Search results for: educational data mining
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26873

Search results for: educational data mining

24833 Non-Adherence to Antidepressant Treatment and Its Predictors among Outpatients with Depressive Disorders

Authors: Selam Mulugeta, Barkot Milkias, Mesfin Araya, Abel Worku, Eyasu Mulugeta

Abstract:

In Ethiopia, there is inadequate information on non-adherence to antidepressant treatment in patients with depressive disorders. Having awareness of the pattern of adherence is important in future prognosis, quality of life, and functionality in these patients. This hospital-based cross-sectional quantitative study was done on a sample of 216 consecutive outpatients with depressive disorders. Data were collected using questionnaires through in-person and phone call interviews. The 8-item Morisky scale was used to assess the pattern of medication adherence. Other specially developed tools were used to obtain sociodemographic and clinical information from electronic medical records and patient interviews. Data were analyzed using the Statistical Package for the Social Sciences Version - 25. Univariate and multivariable analyses were carried out to assess factors associated with non-adherence. 90% of the participants had a primary diagnosis of major depressive disorder. Based on the 8-item Morisky Medication Adherence Scale, the prevalence of non-adherence was found to be 84.7%. Living distance between 11 to 50 km from the hospital (AOR= 11, 95% CI (29,46.6)), post-secondary level of education (AOR= 8.3, 95% CI (1, 64.4)) and taking multiple medications (AOR= 6.1, 95% CI (1, 34.9)) were found to have significantly increased odds of non-adherence. Non-adherence was significantly associated with factors such as increased living distance from the hospital, relatively higher educational level, and polypharmacy. Proper and patient-centered psychoeducation, addressing the communication gap between patients and doctors, adherence to prescribing guidelines, avoiding polypharmacy unless indicated & working on accessibility of treatment is essential to decrease non-adherence.

Keywords: depressive disorders, Ethiopia, medication adherence, Addis Ababa

Procedia PDF Downloads 140
24832 The Benefits of Using Transformative Inclusion Practices and Action Research in Teaching Development and Active Participation of Roma Students in the Kindergarten

Authors: Beazidou Eleftheria

Abstract:

Roma children face discrimination in schools where they are the minority. On the other hand, teachers do not identify the specific needs of Roma students for educational and social inclusion and generally use a very restricted repertoire of insufficient strategies for helping them. Modern classrooms can and should look different. Therefore, engaging in transformational learning with young children is a deliberate choice. Transformation implies a different way of thinking and acting. This requires new knowledge that incorporates multiple perspectives and actions in order to generate experiences for further learning. In this way, we build knowledge based on empirical examples, and we share what works efficiently. The present research aims at assisting the participating teachers to improve their teaching inclusive practice, thus ultimately benefiting their students. To increase the impact of transformative efforts with a ‘new’ teaching approach, we implemented a classroom-based action research program for over six months in five kindergarten classrooms with Roma and non-Roma students. More specifically, we explore a) information about participants’ experience of the program and b) if the program is successful in helping participants to change their teaching practice. Action research is, by definition, a form of inquiry that is intended to have both action and research outcomes. The action research process that we followed included five phases: 1. Defining the problem: As teachers said, the Roma students are often the most excluded group in schools (Low social interaction and participation in classroom activities) 2. Developing a plan to address the problem: We decided to address the problem by improving/transforming the inclusive practices that teachers implemented in their classrooms. 3. Acting: implementing the plan: We incorporated new activities for all students with the goals: a) All students being passionate about their learning, b) Teachers must investigate issues in the educational context that are personal and meaningful to children's growth, c) Establishment of a new module for values and skills for all students, d) Raising awareness in culture of Roma, e) Teaching students to reflect. 4. Observing: We explore the potential for transformation in the action research program that involves observations of students’ participation in classroom activities and peer interaction. – thus, generated evidence from data. 5. Reflecting and acting: After analyzing and evaluating the outcomes from data and considering the obstacles during the program’s implementation, we established new goals for the next steps of the program. These are centered in: a) the literacy skills of Roma students and b) the transformation of teacher’s perceptions and believes, which have a powerful impact on their willingness to adopt new teaching strategies. The final evaluation of the program showed a significant achievement of the transformative goals, which were related to the active participation of the Roma students in classroom activities and peer interaction, while the activities which were related to literacy skills did not have the expected results. In conclusion, children were equipped with relevant knowledge and skills to raise their potential and contribute to wider societal development as well as teachers improved their teaching inclusive practice.

Keywords: action research, inclusive practices, kindergarten, transformation

Procedia PDF Downloads 77
24831 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 82
24830 Media Usage, Citizenship Norms, and Political Participation of Transition to Democracy in Indonesia

Authors: Najmuddin Najmuddin

Abstract:

The purpose of this study is to determine whether media usage and change of citizenship norms influence political participation. The focus of this study is to examine citizenship norms in the context of the development of information, and communication technology and how it will impact political participation in the context of Indonesia's transition to democracy. The study use survey method. The main theoretical framework is media and political participation. The results of this study reveal that gender, age and educational background of the respondents did not influence significantly media usage and citizenship norms. The Results also show that educational background is not a factor that distinguishes media usage but it becomes differentiating factor in citizenship norms. The results further show that the media usage has a significant correlation with citizenship norms and citizenship norms has a significant relationship with political participation. In addition, media usage and citizenship norms impact significantly to political participation. The sub-dimensions of citizenship norms (compliance, duty, and engaged citizen) provides a significant contribution to the sub-dimensions of political participation (traditional political participation, modern political participation, civic political participation). Based on the findings it can be concluded that the political euphoria in the era of transition to democracy has changed pattern media usage and citizenship norms of among the young generation.

Keywords: media, citizenship, norms, political, participation, democracy

Procedia PDF Downloads 348
24829 Mapping Tunnelling Parameters for Global Optimization in Big Data via Dye Laser Simulation

Authors: Sahil Imtiyaz

Abstract:

One of the biggest challenges has emerged from the ever-expanding, dynamic, and instantaneously changing space-Big Data; and to find a data point and inherit wisdom to this space is a hard task. In this paper, we reduce the space of big data in Hamiltonian formalism that is in concordance with Ising Model. For this formulation, we simulate the system using dye laser in FORTRAN and analyse the dynamics of the data point in energy well of rhodium atom. After mapping the photon intensity and pulse width with energy and potential we concluded that as we increase the energy there is also increase in probability of tunnelling up to some point and then it starts decreasing and then shows a randomizing behaviour. It is due to decoherence with the environment and hence there is a loss of ‘quantumness’. This interprets the efficiency parameter and the extent of quantum evolution. The results are strongly encouraging in favour of the use of ‘Topological Property’ as a source of information instead of the qubit.

Keywords: big data, optimization, quantum evolution, hamiltonian, dye laser, fermionic computations

Procedia PDF Downloads 190
24828 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 182
24827 Investigation on Performance of Change Point Algorithm in Time Series Dynamical Regimes and Effect of Data Characteristics

Authors: Farhad Asadi, Mohammad Javad Mollakazemi

Abstract:

In this paper, Bayesian online inference in models of data series are constructed by change-points algorithm, which separated the observed time series into independent series and study the change and variation of the regime of the data with related statistical characteristics. variation of statistical characteristics of time series data often represent separated phenomena in the some dynamical system, like a change in state of brain dynamical reflected in EEG signal data measurement or a change in important regime of data in many dynamical system. In this paper, prediction algorithm for studying change point location in some time series data is simulated. It is verified that pattern of proposed distribution of data has important factor on simpler and smother fluctuation of hazard rate parameter and also for better identification of change point locations. Finally, the conditions of how the time series distribution effect on factors in this approach are explained and validated with different time series databases for some dynamical system.

Keywords: time series, fluctuation in statistical characteristics, optimal learning, change-point algorithm

Procedia PDF Downloads 418
24826 A Comparative Study for Various Techniques Using WEKA for Red Blood Cells Classification

Authors: Jameela Ali, Hamid A. Jalab, Loay E. George, Abdul Rahim Ahmad, Azizah Suliman, Karim Al-Jashamy

Abstract:

Red blood cells (RBC) are the most common types of blood cells and are the most intensively studied in cell biology. The lack of RBCs is a condition in which the amount of hemoglobin level is lower than normal and is referred to as “anemia”. Abnormalities in RBCs will affect the exchange of oxygen. This paper presents a comparative study for various techniques for classifyig the red blood cells as normal, or abnormal (anemic) using WEKA. WEKA is an open source consists of different machine learning algorithms for data mining applications. The algorithm tested are Radial Basis Function neural network, Support vector machine, and K-Nearest Neighbors algorithm. Two sets of combined features were utilized for classification of blood cells images. The first set, exclusively consist of geometrical features, was used to identify whether the tested blood cell has a spherical shape or non-spherical cells. While the second set, consist mainly of textural features was used to recognize the types of the spherical cells. We have provided an evaluation based on applying these classification methods to our RBCs image dataset which were obtained from Serdang Hospital-Malaysia, and measuring the accuracy of test results. The best achieved classification rates are 97%, 98%, and 79% for Support vector machines, Radial Basis Function neural network, and K-Nearest Neighbors algorithm respectively

Keywords: red blood cells, classification, radial basis function neural networks, suport vector machine, k-nearest neighbors algorithm

Procedia PDF Downloads 473
24825 Diversability and Diversity: Toward Including Disability/Body-Mind Diversity in Educational Diversity, Equity, and Inclusion

Authors: Jennifer Natalya Fink

Abstract:

Since the racial reckoning of 2020, almost every major educational institution has incorporated diversity, equity, and inclusion (DEI) principles into its administrative, hiring, and pedagogical practices. Yet these DEI principles rarely incorporate explicit language or critical thinking about disability. Despite the fact that according to the World Health Organization, one in five people worldwide is disabled, making disabled people the larger minority group in the world, disability remains the neglected stepchild of DEI. Drawing on disability studies and crip theory frameworks, the underlying causes of this exclusion of disability from DEI, such as stigma, shame, invisible disabilities, institutionalization/segregation/delineation from family, and competing models and definitions of disability are examined. This paper explores both the ideological and practical shifts necessary to include disability in university DEI initiatives. It offers positive examples as well as conceptual frameworks such as 'divers ability' for so doing. Using Georgetown University’s 2020-2022 DEI initiatives as a case study, this paper describes how curricular infusion, accessibility, identity, community, and diversity administration infused one university’s DEI initiatives with concrete disability-inclusive measures. It concludes with a consideration of how the very framework of DEI itself might be challenged and transformed if disability were to be included.

Keywords: diversity, equity, inclusion, disability, crip theory, accessibility

Procedia PDF Downloads 124
24824 Learning Motivation Factors for Pre-Cadets in Armed Forces Academies Preparatory School, Ministry of Defense

Authors: Prachya Kamonphet

Abstract:

The purposes of this research were to study the learning motivation factors for Pre-cadets in Armed Forces Academies Preparatory School, Ministry of Defense. The subjects were 320 Pre-cadets (from all 3-year classes of Pre-cadets, the academic year 2015). The research instruments were questionnaires. The collected data were analyzed by means of Descriptive Statistic and One-Way Analysis of Variance. The results of this study were as follows: The relation between the Pre-cadets’ average grade and the motivation in studying was significance.In the aspect of the environment related to Pre-cadets’ families and the motivation in studying.In the aspect of the environment related to Pre-cadets’ studying, it was found that teaching method, learning place, educational media, relationship between teachers and Pre-cadets, relationship between Pre-cadets and their friends, and relationship between Pre-cadets and the commanders were significant.

Keywords: learning motivation factors, learning motivation, armed forces academies preparatory school, learning

Procedia PDF Downloads 234
24823 Bayesian Borrowing Methods for Count Data: Analysis of Incontinence Episodes in Patients with Overactive Bladder

Authors: Akalu Banbeta, Emmanuel Lesaffre, Reynaldo Martina, Joost Van Rosmalen

Abstract:

Including data from previous studies (historical data) in the analysis of the current study may reduce the sample size requirement and/or increase the power of analysis. The most common example is incorporating historical control data in the analysis of a current clinical trial. However, this only applies when the historical control dataare similar enough to the current control data. Recently, several Bayesian approaches for incorporating historical data have been proposed, such as the meta-analytic-predictive (MAP) prior and the modified power prior (MPP) both for single control as well as for multiple historical control arms. Here, we examine the performance of the MAP and the MPP approaches for the analysis of (over-dispersed) count data. To this end, we propose a computational method for the MPP approach for the Poisson and the negative binomial models. We conducted an extensive simulation study to assess the performance of Bayesian approaches. Additionally, we illustrate our approaches on an overactive bladder data set. For similar data across the control arms, the MPP approach outperformed the MAP approach with respect to thestatistical power. When the means across the control arms are different, the MPP yielded a slightly inflated type I error (TIE) rate, whereas the MAP did not. In contrast, when the dispersion parameters are different, the MAP gave an inflated TIE rate, whereas the MPP did not.We conclude that the MPP approach is more promising than the MAP approach for incorporating historical count data.

Keywords: count data, meta-analytic prior, negative binomial, poisson

Procedia PDF Downloads 112
24822 Strategic Citizen Participation in Applied Planning Investigations: How Planners Use Etic and Emic Community Input Perspectives to Fill-in the Gaps in Their Analysis

Authors: John Gaber

Abstract:

Planners regularly use citizen input as empirical data to help them better understand community issues they know very little about. This type of community data is based on the lived experiences of local residents and is known as "emic" data. What is becoming more common practice for planners is their use of data from local experts and stakeholders (known as "etic" data or the outsider perspective) to help them fill in the gaps in their analysis of applied planning research projects. Utilizing international Health Impact Assessment (HIA) data, I look at who planners invite to their citizen input investigations. Research presented in this paper shows that planners access a wide range of emic and etic community perspectives in their search for the “community’s view.” The paper concludes with how planners can chart out a new empirical path in their execution of emic/etic citizen participation strategies in their applied planning research projects.

Keywords: citizen participation, emic data, etic data, Health Impact Assessment (HIA)

Procedia PDF Downloads 481
24821 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network

Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang

Abstract:

As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.

Keywords: GUI, deep learning, GAN, data augmentation

Procedia PDF Downloads 176
24820 Modelling Rainfall-Induced Shallow Landslides in the Northern New South Wales

Authors: S. Ravindran, Y.Liu, I. Gratchev, D.Jeng

Abstract:

Rainfall-induced shallow landslides are more common in the northern New South Wales (NSW), Australia. From 2009 to 2017, around 105 rainfall-induced landslides occurred along the road corridors and caused temporary road closures in the northern NSW. Rainfall causing shallow landslides has different distributions of rainfall varying from uniform, normal, decreasing to increasing rainfall intensity. The duration of rainfall varied from one day to 18 days according to historical data. The objective of this research is to analyse slope instability of some of the sites in the northern NSW by varying cumulative rainfall using SLOPE/W and SEEP/W and compare with field data of rainfall causing shallow landslides. The rainfall data and topographical data from public authorities and soil data obtained from laboratory tests will be used for this modelling. There is a likelihood of shallow landslides if the cumulative rainfall is between 100 mm to 400 mm in accordance with field data.

Keywords: landslides, modelling, rainfall, suction

Procedia PDF Downloads 169
24819 Machine Learning-Enabled Classification of Climbing Using Small Data

Authors: Nicholas Milburn, Yu Liang, Dalei Wu

Abstract:

Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.

Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence

Procedia PDF Downloads 138
24818 Analysis of Expression Data Using Unsupervised Techniques

Authors: M. A. I Perera, C. R. Wijesinghe, A. R. Weerasinghe

Abstract:

his study was conducted to review and identify the unsupervised techniques that can be employed to analyze gene expression data in order to identify better subtypes of tumors. Identifying subtypes of cancer help in improving the efficacy and reducing the toxicity of the treatments by identifying clues to find target therapeutics. Process of gene expression data analysis described under three steps as preprocessing, clustering, and cluster validation. Feature selection is important since the genomic data are high dimensional with a large number of features compared to samples. Hierarchical clustering and K Means are often used in the analysis of gene expression data. There are several cluster validation techniques used in validating the clusters. Heatmaps are an effective external validation method that allows comparing the identified classes with clinical variables and visual analysis of the classes.

Keywords: cancer subtypes, gene expression data analysis, clustering, cluster validation

Procedia PDF Downloads 144
24817 Learning Analytics in a HiFlex Learning Environment

Authors: Matthew Montebello

Abstract:

Student engagement within a virtual learning environment generates masses of data points that can significantly contribute to the learning analytics that lead to decision support. Ideally, similar data is collected during student interaction with a physical learning space, and as a consequence, data is present at a large scale, even in relatively small classes. In this paper, we report of such an occurrence during classes held in a HiFlex modality as we investigate the advantages of adopting such a methodology. We plan to take full advantage of the learner-generated data in an attempt to further enhance the effectiveness of the adopted learning environment. This could shed crucial light on operating modalities that higher education institutions around the world will switch to in a post-COVID era.

Keywords: HiFlex, big data in higher education, learning analytics, virtual learning environment

Procedia PDF Downloads 193
24816 A Study of School Meals: How Cafeteria Culture Shapes the Eating Habits of Students

Authors: Jillian Correia, Ali Sakkal

Abstract:

Lunchtime can play a pivotal role in shaping student eating habits. Studies have previously indicated that eating a healthy meal during the school day can improve students’ well-being and academic performance, and potentially prevent childhood obesity. This study investigated the school lunch program in the United Kingdom in order to gain an understanding of the attitudes and beliefs surrounding school meals and the realities of student food patterns. Using a qualitative research methodology, this study was conducted in three primary and secondary school systems in London, United Kingdom. In depth interviews consisting of 14 headteachers, teachers, staff, and chefs and fieldwork observations of approximately 830 primary and secondary school students in the three schools’ cafeterias provided the data. The results of interview responses and fieldwork observation yielded the following set of themes: (a) school meals are publicly portrayed as healthful and nutritious, yet students’ eating habits do not align with this advertising, (b) the level of importance placed on school lunch varies widely among participants and generates inconsistent views concerning who is responsible (government, families, caterers, or schools) for students’ eating habits, (c) role models (i.e. teachers and chefs) present varying levels of interaction with students and conflicting approaches when monitoring students’ eating habits. The latter finding expanded upon Osowski, Göranzon, and Fjellström’s (2013) concept of teacher roles to formulate three education philosophies – the Removed Authority Role Model, the Accommodating Role Model, and the Social Educational Role Model – concluding that the Social Educational Role Model was the most effective at fostering an environment that encouraged healthy eating habits and positive behavior. For schools looking to cultivate strong relationships between students and teachers and facilitate healthier eating habits, these findings were used to construct three key recommendations: (1) elevate the lunch environment by encouraging proper dining etiquette, (2) get teachers eating at the table with students, and (3) shift the focus from monitoring behavior to a teacher-student dialogue centered on food awareness.

Keywords: food culture, eating habits, school meals, student behavior, education, food patterns, lunchtime

Procedia PDF Downloads 258
24815 Li-Fi Technology: Data Transmission through Visible Light

Authors: Shahzad Hassan, Kamran Saeed

Abstract:

People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.

Keywords: communication, LED, Li-Fi, Wi-Fi

Procedia PDF Downloads 335
24814 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 88
24813 An Approach for Estimation in Hierarchical Clustered Data Applicable to Rare Diseases

Authors: Daniel C. Bonzo

Abstract:

Practical considerations lead to the use of unit of analysis within subjects, e.g., bleeding episodes or treatment-related adverse events, in rare disease settings. This is coupled with data augmentation techniques such as extrapolation to enlarge the subject base. In general, one can think about extrapolation of data as extending information and conclusions from one estimand to another estimand. This approach induces hierarchichal clustered data with varying cluster sizes. Extrapolation of clinical trial data is being accepted increasingly by regulatory agencies as a means of generating data in diverse situations during drug development process. Under certain circumstances, data can be extrapolated to a different population, a different but related indication, and different but similar product. We consider here the problem of estimation (point and interval) using a mixed-models approach under an extrapolation. It is proposed that estimators (point and interval) be constructed using weighting schemes for the clusters, e.g., equally weighted and with weights proportional to cluster size. Simulated data generated under varying scenarios are then used to evaluate the performance of this approach. In conclusion, the evaluation result showed that the approach is a useful means for improving statistical inference in rare disease settings and thus aids not only signal detection but risk-benefit evaluation as well.

Keywords: clustered data, estimand, extrapolation, mixed model

Procedia PDF Downloads 129
24812 The Impact of Life Skills in the Educational Context on the Integration Processes of Migrants

Authors: Hala Abdulhafiz, Steffi Robak

Abstract:

Introduction: Refugees often arrive in Germany with traumatic experiences, leading to psy-chosocial challenges. According to the World Health Organization's definition, psychosocial life skills help individuals effectively cope with everyday challenges and enhance their overall health and well-being. This study explores life skills acquired in integration courses and their impact on the integration of Syrian migrants. Methods: Qualitative expert interviews identified crucial life skills for successful integration, followed by a qualitative content analysis of integration course textbooks. Additionally, written interviews with former participants of integration courses were conducted. Results: Expert interviews highlighted the significance of communication skills and problem-solving abilities in promoting integration. Emotional and stress management, however, ranked lower in the hierarchy of essential life skills. While many highlighted life skills were addressed and encouraged in textbooks, there was a deficiency in opportunities to strengthen empathy, creativity, emotions, and stress management. The participant survey revealed that respondents possessed some of the defined life skills positively affecting their integration. However, there was a need for enhancing self-esteem, and many struggled with handling emotions and stress situations. Conclusion: The analyzed life skills should be further developed through educational programs and initiatives, with increased emphasis on textbooks.

Keywords: life skills, integration, migration, integration course

Procedia PDF Downloads 70
24811 Gender-based Violence and Associated Factors among Private College Female Students in Harar City, Ethiopia, Jan 2023

Authors: Taju Abdela Mohammed

Abstract:

Introduction: There has been a rise in awareness of violence against young women and girls, particularly when it occurs in educational environments. Gender-based violence in schools is a significant barrier. Therefore, it would be a threat to the achievement of the sustainable development goals, strive for gender equality in all our programs, right from the planning stages, to make sure we are as equitable as possible. Research on the causes, attitudes, and perceptions of gender-based violence was scant. Furthermore, there aren't many studies done on female students attending private colleges. Thus, the purpose of this study is to evaluate the frequency of gender-based violence and related variables among female students attending private colleges in Harar City, Ethiopia. Methodology: A facility-based mixed method concurrent triangulation study design was conducted among 500 randomly selected Private college female students in Harar City. Self-administered questionnaire and an in-depth interview were used to collect the data. The collected data were cleaned and analyzed using a statistical package for social science. Descriptive statistics were conducted and the results were reported using frequency, and percentile. Bivariate logistic regression was performed to identify associated factors. Adjusted odds ratios with 95% confidence intervals and p values < 0.05 were used to explain statistically significant associations. Thematic analysis was used to manually translate, transcribe, and analyze qualitative data. Result: The study showed the prevalence of gender-based violence was 338 (67.6%) (CI 0.432–0.721) Private college female students in Harar city Administration. Age less than 20 years and 20–24 years, [AOR = 0.21, 95% CI (0.03–0.81)] and [AOR = 0.12, 95% CI (0.03–0.51)], tight family control, [AOR = 5.12, 95% CI (1.43–6.9)], Witnessed father abuse mother at childhood; [AOR = 4.04, 95% CI (1.36–12.1)], had drunkenness female or boyfriend; [AOR = 2.12, 95% CI (1.60–14.05)] had significant association with gender-based violence. Conclusion: Our study shows the prevalence of gender-based violence among Private college female students is significant. This is due to the fact that gender-based violence, such as school dropout, unintended pregnancy, abortion, STDs, and psychological disorders, is abandoning young girls' lives and lowering their productivity.

Keywords: female students, gender-violence, harar, Ethiopia

Procedia PDF Downloads 59
24810 Authorization of Commercial Communication Satellite Grounds for Promoting Turkish Data Relay System

Authors: Celal Dudak, Aslı Utku, Burak Yağlioğlu

Abstract:

Uninterrupted and continuous satellite communication through the whole orbit time is becoming more indispensable every day. Data relay systems are developed and built for various high/low data rate information exchanges like TDRSS of USA and EDRSS of Europe. In these missions, a couple of task-dedicated communication satellites exist. In this regard, for Turkey a data relay system is attempted to be defined exchanging low data rate information (i.e. TTC) for Earth-observing LEO satellites appointing commercial GEO communication satellites all over the world. First, justification of this attempt is given, demonstrating duration enhancements in the link. Discussion of preference of RF communication is, also, given instead of laser communication. Then, preferred communication GEOs – including TURKSAT4A already belonging to Turkey- are given, together with the coverage enhancements through STK simulations and the corresponding link budget. Also, a block diagram of the communication system is given on the LEO satellite.

Keywords: communication, GEO satellite, data relay system, coverage

Procedia PDF Downloads 433
24809 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product

Authors: Tanawat Hongthai, Dusit Thanapatay

Abstract:

This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.

Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC

Procedia PDF Downloads 272
24808 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 358
24807 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: anomaly detection, autoencoder, data centers, deep learning

Procedia PDF Downloads 185
24806 Commercial Management vs. Quantity Surveying: Hoax or Harmonization

Authors: Zelda Jansen Van Rensburg

Abstract:

Purpose: This study investigates the perceived disparities between Quantity Surveying and Commercial Management in the construction industry, questioning if these differences are substantive or merely semantic. It aims to challenge the conventional notion of Commercial Managers’ superiority by critically evaluating QS and CM roles, exploring CM integration possibilities, examining qualifications for aspiring Commercial Managers, assessing regulatory frameworks, and considering terminology redefinition for global QS professional enhancement. Design: Utilizing mixed methods like literature reviews, surveys, interviews, and document analyses, this research examines the QS-CM relationship. Insights from industry professionals, academics, and regulatory bodies inform the investigation into changing QS roles. Findings: Empirical data highlight evolving roles, showcasing areas of convergence and divergence between QSs and CM. Potential CM integration into QS practice and qualifications for aspiring Commercial Managers are identified. Limitations/Implications: Limitations include potential bias in self-reported data and findings. Nevertheless, the research informs future practices and educational approaches in QS and CM, reflecting the changing roles and responsibilities of Quantity Surveyors. Practical Implications: Findings inform industry practitioners, educators, and regulators, stressing the need to adapt to changing QS roles and integrate CM principles where applicable. Value to the Conference Theme: Aligned with ‘Evolving roles and responsibilities of Quantity Surveyors,’ this research offers insights crucial for understanding the changing dynamics within the QS profession and informs strategies to navigate these shifts effectively.

Keywords: quantity surveying, commercial management, cost engineering, quantity survey

Procedia PDF Downloads 31
24805 Exploring Utility and Intrinsic Value among UAE Arabic Teachers in Integrating M-Learning

Authors: Dina Tareq Ismail, Alexandria A. Proff

Abstract:

The United Arab Emirates (UAE) is a nation seeking to advance in all fields, particularly education. One area of focus for UAE 2021 agenda is to restructure UAE schools and universities by equipping them with highly developed technology. The agenda also advises educational institutions to prepare students with applicable and transferrable Information and Communication Technology (ICT) skills. Despite the emphasis on ICT and computer literacy skills, there exists limited empirical data on the use of M-Learning in the literature. This qualitative study explores the motivation of higher primary Arabic teachers in private schools toward implementing and integrating M-Learning apps in their classrooms. This research employs a phenomenological approach through the use of semistructured interviews with nine purposefully selected Arabic teachers. The data were analyzed using a content analysis via multiple stages of coding: open, axial, and thematic. Findings reveal three primary themes: (1) Arabic teachers with high levels of procedural knowledge in ICT are more motivated to implement M-Learning; (2) Arabic teachers' perceptions of self-efficacy influence their motivation toward implementation of M-Learning; (3) Arabic teachers implement M-Learning when they possess high utility and/or intrinsic value in these applications. These findings indicate a strong need for further training, equipping, and creating buy-in among Arabic teachers to enhance their ICT skills in implementing M-Learning. Further, given the limited availability of M-Learning apps designed for use in the Arabic language on the market, it is imperative that developers consider designing M-Learning tools that Arabic teachers, and Arabic-speaking students, can use and access more readily. This study contributes to closing the knowledge gap on teacher-motivation for implementing M-Learning in their classrooms in the UAE.

Keywords: ICT skills, m-learning, self-efficacy, teacher-motivation

Procedia PDF Downloads 104
24804 Interlanguage Pragmatics Instruction: Evidence from EFL Teachers

Authors: Asma Ben Abdallah

Abstract:

Interlanguage Pragmatics (ILP) Instruction has brought a lot of enlightenment for Foreign Language Teaching and has secured itself a deserved position in SLA research. In the Tunisian context, ILP instruction remains less explored for academics and educational practitioners. In our experience as teachers, both at secondary school and at university levels, the instruction and assessment of pragmatics seem to be contentious. This paper firstly introduces the theoretical models of Interlanguage pragmatics Instruction and focuses on their implications for foreign language teaching. This study builds on the work of Ben Abdallah (2015) that investigated the effects of pragmatic Instruction on Tunisian EFL Learners where pragmatic Instruction has been approached from the perspective of students and their learning strategies. The data for the present study, however, come from Tunisian EFL teachers by investigating their pragmatics practices and their perceptions of pragmatic instruction. The findings indicated that EFL teachers have pragmatic awareness; yet, their reflections revealed that their awareness was mostly on theoretical pragmatic knowledge, and not explicitly brought into practical pragmatic applications. The paper concludes by promoting pragmatics instruction with the suggestion that EFL teachers should teach pragmatics in class.

Keywords: interlanguage pragmatics theory, pragmatics, pragmatic instruction, SLA

Procedia PDF Downloads 271