed with the green space departments of the French cities of Alès, Marseille, and Rouen. The third functionality of the application is a decision-making tool for urban planning, promoting biodiversity and landscape connectivity metrics to drive ecosystem restoration roadmap. Based on landscape graph theory, we are currently experimenting with new methodological approaches to scale down regional ecological connectivity principles to local biodiversity conservation and urban planning policies. This methodological framework will couple graph theoretic approach and biological data, mainly biodiversity occurrences (presence/absence) data available on both international (e.g., GBIF), national (e.g., Système d’Information Nature et Paysage) and local (e.g., Atlas de la Biodiversté Communale) biodiversity data sharing platforms in order to help reasoning new decisions for ecological networks conservation and restoration in urban areas. An experiment on this subject is currently ongoing with Montpellier Mediterranee Metropole. These projects and studies have shown that only 26% of tree inventory data is currently geo-localized in France - the rest is still being done on paper or Excel sheets. It seems that technology is not yet used enough to enrich the knowledge city councils have about biodiversity in their city and that existing biodiversity open data (e.g., occurrences, telemetry, or genetic data), species distribution models, landscape graph connectivity metrics are still underexploited to make rational decisions for landscape and urban planning projects. This is the goal of ecoTeka: to support easier inventories of urban biodiversity and better management of urban spaces through rational planning and decisions relying on open databases. Future studies and projects will focus on the development of tools for reducing the artificialization of soils, selecting plant species adapted to climate change, and highlighting the need for ecosystem and biodiversity services in cities.

Keywords: digital software, ecological design of urban landscapes, sustainable urban development, urban ecological corridor, urban forestry, urban planning

Procedia PDF Downloads 73
26311 Survival Data with Incomplete Missing Categorical Covariates

Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar

Abstract:

The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.

Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution

Procedia PDF Downloads 406
26310 Domestic Violence against Rural Women in Haryana State of India

Authors: Jatesh Kathpalia, Subhash Chander

Abstract:

Violence against women has spread into a global epidemic. This has debilitating effect over the performance of women. Due to deep-rooted values, traditional Indian culture women fear the consequences of reporting violence and declare an unwillingness to subject themselves to the shame of being identified as battered women. Main interest was to study types of domestic violence which women face and to encourage them to report the matter. The study involved understanding the nature, extent and types of domestic violence. Two hundred rural women respondents were selected at random, interview schedule was prepared, and victims afflicted with domestic violence were identified. Data were collected and analyzed for different forms of domestic violence faced by women. 60% of the respondents faced domestic violence in different forms. Out of 120 women who were affected, 92.5% faced emotional, 90.8% faced verbal, 49.1% faced economic and 58.3% faced physical violence. 45.0% faced violence within three months of the marriage. Out of these, only 6.6% reported the violence to the police. Frequently faced forms of violence were slapping (27.1%), beating (24.3%) and starvation (25.7%). Number of women who were not allowed to spend money of their own stood at 30.5%. About 50% victims of emotional violence were facing constant criticism by their in-laws. Significant association was found between age, education and socio-economic status of the respondents and domestic violence. Rural women in Haryana face grave problem of domestic violence which need to be curbed for improving condition of women in society.

Keywords: domestic violence against women, economic, emotional, physical and verbal violence, marriage, rural women

Procedia PDF Downloads 390
26309 A Study of Blockchain Oracles

Authors: Abdeljalil Beniiche

Abstract:

The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.

Keywords: blockchain, oracles, oracles design, human oracles

Procedia PDF Downloads 138
26308 The Correlation between Territory Planning and Logistics Development: Methodological Approach

Authors: Ebtissem Sassi, Abdellatif Benabdelhafid, Sami Hammami

Abstract:

Congestion, pollution and space misuse are the major risks in the hinterland. Management of these risks is a major issue for all the actors intervening in territory management. A good mastery of these risks is based on the consideration of environmental and physical constraints since the implementation of a policy integrates simultaneously an efficient use, territorial resources, and financial resources which become increasingly rare. Yet, this balance can be difficult to establish simultaneously by all the actors. Indeed, every actor has often the tendency to favor these objectives in detriment to others. In this framework, we have fixed the objective of designing and achieving a model which will centralize multidisciplinary data and serve the analysis tool as well as a decision support tool. In this article, we will elaborate some methodological axes allowing the good management of the territory system through (i) determination of the structural factors of the decision support system, (ii) integration of methods tools favoring the territorial decisional process. Logistics territory geographic information system is a model dealing with this issue. The objective of this model is to facilitate the exchanges between the actors around a common question which was the research subject of human sciences researchers (geography, economy), nature sciences (ecology) as well as finding an optimal solution for simultaneous responses to all these objectives.

Keywords: complexity, territory, logistics, territory planning, conceptual model, GIS, MCA

Procedia PDF Downloads 136
26307 Investigating of Predisposing Factors for Domestic Violence against Women

Authors: Mozhgan Sigarchian, Shiva Alizadeh, Seyedeh Akram Nazarkardeh

Abstract:

Introduction: The one of the most common forms of violence against women is domestic violence and it is one of the most acute social problems that affecting the individual physical and mental health and, in turn, the health of the family and the community. In all of the world especially in developing country, women suffer violent during her lifetime. Violence against women and girls is a serious threat to health and human rights. Several factors such as low literacy, the low income and poverty affects violence. The purpose of this study was to determine the factors conducive to domestic violence against women in Rasht, Iran, So that based on the findings, preventive measures can be taken to reduce violence and increase support for women. Methods: This is a descriptive-analytic study that was performed on 300 eligible women referred to clinics and physicians' offices in Rasht, Iran, 2017, by convenience sampling method. The questionnaire used included demographic questionnaires and domestic violence with 3 domains: physical, psychological, and sexual violence. Data were analyzed by SPSS software using independent t-test, Chi-square and Mann-Whitney tests. Result: The mean age in the group with and without domestic violence was 28.31 ± 6.097 and 32.52 ± 9.8, respectively. 168 women (56%) were reported to be violent. The results indicate that there is a significant relationship between age, husband's age, number of family members, and educational level of women with violence. But, there was no significant relationship between the duration of marriage, the education of husbands, the occupation of women and their husbands, housing situation, smoking with violence. Conclusion: The results showed that some factors such as education, age, and the number of families can affect the level of violence. According to the results, as well as a high prevalence of domestic violence among women in this study, it is suggested that training be given to families to increase women's empowerment and prevent violence against women.

Keywords: domestic violence, predisposing factors, violence, women

Procedia PDF Downloads 202
26306 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 91
26305 Ending the Multibillionaire: A Solution to Poverty and Violations of the Right to Health

Authors: Andreanna Kalasountas

Abstract:

A rampant health crisis is facing America. That health crisis is poverty. Millions of Americans live without knowing when they will eat or where they will sleep. Meanwhile, there are over 600 multi-billionaires in the United States. “In April 2021, U.S. billionaires had nearly twice as much combined wealth than the bottom half of Americans -- $4.56 trillion vs. $2.62 trillion.” It's disturbingly ironic that we live in a country where there are people with more money than they know what to do with (or could spend in a lifetime) while simultaneously, people are losing their life because they do not have enough money to survive. Accordingly, this paper argues for the end of the multi-billionaire; that wealth be capped, captured, and redistributed to the poorest among us. To accomplish this goal, this paper begins by identifying the problem, advocating for a new measurement of poverty; and concludes with a both legal and tax policy solutions and what implementation of those solutions would look like.

Keywords: health and human rights, law and policy, poverty, wealth gap

Procedia PDF Downloads 103
26304 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering

Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining

Abstract:

DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.

Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)

Procedia PDF Downloads 280
26303 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade

Authors: Drutika Upadhyay

Abstract:

Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.

Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape

Procedia PDF Downloads 130
26302 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 394
26301 Integration of Gravity and Seismic Methods in the Geometric Characterization of a Dune Reservoir: Case of the Zouaraa Basin, NW Tunisia

Authors: Marwa Djebbi, Hakim Gabtni

Abstract:

Gravity is a continuously advancing method that has become a mature technology for geological studies. Increasingly, it has been used to complement and constrain traditional seismic data and even used as the only tool to get information of the sub-surface. In fact, in some regions the seismic data, if available, are of poor quality and hard to be interpreted. Such is the case for the current study area. The Nefza zone is part of the Tellian fold and thrust belt domain in the north west of Tunisia. It is essentially made of a pile of allochthonous units resulting from a major Neogene tectonic event. Its tectonic and stratigraphic developments have always been subject of controversies. Considering the geological and hydrogeological importance of this area, a detailed interdisciplinary study has been conducted integrating geology, seismic and gravity techniques. The interpretation of Gravity data allowed the delimitation of the dune reservoir and the identification of the regional lineaments contouring the area. It revealed the presence of three gravity lows that correspond to the dune of Zouara and Ouchtata separated along with a positive gravity axis espousing the Ain Allega_Aroub Er Roumane axe. The Bouguer gravity map illustrated the compartmentalization of the Zouara dune into two depressions separated by a NW-SE anomaly trend. This constitution was confirmed by the vertical derivative map which showed the individualization of two depressions with slightly different anomaly values. The horizontal gravity gradient magnitude was performed in order to determine the different geological features present in the studied area. The latest indicated the presence of NE-SW parallel folds according to the major Atlasic direction. Also, NW-SE and EW trends were identified. The maxima tracing confirmed this direction by the presence of NE-SW faults, mainly the Ghardimaou_Cap Serrat accident. The quality of the available seismic sections and the absence of borehole data in the region, except few hydraulic wells that been drilled and showing the heterogeneity of the substratum of the dune, required the process of gravity modeling of this challenging area that necessitates to be modeled for the geometrical characterization of the dune reservoir and determine the different stratigraphic series underneath these deposits. For more detailed and accurate results, the scale of study will be reduced in coming research. A more concise method will be elaborated; the 4D microgravity survey. This approach is considered as an expansion of gravity method and its fourth dimension is time. It will allow a continuous and repeated monitoring of fluid movement in the subsurface according to the micro gal (μgall) scale. The gravity effect is a result of a monthly variation of the dynamic groundwater level which correlates with rainfall during different periods.

Keywords: 3D gravity modeling, dune reservoir, heterogeneous substratum, seismic interpretation

Procedia PDF Downloads 302
26300 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 19
26299 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Authors: Nathainail Bashir, Neil Anderson

Abstract:

The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.

Keywords: dipole-dipole, ERT, Karst terrains, MASW

Procedia PDF Downloads 315
26298 Data Science in Military Decision-Making: A Semi-Systematic Literature Review

Authors: H. W. Meerveld, R. H. A. Lindelauf

Abstract:

In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.

Keywords: data science, decision-making, information superiority, literature review, military

Procedia PDF Downloads 169
26297 Effects of Surface Topography on Roughness of Glazed Ceramic Substrates

Authors: R. Sarjahani, M. Sheikhattar, S. Javadpour, B. Hashemi

Abstract:

Glazes and their surface characterization is an important subject for ceramic industries. Fabrication of a super smooth surface resistant to stains is a big improvement for those industries. In this investigation, surface topography of popular glazes such as Zircon and Titania based opaque glazes, calcium based matte glaze and transparent glaze has been analyzed by Marsurf M300, SEM, EDS and XRD. Results shows that surface roughness of glazes seriously depends on surface crystallinity, crystal size and shapes.

Keywords: crystallinity, glaze, surface roughness, topography

Procedia PDF Downloads 568
26296 Wavelets Contribution on Textual Data Analysis

Authors: Habiba Ben Abdessalem

Abstract:

The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.

Keywords: textual data, wavelet, denoising, contingency table

Procedia PDF Downloads 278
26295 On Pooling Different Levels of Data in Estimating Parameters of Continuous Meta-Analysis

Authors: N. R. N. Idris, S. Baharom

Abstract:

A meta-analysis may be performed using aggregate data (AD) or an individual patient data (IPD). In practice, studies may be available at both IPD and AD level. In this situation, both the IPD and AD should be utilised in order to maximize the available information. Statistical advantages of combining the studies from different level have not been fully explored. This study aims to quantify the statistical benefits of including available IPD when conducting a conventional summary-level meta-analysis. Simulated meta-analysis were used to assess the influence of the levels of data on overall meta-analysis estimates based on IPD-only, AD-only and the combination of IPD and AD (mixed data, MD), under different study scenario. The percentage relative bias (PRB), root mean-square-error (RMSE) and coverage probability were used to assess the efficiency of the overall estimates. The results demonstrate that available IPD should always be included in a conventional meta-analysis using summary level data as they would significantly increased the accuracy of the estimates. On the other hand, if more than 80% of the available data are at IPD level, including the AD does not provide significant differences in terms of accuracy of the estimates. Additionally, combining the IPD and AD has moderating effects on the biasness of the estimates of the treatment effects as the IPD tends to overestimate the treatment effects, while the AD has the tendency to produce underestimated effect estimates. These results may provide some guide in deciding if significant benefit is gained by pooling the two levels of data when conducting meta-analysis.

Keywords: aggregate data, combined-level data, individual patient data, meta-analysis

Procedia PDF Downloads 375
26294 Back to Basics: Where is Allah? A Survey of Generation Z Youth at the Canadian University of Dubai

Authors: Said Baadel

Abstract:

The belief of a heavenly God is enshrined to all Abrahamic religions which form the three major religions of the world today. Muslims believe in Allah who is above the seven heavens. The youth in the United Arab Emirates (UAE) study Islamic courses as part of their high school curriculum and are required to take at least one Islamic course at the university level to gain credit hours towards their general education (GENED). This paper provides an insight of what the youth studying in the UAE think of where Allah was. Our analysis reveals that a big number of Muslim youth were not sure, especially those from the Middle Eastern and Arab countries bringing to the conclusion that this subject needs to be revisited again in the course work.

Keywords: Allah, Islam, Tawheed, religion

Procedia PDF Downloads 237
26293 Analyzing On-Line Process Data for Industrial Production Quality Control

Authors: Hyun-Woo Cho

Abstract:

The monitoring of industrial production quality has to be implemented to alarm early warning for unusual operating conditions. Furthermore, identification of their assignable causes is necessary for a quality control purpose. For such tasks many multivariate statistical techniques have been applied and shown to be quite effective tools. This work presents a process data-based monitoring scheme for production processes. For more reliable results some additional steps of noise filtering and preprocessing are considered. It may lead to enhanced performance by eliminating unwanted variation of the data. The performance evaluation is executed using data sets from test processes. The proposed method is shown to provide reliable quality control results, and thus is more effective in quality monitoring in the example. For practical implementation of the method, an on-line data system must be available to gather historical and on-line data. Recently large amounts of data are collected on-line in most processes and implementation of the current scheme is feasible and does not give additional burdens to users.

Keywords: detection, filtering, monitoring, process data

Procedia PDF Downloads 559
26292 Unveiling Irregular Migration: An Evaluation of Airport Interventions and Geographic Trends in Sri Lanka

Authors: Abewardhana Arachchi Bandula Dimuthu Priyadarshana Abewardhana, Rasika Nirosh Gonapinuwala Vithanage, Karawe Thanthreege Amila Madusanka Perera, Asanka Sanjeewa Karunarathne, Navullage Mayuri Radhika Perera

Abstract:

The phenomenon of irregular migration and human trafficking presents multifaceted challenges to Sri Lanka, with specific focus on the migration routes to the United Arab Emirates (UAE), the Sultanate of Oman, and Malaysia. This research critically assesses the efficacy of a pilot project instituted at Bandaranaike International Airport aimed at the identification and deterrence of potential irregular migrants. Additionally, the study conducts a nuanced analysis of the geographical tendencies pertaining to passengers who revise their migration intentions at the airport. Pertinently, the findings indicate that Colombo and Gampaha Districts emerge as the most susceptible to human trafficking, with Galle, Nuwaraeliya, Rathnapura, and Polonnaruwa Districts following as areas of elevated concern, particularly within the framework of the 'visit visa' scenario. These insights emanate from an extensive data collection period spanning 50 days of the pilot project, encompassing 1,479 passengers, of which 46 returnees reported to the Safe Migration Promotion Unit. The research is founded on the twin objectives of comprehending the motivations of passengers and evaluating the effectiveness of interventions, with a view to devising precision-targeted prevention strategies. Through this endeavor, the study actively contributes to the safeguarding of the rights and welfare of migrants, significantly advancing the ongoing battle against irregular migration.

Keywords: irregular migration, human trafficking, airport interventions, geographic trends

Procedia PDF Downloads 84
26291 A Review of Travel Data Collection Methods

Authors: Muhammad Awais Shafique, Eiji Hato

Abstract:

Household trip data is of crucial importance for managing present transportation infrastructure as well as to plan and design future facilities. It also provides basis for new policies implemented under Transportation Demand Management. The methods used for household trip data collection have changed with passage of time, starting with the conventional face-to-face interviews or paper-and-pencil interviews and reaching to the recent approach of employing smartphones. This study summarizes the step-wise evolution in the travel data collection methods. It provides a comprehensive review of the topic, for readers interested to know the changing trends in the data collection field.

Keywords: computer, smartphone, telephone, travel survey

Procedia PDF Downloads 314
26290 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 138
26289 Transgressing Gender Norms in Addiction Treatment

Authors: Sara Matsuzaka

Abstract:

At the center of emerging policy debates on the rights of transgender individuals in public accommodations is the collision of gender binary views with transgender perspectives that challenge conventional gender norms. The results of such socio-political debates could have significant ramifications for the policies and infrastructures of public and private institutions nationwide, including within the addiction treatment field. Despite having disproportionately high rates of substance use disorder compared to the general population, transgender individuals experience significant barriers to engaging in addiction treatment programs. Inpatient addiction treatment centers were originally designed to treat heterosexual cisgender populations and, as such, feature gender segregated housing, bathrooms, and counseling sessions. Such heteronormative structural barriers, combined with exposures to stigmatic al attitudes, may dissuade transgender populations from benefiting from the addiction treatment they so direly need. A literature review is performed to explore the mechanisms by which gender segregation alienates transgender populations within inpatient addiction treatment. The constituent parts of the current debate on the rights of transgender individuals in public accommodations are situated the context of inpatient addiction treatment facilities. Minority Stress Theory is used as a theoretical framework for understanding substance abuse issues among transgender populations as a maladaptive behavioral response for coping with chronic stressors related to gender minority status and intersecting identities. The findings include that despite having disproportionately high rates of substance use disorder compared to the general population, transgender individuals experience significant barriers to engaging in and benefiting from addiction treatment. These barriers are present in the form of anticipated or real interpersonal stigma and discrimination by service providers and structural stigma in the form of policy and programmatic components in addiction treatment that marginalize transgender populations. Transphobic manifestations within addiction treatment may dissuade transgender individuals from seeking help, if not reinforce a lifetime of stigmatic experience, potentially exacerbating their substance use issues. Conclusive recommendations for social workers and addiction treatment professionals include: (1) dismantling institutional policies around gender segregation that alienate transgender individuals, (2) developing policies that provide full protections for transgender clients against discrimination based on their gender identity, and (3) implementing trans-affirmative cultural competency training requirements for all staff. Directions for future research are provided.

Keywords: addiction treatment, gender segregation, stigma, transgender

Procedia PDF Downloads 214
26288 Multivariate Assessment of Mathematics Test Scores of Students in Qatar

Authors: Ali Rashash Alzahrani, Elizabeth Stojanovski

Abstract:

Data on various aspects of education are collected at the institutional and government level regularly. In Australia, for example, students at various levels of schooling undertake examinations in numeracy and literacy as part of NAPLAN testing, enabling longitudinal assessment of such data as well as comparisons between schools and states within Australia. Another source of educational data collected internationally is via the PISA study which collects data from several countries when students are approximately 15 years of age and enables comparisons in the performance of science, mathematics and English between countries as well as ranking of countries based on performance in these standardised tests. As well as student and school outcomes based on the tests taken as part of the PISA study, there is a wealth of other data collected in the study including parental demographics data and data related to teaching strategies used by educators. Overall, an abundance of educational data is available which has the potential to be used to help improve educational attainment and teaching of content in order to improve learning outcomes. A multivariate assessment of such data enables multiple variables to be considered simultaneously and will be used in the present study to help develop profiles of students based on performance in mathematics using data obtained from the PISA study.

Keywords: cluster analysis, education, mathematics, profiles

Procedia PDF Downloads 128