Search results for: decentralized data platform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26121

Search results for: decentralized data platform

23601 Analyzing Log File of Community Question Answering for Online Learning

Authors: Long Chen

Abstract:

With the proliferation of E-Learning, collaborative learning becomes more and more popular in various teaching and learning occasions. Studies over the years have proved that actively participating in classroom discussion can enhance student's learning experience, consolidating their knowledge and understanding of the class content. Collaborative learning can also allow students to share their resources and knowledge by exchanging, absorbing, and observing one another's opinions and ideas. Community Question Answering (CQA) services are particularly suitable paradigms for collaborative learning, since it is essentially an online collaborative learning platform where one can get information from multiple sources for he/her to choose from. However, current CQA services have only achieved limited success in collaborative learning due to the uncertainty of answers' quality. In this paper, we predict the quality of answers in a CQA service, i.e. Yahoo! Answers, for the use of online education and distance learning, which would enable a student to find relevant answers and potential answerers more effectively and efficiently, and thus greatly increase students' user experience in CQA services. Our experiment reveals that the quality of answers is influenced by a series of factors such as asking time, relations between users, and his/her experience in the past. We also show that by modelling user's profile with our proposed personalized features, student's satisfaction towards the provided answers could be accurately estimated.

Keywords: Community Question Answering, Collaborative Learning, Log File, Co-Training

Procedia PDF Downloads 437
23600 Investigation of Maritime Accidents with Exploratory Data Analysis in the Strait of Çanakkale (Dardanelles)

Authors: Gizem Kodak

Abstract:

The Strait of Çanakkale, together with the Strait of Istanbul and the Sea of Marmara, form the Turkish Straits System. In other words, the Strait of Çanakkale is the southern gate of the system that connects the Black Sea countries with the other countries of the world. Due to the heavy maritime traffic, it is important to scientifically examine the accident characteristics in the region. In particular, the results indicated by the descriptive statistics are of critical importance in order to strengthen the safety of navigation. At this point, exploratory data analysis offers strategic outputs in terms of defining the problem and knowing the strengths and weaknesses against possible accident risk. The study aims to determine the accident characteristics in the Strait of Çanakkale with temporal and spatial analysis of historical data, using Exploratory Data Analysis (EDA) as the research method. The study's results will reveal the general characteristics of maritime accidents in the region and form the infrastructure for future studies. Therefore, the text provides a clear description of the research goals and methodology, and the study's contributions are well-defined.

Keywords: maritime accidents, EDA, Strait of Çanakkale, navigational safety

Procedia PDF Downloads 92
23599 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 403
23598 Research on Sensitivity of Geological Disasters in Road Area Based on Analytic Hierarchy Process

Authors: Li Yongyi

Abstract:

In order to explore the distribution of geological disasters within the expressway area of Shaanxi Province, the Analytic Hierarchy Process theory is applied based on the geographic information system technology platform, and the ground elevation, rainfall, vegetation coverage and other indicators are selected for analysis, and the expressway area is sensitive Sexual evaluation. The results show that the highway area disasters in Shaanxi Province are mainly distributed in the southern mountainous areas and are dominated by landslides; the disaster area ratio basically increases with the increase in ground elevation, surface slope, surface undulation, rainfall, and vegetation coverage. The increase in the distance from the river shows a decreasing trend; after grading the disaster sensitivity within 5km of the expressway, the extremely sensitive area, the highly sensitive area, the medium sensitive area, the low sensitive area, and the extremely low sensitive area respectively account for 8.17%、15.80%、22.99%、26.22%、26.82%. Highly sensitive road areas are mainly distributed in southern Shaanxi.

Keywords: highway engineering, sensitivity, analytic hierarchy process, geological hazard, road area

Procedia PDF Downloads 93
23597 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 292
23596 Solar Seawater Desalination Still with Seawater Preheater Using Efficient Heat Transfer Oil: Numerical Investigation and Data Verification

Authors: Ahmed N. Shmroukh, Gamal Tag Abdel-Jaber, Rashed D. Aldughpassi

Abstract:

The feasibility of improving the performance of the proposed solar still unit which operated in very hot climate is investigated numerically and verified with experimental data. This solar desalination unit with proposed auxiliary device as seawater preheating system using petrol based textherm oil was used to produce pure fresh water from seawater. The effective evaporation area of basin is about 1 m2. The unit was tested in two main operation modes which are normal and with seawater preheating system. The results showed that, there is good agreement between the theoretical data and the experimental data; this means that the numerical model can be accurately dependable for predicting the proposed solar still performance and design parameters. The results also showed that the fresh water productivity of the solar still in the modified preheating case which is higher than normal case, leads to an increase in productivity of 42%.

Keywords: improving productivity, seawater desalination, solar stills, theoretical model

Procedia PDF Downloads 133
23595 Intelligent System and Renewable Energy: A Farming Platform in Precision Agriculture

Authors: Ryan B. Escorial, Elmer A. Maravillas, Chris Jordan G. Aliac

Abstract:

This study presents a small-scale water pumping system utilizing a fuzzy logic inference system attached to a renewable energy source. The fuzzy logic controller was designed and simulated in MATLAB fuzzy logic toolbox to examine the properties and characteristics of the input and output variables. The result of the simulation was implemented in a microcontroller, together with sensors, modules, and photovoltaic cells. The study used a grand rapid variety of lettuce, organic substrates, and foliar for observation of the capability of the device to irrigate crops. Two plant boxes intended for manual and automated irrigation were prepared with each box having 48 heads of lettuce. The observation of the system took 22-31 days, which is one harvest period of the crop. Results showed a 22.55% increase in agricultural productivity compared to manual irrigation. Aside from reducing human effort, and time, the smart irrigation system could help lessen some of the shortcomings of manual irrigations. It could facilitate the economical utilization of water, reducing consumption by 25%. The use of renewable energy could also help farmers reduce the cost of production by minimizing the use of diesel and gasoline.

Keywords: fuzzy logic, intelligent system, precision agriculture, renewable energy

Procedia PDF Downloads 124
23594 The Parallelization of Algorithm Based on Partition Principle for Association Rules Discovery

Authors: Khadidja Belbachir, Hafida Belbachir

Abstract:

subsequently the expansion of the physical supports storage and the needs ceaseless to accumulate several data, the sequential algorithms of associations’ rules research proved to be ineffective. Thus the introduction of the new parallel versions is imperative. We propose in this paper, a parallel version of a sequential algorithm “Partition”. This last is fundamentally different from the other sequential algorithms, because it scans the data base only twice to generate the significant association rules. By consequence, the parallel approach does not require much communication between the sites. The proposed approach was implemented for an experimental study. The obtained results, shows a great reduction in execution time compared to the sequential version and Count Distributed algorithm.

Keywords: association rules, distributed data mining, partition, parallel algorithms

Procedia PDF Downloads 405
23593 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China

Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng

Abstract:

This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.

Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT

Procedia PDF Downloads 181
23592 A Less Complexity Deep Learning Method for Drones Detection

Authors: Mohamad Kassab, Amal El Fallah Seghrouchni, Frederic Barbaresco, Raed Abu Zitar

Abstract:

Detecting objects such as drones is a challenging task as their relative size and maneuvering capabilities deceive machine learning models and cause them to misclassify drones as birds or other objects. In this work, we investigate applying several deep learning techniques to benchmark real data sets of flying drones. A deep learning paradigm is proposed for the purpose of mitigating the complexity of those systems. The proposed paradigm consists of a hybrid between the AdderNet deep learning paradigm and the Single Shot Detector (SSD) paradigm. The goal was to minimize multiplication operations numbers in the filtering layers within the proposed system and, hence, reduce complexity. Some standard machine learning technique, such as SVM, is also tested and compared to other deep learning systems. The data sets used for training and testing were either complete or filtered in order to remove the images with mall objects. The types of data were RGB or IR data. Comparisons were made between all these types, and conclusions were presented.

Keywords: drones detection, deep learning, birds versus drones, precision of detection, AdderNet

Procedia PDF Downloads 172
23591 Communication About Health and Fitness in Media and Its Hidden Message About Objectification

Authors: Emiko Suzuki

Abstract:

Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.

Keywords: Instagram, fitness, dehumanization, body image, embodiment

Procedia PDF Downloads 133
23590 The Quality Assessment of Seismic Reflection Survey Data Using Statistical Analysis: A Case Study of Fort Abbas Area, Cholistan Desert, Pakistan

Authors: U. Waqas, M. F. Ahmed, A. Mehmood, M. A. Rashid

Abstract:

In geophysical exploration surveys, the quality of acquired data holds significant importance before executing the data processing and interpretation phases. In this study, 2D seismic reflection survey data of Fort Abbas area, Cholistan Desert, Pakistan was taken as test case in order to assess its quality on statistical bases by using normalized root mean square error (NRMSE), Cronbach’s alpha test (α) and null hypothesis tests (t-test and F-test). The analysis challenged the quality of the acquired data and highlighted the significant errors in the acquired database. It is proven that the study area is plain, tectonically least affected and rich in oil and gas reserves. However, subsurface 3D modeling and contouring by using acquired database revealed high degrees of structural complexities and intense folding. The NRMSE had highest percentage of residuals between the estimated and predicted cases. The outcomes of hypothesis testing also proved the biasness and erraticness of the acquired database. Low estimated value of alpha (α) in Cronbach’s alpha test confirmed poor reliability of acquired database. A very low quality of acquired database needs excessive static correction or in some cases, reacquisition of data is also suggested which is most of the time not feasible on economic grounds. The outcomes of this study could be used to assess the quality of large databases and to further utilize as a guideline to establish database quality assessment models to make much more informed decisions in hydrocarbon exploration field.

Keywords: Data quality, Null hypothesis, Seismic lines, Seismic reflection survey

Procedia PDF Downloads 155
23589 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 126
23588 Poz and Play: Exploring the Effectiveness of the Online Teleserye 'Mga Batang Poz' in Influencing the Reproductive Health Practices of Filipino Teenagers

Authors: Arlan Jay Jondonero

Abstract:

The study explores the potential of teleseryes in improving the reproductive health practices of its Filipino teenage viewers. This includes the identification of the elements of teleseryes and the conditions that make it suitable for teleseryes to influence the practices of its viewers, as well as the assessment of how the Sabido methodology was applied in other countries to see if it can be applied in the Philippine context. It discusses the historical context of teleseryes in the Philippines, which are now in the online digital media platform. The study recognizes the role of the social cognitive theory and dramatic theory in a viewer’s acquisition of better reproductive health practices and evaluates if these theories can be applied in the Philippine context. Using the quasi-experimental approach, the study aims to determine if there is a causal relationship between how the online teleserye “Mga Batang Poz” is perceived by the Filipino teenage audience through its characters and storylines and the development of the audience’s knowledge, perceptions, and behaviors surrounding HIV/AIDS. The study looked into the components of the teleserye that made it relatable to the Filipino youth, as well as factors that should be taken into consideration to significantly influence the reproductive health practices of the Filipino youth.

Keywords: entertainment-education, HIV, quasi-experimental, Sabido methodology, teleserye

Procedia PDF Downloads 111
23587 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 328
23586 Sparsity-Based Unsupervised Unmixing of Hyperspectral Imaging Data Using Basis Pursuit

Authors: Ahmed Elrewainy

Abstract:

Mixing in the hyperspectral imaging occurs due to the low spatial resolutions of the used cameras. The existing pure materials “endmembers” in the scene share the spectra pixels with different amounts called “abundances”. Unmixing of the data cube is an important task to know the present endmembers in the cube for the analysis of these images. Unsupervised unmixing is done with no information about the given data cube. Sparsity is one of the recent approaches used in the source recovery or unmixing techniques. The l1-norm optimization problem “basis pursuit” could be used as a sparsity-based approach to solve this unmixing problem where the endmembers is assumed to be sparse in an appropriate domain known as dictionary. This optimization problem is solved using proximal method “iterative thresholding”. The l1-norm basis pursuit optimization problem as a sparsity-based unmixing technique was used to unmix real and synthetic hyperspectral data cubes.

Keywords: basis pursuit, blind source separation, hyperspectral imaging, spectral unmixing, wavelets

Procedia PDF Downloads 192
23585 Hematologic Inflammatory Markers and Inflammation-Related Hepatokines in Pediatric Obesity

Authors: Mustafa Metin Donma, Orkide Donma

Abstract:

Obesity in children particularly draws attention because it may threaten the individual’s future life due to many chronic diseases it may lead to. Most of these diseases, including obesity itself altogether are related to inflammation. For this reason, inflammation-related parameters gain importance. Within this context, complete blood cell counts, ratios or indices derived from these counts have recently found some platform to be used as inflammatory markers. So far, mostly adipokines were investigated within the field of obesity. The liver is at the center of the metabolic pathways network. Metabolic inflammation is closely associated with cellular dysfunction. In this study, hematologic inflammatory markers and two major hepatokines, cytokines produced predominantly by the liver, fibroblast growth factor-21 (FGF-21) and fetuin A were investigated in pediatric obesity. Two groups were constituted from seventy-six obese children based on World Health Organization criteria. Group 1 was composed of children whose age- and sex-adjusted body mass index (BMI) percentiles were between 95 and 99. Group 2 consists of children who are above the 99ᵗʰ percentile. The first and the latter groups were defined as obese (OB) and morbid obese (MO). Anthropometric measurements of the children were performed. Informed consent forms and the approval of the institutional ethics committee were obtained. Blood cell counts and ratios were determined by an automated hematology analyzer. The related ratios and indexes were calculated. Statistical evaluation of the data was performed by the SPSS program. There was no statistically significant difference in terms of neutrophil-to lymphocyte ratio, monocyte-to-high density lipoprotein cholesterol ratio and the platelet-to-lymphocyte ratio between the groups. Mean platelet volume and platelet distribution width values were decreased (p<0.05), total platelet count, red cell distribution width (RDW) and systemic immune inflammation index values were increased (p<0.01) in MO group. Both hepatokines were increased in the same group; however, increases were not statistically significant. In this group, also a strong correlation was calculated between FGF-21 and RDW when controlled by age, hematocrit, iron and ferritin (r=0.425; p<0.01). In conclusion, the association between RDW, a hematologic inflammatory marker, and FGF-21, an inflammation-related hepatokine, found in MO group is an important finding discriminating between OB and MO children. This association is even more powerful when controlled by age and iron-related parameters.

Keywords: childhood obesity, fetuin A , fibroblast growth factor-21, hematologic markers, red cell distribution width

Procedia PDF Downloads 191
23584 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 440
23583 Investigation of Fluid-Structure-Seabed Interaction of Gravity Anchor under Liquefaction and Scour

Authors: Vinay Kumar Vanjakula, Frank Adam, Nils Goseberg, Christian Windt

Abstract:

When a structure is installed on a seabed, the presence of the structure will influence the flow field around it. The changes in the flow field include, formation of vortices, turbulence generation, waves or currents flow breaking and pressure differentials around the seabed sediment. These changes allow the local seabed sediment to be carried off and results in Scour (erosion). These are a threat to the structure's stability. In recent decades, rapid developments of research work and the knowledge of scour On fixed structures (bridges and Monopiles) in rivers and oceans has been carried out, and very limited research work on scour and liquefaction for gravity anchors, particularly for floating Tension Leg Platform (TLP) substructures. Due to its importance and need for enhancement of knowledge in scour and liquefaction around marine structures, the MarTERA funded a three-year (2020-2023) research program called NuLIMAS (Numerical Modeling of Liquefaction Around Marine Structures). It’s a group consists of European institutions (Universities, laboratories, and consulting companies). The objective of this study is to build a numerical model that replicates the reality, which indeed helps to simulate (predict) underwater flow conditions and to study different marine scour and Liquefication situations. It helps to design a heavyweight anchor for the TLP substructure and to minimize the time and expenditure on experiments. And also, the achieved results and the numerical model will be a basis for the development of other design and concepts For marine structures. The Computational Fluid Dynamics (CFD) numerical model will build in OpenFOAM. A conceptual design of heavyweight anchor for TLP substructure is designed through taking considerations of available state-of-the-art knowledge on scour and Liquefication concepts and references to Previous existing designs. These conceptual designs are validated with the available similar experimental benchmark data and also with the CFD numerical benchmark standards (CFD quality assurance study). CFD optimization model/tool is designed as to minimize the effect of fluid flow, scour, and Liquefication. A parameterized model is also developed to automate the calculation process to reduce user interactions. The parameters such as anchor Lowering Process, flow optimized outer contours, seabed interaction study, and FSSI (Fluid-Structure-Seabed Interactions) are investigated and used to carve the model as to build an optimized anchor.

Keywords: gravity anchor, liquefaction, scour, computational fluid dynamics

Procedia PDF Downloads 140
23582 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 142
23581 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 55
23580 Benzoxaboralone: A Boronic Acid with High Oxidative Stability and Utility in Biological Contexts

Authors: Brian J. Graham, Ronald T. Raines

Abstract:

The presence of a nearly vacant p orbital on boron endows boronic acids with unique abilities as a catalyst and ligand. An organocatalytic process has been developed for the conversion of biomass-derived sugars to 5-hydroxymethylfurfural, which is a platform chemical. Specifically, 2-carboxyphenylboronic acid (2-CPBA) has been shown to be an optimal catalyst for this process, promoting the desired transformation in the absence of metals. The attributes of 2-CPBA as a catalyst led to additional investigations of its structure and reactivity. 2-CPBA was found to exist as a cyclized benzoxaborolone adduct rather than a free carboxylic acid. This cyclization has profound consequences for the oxidative stability of the boronic acid. Stereoelectronic effects within the oxaborolone ring destabilize the oxidation transition state by reducing electron donation from the cyclic oxygen to the developing p orbital on boron. That leads to a 10,000-fold increase in oxidative stability while maintaining the normal reactivity of boronic acids toward diols (e.g., carbohydrates) and nucleophiles in proteins while also presenting numerous hydrogen-bond accepting and donating groups. Thus, benzoxaborolones are useful in catalysis, chemical biology, medicinal chemistry, and allied fields.

Keywords: bioisosteres, boronic acid, catalysis, oxidative stability, pharmacophore, stereoelectronic effects

Procedia PDF Downloads 185
23579 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 418
23578 Research on the Strategy of Old City Reconstruction under Market Orientation: Taking Mutoulong Community in Shenzhen as an Example

Authors: Ziwei Huang

Abstract:

In order to promote Inventory development in Shenzhen, the market-oriented real estate development mode has occupied a dominant position in the urban renewal activities of Shenzhen. This research is based on the theory of role relationship and urban regime, taking the Mutoulong community as the research object. Carries on the case depth analysis found that: Under the situation of absence and dislocation of the government's role, land property rights disputes and lack of communication platforms is the main reason for the problems of nail households and market failures, and the long-term delay in the progress of old city reconstruction. Through the analysis of the cause of the transformation problem and the upper planning and interest coordination mechanism, the optimization strategy of the old city transformation is finally proposed as follows: the establishment of interest coordination platform, the risk assessment of the government's intervention in the preliminary construction of the land, the adaptive construction of laws and regulations, and the re-examination of the interest relationship between the government and the market.

Keywords: Shenzhen city, Mutoulong community, urban regeneration, urban regime theory, role relationship theory

Procedia PDF Downloads 95
23577 The Potential of Key Diabetes-related Social Media Influencers in Health Communication

Authors: Zhaozhang Sun

Abstract:

Health communication is essential in promoting healthy lifestyles, preventing unhealthy behaviours, managing disease conditions, and eventually reducing health disparities. Nowadays, social media provides unprecedented opportunities for enhancing health communication for both healthcare providers and people with health conditions, including self-management of chronic conditions such as diabetes. Meanwhile, a special group of active social media users have started playing a pivotal role in providing health ‘solutions’. Such individuals are often referred to as ‘influencers’ because of their ‘central’ position in the online communication system and the persuasive effect their actions and advice may have on audiences' health-related knowledge, attitudes, confidence and behaviours. Work on social media influencers (SMIs) has gained much attention in a specific research field of “influencer marketing”, which mainly focuses on emphasising the use of SMIs to promote or endorse brands’ products and services in the business. Yet to date, a lack of well-studied and empirical evidence has been conducted to guide the exploration of health-related social media influencers. The failure to investigate health-related SMIs can significantly limit the effectiveness of communicating health on social media. Therefore, this article presents a study to identify key diabetes-related SMIs in the UK and the potential implications of information provided by identified social media influencers on their audiences’ diabetes-related knowledge, attitudes and behaviours to bridge the research gap that exists in linking work on influencers in marketing to health communication. The multidisciplinary theories and methods in social media, communication, marketing and diabetes have been adopted, seeking to provide a more practical and promising approach to investigate the potential of social media influencers in health communication. Twitter was chosen as the social media platform to initially identify health influencers and the Twitter API academic was used to extract all the qualitative data. Health-related Influencer Identification Model was developed based on social network analysis, analytic hierarchy process and other screening criteria. Meanwhile, a two-section English-version online questionnaire has been developed to explore the potential implications of social media influencers’ (SMI’s) diabetes-related narratives on the health-related knowledge, attitudes and behaviours (KAB) of their audience. The paper is organised as follows: first, the theoretical and research background of health communication and social media influencers was discussed. Second, the methodology was described by illustrating the model for the identification of health-related SMIs and the development process of the SMIKAB instrument, followed by the results and discussions. The limitations and contributions of this study were highlighted in the summary.

Keywords: health communication, Interdisciplinary research, social media influencers, diabetes management

Procedia PDF Downloads 110
23576 The Necessity to Standardize Procedures of Providing Engineering Geological Data for Designing Road and Railway Tunneling Projects

Authors: Atefeh Saljooghi Khoshkar, Jafar Hassanpour

Abstract:

One of the main problems of the design stage relating to many tunneling projects is the lack of an appropriate standard for the provision of engineering geological data in a predefined format. In particular, this is more reflected in highway and railroad tunnel projects in which there is a number of tunnels and different professional teams involved. In this regard, comprehensive software needs to be designed using the accepted methods in order to help engineering geologists to prepare standard reports, which contain sufficient input data for the design stage. Regarding this necessity, applied software has been designed using macro capabilities and Visual Basic programming language (VBA) through Microsoft Excel. In this software, all of the engineering geological input data, which are required for designing different parts of tunnels, such as discontinuities properties, rock mass strength parameters, rock mass classification systems, boreability classification, the penetration rate, and so forth, can be calculated and reported in a standard format.

Keywords: engineering geology, rock mass classification, rock mechanic, tunnel

Procedia PDF Downloads 73
23575 The Underestimate of the Annual Maximum Rainfall Depths Due to Coarse Time Resolution Data

Authors: Renato Morbidelli, Carla Saltalippi, Alessia Flammini, Tommaso Picciafuoco, Corrado Corradini

Abstract:

A considerable part of rainfall data to be used in the hydrological practice is available in aggregated form within constant time intervals. This can produce undesirable effects, like the underestimate of the annual maximum rainfall depth, Hd, associated with a given duration, d, that is the basic quantity in the development of rainfall depth-duration-frequency relationships and in determining if climate change is producing effects on extreme event intensities and frequencies. The errors in the evaluation of Hd from data characterized by a coarse temporal aggregation, ta, and a procedure to reduce the non-homogeneity of the Hd series are here investigated. Our results indicate that: 1) in the worst conditions, for d=ta, the estimation of a single Hd value can be affected by an underestimation error up to 50%, while the average underestimation error for a series with at least 15-20 Hd values, is less than or equal to 16.7%; 2) the underestimation error values follow an exponential probability density function; 3) each very long time series of Hd contains many underestimated values; 4) relationships between the non-dimensional ratio ta/d and the average underestimate of Hd, derived from continuous rainfall data observed in many stations of Central Italy, may overcome this issue; 5) these equations should allow to improve the Hd estimates and the associated depth-duration-frequency curves at least in areas with similar climatic conditions.

Keywords: central Italy, extreme events, rainfall data, underestimation errors

Procedia PDF Downloads 187
23574 Objective Evaluation on Medical Image Compression Using Wavelet Transformation

Authors: Amhimmid Mohammed Saffour, Mustafa Mohamed Abdullah

Abstract:

The use of computers for handling image data in the healthcare is growing. However, the amount of data produced by modern image generating techniques is vast. This data might be a problem from a storage point of view or when the data is sent over a network. This paper using wavelet transform technique for medical images compression. MATLAB program, are designed to evaluate medical images storage and transmission time problem at Sebha Medical Center Libya. In this paper, three different Computed Tomography images which are abdomen, brain and chest have been selected and compressed using wavelet transform. Objective evaluation has been performed to measure the quality of the compressed images. For this evaluation, the results show that the Peak Signal to Noise Ratio (PSNR) which indicates the quality of the compressed image is ranging from (25.89db to 34.35db for abdomen images, 23.26db to 33.3db for brain images and 25.5db to 36.11db for chest images. These values shows that the compression ratio is nearly to 30:1 is acceptable.

Keywords: medical image, Matlab, image compression, wavelet's, objective evaluation

Procedia PDF Downloads 283
23573 Understanding the Qualitative Nature of Product Reviews by Integrating Text Processing Algorithm and Usability Feature Extraction

Authors: Cherry Yieng Siang Ling, Joong Hee Lee, Myung Hwan Yun

Abstract:

The quality of a product to be usable has become the basic requirement in consumer’s perspective while failing the requirement ends up the customer from not using the product. Identifying usability issues from analyzing quantitative and qualitative data collected from usability testing and evaluation activities aids in the process of product design, yet the lack of studies and researches regarding analysis methodologies in qualitative text data of usability field inhibits the potential of these data for more useful applications. While the possibility of analyzing qualitative text data found with the rapid development of data analysis studies such as natural language processing field in understanding human language in computer, and machine learning field in providing predictive model and clustering tool. Therefore, this research aims to study the application capability of text processing algorithm in analysis of qualitative text data collected from usability activities. This research utilized datasets collected from LG neckband headset usability experiment in which the datasets consist of headset survey text data, subject’s data and product physical data. In the analysis procedure, which integrated with the text-processing algorithm, the process includes training of comments onto vector space, labeling them with the subject and product physical feature data, and clustering to validate the result of comment vector clustering. The result shows 'volume and music control button' as the usability feature that matches best with the cluster of comment vectors where centroid comments of a cluster emphasized more on button positions, while centroid comments of the other cluster emphasized more on button interface issues. When volume and music control buttons are designed separately, the participant experienced less confusion, and thus, the comments mentioned only about the buttons' positions. While in the situation where the volume and music control buttons are designed as a single button, the participants experienced interface issues regarding the buttons such as operating methods of functions and confusion of functions' buttons. The relevance of the cluster centroid comments with the extracted feature explained the capability of text processing algorithms in analyzing qualitative text data from usability testing and evaluations.

Keywords: usability, qualitative data, text-processing algorithm, natural language processing

Procedia PDF Downloads 280
23572 Differentiation between Different Rangeland Sites Using Principal Component Analysis in Semi-Arid Areas of Sudan

Authors: Nancy Ibrahim Abdalla, Abdelaziz Karamalla Gaiballa

Abstract:

Rangelands in semi-arid areas provide a good source for feeding huge numbers of animals and serving environmental, economic and social importance; therefore, these areas are considered economically very important for the pastoral sector in Sudan. This paper investigates the means of differentiating between different rangelands sites according to soil types using principal component analysis to assist in monitoring and assessment purposes. Three rangeland sites were identified in the study area as flat sandy sites, sand dune site, and hard clay site. Principal component analysis (PCA) was used to reduce the number of factors needed to distinguish between rangeland sites and produce a new set of data including the most useful spectral information to run satellite image processing. It was performed using selected types of data (two vegetation indices, topographic data and vegetation surface reflectance within the three bands of MODIS data). Analysis with PCA indicated that there is a relatively high correspondence between vegetation and soil of the total variance in the data set. The results showed that the use of the principal component analysis (PCA) with the selected variables showed a high difference, reflected in the variance and eigenvalues and it can be used for differentiation between different range sites.

Keywords: principal component analysis, PCA, rangeland sites, semi-arid areas, soil types

Procedia PDF Downloads 177