Search results for: food composition data
27119 Optimized Electron Diffraction Detection and Data Acquisition in Diffraction Tomography: A Complete Solution by Gatan
Authors: Saleh Gorji, Sahil Gulati, Ana Pakzad
Abstract:
Continuous electron diffraction tomography, also known as microcrystal electron diffraction (MicroED) or three-dimensional electron diffraction (3DED), is a powerful technique, which in combination with cryo-electron microscopy (cryo-ED), can provide atomic-scale 3D information about the crystal structure and composition of different classes of crystalline materials such as proteins, peptides, and small molecules. Unlike the well-established X-ray crystallography method, 3DED does not require large single crystals and can collect accurate electron diffraction data from crystals as small as 50 – 100 nm. This is a critical advantage as growing larger crystals, as required by X-ray crystallography methods, is often very difficult, time-consuming, and expensive. In most cases, specimens studied via 3DED method are electron beam sensitive, which means there is a limitation on the maximum amount of electron dose one can use to collect the required data for a high-resolution structure determination. Therefore, collecting data using a conventional scintillator-based fiber coupled camera brings additional challenges. This is because of the inherent noise introduced during the electron-to-photon conversion in the scintillator and transfer of light via the fibers to the sensor, which results in a poor signal-to-noise ratio and requires a relatively higher and commonly specimen-damaging electron dose rates, especially for protein crystals. As in other cryo-EM techniques, damage to the specimen can be mitigated if a direct detection camera is used which provides a high signal-to-noise ratio at low electron doses. In this work, we have used two classes of such detectors from Gatan, namely the K3® camera (a monolithic active pixel sensor) and Stela™ (that utilizes DECTRIS hybrid-pixel technology), to address this problem. The K3 is an electron counting detector optimized for low-dose applications (like structural biology cryo-EM), and Stela is also a counting electron detector but optimized for diffraction applications with high speed and high dynamic range. Lastly, data collection workflows, including crystal screening, microscope optics setup (for imaging and diffraction), stage height adjustment at each crystal position, and tomogram acquisition, can be one of the other challenges of the 3DED technique. Traditionally this has been all done manually or in a partly automated fashion using open-source software and scripting, requiring long hours on the microscope (extra cost) and extensive user interaction with the system. We have recently introduced Latitude® D in DigitalMicrograph® software, which is compatible with all pre- and post-energy-filter Gatan cameras and enables 3DED data acquisition in an automated and optimized fashion. Higher quality 3DED data enables structure determination with higher confidence, while automated workflows allow these to be completed considerably faster than before. Using multiple examples, this work will demonstrate how to direct detection electron counting cameras enhance 3DED results (3 to better than 1 Angstrom) for protein and small molecule structure determination. We will also show how Latitude D software facilitates collecting such data in an integrated and fully automated user interface.Keywords: continuous electron diffraction tomography, direct detection, diffraction, Latitude D, Digitalmicrograph, proteins, small molecules
Procedia PDF Downloads 10727118 Rheological and Microstructural Characterization of Concentrated Emulsions Prepared by Fish Gelatin
Authors: Helen S. Joyner (Melito), Mohammad Anvari
Abstract:
Concentrated emulsions stabilized by proteins are systems of great importance in food, pharmaceutical and cosmetic products. Controlling emulsion rheology is critical for ensuring desired properties during formation, storage, and consumption of emulsion-based products. Studies on concentrated emulsions have focused on rheology of monodispersed systems. However, emulsions used for industrial applications are polydispersed in nature, and this polydispersity is regarded as an important parameter that also governs the rheology of the concentrated emulsions. Therefore, the objective of this study was to characterize rheological (small and large deformation behaviors) and microstructural properties of concentrated emulsions which were not truly monodispersed as usually encountered in food products such as margarines, mayonnaise, creams, spreads, and etc. The concentrated emulsions were prepared at different concentrations of fish gelatin (0.2, 0.4, 0.8% w/v in the whole emulsion system), oil-water ratio 80-20 (w/w), homogenization speed 10000 rpm, and 25oC. Confocal laser scanning microscopy (CLSM) was used to determine the microstructure of the emulsions. To prepare samples for CLSM analysis, FG solutions were stained by Fluorescein isothiocyanate dye. Emulsion viscosity profiles were determined using shear rate sweeps (0.01 to 100 1/s). The linear viscoelastic regions (LVRs) of the emulsions were determined using strain sweeps (0.01 to 100% strain) for each sample. Frequency sweeps were performed in the LVR (0.1% strain) from 0.6 to 100 rad/s. Large amplitude oscillatory shear (LAOS) testing was conducted by collecting raw waveform data at 0.05, 1, 10, and 100% strain at 4 different frequencies (0.5, 1, 10, and 100 rad/s). All measurements were performed in triplicate at 25oC. The CLSM results revealed that increased fish gelatin concentration resulted in more stable oil-in-water emulsions with homogeneous, finely dispersed oil droplets. Furthermore, the protein concentration had a significant effect on emulsion rheological properties. Apparent viscosity and dynamic moduli at small deformations increased with increasing fish gelatin concentration. These results were related to increased inter-droplet network connections caused by increased fish gelatin adsorption at the surface of oil droplets. Nevertheless, all samples showed shear-thinning and weak gel behaviors over shear rate and frequency sweeps, respectively. Lissajous plots, or plots of stress versus strain, and phase lag values were used to determine nonlinear behavior of the emulsions in LAOS testing. Greater distortion in the elliptical shape of the plots followed by higher phase lag values was observed at large strains and frequencies in all samples, indicating increased nonlinear behavior. Shifts from elastic-dominated to viscous dominated behavior were also observed. These shifts were attributed to damage to the sample microstructure (e.g. gel network disruption), which would lead to viscous-type behaviors such as permanent deformation and flow. Unlike the small deformation results, the LAOS behavior of the concentrated emulsions was not dependent on fish gelatin concentration. Systems with different microstructures showed similar nonlinear viscoelastic behaviors. The results of this study provided valuable information that can be used to incorporate concentrated emulsions in emulsion-based food formulations.Keywords: concentrated emulsion, fish gelatin, microstructure, rheology
Procedia PDF Downloads 27527117 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data
Authors: Murat Yazici
Abstract:
Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data
Procedia PDF Downloads 5427116 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 48027115 AI/ML Atmospheric Parameters Retrieval Using the “Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN)”
Authors: Thomas Monahan, Nicolas Gorius, Thanh Nguyen
Abstract:
Exoplanet atmospheric parameters retrieval is a complex, computationally intensive, inverse modeling problem in which an exoplanet’s atmospheric composition is extracted from an observed spectrum. Traditional Bayesian sampling methods require extensive time and computation, involving algorithms that compare large numbers of known atmospheric models to the input spectral data. Runtimes are directly proportional to the number of parameters under consideration. These increased power and runtime requirements are difficult to accommodate in space missions where model size, speed, and power consumption are of particular importance. The use of traditional Bayesian sampling methods, therefore, compromise model complexity or sampling accuracy. The Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN) is a deep convolutional generative adversarial network that improves on the previous model’s speed and accuracy. We demonstrate the efficacy of artificial intelligence to quickly and reliably predict atmospheric parameters and present it as a viable alternative to slow and computationally heavy Bayesian methods. In addition to its broad applicability across instruments and planetary types, ARcGAN has been designed to function on low power application-specific integrated circuits. The application of edge computing to atmospheric retrievals allows for real or near-real-time quantification of atmospheric constituents at the instrument level. Additionally, edge computing provides both high-performance and power-efficient computing for AI applications, both of which are critical for space missions. With the edge computing chip implementation, ArcGAN serves as a strong basis for the development of a similar machine-learning algorithm to reduce the downlinked data volume from the Compact Ultraviolet to Visible Imaging Spectrometer (CUVIS) onboard the DAVINCI mission to Venus.Keywords: deep learning, generative adversarial network, edge computing, atmospheric parameters retrieval
Procedia PDF Downloads 17027114 Rheumatoid Arthritis, Periodontitis and the Subgingival Microbiome: A Circular Relationship
Authors: Isabel Lopez-Oliva, Akshay Paropkari, Shweta Saraswat, Stefan Serban, Paola de Pablo, Karim Raza, Andrew Filer, Iain Chapple, Thomas Dietrich, Melissa Grant, Purnima Kumar
Abstract:
Objective: We aimed to explicate the role of the subgingival microbiome in the causal link between rheumatoid arthritis (RA) and periodontitis (PD). Methods: Subjects with/without RA and with/without PD were randomized for treatment with scaling and root planing (SRP) or oral hygiene instructions. Subgingival biofilm, gingival crevicular fluid, and serum were collected at baseline and at 3- and 6-months post-operatively. Correlations were generated between 72 million 16S rDNA sequences, immuno-inflammatory mediators, circulating antibodies to oral microbial antigens, serum inflammatory molecules, and clinical metrics of RA. The dynamics of inter-microbial and host-microbial interactions were modeled using differential network analysis. Results: RA superseded periodontitis as a determinant of microbial composition, and DAS28 score superseded the severity of periodontitis as a driver of microbial assemblages (p=0.001, ANOSIM). RA subjects evidenced higher serum anti-PPAD (p=0.0013), anti-Pg-enolase (p=0.0031), anti-RPP3, anti- Pg-OMP and anti- Pi-OMP (p=0.001) antibodies than non-RA controls (with and without periodontitis). Following SRP, bacterial networks anchored by IL-1b, IL-4, IL-6, IL-10, IL-13, MIP-1b, and PDGF-b underwent ≥5-fold higher rewiring; and serum antibodies to microbial antigens decreased significantly. Conclusions: Our data suggest a circular relationship between RA and PD, beginning with an RA-influenced dysbiosis within the healthy subgingival microbiome that leads to exaggerated local inflammation in periodontitis and circulating antibodies to periodontal pathogens and positive correlation between severity of periodontitis and RA activity. Periodontal therapy restores host-microbial homeostasis, reduces local inflammation, and decreases circulating microbial antigens. Our data highlights the importance of integrating periodontal care into the management of RA patients.Keywords: rheumatoid arthritis, periodontal, subgingival, DNA sequence analysis, oral microbiome
Procedia PDF Downloads 10827113 A Review of Food Reformulation of Sweetened Baked Goods to Reduce Added Sugar Intake
Authors: Xiao Luo, Jayashree Arcot, Timothy P. Gill, Jimmy C. Louie, Anna M. Rangan
Abstract:
Excessive consumption of added sugar is negatively associated with many health outcomes such as lower diet quality, dental diseases and other non-communicable diseases. Sugar-sweetened baked goods are popular discretionary foods that contribute significant amounts of added sugar to people’s diets worldwide. Food reformulation is of the most effective methods to reduce consumption of added sugar without significantly altering individual's diet pattern. However, sucrose, as the major sugar in baked goods, plays several vital functional roles such as providing sweetness and bulking, and suitable substitutes must be able to address these. The review examines the literature on sugar-reduced baked goods to summarise the feasible reformulations of low/no added sugar baked goods, and indicates the future directions for healthier baked goods reformulation. Based on this review, polyols and non-nutritive sweeteners (NNS) are suitable for alternative sweeteners to partially or fully replace sucrose in baked goods. Low-calorie carbohydrates such as oligofructose, polydextrose, maltodextrins are the mostly used bulking agents to compensate the loss of bulk due to the removal of sucrose. This review found that maltitol seems the most suitable sole sucrose substitution at present, while diverse mixtures of NNS( stevia, sucralose, acesulfame-K), other polyols and inulins can also deliver the functionalities of sucrose in baked products.Keywords: alternative sweeteners, baked goods, reformulation, sugar reduction
Procedia PDF Downloads 27027112 Phytochemical Composition and Biological Activities of the Vegetal Extracts of Six Aromatic and Medicinal Plants of Algerian Flora and Their Uses in Food and Pharmaceutical Industries
Authors: Ziani Borhane Eddine Cherif, Hazzi Mohamed, Mouhouche Fazia
Abstract:
The vegetal extracts of aromatic and medicinal plants start to have much of interest like potential sources of natural bioactive molecules. Many features are conferred by the nature of the chemical function of their major constituents (phenol, alcohol, aldehyde, cetone). This biopotential lets us to focalize on the study of three main biological activities, the antioxidant, antibiotic and insecticidal activities of six Algerian aromatic plants in the aim of making in evidence by the chromatographic analysis (CPG and CG/SM) the phytochemical compounds implicating in this effects. The contents of Oxygenated monoterpenes represented the most prominent group of constituents in the majority of plants. However, the α-Terpineol (28,3%), Carvacrol (47,3%), pulégone (39,5%), Chrysanthenone (27,4%), Thymol 23,9%, γ-Terpinene 23,9% and 2-Undecanone(94%) were the main components. The antioxyding activity of the Essential oils and no-volatils extracts was evaluated in vitro using four tests: inhibition of free radical 2,2-diphenyl-1-picrylhydrazyl (DPPH) and the 2,2-Azino-bis (3-ethylbenzthiazoline-6-sulphonic acid) radical-scavenging activity (ABTS•+), the thiobarbituric acid reactive substances (TBARS) assays and the reducing power. The measures of the IC50 of these natural compounds revealed potent activity (between 254.64-462.76mg.l-1), almost similar to that of BHT, BHA, Tocopherol and Ascorbic acid (126,4-369,1 mg.l-1) and so far than the Trolox one (IC50= 2,82mg.l-1). Furthermore, three ethanol extracts were found to be remarkably effective toward DPPH and ABTS inhibition, compared to chemical antioxidant BHA and BHT (IC = 9.8±0.1 and 28±0.7 mg.l-1, respectively); for reducing power test it has also exhibited high activity. The study on the insecticidal activity effect by contact, inhalation, fecundity and fertility of Callosobruchus maculatus and Tribolium confusum showed a strong potential biocide reaching 95-100% mortality only after 24 hours. The antibiotic activity of our essential oils were evaluated by a qualitative study (aromatogramme) and quantitative (MIC, MBC and CML) on four bacteria (Gram+ and Gram-) and one strain of pathogenic yeast, the results of these tests showed very interesting action than that induced by the same reference antibiotics (Gentamycin, and Nystatin Ceftatidine) such that the inhibition diameters and MIC values for tested microorganisms were in the range of 23–58 mm and 0.015–0.25%(v/v) respectively.Keywords: aromatic plants, essential oils, no-volatils extracts, bioactive molecules, antioxidant activity, insecticidal activity, antibiotic activity
Procedia PDF Downloads 22027111 An Approximation of Daily Rainfall by Using a Pixel Value Data Approach
Authors: Sarisa Pinkham, Kanyarat Bussaban
Abstract:
The research aims to approximate the amount of daily rainfall by using a pixel value data approach. The daily rainfall maps from the Thailand Meteorological Department in period of time from January to December 2013 were the data used in this study. The results showed that this approach can approximate the amount of daily rainfall with RMSE=3.343.Keywords: daily rainfall, image processing, approximation, pixel value data
Procedia PDF Downloads 38727110 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management
Authors: Kenneth Harper
Abstract:
The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups
Procedia PDF Downloads 2727109 Assessing Digestive Enzymes Inhibitory Properties of Anthocyanins and Procyanidins from Apple, Red Grape, Cinnamon
Authors: Pinar Ercan, Sedef N. El
Abstract:
The goals of this study were to determine the total anthocyanin and procyanidin contents and their in vitro bioaccessibilities of apple, red grape and cinnamon by a static in vitro digestion method reported by the COST FA1005 Action INFOGEST, as well as in vitro inhibitory effects of these food samples on starch and lipid digestive enzymes. While the highest total anthocyanin content was found in red grape (164.76 ± 2.51 mg/100 g), the highest procyanidin content was found in cinnamon (6432.54±177.31 mg/100 g) among the selected food samples (p<0.05). The anthocyanin bioaccessibilities were found as 10.23±1 %, 8.23±0.64 %, and 8.73±0.70 % in apple, red grape, and cinnamon, respectively. The procyanidin bioaccessibilities of apple, red grape, and cinnamon were found as 17.57±0.71 %, 14.08±0.74 % and 18.75±1.49 %, respectively. The analyzed apple, red grape and cinnamon showed the inhibitory activity against α-glucosidase (IC50 544.27±21.94, 445.63±15.67, 1592±17.58 μg/mL, respectively), α-amylase (IC50 38.41±7.26, 56.12±3.60, 3.54±0.86 μg/mL, respectively), and lipase (IC50 52.65±2.05, 581.70±54.14, 49.63±2.72 μg/mL, respectively). Red grape sample showed the highest inhibitory activity against α-glucosidase, cinnamon showed the highest inhibitory activity against α-amylase and lipase according to IC50 (concentration of inhibitor required to produce a 50% inhibition of the initial rate of reaction) and Catechin equivalent inhibition capacity (CEIC50) values. This study reported that apple, grape and cinnamon samples can inhibit the activity of digestive enzymes in vitro. The consumption of these samples would be used in conjunction with a low-calorie diet for body weight management.Keywords: anthocyanin, α-amylase, α-glucosidase, lipase, procyanidin
Procedia PDF Downloads 18127108 Techno-Functional Characteristics, Mineral Composition and Antioxidant Potential of Dietary Fiber Extracted by Sonication from Different Oat Cultivars (Avena sativa)
Authors: Muhammad Suhail Ibrahim, Muhammad Nadeem, Muhammad Sultan, Uzair Sajjad, Khalid Hamid, Tahir Mahmood Qureshi, Sadaf Javaria
Abstract:
Metabolic disorders, including hypertension, diabetes, cardiovascular disease etc., are major threats to public health and economy. Management and prevention of alarmingly increasing disorders have attracted researchers to explore natural barriers against these disorders. The objective of this study was to explore oats as a potential source of dietary fiber. Extraction of dietary was optimized by response surface methodology, and five indigenous oat cultivars, including SGD2011, Avon, SGD81, PD2LV65, and S2000, were also characterized for techno-functional characteristics, mineral composition and phytochemical quantification. These cultivars varied significantly (p < 0.05) for oil holding capacity, water saturation, and water holding capacity, respectively. SGD81 showed the highest oil-holding capacity, water-holding capacity, and water saturation due to the highest fraction of dietary fiber. The highest values of total phenolic contents, total flavonoid contents, total flavonol contents, 2, 2-Diphenyl-1-picrylhydrazyl radical scavenging activity, and anthocyanin were shown by SGD81, and SGD2011, respectively. All cultivars varied significantly (P<0.05) with respect to phytochemical quantification. Oat cultivars SGD81 and SGD2011 showed the best phenolic acid profile and can be effectively used as a source of nutraceuticals. Beyond the nutritional properties of oats, these also contribute and emerged as potential sources of dietary fiber and have gained attention as nutraceutical cereal crops. This approach offers oats as a natural means of dietary fiber to protect humans from alarmingly increasing metabolic disorders, and its extraction by sonication has made it a sustainable and eco-friendly strategy.Keywords: oat cultivars, dietary fibers, mineral profile, antioxidant activity, color properties
Procedia PDF Downloads 4327107 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data
Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri
Abstract:
In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification
Procedia PDF Downloads 51627106 Painting in Neolithic of Northwest Iberia: Archaeometrical Studies Applied to Megalithic Monuments
Authors: César Oliveira, Ana M. S. Bettencourt, Luciano Vilas Boas, Luís Gonçalves, Carlo Bottaini
Abstract:
Funerary megalithic monuments are probably under the most remarkable remains of the Neolithic period of western Europe. Some monuments are well known for their paintings, sometimes associated with engraved motifs, giving the funerary crypts a character of great symbolic value. The engraved and painted motifs, the colors used in the paintings, and the offerings associated with the deposited corpses are archaeological data that, being part of the funeral rites, also reveal the ideological world of these communities and their way of interacting with the world. In this sense, the choice of colors to be used in the paintings, the pigments collected, and the proceeds for making the paints would also be significant performances. The present study will focus on the characterization of painted art from megalithic monuments located in different areas of North-Western Portugal (coastal and inland). The colorant composition of megalithic barrows decorated with rock art motifs was studied using a multi-analytical approach (XRD, SEM-EDS, FTIR, and GC-MS), allowing the characterization of the painting techniques, pigments, and the organic compounds used as binders. Some analyses revealed that the pigments used for painting were produced using a collection of mined or quarried organic and inorganic substances. The results will be analyzed from the perspective of contingencies and regularity among the different case studies in order to interpret more or less standardized behaviors.Keywords: funerary megalithic monuments, painting motifs, archaeometrical studies, Northwest Iberia, behaviors
Procedia PDF Downloads 11027105 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R
Authors: Jaya Mathew
Abstract:
Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R
Procedia PDF Downloads 37927104 Trusting the Big Data Analytics Process from the Perspective of Different Stakeholders
Authors: Sven Gehrke, Johannes Ruhland
Abstract:
Data is the oil of our time, without them progress would come to a hold [1]. On the other hand, the mistrust of data mining is increasing [2]. The paper at hand shows different aspects of the concept of trust and describes the information asymmetry of the typical stakeholders of a data mining project using the CRISP-DM phase model. Based on the identified influencing factors in relation to trust, problematic aspects of the current approach are verified using various interviews with the stakeholders. The results of the interviews confirm the theoretically identified weak points of the phase model with regard to trust and show potential research areas.Keywords: trust, data mining, CRISP DM, stakeholder management
Procedia PDF Downloads 9427103 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 49027102 Income Inequality among Selected Entrepreneurs in Ondo State, Nigeria
Authors: O.O. Ehinmowo, A.I. Fatuase, D.F. Oke
Abstract:
Nigeria is endowed with resources that could boost the economy as well as generate income and provide jobs to the teaming populace. One of the keys of attaining this is by making the environment conducive for the entrepreneurs to excel in their respective enterprises so that more income could be accrued to the entrepreneurs. This study therefore examines income inequality among selected entrepreneurs in Ondo State, Nigeria using primary data. A multistage sampling technique was used to select 200 respondents for the study with the aid of structured questionnaire and personal interview. The data collected were subjected to descriptive statistics, Lorenz curve, Gini coefficient and Double - Log regression model. Results revealed that majority of the entrepreneurs (63%) were males and 90% were married with an average age of 44 years. About 40% of the respondents spent at most 12 years in school with 81% of the respondents had 4-6 members per household, while hair dressing (43.5%) and fashion designing (31.5%) were the most common enterprises among the sampled respondents. The findings also showed that majority of the entrepreneurs in hairdressing, fashion designing and laundry service earned below N200,000 per annum while the majority of those in restaurant and food vending earned between N400,000 – N600,000 followed by the entrepreneurs in pure water enterprise where majority earned N800,000 and above per annum. The result of the Gini coefficient (0.58) indicated that there was presence of inequality among the entrepreneurs which was also affirmed by the Lorenz curve. The Regression results showed that gender, household size and number of employees significantly affected the income of the entrepreneurs in the study area. Therefore, more female households should be encouraged into entrepreneurial businesses and government should give incentive cum conductive environment that could bridge the disparity in the income of the entrepreneurs in their various enterprises.Keywords: entrepreneurs, Gini coefficient, income inequality, Lorenz curve
Procedia PDF Downloads 35027101 Examining Litter Distributions in Lethbridge, Alberta, Canada, Using Citizen Science and GIS Methods: OpenLitterMap App and Story Maps
Authors: Tali Neta
Abstract:
Humans’ impact on the environment has been incredibly brutal, with enormous plastic- and other pollutants (e.g., cigarette buds, paper cups, tires) worldwide. On land, litter costs taxpayers a fortune. Most of the litter pollution comes from the land, yet it is one of the greatest hazards to marine environments. Due to spatial and temporal limitations, previous litter data covered very small areas. Currently, smartphones can be used to obtain information on various pollutants (through citizen science), and they can greatly assist in acknowledging and mitigating the environmental impact of litter. Litter app data, such as the Litterati, are available for study through a global map only; these data are not available for download, and it is not clear whether irrelevant hashtags have been eliminated. Instagram and Twitter open-source geospatial data are available for download; however, these are considered inaccurate, computationally challenging, and impossible to quantify. Therefore, the resulting data are of poor quality. Other downloadable geospatial data (e.g., Marine Debris Tracker8 and Clean Swell10) are focused on marine- rather than terrestrial litter. Therefore, accurate terrestrial geospatial documentation of litter distribution is needed to improve environmental awareness. The current research employed citizen science to examine litter distribution in Lethbridge, Alberta, Canada, using the OpenLitterMap (OLM) app. The OLM app is an application used to track litter worldwide, and it can mark litter locations through photo georeferencing, which can be presented through GIS-designed maps. The OLM app provides open-source data that can be downloaded. It also offers information on various litter types and “hot-spots” areas where litter accumulates. In this study, Lethbridge College students collected litter data with the OLM app. The students produced GIS Story Maps (interactive web GIS illustrations) and presented these to school children to improve awareness of litter's impact on environmental health. Preliminary results indicate that towards the Lethbridge Coulees’ (valleys) East edges, the amount of litter significantly increased due to shrubs’ presence, that acted as litter catches. As wind generally travels from west to east in Lethbridge, litter in West-Lethbridge often finds its way down in the east part of the coulees. The students’ documented various litter types, while the majority (75%) included plastic and paper food packaging. The students also found metal wires, broken glass, plastic bottles, golf balls, and tires. Presentations of the Story Maps to school children had a significant impact, as the children voluntarily collected litter during school recess, and they were looking into solutions to reduce litter. Further litter distribution documentation through Citizen Science is needed to improve public awareness. Additionally, future research will be focused on Drone imagery of highly concentrated litter areas. Finally, a time series analysis of litter distribution will help us determine whether public education through Citizen Science and Story Maps can assist in reducing litter and reaching a cleaner and healthier environment.Keywords: citizen science, litter pollution, Open Litter Map, GIS Story Map
Procedia PDF Downloads 7927100 One Step Further: Pull-Process-Push Data Processing
Authors: Romeo Botes, Imelda Smit
Abstract:
In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list
Procedia PDF Downloads 24427099 Development of Intervention Policy Options for Sustainable Fisheries Management of Lake Hawassa, Ethiopia
Authors: Mekonen Hailu, Gashaw Tesfaye, Adamneh Dagne, Hiwot Teshome
Abstract:
Lake Hawassa is one of the most important lakes for Ethiopian fishery. It serves as a source of food and nutrition, income and livelihood for many inhabitants. However, the fishery in Lake Hawassa shows a declining trend, especially for the most valuable species, such as the Nile tilapia (Oreochromis niloticus L.), indicating that the existing management systems are either not fully enforced or inadequate. The aim of this study was therefore to develop management policy options for the sustainable utilization and management of fishery resources in Lake Hawassa. A blend of primary and secondary data was used for the study. Primary data were collected using Participatory Rural Appraisal (PRA) techniques such as focus group discussions with members of fishing co-operatives, co-operative leaders and key informant discussion to understand the current state of the fisheries resources. Then literatures were reviewed to obtain secondary data and develop alternative management policy options. It has been realized that Lake Hawassa is not very species-rich in terms of fish diversity. It contains only six species belonging to four families, of which only three are commercially important, including the Nile tilapia (90 % of catches), the African catfish Clarias gariepinus B. (7 % of catches) and the African large barb Labeobarbus intermedius R. (only 3 % of catches). The production has been declining since 2007. The top six challenges that could be responsible for this decline, identified by about two-thirds of respondents and supported by the literature review, are directly linked to fisheries and fisheries management, with overfishing, irregular monitoring, control, and surveillance (MCS) system and the lack of a fishing licensing system ranking first, second and third respectively. It is, therefore, important to address these and other problems identified in the study. Of the management options analyzed, we suggest adapting the management approach to sustain the fishery in Lake Hawaasa and its socio-economic benefits. We also present important conditions for successfully implementing co-management in this and other lakes in Ethiopia.Keywords: comanagement, community-based management, fishery, overfishing, participatory approach, top-down management
Procedia PDF Downloads 1027098 Extreme Temperature Forecast in Mbonge, Cameroon Through Return Level Analysis of the Generalized Extreme Value (GEV) Distribution
Authors: Nkongho Ayuketang Arreyndip, Ebobenow Joseph
Abstract:
In this paper, temperature extremes are forecast by employing the block maxima method of the generalized extreme value (GEV) distribution to analyse temperature data from the Cameroon Development Corporation (CDC). By considering two sets of data (raw data and simulated data) and two (stationary and non-stationary) models of the GEV distribution, return levels analysis is carried out and it was found that in the stationary model, the return values are constant over time with the raw data, while in the simulated data the return values show an increasing trend with an upper bound. In the non-stationary model, the return levels of both the raw data and simulated data show an increasing trend with an upper bound. This clearly shows that although temperatures in the tropics show a sign of increase in the future, there is a maximum temperature at which there is no exceedance. The results of this paper are very vital in agricultural and environmental research.Keywords: forecasting, generalized extreme value (GEV), meteorology, return level
Procedia PDF Downloads 47827097 Analyzing Business Model Choices and Sustainable Value Capturing: A Multiple Case Study of Sharing Economy Business Models
Authors: Minttu Laukkanen, Janne Huiskonen
Abstract:
This study investigates the sharing economy business models as examples of the sustainable business models. The aim is to contribute to the limited literature on sharing economy in connection with sustainable business models by explaining sharing economy business models value capturing. Specifically, this research answers the following question: How business model choices affect captured sustainable value? A multiple case study approach is applied in this study. Twenty different successful sharing economy business models focusing on consumer business and covering four main areas, accommodation, mobility, food, and consumer goods, are selected for analysis. The secondary data available on companies’ websites, previous research, reports, and other public documents are used. All twenty cases are analyzed through the sharing economy business model framework and sustainable value analysis framework using qualitative data analysis. This study represents general sharing economy business model value attributes and their specifications, i.e. sustainable value propositions for different stakeholders, and further explains the sustainability impacts of different sharing economy business models through captured and uncaptured value. In conclusion, this study represents how business model choices affect sustainable value capturing through eight business model attributes identified in this study. This paper contributes to the research on sustainable business models and sharing economy by examining how business model choices affect captured sustainable value. This study highlights the importance of careful business model and sustainability impacts analyses including the triple bottom line, multiple stakeholders and value captured and uncaptured perspectives as well as sustainability trade-offs. It is not self-evident that sharing economy business models advance sustainability, and business model choices does matter.Keywords: sharing economy, sustainable business model innovation, sustainable value, value capturing
Procedia PDF Downloads 17327096 Influence of κ-Casein Genotype on Milk Productivity of Latvia Local Dairy Breeds
Authors: S. Petrovska, D. Jonkus, D. Smiltiņa
Abstract:
κ-casein is one of milk proteins which are very important for milk processing. Genotypes of κ-casein affect milk yield, fat, and protein content. The main factors which affect local Latvian dairy breed milk yield and composition are analyzed in research. Data were collected from 88 Latvian brown and 82 Latvian blue cows in 2015. AA genotype was 0.557 in Latvian brown and 0.232 in Latvian blue breed. BB genotype was 0.034 in Latvian brown and 0.207 in Latvian blue breed. Highest milk yield was observed in Latvian brown (5131.2 ± 172.01 kg), significantly high fat content and fat yield also was in Latvian brown (p < 0.05). Significant differences between κ-casein genotypes were not found in Latvian brown, but highest milk yield (5057 ± 130.23 kg), protein content (3.42 ± 0.03%), and protein yield (171.9 ± 4.34 kg) were with AB genotype. Significantly high fat content was observed in Latvian blue breed with BB genotype (4.29 ± 0.17%) compared with AA genotypes (3.42 ± 0.19). Similar tendency was found in protein content – 3.27 ± 0.16% with BB genotype and 2.59 ± 0.16% with AA genotype (p < 0.05). Milk yield increases by increasing parity. We did not obtain major tendency of changes of milk fat and protein content according parity.Keywords: dairy cows, κ-casein, milk productivity, polymorphism
Procedia PDF Downloads 27027095 Impact of Stack Caches: Locality Awareness and Cost Effectiveness
Authors: Abdulrahman K. Alshegaifi, Chun-Hsi Huang
Abstract:
Treating data based on its location in memory has received much attention in recent years due to its different properties, which offer important aspects for cache utilization. Stack data and non-stack data may interfere with each other’s locality in the data cache. One of the important aspects of stack data is that it has high spatial and temporal locality. In this work, we simulate non-unified cache design that split data cache into stack and non-stack caches in order to maintain stack data and non-stack data separate in different caches. We observe that the overall hit rate of non-unified cache design is sensitive to the size of non-stack cache. Then, we investigate the appropriate size and associativity for stack cache to achieve high hit ratio especially when over 99% of accesses are directed to stack cache. The result shows that on average more than 99% of stack cache accuracy is achieved by using 2KB of capacity and 1-way associativity. Further, we analyze the improvement in hit rate when adding small, fixed, size of stack cache at level1 to unified cache architecture. The result shows that the overall hit rate of unified cache design with adding 1KB of stack cache is improved by approximately, on average, 3.9% for Rijndael benchmark. The stack cache is simulated by using SimpleScalar toolset.Keywords: hit rate, locality of program, stack cache, stack data
Procedia PDF Downloads 30327094 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 50427093 Information Extraction Based on Search Engine Results
Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk
Abstract:
The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.Keywords: search engines, information extraction, agent system
Procedia PDF Downloads 43027092 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 29027091 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India
Authors: Anushtha Saxena
Abstract:
This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.Keywords: data monetization, e-commerce companies, regulatory framework, GDPR
Procedia PDF Downloads 12027090 Concentrations of Some Metallic Trace Elements in Twelve Sludge Incineration Ashes
Authors: Lotfi Khiari, Antoine Karam, Claude-Alla Joseph, Marc Hébert
Abstract:
The main objective of incineration of sludge generated from municipal or agri-food waste treatment plant is to reduce the volume of sludge to be disposed of as a solid or liquid waste, whilst concentrating or destroying potentially harmful volatile substances. In some cities in Canada and United States of America (USA), a large amount of sludge is incinerated, which entails a loss of organic matter and water leading to phosphorus, potassium and some metallic trace element (MTE) accumulation in ashes. The purpose of this study was to evaluate the concentration of potentially hazardous MTE such as cadmium (Cd), lead (Pb) and mercury (Hg) in twelve sludge incineration ash samples obtained from municipal wastewater and other food processing waste treatments from Canada and USA. The average, maximum, and minimum values of MTE in ashes were calculated for each city individually and all together. The trace metal concentration values were compared to the literature reported values. The concentrations of MTE in ashes vary widely depending on the sludge origins and treatment options. The concentrations of MTE in ashes were found the range of 0.1-6.4 mg/kg for Cd; 13-286 mg/kg for Pb and 0.1-0.5 mg/kg for Hg. On average, the following order of metal concentration in ashes was observed: Pb > Cd > Hg. Results show that metal contents in most ashes were similar to MTE levels in synthetic inorganic fertilizers and many fertilizing residual materials. Consequently, the environmental effects of MTE content of these ashes would be low.Keywords: biosolids, heavy metals, recycling, sewage sludge
Procedia PDF Downloads 380