Search results for: data cleansing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24205

Search results for: data cleansing

24175 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach

Authors: Theertha Chandroth

Abstract:

This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.

Keywords: XML, JSON, data comparison, integration testing, Python, SQL

Procedia PDF Downloads 92
24174 Reviewing Privacy Preserving Distributed Data Mining

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.

Keywords: data mining, distributed data mining, privacy protection, privacy preserving

Procedia PDF Downloads 492
24173 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 444
24172 Recent Advances in Data Warehouse

Authors: Fahad Hanash Alzahrani

Abstract:

This paper describes some recent advances in a quickly developing area of data storing and processing based on Data Warehouses and Data Mining techniques, which are associated with software, hardware, data mining algorithms and visualisation techniques having common features for any specific problems and tasks of their implementation.

Keywords: data warehouse, data mining, knowledge discovery in databases, on-line analytical processing

Procedia PDF Downloads 369
24171 How to Use Big Data in Logistics Issues

Authors: Mehmet Akif Aslan, Mehmet Simsek, Eyup Sensoy

Abstract:

Big Data stands for today’s cutting-edge technology. As the technology becomes widespread, so does Data. Utilizing massive data sets enable companies to get competitive advantages over their adversaries. Out of many area of Big Data usage, logistics has significance role in both commercial sector and military. This paper lays out what big data is and how it is used in both military and commercial logistics.

Keywords: big data, logistics, operational efficiency, risk management

Procedia PDF Downloads 611
24170 On Being a Fugitive from the State-Sponsored Witch Hunt of Homosexuals in Egypt's Media Discourse

Authors: Mahitab A. A. Mahmoud

Abstract:

Despite the international community’s galvanized efforts to achieve gender equality, the Arab world still lags behind for their sustained suppression of diversity and freedoms. In Egypt, homosexuals are defamed and hunted not only by authorities but also by politicized religious institutions and media platforms. The resultant state-sponsored homophobia is reflected in media. This paper offers a critical discourse analysis of the representation of LGBTQs in Egypt’s local news articles and movies in an attempt to investigate the underlying ideology. The results reveal a clichéd portrayal of homosexuals as a social parasite that requires cleansing by the government. LGBTQs are depicted as an outcome of debauchery, unhappy marriage, sexual deviancy, deficiency of masculinity/femininity, absence of the mother and/or father figure(s), abject poverty, excessive wealth, psychiatric disorder, debased instincts, childhood sexual molestation, immorality, deviation from religion, chaos, treason, conspiracy against the regime, to name only a few. This image, which is imposed and sustained by the state, exposes homosexuals to a violation of their human rights by both the police and the society, endangers their lives, breeds intolerance, social inequality and violence, prevents healthy coexistence; and deprives them of living a normal life.

Keywords: critical discourse analysis, gender studies, homophobia, homosexuality, ideology, media studies

Procedia PDF Downloads 129
24169 Ethnopharmacological Analysis of Fermented Herbal Concoctions

Authors: Ishmael Ntlhamu

Abstract:

In Limpopo Province, the use of herbal concoctions is becoming very popular. These concoctions are claimed to be capable of treating ulcers, diabetes, certain STDs, blood cleansing, and many more types of diseases. The aim of this study was to evaluate the phytochemical composition, evaluate the pharmacological effects and consumption safety in herbal concoctions to treat various kinds of ailments in Limpopo. The concoctions were extracted with 80% acetone. Microorganisms in the concoctions were identified using the Vitek 2 compact system. Qualitative phytochemical analysis was determined using standard chemical tests and thin layer chromatography (TLC). Total polyphenol content was quantified. Antioxidant activity was quantified using 2, 2-diphenyl-1-picrylhydrazyl (DPPH) assay and ferric reducing power. Antimicrobial activities were determined using a broth micro-dilution assay and bioautography. Cell viability assay was used to determine the cytotoxicity. Results showed that concoctions had antioxidant activity. Presence of different phytoconstituents was observed. Isolated microorganisms were identified as Burkholderia pseudomallei, Staphylococcus vitulimus, Enterococcus columbae, Kocuria kristanae, Staphylococcus intermedius, Cryptococcus laurenti. and Burkholderia pseudomallei (highly pathogenic). Therefore, phytochemicals prove that the concoctions can heal as the antimicrobial tests also displayed activity. Moreover, the concoctions did not exhibit cytotoxic effects. However, contaminants raise concerns, not only for consumer safety but also the quality of herbal concoctions available as part of the traditional medicinal practice in Limpopo.

Keywords: antimicrobials, concoctions, cytotoxicity, phytochemicals

Procedia PDF Downloads 113
24168 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 347
24167 Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Organizations, including governments, generate (big) data that are high in volume, velocity, veracity, and come from a variety of sources. Public Administrations are using (big) data, implementing base registries, and enforcing data sharing within the entire government to deliver (big) data related integrated services, provision of insights to users, and for good governance. Government (Big) data ecosystem actors represent distinct entities that provide data, consume data, manipulate data to offer paid services, and extend data services like data storage, hosting services to other actors. In this research work, we perform a systematic literature review. The key objectives of this paper are to propose a robust definition of government (big) data ecosystem and a classification of government (big) data ecosystem actors and their roles. We showcase a graphical view of actors, roles, and their relationship in the government (big) data ecosystem. We also discuss our research findings. We did not find too much published research articles about the government (big) data ecosystem, including its definition and classification of actors and their roles. Therefore, we lent ideas for the government (big) data ecosystem from numerous areas that include scientific research data, humanitarian data, open government data, industry data, in the literature.

Keywords: big data, big data ecosystem, classification of big data actors, big data actors roles, definition of government (big) data ecosystem, data-driven government, eGovernment, gaps in data ecosystems, government (big) data, public administration, systematic literature review

Procedia PDF Downloads 133
24166 Government Big Data Ecosystem: A Systematic Literature Review

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Data that is high in volume, velocity, veracity and comes from a variety of sources is usually generated in all sectors including the government sector. Globally public administrations are pursuing (big) data as new technology and trying to adopt a data-centric architecture for hosting and sharing data. Properly executed, big data and data analytics in the government (big) data ecosystem can be led to data-driven government and have a direct impact on the way policymakers work and citizens interact with governments. In this research paper, we conduct a systematic literature review. The main aims of this paper are to highlight essential aspects of the government (big) data ecosystem and to explore the most critical socio-technical factors that contribute to the successful implementation of government (big) data ecosystem. The essential aspects of government (big) data ecosystem include definition, data types, data lifecycle models, and actors and their roles. We also discuss the potential impact of (big) data in public administration and gaps in the government data ecosystems literature. As this is a new topic, we did not find specific articles on government (big) data ecosystem and therefore focused our research on various relevant areas like humanitarian data, open government data, scientific research data, industry data, etc.

Keywords: applications of big data, big data, big data types. big data ecosystem, critical success factors, data-driven government, egovernment, gaps in data ecosystems, government (big) data, literature review, public administration, systematic review

Procedia PDF Downloads 184
24165 A Machine Learning Decision Support Framework for Industrial Engineering Purposes

Authors: Anli Du Preez, James Bekker

Abstract:

Data is currently one of the most critical and influential emerging technologies. However, the true potential of data is yet to be exploited since, currently, about 1% of generated data are ever actually analyzed for value creation. There is a data gap where data is not explored due to the lack of data analytics infrastructure and the required data analytics skills. This study developed a decision support framework for data analytics by following Jabareen’s framework development methodology. The study focused on machine learning algorithms, which is a subset of data analytics. The developed framework is designed to assist data analysts with little experience, in choosing the appropriate machine learning algorithm given the purpose of their application.

Keywords: Data analytics, Industrial engineering, Machine learning, Value creation

Procedia PDF Downloads 141
24164 Effects of Titanium Dioxide Coatings on Building Composites for Sustainable Construction Applications

Authors: Ifeyinwa Ijeoma Obianyo, Luqman Adedeji Taiwo, Olugbenga O. Amu, Azikiwe Peter Onwualu

Abstract:

Improving the durability of building materials saves maintenance costs, construction time, and energy. In this study, titanium dioxide coated conventional and non-conventional composites were produced, and the effects of titanium dioxide coatings were investigated. Conventional composites were produced using river sand and Portland cement, whereas non-conventional composites were produced by partially replacing river sand and Portland cement with quarry dust and rice husk ash. Water absorption and thickness swelling tests were conducted on the produced coated and non-coated block samples. A reduction in water absorption was observed in the coated composite samples when compared to the non-coated composite samples, and this is an indication of the improved durability of the samples coated with titanium dioxide. However, there was an increase in the thickness swelling of coatings on the coated block samples, but this increase has a slight influence on the compressive strength of the coated samples. The outcome of this study indicates that coating composite building blocks with titanium dioxide will improve theirdurability. Also, the site exposure experiments revealed the self-cleansing properties of TiO2-coated composite block samples, while the Rhodamine B discolouration test confirmed the photocatalytic features of TiO2-coated composite block samples.

Keywords: titanium dioxide, water absorption, durability, mechanical properties, building composite

Procedia PDF Downloads 80
24163 ‘Honour’ Crime and the Need for Differentiation from Domestic Violence in UK Law

Authors: Mariam Shah

Abstract:

‘Honour’ crime has commonly been perceived in the UK as being a ‘domestic violence’ related issue due to incidents perceived to take place within a domestic context, and commonly by familial perpetrators. The lack of differentiation between domestic violence and ‘honour’ related incidents has several negative implications. Firstly, the prevalence and extent of ‘honour’ related crime within the UK cannot be accurately quantified due to ‘honour’ incidents being classed statistically as domestic violence incidents. Secondly, lack of differentiation means that the negative stereotypical attitudes ascribed to domestic violence which has resulted in lower criminal conviction rates that are also impacting the conviction of perpetrators of ‘honour’ crime. Thirdly, ‘honour’ related crime is innately distinct from domestic violence due to the perpetrator’s resolute intent of cleansing perceived ‘shame’ in any way possible, often with the involvement and collusion of multiple perpetrators from within the family and/or community. Domestic violence is typically restricted to the ‘home’, but ‘honour’ crime can operate between national and international boundaries. This paper critically examines the current academic literature and concludes that the few similarities between domestic violence and ‘honour’ related crime are not sufficient to warrant identical treatment under UK criminal law. ‘Honour’ related crime is a distinct and stand-alone offence which should be recognised as such. The appropriate identification and treatment of ‘honour’ crime are crucial, particularly in light of the UK’s first ‘white’ honour killing which saw a young English woman murdered after being deemed to have brought ‘shame’ on her ex-boyfriend’s family. This incident highlights the possibility of ‘honour’ crime extending beyond its perceived ‘ethnic minority’ roots and becoming more of a ‘mainstream’ issue for the multi-cultural and multi-racial UK.

Keywords: differentiation, domestic violence, honour crime, United Kingdom

Procedia PDF Downloads 209
24162 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 176
24161 Business Intelligence for Profiling of Telecommunication Customer

Authors: Rokhmatul Insani, Hira Laksmiwati Soemitro

Abstract:

Business Intelligence is a methodology that exploits the data to produce information and knowledge systematically, business intelligence can support the decision-making process. Some methods in business intelligence are data warehouse and data mining. A data warehouse can store historical data from transactional data. For data modelling in data warehouse, we apply dimensional modelling by Kimball. While data mining is used to extracting patterns from the data and get insight from the data. Data mining has many techniques, one of which is segmentation. For profiling of telecommunication customer, we use customer segmentation according to customer’s usage of services, customer invoice and customer payment. Customers can be grouped according to their characteristics and can be identified the profitable customers. We apply K-Means Clustering Algorithm for segmentation. The input variable for that algorithm we use RFM (Recency, Frequency and Monetary) model. All process in data mining, we use tools IBM SPSS modeller.

Keywords: business intelligence, customer segmentation, data warehouse, data mining

Procedia PDF Downloads 450
24160 On the Principles of Self-determination, Remedial Secession, and Responsibility to Protect: The Case of Nagorno Karabakh

Authors: Sara Melkonyan

Abstract:

Over the past decades, the political (and partly legal) doctrine of remedial secession has emerged on the basis of the development of internationally recognized human rights and rights of peoples stemming from various multilateral treaties, which stipulates that aggrieved and persecuted nations have the right to secede from the parent state as a remedy for their continuous and unstoppable grievances. The 44-day war in Nagorno-Karabakh and the following events posed severe challenges for Nagorno-Karabakh and its people. Constant aggression and threat, the humanitarian crisis caused by the closure of the Lachin Corridor, the persistent threat of ethnic cleansing of Artsakhi Armenians, and the state policy that has been executed towards Artsakhi people by the Azerbaijani authorities come to prove that the Artsakhi people cannot survive under Azerbaijani control and secession may be the last resort for ending oppression. The paper tries to make parallels with similar cases and discuss the doctrine of remedial secession applied selectively among different cases. This paper aims to figure out why in some cases the secessionist movements succeeded to gain independence based on the doctrine of remedial secession, in other cases, they refused to gain recognition from the international community. Through analyzing the domestic-level and then international-level factors, the study concluded that the doctrine of remedial secession is inherently in the political realm and almost impossible to draw substantial “recipes” for warranting secession, and the latter is not applied similarly among the cases, so its success mainly depends on the geopolitical interests of the great powers involved.

Keywords: R2P, remedial secession, self-determination, conflicts

Procedia PDF Downloads 51
24159 Imputation Technique for Feature Selection in Microarray Data Set

Authors: Younies Saeed Hassan Mahmoud, Mai Mabrouk, Elsayed Sallam

Abstract:

Analysing DNA microarray data sets is a great challenge, which faces the bioinformaticians due to the complication of using statistical and machine learning techniques. The challenge will be doubled if the microarray data sets contain missing data, which happens regularly because these techniques cannot deal with missing data. One of the most important data analysis process on the microarray data set is feature selection. This process finds the most important genes that affect certain disease. In this paper, we introduce a technique for imputing the missing data in microarray data sets while performing feature selection.

Keywords: DNA microarray, feature selection, missing data, bioinformatics

Procedia PDF Downloads 535
24158 PDDA: Priority-Based, Dynamic Data Aggregation Approach for Sensor-Based Big Data Framework

Authors: Lutful Karim, Mohammed S. Al-kahtani

Abstract:

Sensors are being used in various applications such as agriculture, health monitoring, air and water pollution monitoring, traffic monitoring and control and hence, play the vital role in the growth of big data. However, sensors collect redundant data. Thus, aggregating and filtering sensors data are significantly important to design an efficient big data framework. Current researches do not focus on aggregating and filtering data at multiple layers of sensor-based big data framework. Thus, this paper introduces (i) three layers data aggregation and framework for big data and (ii) a priority-based, dynamic data aggregation scheme (PDDA) for the lowest layer at sensors. Simulation results show that the PDDA outperforms existing tree and cluster-based data aggregation scheme in terms of overall network energy consumptions and end-to-end data transmission delay.

Keywords: big data, clustering, tree topology, data aggregation, sensor networks

Procedia PDF Downloads 306
24157 Photocatalytic Self-Cleaning Concrete Production Using Nano-Size Titanium Dioxide

Authors: Amin Akhnoukh, Halla Elea, Lawrence Benzmiller

Abstract:

The objective of this research is to evaluate the possibility of using nano-sized materials, mainly titanium dioxide (TiO2), in producing economic self-cleaning concrete using photo-catalysis process. In photo-catalysis, the nano-particles react and dissolve smog, dust, and dirt particles in the presence of sunlight, resulting in a cleaned concrete surface. To-date, the Italian cement company (Italcementi) produces a proprietary self-cleaning cementitious material that is currently used in government buildings and major highways in Europe. The high initial cost of the proprietary product represents a major obstacle to the wide spread of the self-cleaning concrete in industrial and commercial projects. In this research project, titanium dioxide nano-sized particles are infused to the top layer of a concrete pour before the concrete surface is finished. Once hardened, a blue dye is applied to the concrete surface to simulate smog and dirt effect. The concrete surface is subjected to direct light to investigate the effectiveness of the nano-sized titanium dioxide in cleaning the concrete surface. The outcome of this research project proved that the titanium dioxide can be successfully used in reducing smog and dirt particles attached to the concrete when infused to the surface concrete layer. The majority of cleansing effect due to photocatalysis happens within 24 hours of photocatalysis process. The non-proprietary mix can be used in highway, industrial, and commercial projects due to its economy and ease of production.

Keywords: self-cleaning concrete, photocatalysis, Smog-eating concrete, titanium dioxide

Procedia PDF Downloads 329
24156 Jurisprudential Terms of Istiḥālah (Transformation) in Cosmetic Products (An Analytical Study)

Authors: Hassan Sher

Abstract:

God has made this world with all of his essences and beautified it with his countless blessings. In Islam, no doubt, beauty is a very important characteristic but also an aspect of the body and the heart. In a world where the standards of beauty seem to change from year to year according to trends and norms. Moreover, in this world, many people want to look good and feel satisfied and will be willing to go through many ways for their ideal look. likewise, several products came into use for beautifying, cleansing, and promoting attractiveness. These products include components of cosmetics, they are utilized for health and beauty purposes. There are concerns regarding the existence of harmful or ḥarām chemicals, but With the advancement in (technology), it results in the transformation of unlawful and forbidden cosmetic products into permissible several new ingredients and products. The process of transforming certain items or products from one form to another, Muslim jurists tend to use terms like Istiḥālah (transformation).Istiḥālah is an Islamic principle unknown to many Muslims. LinguisticallyIstiḥālah carries the meaning of a transformation or a change in the nature of a thing into something else.According to the religious contact, Istiḥālah signifies a turning of a matter from a state of impurity or inedibility into a matter of different nature, name, properties, and characteristics (colour, taste, and smell) (Zuhayli, 1997). This principle, which is unanimously accepted by Muslim scholars, are breaths of fresh air to Muslims suffering from the suffocation of excessive prohibition. This will allow the invention to be utilized fully. This research tends to highlight the different ideological concepts of Istiḥālah from the perspective of Islamic Shariah and jurisprudence and its application in cosmetic products. However, the study focuses on the issues related to alcohol and pig ingredients in beauty products.

Keywords: istiḥālah. harām, jurisprudence, cosmetic, pig

Procedia PDF Downloads 105
24155 The Antioxidant Gel Mask Supplies Of Bitter Melon's Extract ( Momordica charantia Linn.)

Authors: N. S. Risqina, G. Edijanti, P. S. Nurita, L. Endang, R. A. Siti, R. Tri

Abstract:

Skin is an important and vital organs and also as a mirror of health and life. Facial skin care is one of the main emphasis to get the beautiful, healthy, and fresh skin. Potentially antioxidant phenolic compounds shows, antimutagen, antitumor, anti-inflammatory, and anti-cancer. Flavonoids are a group of polyphenolic compounds that have the nature of free radicals, inhibiting the oxidative and hydrolytic enzymes as well as anti-inflammatory. Bitter melon (Momordica charantia Linn) is a plant that contains flavonoids, and phenolic antioxidant activity. Bitter melon has strong antioxidant activity that can counteract the free radicals.These compounds can prevent free radicals that cause premature aging. Gel masks including depth cleansing is the cosmetics which work in depth and could raise the dead skin cells. Measurement of antioxidant activity of the extract and gel mask is done by using the immersion method of DPPH. IC50 value of ethanol extract of bitter melon fruit of 287.932 ppm. The preparation of gel mask bitter melon fruit extract, necessary to test the effectiveness of antioxidants using DPPH method is done by measuring the inhibition of DPPH and using UV spectrophotometer at the wavelength of maximum DPPH solution. Tests conducted at the beginning and end of the evaluation (day 0 and day 28). The purpose of this study is to determine the antioxidant activity of the bitter melon's extract and to determine the antioxidant activity of ethanol extract gel mask pare in varying concentrations, ie 1xIC100 (0.295%), 2xIC100 (0.590%) and 4xIC100 (1.180%). Evaluation of physical properties of the preparation on (Day-0,7,14,21, and 28) and evaluation of antioxidant activity (day 0 and 28). Data were analyzed using One Way ANOVA to determine differences in the physical properties of each formula. The statistical results showed that differences in the formula and storage time affects the adhesion, dispersive power, dry time and pH it is shown on a significant value of p <0.05, but longer storage does not affect the pH because the significance value p> 0,05. The antioxidant test showed that there are differences in antioxidant activity in all formulas. Measurement of antioxidant activity of bitter melon fruit extract gel mask on day 0 with a concentration of 0.295%, 0.590%, and 1.180%, respectively, are 124,209.277 ppm, ppm 83819.223 and 47323.592 ppm, whereas day 28 consecutive 130 411, 495 ppm, and 53239.806 95561.645 ppm ppm. The Conclusions drawn that there are antioxidant activity in preparation gel mask of bitter melon fruit extract. The antioxidant activity of bitter melon fruit extract gel mask on the day 0 with a concentration of 0.295%, 0.590%, and 1.180%, respectively, are 124,209.277 ppm, ppm 83819.223 and 47323.592 ppm, whereas on day 28 of antioxidant activity gel mask bitter melon fruit extract with a concentration of 0.295%, 0.590%, and 1.180% in succession, namely: 130,411.495 ppm, ppm 95561.645 and 53239.806 ppm.

Keywords: antioxdant, bitter melon, gel mask, IC50

Procedia PDF Downloads 448
24154 Control the Flow of Big Data

Authors: Shizra Waris, Saleem Akhtar

Abstract:

Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.

Keywords: computer, it community, industry, big data

Procedia PDF Downloads 161
24153 The Role of Phycoremediation in the Sustainable Management of Aquatic Pollution

Authors: Raymond Ezenweani, Jeffrey Ogbebor

Abstract:

The menace of aquatic pollution has become increasingly of great concern and the effects of this pollution as a result of anthropogenic activities cannot be over emphasized. Phycoremediation is the application of algal remediation technology in the removal of harmful products from the environment. Harmful products also known as pollutants are usually introduced into the environment through variety of processes such as industrial discharge, agricultural runoff, flooding, and acid rain. This work has to do with the capability of algae in the efficient removal of different pollutants, ranging from hydrocarbons, eutrophication, agricultural chemicals and wastes, heavy metals, foul smell from septic tanks or dumps through different processes such as bioconversion, biosorption, bioabsorption and biodecomposition. Algae are capable of bioconversion of environmentally persistent compounds to degradable compounds and also capable of putting harmful bacteria growth into check in waste water remediation. Numerous algal organisms such as Nannochloropsis spp, Chlorella spp, Tetraselmis spp, Shpaerocystics spp, cyanobacteria and different macroalgae have been tested by different researchers in laboratory scale and shown to have 100% efficiency in environmental remediation. Algae as a result of their photosynthetic capacity are also efficient in air cleansing and management of global warming by sequestering carbon iv oxide in air and converting it into organic carbon, thereby making food available for the other organisms in the higher trophic level of the aquatic food chain. Algae play major role in the sustenance of the aquatic ecosystem by their virtue of being photosynthetic. They are the primary producers and their role in environmental sustainability is remarkable.

Keywords: Algae , Pollutant, ., Phycoremediation, Aquatic, Sustainability

Procedia PDF Downloads 89
24152 High Performance Computing and Big Data Analytics

Authors: Branci Sarra, Branci Saadia

Abstract:

Because of the multiplied data growth, many computer science tools have been developed to process and analyze these Big Data. High-performance computing architectures have been designed to meet the treatment needs of Big Data (view transaction processing standpoint, strategic, and tactical analytics). The purpose of this article is to provide a historical and global perspective on the recent trend of high-performance computing architectures especially what has a relation with Analytics and Data Mining.

Keywords: high performance computing, HPC, big data, data analysis

Procedia PDF Downloads 485
24151 A Landscape of Research Data Repositories in Re3data.org Registry: A Case Study of Indian Repositories

Authors: Prashant Shrivastava

Abstract:

The purpose of this study is to explore re3dat.org registry to identify research data repositories registration workflow process. Further objective is to depict a graph for present development of research data repositories in India. Preliminarily with an approach to understand re3data.org registry framework and schema design then further proceed to explore the status of research data repositories of India in re3data.org registry. Research data repositories are getting wider relevance due to e-research concepts. Now available registry re3data.org is a good tool for users and researchers to identify appropriate research data repositories as per their research requirements. In Indian environment, a compatible National Research Data Policy is the need of the time to boost the management of research data. Registry for Research Data Repositories is a crucial tool to discover specific information in specific domain. Also, Research Data Repositories in India have not been studied. Re3data.org registry and status of Indian research data repositories both discussed in this study.

Keywords: research data, research data repositories, research data registry, re3data.org

Procedia PDF Downloads 297
24150 A Study of Cloud Computing Solution for Transportation Big Data Processing

Authors: Ilgin Gökaşar, Saman Ghaffarian

Abstract:

The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.

Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing

Procedia PDF Downloads 424
24149 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 220
24148 Linguistic Summarization of Structured Patent Data

Authors: E. Y. Igde, S. Aydogan, F. E. Boran, D. Akay

Abstract:

Patent data have an increasingly important role in economic growth, innovation, technical advantages and business strategies and even in countries competitions. Analyzing of patent data is crucial since patents cover large part of all technological information of the world. In this paper, we have used the linguistic summarization technique to prove the validity of the hypotheses related to patent data stated in the literature.

Keywords: data mining, fuzzy sets, linguistic summarization, patent data

Procedia PDF Downloads 248
24147 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: communication, computer network, data collection, probe

Procedia PDF Downloads 333
24146 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 56