Search results for: internet data science
25688 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 29525687 Factors Influencing Telehealth Services for Diabetes Care in Nepal: A Mixed Method Study
Authors: Sumitra Sharma, Christina Parker, Kathleen Finlayson, Clint Douglas, Niall Higgins
Abstract:
Background: Telehealth services have potential to increase accessibility, utilization, and effectiveness of healthcare services. As the telehealth services are yet to integrate within regular hospital services in Nepal, the use of the telehealth services among adults with diabetes is scarce. Prior to implementation of telehealth services for adults with diabetes, it is necessary to examine influencing factors of telehealth services. Objective: This study aimed to investigate factors influencing telehealth services for diabetes care in Nepal. Methods: This study used a mixed-method study design which included a cross-sectional survey among adults with diabetes and semi-structured interviews among key healthcare professionals of Nepal. The study was conducted in a medical out-patient department of a tertiary hospital of Nepal. The survey adapted a previously validated questionnaire, while semi-structured questions for interviews were developed from literature review and experts consultation. All interviews were audio-recorded, and inductive content analysis was used to code transcripts and develop themes. For a survey, a descriptive analysis, chi-square test, and Mann Whitney U test were used to analyze the data. Results: One hundred adults with diabetes were participated in a survey, and seven healthcare professionals were recruited for interviews. In a survey, just over half of the participants (53%) were male, and others were female. Almost all participants (98%) owned a mobile phone, and 67% of them had a computer with internet access at home. Majority of participants had experience in using Facebook messenger (95%), followed by Viber (60%) and Zoom (26%). Almost all of the participants (96%) were willing to use telehealth services. There were significant associations between female sex and participants living 10 km away from the hospital with their willingness to use telehealth services. There was a significant association between participants' self-perception of good health status with their willingness to use video-conference calls and phone calls to use telehealth services. Seven themes were developed from interview data which are related to predisposing, reinforcing, and enabling factors influencing telehealth services for diabetes care in Nepal. Conclusion: In summary, several factors were found to influence the use of telehealth services for diabetes care in Nepal. For effective implementation of a sustainable telehealth services for adults with diabetes in Nepal, these factors need to be considered.Keywords: contributing factors, diabetes mellitus, developing countries, telemedicine, telecare
Procedia PDF Downloads 7225686 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis
Authors: Nathainail Bashir, Neil Anderson
Abstract:
The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.Keywords: dipole-dipole, ERT, Karst terrains, MASW
Procedia PDF Downloads 31525685 Correlation of Hematological Indices with Fasting Blood Glucose Level and Anthropometric Measurements in Geriatric Diabetes Mellitus Subjects in Lagos State University Teaching Hospital, Ikeja, Lagos, Nigeria
Authors: Dada. O.Akinola, Uche. I. Ebele, Bamiro .A.Rafatu, Akinbami A. Akinsegun, Dada O. Adeyemi, Adeyemi. O. Ibukun, Okunowo O.Bolanle, Abdulateef O. Kareem, Ibrahim.N. Ismaila, Dosu Rihanat
Abstract:
Background: Hyperglycaemia alters qualitatively and quantitatively all the full blood count parameters. The alterations among other factors are responsible for the macrovascular and microvascular complications associated with diabetes mellitus (DM). This study is aimed at correlating haematological parameters in DM subjects with their fasting blood glucose (FBG) and anthropometric parameters. Materials and Methods: This was a cross-sectional study of participants attending DM clinic of Lagos State University Teaching Hospital (LASUTH), Ikeja. The study recruited one hundred and two (102) DM subjects and one hundred (100) non-DM controls. Venous blood samples were collected for full blood count (FBC) assay while FBG was done, structured questionnaires were administered, and anthropometric measurements of all participants were done. Data were analyzed with Statistical Package for Social Science (SPSS) version 23. P was set at ≤0.05. Results: The mean age of DM patients was 64.32± 11.31 years. Using a haemoglobin concentration cut-off of 11g/dl, 39.2%, and 13% DM and control participants respectively had values lower than 11g/dl. A total of 22.5% and 3% of DM and controls respectively gave a history of previous blood transfusion.White blood cells count and platelet count means were (6.12±1.60 and 5.30±7.52,p=0.59) and (213.31±73.58 and 228.91±73.21,p = 0.26) *109/L in DM subjects and controls respectively. FBG and all the anthropometric data in DM subjects were significantly higher than in controls. Conclusions: The prevalence of anaemia in DM subjects was three times higher than in controls. The white blood cell count was higher but not statistically significant in DM compared with controls. But platelet count was higher but not statistically significant in controls compared with DM subjects.Keywords: haematological profile, diabetes mellitus, anthropometric data, fasting blood glucose
Procedia PDF Downloads 8525684 Frontier Dynamic Tracking in the Field of Urban Plant and Habitat Research: Data Visualization and Analysis Based on Journal Literature
Authors: Shao Qi
Abstract:
The article uses the CiteSpace knowledge graph analysis tool to sort and visualize the journal literature on urban plants and habitats in the Web of Science and China National Knowledge Infrastructure databases. Based on a comprehensive interpretation of the visualization results of various data sources and the description of the intrinsic relationship between high-frequency keywords using knowledge mapping, the research hotspots, processes and evolution trends in this field are analyzed. Relevant case studies are also conducted for the hotspot contents to explore the means of landscape intervention and synthesize the understanding of research theories. The results show that (1) from 1999 to 2022, the research direction of urban plants and habitats gradually changed from focusing on plant and animal extinction and biological invasion to the field of human urban habitat creation, ecological restoration, and ecosystem services. (2) The results of keyword emergence and keyword growth trend analysis show that habitat creation research has shown a rapid and stable growth trend since 2017, and ecological restoration has gained long-term sustained attention since 2004. The hotspots of future research on urban plants and habitats in China may focus on habitat creation and ecological restoration.Keywords: research trends, visual analysis, habitat creation, ecological restoration
Procedia PDF Downloads 6125683 Wavelets Contribution on Textual Data Analysis
Authors: Habiba Ben Abdessalem
Abstract:
The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.Keywords: textual data, wavelet, denoising, contingency table
Procedia PDF Downloads 27725682 The Development of an Agent-Based Model to Support a Science-Based Evacuation and Shelter-in-Place Planning Process within the United States
Authors: Kyle Burke Pfeiffer, Carmella Burdi, Karen Marsh
Abstract:
The evacuation and shelter-in-place planning process employed by most jurisdictions within the United States is not informed by a scientifically-derived framework that is inclusive of the behavioral and policy-related indicators of public compliance with evacuation orders. While a significant body of work exists to define these indicators, the research findings have not been well-integrated nor translated into useable planning factors for public safety officials. Additionally, refinement of the planning factors alone is insufficient to support science-based evacuation planning as the behavioral elements of evacuees—even with consideration of policy-related indicators—must be examined in the context of specific regional transportation and shelter networks. To address this problem, the Federal Emergency Management Agency and Argonne National Laboratory developed an agent-based model to support regional analysis of zone-based evacuation in southeastern Georgia. In particular, this model allows public safety officials to analyze the consequences that a range of hazards may have upon a community, assess evacuation and shelter-in-place decisions in the context of specified evacuation and response plans, and predict outcomes based on community compliance with orders and the capacity of the regional (to include extra-jurisdictional) transportation and shelter networks. The intention is to use this model to aid evacuation planning and decision-making. Applications for the model include developing a science-driven risk communication strategy and, ultimately, in the case of evacuation, the shortest possible travel distance and clearance times for evacuees within the regional boundary conditions.Keywords: agent-based modeling for evacuation, decision-support for evacuation planning, evacuation planning, human behavior in evacuation
Procedia PDF Downloads 23525681 Customer Churn Analysis in Telecommunication Industry Using Data Mining Approach
Authors: Burcu Oralhan, Zeki Oralhan, Nilsun Sariyer, Kumru Uyar
Abstract:
Data mining has been becoming more and more important and a wide range of applications in recent years. Data mining is the process of find hidden and unknown patterns in big data. One of the applied fields of data mining is Customer Relationship Management. Understanding the relationships between products and customers is crucial for every business. Customer Relationship Management is an approach to focus on customer relationship development, retention and increase on customer satisfaction. In this study, we made an application of a data mining methods in telecommunication customer relationship management side. This study aims to determine the customers profile who likely to leave the system, develop marketing strategies, and customized campaigns for customers. Data are clustered by applying classification techniques for used to determine the churners. As a result of this study, we will obtain knowledge from international telecommunication industry. We will contribute to the understanding and development of this subject in Customer Relationship Management.Keywords: customer churn analysis, customer relationship management, data mining, telecommunication industry
Procedia PDF Downloads 31725680 The Correlation between Political Awareness and Political Participation for University Students’ “Applied Study”
Authors: Rana Mohamed
Abstract:
Despite youth in Egypt were away from political life for a long time; they are able to make a tangible difference in political status. Purpose: This exploratory study aims to determine whether and how much the prevailing political culture influence participatory behavior with a special focus on political awareness factors among university students in Egypt. Methodology: The study employed several data collection methods to ensure the validity of the results, quantitative and qualitative, verifying the positive relationships between the levels of political awareness and political participation and between political values in society and the level of political participation among university students. For achieving the objectives of the paper in the light of the pool of available literature and data, the study adopts system analysis method to apply input-output and conversions associated with the phenomena of political participation to analyze the different factors that have an effect upon the prevailing political culture and the patterns of values in Egyptian society. Findings: The result reveals that the level of political awareness and political participation for students were low, with a statistically significant relationship. In addition, the patterns of values in Egyptian culture significantly influence the levels of student participation. Therefore, the study recommends formulating policies that aim to increase awareness levels and integrate youth into the political process. Originality/Value: The importance of the academic study stems from addressing one of the central issues in political science; this study measures the change in the Egyptian patterns of culture and values among university students.Keywords: political awareness, political participation, civic culture, citizenship, Egyptian universities, political knowledge
Procedia PDF Downloads 25025679 On Pooling Different Levels of Data in Estimating Parameters of Continuous Meta-Analysis
Authors: N. R. N. Idris, S. Baharom
Abstract:
A meta-analysis may be performed using aggregate data (AD) or an individual patient data (IPD). In practice, studies may be available at both IPD and AD level. In this situation, both the IPD and AD should be utilised in order to maximize the available information. Statistical advantages of combining the studies from different level have not been fully explored. This study aims to quantify the statistical benefits of including available IPD when conducting a conventional summary-level meta-analysis. Simulated meta-analysis were used to assess the influence of the levels of data on overall meta-analysis estimates based on IPD-only, AD-only and the combination of IPD and AD (mixed data, MD), under different study scenario. The percentage relative bias (PRB), root mean-square-error (RMSE) and coverage probability were used to assess the efficiency of the overall estimates. The results demonstrate that available IPD should always be included in a conventional meta-analysis using summary level data as they would significantly increased the accuracy of the estimates. On the other hand, if more than 80% of the available data are at IPD level, including the AD does not provide significant differences in terms of accuracy of the estimates. Additionally, combining the IPD and AD has moderating effects on the biasness of the estimates of the treatment effects as the IPD tends to overestimate the treatment effects, while the AD has the tendency to produce underestimated effect estimates. These results may provide some guide in deciding if significant benefit is gained by pooling the two levels of data when conducting meta-analysis.Keywords: aggregate data, combined-level data, individual patient data, meta-analysis
Procedia PDF Downloads 37525678 Schoolwide Implementation of Schema-Based Instruction for Mathematical Problem Solving: An Action Research Investigation
Authors: Sara J. Mills, Sally Howell
Abstract:
The field of special education has long struggled to bridge the research to practice gap. There is ample evidence from research of effective strategies for students with special needs, but these strategies are not routinely implemented in schools in ways that yield positive results for students. In recent years, the field of special education has turned its focus to implementation science. That is, discovering effective methods of implementing evidence-based practices in school settings. Teacher training is a critical factor in implementation. This study aimed to successfully implement Schema-Based Instruction (SBI) for math problem solving in four classrooms in a special primary school serving students with language deficits, including students with Autism Spectrum Disorders (ASD) and Intellectual Disabilities (ID). Using an action research design that allowed for adjustments and modification to be made over the year-long study, two cohorts of teachers across the school were trained and supported in six-week learning cycles to implement SBI in their classrooms. The learning cycles included a one-day training followed by six weeks of one-on-one or team coaching and three fortnightly cohort group meetings. After the first cohort of teachers completed the learning cycle, modifications and adjustments were made to lesson materials in an attempt to improve their effectiveness with the second cohort. Fourteen teachers participated in the study, including master special educators (n=3), special education instructors (n=5), and classroom assistants (n=6). Thirty-one students participated in the study (21 boys and 10 girls), ranging in age from 5 to 12 years (M = 9 years). Twenty-one students had a diagnosis of ASD, 20 had a diagnosis of mild or moderate ID, with 13 of these students having both ASD and ID. The remaining students had diagnosed language disorders. To evaluate the effectiveness of the implementation approach, both student and teacher data was collected. Student data included pre- and post-tests of math word problem solving. Teacher data included fidelity of treatment checklists and pre-post surveys of teacher attitudes and efficacy for teaching problem solving. Finally, artifacts were collected throughout the learning cycle. Results from cohort 1 and cohort 2 revealed similar outcomes. Students improved in the number of word problems they answered correctly and in the number of problem-solving steps completed independently. Fidelity of treatment data showed that teachers implemented SBI with acceptable levels of fidelity (M = 86%). Teachers also reported increases in the amount of time spent teaching problem solving, their confidence in teaching problem solving and their perception of students’ ability to solve math word problems. The artifacts collected during instruction indicated that teachers made modifications to allow their students to access the materials and to show what they knew. These findings are in line with research that shows student learning can improve when teacher professional development is provided over an extended period of time, actively involves teachers, and utilizes a variety of learning methods in classroom contexts. Further research is needed to evaluate whether these gains in teacher instruction and student achievement can be maintained over time once the professional development is completed.Keywords: implementation science, mathematics problem solving, research-to-practice gap, schema based instruction
Procedia PDF Downloads 12525677 Centrality and Patent Impact: Coupled Network Analysis of Artificial Intelligence Patents Based on Co-Cited Scientific Papers
Authors: Xingyu Gao, Qiang Wu, Yuanyuan Liu, Yue Yang
Abstract:
In the era of the knowledge economy, the relationship between scientific knowledge and patents has garnered significant attention. Understanding the intricate interplay between the foundations of science and technological innovation has emerged as a pivotal challenge for both researchers and policymakers. This study establishes a coupled network of artificial intelligence patents based on co-cited scientific papers. Leveraging centrality metrics from network analysis offers a fresh perspective on understanding the influence of information flow and knowledge sharing within the network on patent impact. The study initially obtained patent numbers for 446,890 granted US AI patents from the United States Patent and Trademark Office’s artificial intelligence patent database for the years 2002-2020. Subsequently, specific information regarding these patents was acquired using the Lens patent retrieval platform. Additionally, a search and deduplication process was performed on scientific non-patent references (SNPRs) using the Web of Science database, resulting in the selection of 184,603 patents that cited 37,467 unique SNPRs. Finally, this study constructs a coupled network comprising 59,379 artificial intelligence patents by utilizing scientific papers co-cited in patent backward citations. In this network, nodes represent patents, and if patents reference the same scientific papers, connections are established between them, serving as edges within the network. Nodes and edges collectively constitute the patent coupling network. Structural characteristics such as node degree centrality, betweenness centrality, and closeness centrality are employed to assess the scientific connections between patents, while citation count is utilized as a quantitative metric for patent influence. Finally, a negative binomial model is employed to test the nonlinear relationship between these network structural features and patent influence. The research findings indicate that network structural features such as node degree centrality, betweenness centrality, and closeness centrality exhibit inverted U-shaped relationships with patent influence. Specifically, as these centrality metrics increase, patent influence initially shows an upward trend, but once these features reach a certain threshold, patent influence starts to decline. This discovery suggests that moderate network centrality is beneficial for enhancing patent influence, while excessively high centrality may have a detrimental effect on patent influence. This finding offers crucial insights for policymakers, emphasizing the importance of encouraging moderate knowledge flow and sharing to promote innovation when formulating technology policies. It suggests that in certain situations, data sharing and integration can contribute to innovation. Consequently, policymakers can take measures to promote data-sharing policies, such as open data initiatives, to facilitate the flow of knowledge and the generation of innovation. Additionally, governments and relevant agencies can achieve broader knowledge dissemination by supporting collaborative research projects, adjusting intellectual property policies to enhance flexibility, or nurturing technology entrepreneurship ecosystems.Keywords: centrality, patent coupling network, patent influence, social network analysis
Procedia PDF Downloads 5425676 Artificial Intelligence and Cybernetics in Bertrand Russell’s Philosophy
Authors: Djoudi Ali
Abstract:
In this article, we shall expose some of the more interesting interactions of philosophy and cybernetics, some philosophical issues arising in cybernetic systems, and some questions in philosophy of our daily life related to the artificial intelligence. Many of these are fruitfully explored in the article..This article will shed light also on the importance of science and technology in our life and what are the main problems of misusing the latest technologies known under artificial intelligence and cybernatics acoording to Bertrand Russell’s point of view; then to analyse his project of reforms inculding science progress risks , the article show also the whole aspect of the impact of technology on peace , nature and on individual daily behavior, we shall discuss all issues and defies imposing by this new era , The article will invest in showing what Russell will suggest to eliminate or to slow down the dangers of these changes and what are the main solutions to protect the indiviual’s rights and responsiblities In this article, We followed a different methodology, like analysis method and sometimes the historical or descriptive method, without forgetting criticizing some conclusions when it is logically needed In the end, we mentioned what is supposed to be solutions suggested by Bertrand Russell that should be taken into considerations during the next decades and how to protect our ennvironement and the human being of any risk of disappearingKeywords: artificial intelligence, technology, cybernetics, sience
Procedia PDF Downloads 12525675 Analyzing On-Line Process Data for Industrial Production Quality Control
Authors: Hyun-Woo Cho
Abstract:
The monitoring of industrial production quality has to be implemented to alarm early warning for unusual operating conditions. Furthermore, identification of their assignable causes is necessary for a quality control purpose. For such tasks many multivariate statistical techniques have been applied and shown to be quite effective tools. This work presents a process data-based monitoring scheme for production processes. For more reliable results some additional steps of noise filtering and preprocessing are considered. It may lead to enhanced performance by eliminating unwanted variation of the data. The performance evaluation is executed using data sets from test processes. The proposed method is shown to provide reliable quality control results, and thus is more effective in quality monitoring in the example. For practical implementation of the method, an on-line data system must be available to gather historical and on-line data. Recently large amounts of data are collected on-line in most processes and implementation of the current scheme is feasible and does not give additional burdens to users.Keywords: detection, filtering, monitoring, process data
Procedia PDF Downloads 55925674 A Review of Travel Data Collection Methods
Authors: Muhammad Awais Shafique, Eiji Hato
Abstract:
Household trip data is of crucial importance for managing present transportation infrastructure as well as to plan and design future facilities. It also provides basis for new policies implemented under Transportation Demand Management. The methods used for household trip data collection have changed with passage of time, starting with the conventional face-to-face interviews or paper-and-pencil interviews and reaching to the recent approach of employing smartphones. This study summarizes the step-wise evolution in the travel data collection methods. It provides a comprehensive review of the topic, for readers interested to know the changing trends in the data collection field.Keywords: computer, smartphone, telephone, travel survey
Procedia PDF Downloads 31325673 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 14825672 Estimating Big Five Personality Expressions with a Tiered Information Framework
Authors: Laura Kahn, Paul Rodrigues, Onur Savas, Shannon Hahn
Abstract:
An empirical understanding of an individual's personality expression can have a profound impact on organizations seeking to strengthen team performance and improve employee retention. A team's personality composition can impact overall performance. Creating a tiered information framework that leverages proxies for a user's social context and lexical and linguistic content provides insight into location-specific personality expression. We leverage the layered framework to examine domain-specific, psychological, and lexical cues within social media posts. We apply DistilBERT natural language transfer learning models with real world data to examine the relationship between Big Five personality expressions of people in Science, Technology, Engineering and Math (STEM) fields.Keywords: big five, personality expression, social media analysis, workforce development
Procedia PDF Downloads 13925671 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain
Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami
Abstract:
To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption
Procedia PDF Downloads 13625670 The Knowledge-Behavior Gap in the Online Information Seeking Process
Authors: Yen-Mei Lee
Abstract:
The concept of a knowledge-behavior gap has been discussed for several years. It is addressed that an individual’s knowledge does not sufficiently transfer to his or her actual actions. This concept is mostly focused on fields related to medicine or applied to health care issues to explain how people or patients connect their personal knowledge to actual health care behaviors. To our knowledge, seldomly has this research been applied to discuss people’s online information seeking behavior. In the current study, the main purpose is to investigate the relationship between web users’ personal values and their actual performances when seeking information on the Internet. The total number of twenty-eight participants, divided into one experienced group (n=14) and one novice group (n=14), were recruited and asked to complete a self-report questionnaire of fifty items related to information seeking actions and behaviors. During the execution, participants needed to rate the importance level (how important each item is) and the performance level (how often they actually do each item) from 1 to 10 points on each item. In this paper, the mean scores of the importance and the performance level are analyzed and discussed. The results show that there is a gap between web user’s knowledge and their actual online seeking behaviors. Both experienced group and novice group have higher average scores of the importance level (experienced group = 7.57, novice group = 6.01) than the actual performance level (experienced group = 6.89, novice group = 5.00) in terms of the fifty online information seeking actions. On the other hand, the experienced group perceives more importance of the fifty online seeking actions and performs actual behaviors better than the novice group. Moreover, experienced participants express a consistent result between their concept knowledge and actual behaviors. For instance, they feel extending a seeking strategy is important and frequently perform this action when seeking online. However, novice participants do not have a consistency between their knowledge and behaviors. For example, though they perceive browsing and judging information are less important than they get lost in the online information seeking process. However, in the actual behavior rating, the scores show that novices do browsing and judge information more often than they get lost when seeking information online. These results, therefore, help scholars and educators have a better understanding of the difference between experienced and novice web users regarding their concept knowledge and actual behaviors. In future study, figuring out how to narrow down the knowledge-behavior gap and create practical guidance for novice users to increase their online seeking efficiency is crucial. Not only could it help experienced users be aware of their actual information seeking behaviors, but also help the novice become mastery to concisely obtain information on the Internet.Keywords: experienced web user, information seeking behavior, knowledge-behavior gap, novice, online seeking efficiency
Procedia PDF Downloads 12025669 An Integrated Lightweight Naïve Bayes Based Webpage Classification Service for Smartphone Browsers
Authors: Mayank Gupta, Siba Prasad Samal, Vasu Kakkirala
Abstract:
The internet world and its priorities have changed considerably in the last decade. Browsing on smart phones has increased manifold and is set to explode much more. Users spent considerable time browsing different websites, that gives a great deal of insight into user’s preferences. Instead of plain information classifying different aspects of browsing like Bookmarks, History, and Download Manager into useful categories would improve and enhance the user’s experience. Most of the classification solutions are server side that involves maintaining server and other heavy resources. It has security constraints and maybe misses on contextual data during classification. On device, classification solves many such problems, but the challenge is to achieve accuracy on classification with resource constraints. This on device classification can be much more useful in personalization, reducing dependency on cloud connectivity and better privacy/security. This approach provides more relevant results as compared to current standalone solutions because it uses content rendered by browser which is customized by the content provider based on user’s profile. This paper proposes a Naive Bayes based lightweight classification engine targeted for a resource constraint devices. Our solution integrates with Web Browser that in turn triggers classification algorithm. Whenever a user browses a webpage, this solution extracts DOM Tree data from the browser’s rendering engine. This DOM data is a dynamic, contextual and secure data that can’t be replicated. This proposal extracts different features of the webpage that runs on an algorithm to classify into multiple categories. Naive Bayes based engine is chosen in this solution for its inherent advantages in using limited resources compared to other classification algorithms like Support Vector Machine, Neural Networks, etc. Naive Bayes classification requires small memory footprint and less computation suitable for smartphone environment. This solution has a feature to partition the model into multiple chunks that in turn will facilitate less usage of memory instead of loading a complete model. Classification of the webpages done through integrated engine is faster, more relevant and energy efficient than other standalone on device solution. This classification engine has been tested on Samsung Z3 Tizen hardware. The Engine is integrated into Tizen Browser that uses Chromium Rendering Engine. For this solution, extensive dataset is sourced from dmoztools.net and cleaned. This cleaned dataset has 227.5K webpages which are divided into 8 generic categories ('education', 'games', 'health', 'entertainment', 'news', 'shopping', 'sports', 'travel'). Our browser integrated solution has resulted in 15% less memory usage (due to partition method) and 24% less power consumption in comparison with standalone solution. This solution considered 70% of the dataset for training the data model and the rest 30% dataset for testing. An average accuracy of ~96.3% is achieved across the above mentioned 8 categories. This engine can be further extended for suggesting Dynamic tags and using the classification for differential uses cases to enhance browsing experience.Keywords: chromium, lightweight engine, mobile computing, Naive Bayes, Tizen, web browser, webpage classification
Procedia PDF Downloads 16325668 Dataset Quality Index:Development of Composite Indicator Based on Standard Data Quality Indicators
Authors: Sakda Loetpiparwanich, Preecha Vichitthamaros
Abstract:
Nowadays, poor data quality is considered one of the majority costs for a data project. The data project with data quality awareness almost as much time to data quality processes while data project without data quality awareness negatively impacts financial resources, efficiency, productivity, and credibility. One of the processes that take a long time is defining the expectations and measurements of data quality because the expectation is different up to the purpose of each data project. Especially, big data project that maybe involves with many datasets and stakeholders, that take a long time to discuss and define quality expectations and measurements. Therefore, this study aimed at developing meaningful indicators to describe overall data quality for each dataset to quick comparison and priority. The objectives of this study were to: (1) Develop a practical data quality indicators and measurements, (2) Develop data quality dimensions based on statistical characteristics and (3) Develop Composite Indicator that can describe overall data quality for each dataset. The sample consisted of more than 500 datasets from public sources obtained by random sampling. After datasets were collected, there are five steps to develop the Dataset Quality Index (SDQI). First, we define standard data quality expectations. Second, we find any indicators that can measure directly to data within datasets. Thirdly, each indicator aggregates to dimension using factor analysis. Next, the indicators and dimensions were weighted by an effort for data preparing process and usability. Finally, the dimensions aggregate to Composite Indicator. The results of these analyses showed that: (1) The developed useful indicators and measurements contained ten indicators. (2) the developed data quality dimension based on statistical characteristics, we found that ten indicators can be reduced to 4 dimensions. (3) The developed Composite Indicator, we found that the SDQI can describe overall datasets quality of each dataset and can separate into 3 Level as Good Quality, Acceptable Quality, and Poor Quality. The conclusion, the SDQI provide an overall description of data quality within datasets and meaningful composition. We can use SQDI to assess for all data in the data project, effort estimation, and priority. The SDQI also work well with Agile Method by using SDQI to assessment in the first sprint. After passing the initial evaluation, we can add more specific data quality indicators into the next sprint.Keywords: data quality, dataset quality, data quality management, composite indicator, factor analysis, principal component analysis
Procedia PDF Downloads 14025667 Internet of Things-Based Electric Vehicle Charging Notification
Authors: Nagarjuna Pitty
Abstract:
It is believed invention “Advanced Method and Process Quick Electric Vehicle Charging” is an Electric Vehicles (EVs) are quickly turning into the heralds of vehicle innovation. This study endeavors to address the inquiries of how module charging process correspondence has been performed between the EV and Electric Vehicle Supply Equipment (EVSE). The energy utilization of gas-powered motors is higher than that of electric engines. An invention is related to an Advanced Method and Process Quick Electric Vehicle Charging. In this research paper, readings on the electric vehicle charging approaches will be checked, and the module charging phases will be described comprehensively.Keywords: electric, vehicle, charging, notification, IoT, supply, equipment
Procedia PDF Downloads 7125666 Associated Map and Inter-Purchase Time Model for Multiple-Category Products
Authors: Ching-I Chen
Abstract:
The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce
Procedia PDF Downloads 36825665 Predictive Analysis for Big Data: Extension of Classification and Regression Trees Algorithm
Authors: Ameur Abdelkader, Abed Bouarfa Hafida
Abstract:
Since its inception, predictive analysis has revolutionized the IT industry through its robustness and decision-making facilities. It involves the application of a set of data processing techniques and algorithms in order to create predictive models. Its principle is based on finding relationships between explanatory variables and the predicted variables. Past occurrences are exploited to predict and to derive the unknown outcome. With the advent of big data, many studies have suggested the use of predictive analytics in order to process and analyze big data. Nevertheless, they have been curbed by the limits of classical methods of predictive analysis in case of a large amount of data. In fact, because of their volumes, their nature (semi or unstructured) and their variety, it is impossible to analyze efficiently big data via classical methods of predictive analysis. The authors attribute this weakness to the fact that predictive analysis algorithms do not allow the parallelization and distribution of calculation. In this paper, we propose to extend the predictive analysis algorithm, Classification And Regression Trees (CART), in order to adapt it for big data analysis. The major changes of this algorithm are presented and then a version of the extended algorithm is defined in order to make it applicable for a huge quantity of data.Keywords: predictive analysis, big data, predictive analysis algorithms, CART algorithm
Procedia PDF Downloads 14225664 Examining the Perceived Usefulness of ICTs for Learning about Indigenous Foods
Authors: Khumbuzile M. Ngcobo, Seraphin D. Eyono Obono
Abstract:
Science and technology has a major impact on many societal domains such as communication, medicine, food, transportation, etc. However, this dominance of modern technology can have a negative unintended impact on indigenous systems, and in particular on indigenous foods. This problem serves as a motivation to this study whose aim is to examine the perceptions of learners on the usefulness of Information and Communication Technologies (ICT's) for learning about indigenous foods. This aim will be subdivided into two types of research objectives. The design and identification of theories and models will be achieved using literature content analysis. The objective on the empirical testing of such theories and models will be achieved through the survey of Hospitality studies learners from different schools in the iLembe and Umgungundlovu Districts of the South African Kwazulu-Natal province. SPSS is used to quantitatively analyse the data collected by the questionnaire of this survey using descriptive statistics and Pearson correlations after the assessment of the validity and the reliability of the data. The main hypothesis behind this study is that there is a connection between the demographics of learners, their perceptions on the usefulness of ICTs for learning about indigenous foods and the following personality an e-learning related theories constructs: computer self-efficacy, trust in ICT systems, and conscientiousness; as suggested by existing studies on learning theories. This hypothesis was fully confirmed by the survey conducted by this study except for the demographic factors where gender and age were not found to be determinant factors of learners’ perceptions on the usefulness of ICT's for learning about indigenous foods.Keywords: e-learning, indigenous foods, information and communication technologies, learning theories, personality
Procedia PDF Downloads 28025663 Canopy Temperature Acquired from Daytime and Nighttime Aerial Data as an Indicator of Trees’ Health Status
Authors: Agata Zakrzewska, Dominik Kopeć, Adrian Ochtyra
Abstract:
The growing number of new cameras, sensors, and research methods allow for a broader application of thermal data in remote sensing vegetation studies. The aim of this research was to check whether it is possible to use thermal infrared data with a spectral range (3.6-4.9 μm) obtained during the day and the night to assess the health condition of selected species of deciduous trees in an urban environment. For this purpose, research was carried out in the city center of Warsaw (Poland) in 2020. During the airborne data acquisition, thermal data, laser scanning, and orthophoto map images were collected. Synchronously with airborne data, ground reference data were obtained for 617 studied species (Acer platanoides, Acer pseudoplatanus, Aesculus hippocastanum, Tilia cordata, and Tilia × euchlora) in different health condition states. The results were as follows: (i) healthy trees are cooler than trees in poor condition and dying both in the daytime and nighttime data; (ii) the difference in the canopy temperatures between healthy and dying trees was 1.06oC of mean value on the nighttime data and 3.28oC of mean value on the daytime data; (iii) condition classes significantly differentiate on both daytime and nighttime thermal data, but only on daytime data all condition classes differed statistically significantly from each other. In conclusion, the aerial thermal data can be considered as an alternative to hyperspectral data, a method of assessing the health condition of trees in an urban environment. Especially data obtained during the day, which can differentiate condition classes better than data obtained at night. The method based on thermal infrared and laser scanning data fusion could be a quick and efficient solution for identifying trees in poor health that should be visually checked in the field.Keywords: middle wave infrared, thermal imagery, tree discoloration, urban trees
Procedia PDF Downloads 11525662 Reliability of Movement Assessment Battery for Children-2 Age Band 3 Using Multiple Testers
Authors: Jernice S. Y. Tan
Abstract:
Introduction: Reliability within and between testers is vital to ensure the accuracy of any motor assessment instrument. However, reliability checks of the Movement Assessment Battery for Children-2 (MABC-2) age band 3 using multiple testers assigned to different MABC-2 tasks for the same group of participants are uncommon. Multiple testers were not stated as a choice in the MABC-2 manual. Therefore, the purpose of this study was to determine the inter- and intra-tester reliability for using multiple testers to administer the test protocols of MABC-2 age band 3. Methods: Thirty volunteered adolescents (n = 30; 15 males, 15 females; age range: 13 – 16 years) performed the eight tasks in a randomised sequence at three different test stations for the MABC-2 task components (Manual Dexterity, Aiming and Catching, Balance). Ethics approval and parental consent were obtained. The participants were videotaped while performing the test protocols of MABC-2 age band 3. Five testers were involved in the data collection process. They were Sports Science graduating students doing their final year project and were supervised by experienced motor assessor. Inter- and intra-tester reliability checks using intra-class coefficient (ICC) were carried out using the videotaped data. Results: The inter-tester reliability between the five testers for the eight tasks ranged from rᵢcc = 0.705 to rᵢcc = 0.995. This suggests that the average agreement between them was considered good to excellent. With the exception of one tester who had rᵢcc = 0.687 for one of the eight tasks (i.e. zip-zap hopping), the intra-tester reliability within each tester ranged from rᵢcc = 0.728 to rᵢcc = 1.000, and this also suggested good to excellent consistency within testers. Discussion: The use of multiple testers with good intra-tester reliability for different test stations is feasible. This method allows several participants to be assessed concurrently at different test stations and saves overall data collection time. Therefore, it is recommended that the administering of MABC-2 with multiple testers should be extended to other age bands ensuring the feasibility of such method for other age bands.Keywords: adolescents, MABC, motor assessment, motor skills, reliability
Procedia PDF Downloads 32325661 Design of a Rectifier with Enhanced Efficiency and a High-gain Antenna for Integrated and Compact-size Rectenna Circuit
Authors: Rawaa Maher, Ahmed Allam, Haruichi Kanaya, Adel B. Abdelrahman
Abstract:
In this paper, a compact, high-efficiency integrated rectenna is presented to operate in the 2.45 GHz band. A comparison between two rectifier topologies is performed to verify the benefits of removing the matching network from the rectifier. A rectifier high conversion efficiency of 74.1% is achieved. To complete the rectenna system, a novel omnidirectional antenna with high gain (3.72 dB) and compact size (25 mm * 29 mm) is designed and fabricated. The same antenna is used with a reflector for raising the gain to nearly 8.3 dB. The simulation and measurement results of the antenna are in good agreement.Keywords: internet of things, integrated rectenna, rectenna, RF energy harvesting, wireless sensor networks(WSN)
Procedia PDF Downloads 18225660 Hierarchical Clustering Algorithms in Data Mining
Authors: Z. Abdullah, A. R. Hamdan
Abstract:
Clustering is a process of grouping objects and data into groups of clusters to ensure that data objects from the same cluster are identical to each other. Clustering algorithms in one of the areas in data mining and it can be classified into partition, hierarchical, density based, and grid-based. Therefore, in this paper, we do a survey and review for four major hierarchical clustering algorithms called CURE, ROCK, CHAMELEON, and BIRCH. The obtained state of the art of these algorithms will help in eliminating the current problems, as well as deriving more robust and scalable algorithms for clustering.Keywords: clustering, unsupervised learning, algorithms, hierarchical
Procedia PDF Downloads 88525659 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 160