Search results for: data collecting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24382

Search results for: data collecting

24022 A Review Paper on Data Mining and Genetic Algorithm

Authors: Sikander Singh Cheema, Jasmeen Kaur

Abstract:

In this paper, the concept of data mining is summarized and its one of the important process i.e KDD is summarized. The data mining based on Genetic Algorithm is researched in and ways to achieve the data mining Genetic Algorithm are surveyed. This paper also conducts a formal review on the area of data mining tasks and genetic algorithm in various fields.

Keywords: data mining, KDD, genetic algorithm, descriptive mining, predictive mining

Procedia PDF Downloads 566
24021 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring

Authors: Seung-Lock Seo

Abstract:

This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.

Keywords: data mining, process data, monitoring, safety, industrial processes

Procedia PDF Downloads 371
24020 Legal Responsibility of the External Auditor Qualitative Case Study of Libyan Environment

Authors: Bubaker F. Shareia

Abstract:

The aim of this paper is to determine a general frame of the auditor's legal responsibilities in Libya which were implied in professional codes and rules, these codes and rules were concerned with the auditor's rights and duties in conducting his professional duties. This will provide a background for the Libyan accounting profession, and the challenges in tailoring Auditors to meet third party's needs. Being informed of the kinds of legal responsibilities which the external auditors could face during conducting their duties. The study is based on a literature review and archival research, reinforced by a qualitative case study comprised of interviews, questionnaire and a study of internal documents. To reach such an understanding, the researcher designed two questionnaires for collecting the data. One questionnaire was distributed among the certified public accountant firms in Libya and the second was distributed among a group of randomly selected lawyers and judges in the same country. Most auditors agreed upon the determination of their responsibilities toward the state and they emphasized that their responsibilities toward their clients were limited to the accepted standards of auditing. Moreover, all auditors who were surveyed emphasized that there has never been any juridical claims against them, and as a consequence they have never paid any legal fines. This study focuses on one country, which does limit its generalisability. However, it also suggests fruitful research areas in considering the impact and challenge of the historic factors in the accounting profession in emerging economies.

Keywords: accounting, external auditor, legal responsibilities, libyan accounting profession

Procedia PDF Downloads 121
24019 Assessing the Effects of Entrepreneurship Education and Moderating Variables on Venture Creation Intention of Undergraduate Students in Ghana

Authors: Daniel K. Gameti

Abstract:

The paper explored the effects of active and passive entrepreneurship education methods on the venture creation intention of undergraduate students in Ghana. The study also examined the moderating effect of gender and negative personal characteristics (risk tolerance, stress tolerance and fear of failure) on students’ venture creation intention. Deductive approach was used in collecting quantitative data from 555 business students from one public university and one private university through self-administered questionnaires. Descriptive statistic was used to determine the dominant method of entrepreneurship education used in Ghana. Further, structural equation model was used to test four hypotheses. The results of the study show that the dominant method of education used in Ghana was lectures and the least method used was field trip. The study further revealed that passive methods of education are less effective compared to active methods which were statistically significant in venture creation intention among students. There was also statistical difference between male and female students’ venture creation intention but stronger among male students and finally, the only personal characteristics that influence students’ intention was stress tolerance because risk tolerance and fear of failure were statistically insignificant.

Keywords: entrepreneurship education, Ghana, moderating variables, venture creation intention, undergraduate students

Procedia PDF Downloads 429
24018 Digital Curriculum Preservation Planning, Actions, and Challenges

Authors: Misook Ahn

Abstract:

This study examined the Digital Curriculum Repository (DCR) project initiated at Defense Language Institute Foreign Language Center (DLIFLC). The purpose of the DCR is to build a centralized curriculum infrastructure, preserve all curriculum materials, and provide academic service to users (faculty, students, or other agencies). The DCR collection includes core language curriculum materials developed by each language school—foreign language textbooks, language survival kits, and audio files currently in or not in use at the schools. All core curriculum materials with audio and video files have been coded, collected, and preserved at the DCR. The DCR website was designed with MS SharePoint for easy accessibility by the DLIFLC’s faculty and students. All metadata for the collected curriculum materials have been input by language, code, year, book type, level, user, version, and current status (in use/not in use). The study documents digital curriculum preservation planning, actions, and challenges, including collecting, coding, collaborating, designing DCR SharePoint, and policymaking. DCR Survey data is also collected and analyzed for this research. Based on the finding, the study concludes that the mandatory policy for the DCR system and collaboration with school leadership are critical elements of a successful repository system. The sample collected items, metadata, and DCR SharePoint site are presented in the evaluation section.

Keywords: MS share point, digital preservation, repository, policy

Procedia PDF Downloads 131
24017 A Survey of Semantic Integration Approaches in Bioinformatics

Authors: Chaimaa Messaoudi, Rachida Fissoune, Hassan Badir

Abstract:

Technological advances of computer science and data analysis are helping to provide continuously huge volumes of biological data, which are available on the web. Such advances involve and require powerful techniques for data integration to extract pertinent knowledge and information for a specific question. Biomedical exploration of these big data often requires the use of complex queries across multiple autonomous, heterogeneous and distributed data sources. Semantic integration is an active area of research in several disciplines, such as databases, information-integration, and ontology. We provide a survey of some approaches and techniques for integrating biological data, we focus on those developed in the ontology community.

Keywords: biological ontology, linked data, semantic data integration, semantic web

Procedia PDF Downloads 418
24016 Classification of Generative Adversarial Network Generated Multivariate Time Series Data Featuring Transformer-Based Deep Learning Architecture

Authors: Thrivikraman Aswathi, S. Advaith

Abstract:

As there can be cases where the use of real data is somehow limited, such as when it is hard to get access to a large volume of real data, we need to go for synthetic data generation. This produces high-quality synthetic data while maintaining the statistical properties of a specific dataset. In the present work, a generative adversarial network (GAN) is trained to produce multivariate time series (MTS) data since the MTS is now being gathered more often in various real-world systems. Furthermore, the GAN-generated MTS data is fed into a transformer-based deep learning architecture that carries out the data categorization into predefined classes. Further, the model is evaluated across various distinct domains by generating corresponding MTS data.

Keywords: GAN, transformer, classification, multivariate time series

Procedia PDF Downloads 91
24015 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault

Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola

Abstract:

Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.

Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula

Procedia PDF Downloads 35
24014 Authority and Responsibility of Turkish Physical Education Teachers

Authors: Mufide Cotuk, Muslim Bakir

Abstract:

National education in Turkey aims to provide superior education opportunities to students in order to develop their intellectual abilities in accordance with contemporary pedagogy. Physical education (PE) plays an important role in this context. Various factors affect the quality and efficiency of the process of PE. Factors related to governance are crucially important, especially those of authority and responsibility. For educational institutions at high school level, the factors affecting authority and responsibility have not been clearly delineated. Therefore, the aim of this study was to examine authority and responsibility of PE teachers as the balance between them. The study sample consisted of 60 PE teachers (19 women, 41 men) at 57 high schools in Istanbul (65% state and 35% private institutions). All PE teachers completed the study questionnaire collecting demographic and institutional data as knowledge and attitudes regarding authority and responsibility issues. The determination of authority and responsibility of PE teachers has been grounded on the law for government officials, course-passing regulations, and school sports regulations. The PE teachers declared as the primary source of their authority and responsibility ‘school sports regulations’ (56,7% of PE teachers), ‘course-passing regulations’ (36,7% of PE teachers) and ‘the law for government officials’ (30,0% of PE teachers). The PE teachers mentioned that the school administration burdened them with additional responsibilities (58,3% of PE teachers). Such ‘additional’ responsibilities were primarily related to ‘disciplinary regulations’ (21,7% of PE teachers) and ‘maintenance of school order’ (16,0% of PE teachers). In conclusion, authority and responsibility of PE teachers were not well balanced. As authority issues were not clearly stated, ‘compulsory’ responsibilities increased causing this imbalance.

Keywords: authority, PE teacher, responsibility, sport management

Procedia PDF Downloads 317
24013 Building Bridges on Roads With Major Constructions

Authors: Mohamed Zaidour

Abstract:

In this summary, we are going to look in brief at the bridges and their building and construction on most roads and we have followed a simple method to explain each field clearly because the geographical and climatic diversity of an area leads to different methods and types of roads and installation engineering in other areas In mountain areas we need to build retaining walls in areas of rain. It needs to construct ferries to discharge water from roads in areas of temporary or permanent rivers. There is a need to build bridges and construct road installations in the process of collecting the necessary information, such as soil type. This information needs it, engineer, when designing the constructor and in this section, we will identify the types and methods of calculation bridge columns rules phrases the walls are chock.

Keywords: bridges, buildings, concrete, constructions, roads

Procedia PDF Downloads 88
24012 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 450
24011 ParkedGuard: An Efficient and Accurate Parked Domain Detection System Using Graphical Locality Analysis and Coarse-To-Fine Strategy

Authors: Chia-Min Lai, Wan-Ching Lin, Hahn-Ming Lee, Ching-Hao Mao

Abstract:

As world wild internet has non-stop developments, making profit by lending registered domain names emerges as a new business in recent years. Unfortunately, the larger the market scale of domain lending service becomes, the riskier that there exist malicious behaviors or malwares hiding behind parked domains will be. Also, previous work for differentiating parked domain suffers two main defects: 1) too much data-collecting effort and CPU latency needed for features engineering and 2) ineffectiveness when detecting parked domains containing external links that are usually abused by hackers, e.g., drive-by download attack. Aiming for alleviating above defects without sacrificing practical usability, this paper proposes ParkedGuard as an efficient and accurate parked domain detector. Several scripting behavioral features were analyzed, while those with special statistical significance are adopted in ParkedGuard to make feature engineering much more cost-efficient. On the other hand, finding memberships between external links and parked domains was modeled as a graph mining problem, and a coarse-to-fine strategy was elaborately designed by leverage the graphical locality such that ParkedGuard outperforms the state-of-the-art in terms of both recall and precision rates.

Keywords: coarse-to-fine strategy, domain parking service, graphical locality analysis, parked domain

Procedia PDF Downloads 388
24010 A Development of Community Participation in Developing Healthy Religion Places in Narathiwat Province, Thailand

Authors: Waepa Wanhussen

Abstract:

The Ministry of Public Health has established policies accelerating health promotion to prevent public health problems in five border provinces of Thailand. One of these policies employs the religion to guide the community development and solve health issues consistent with the lifestyle and culture of those people. This policy is an important strategy to solve the problems due to the unrest and conflicts in the southern border provinces. This participatory action research aimed to develop mosques as healthy religion places in Narathiwat Province. In the development, the participatory action, consisting of 5 stages, was conducted from October 2012 - May 2013. Stage I: Conducting a survey for problems and needs for developing healthy religion places by employing community participation. Stage II: Analyzing problems and situations at a workshop containing informal interviews and group conversations with 200 participants (health providers at district level, Imams (the Muslim leaders), and community leaders). Stage III: Planning for developing healthy religion places by health providers, Imams, community leaders. Stage IV: Implementing the plan according to the conditions of problems and needs of the community in order to develop healthy religion places. Stage V: Evaluating the implementation by using the instrument, a criteria of being healthy religion place, for collecting data. Data were analyzed by using percentage. It was found that out of 630 mosques 575 (90.12%) passed the criteria of being a healthy religion place. Among these mosques, 190 mosques (30.15%) were in good and very good level, in which, after the implementation, the number of being good and very good healthy mosques increased by 22.58%. The researcher suggested that the developing sustainably healthy religion places require the participation of residences in the community and agencies such as local government, the Islamic Council of Narathiwat Province, and Council of Culture of Narathiwat Province. The healthy religion places can be used to strengthen and sustain health promotion and disease prevention in the community as health learning centers.

Keywords: healthy religion places, development of community participation, nursing informatics, health

Procedia PDF Downloads 266
24009 Identification and Classification of Medicinal Plants of Indian Himalayan Region Using Hyperspectral Remote Sensing and Machine Learning Techniques

Authors: Kishor Chandra Kandpal, Amit Kumar

Abstract:

The Indian Himalaya region harbours approximately 1748 plants of medicinal importance, and as per International Union for Conservation of Nature (IUCN), the 112 plant species among these are threatened and endangered. To ease the pressure on these plants, the government of India is encouraging its in-situ cultivation. The Saussurea costus, Valeriana jatamansi, and Picrorhiza kurroa have also been prioritized for large scale cultivation owing to their market demand, conservation value and medicinal properties. These species are found from 1000 m to 4000 m elevation ranges in the Indian Himalaya. Identification of these plants in the field requires taxonomic skills, which is one of the major bottleneck in the conservation and management of these plants. In recent years, Hyperspectral remote sensing techniques have been precisely used for the discrimination of plant species with the help of their unique spectral signatures. In this background, a spectral library of the above 03 medicinal plants was prepared by collecting the spectral data using a handheld spectroradiometer (325 to 1075 nm) from farmer’s fields of Himachal Pradesh and Uttarakhand states of Indian Himalaya. The Random forest (RF) model was implied on the spectral data for the classification of the medicinal plants. The 80:20 standard split ratio was followed for training and validation of the RF model, which resulted in training accuracy of 84.39 % (kappa coefficient = 0.72) and testing accuracy of 85.29 % (kappa coefficient = 0.77). This RF classifier has identified green (555 to 598 nm), red (605 nm), and near-infrared (725 to 840 nm) wavelength regions suitable for the discrimination of these species. The findings of this study have provided a technique for rapid and onsite identification of the above medicinal plants in the field. This will also be a key input for the classification of hyperspectral remote sensing images for mapping of these species in farmer’s field on a regional scale. This is a pioneer study in the Indian Himalaya region for medicinal plants in which the applicability of hyperspectral remote sensing has been explored.

Keywords: himalaya, hyperspectral remote sensing, machine learning; medicinal plants, random forests

Procedia PDF Downloads 176
24008 Healthcare Big Data Analytics Using Hadoop

Authors: Chellammal Surianarayanan

Abstract:

Healthcare industry is generating large amounts of data driven by various needs such as record keeping, physician’s prescription, medical imaging, sensor data, Electronic Patient Record(EPR), laboratory, pharmacy, etc. Healthcare data is so big and complex that they cannot be managed by conventional hardware and software. The complexity of healthcare big data arises from large volume of data, the velocity with which the data is accumulated and different varieties such as structured, semi-structured and unstructured nature of data. Despite the complexity of big data, if the trends and patterns that exist within the big data are uncovered and analyzed, higher quality healthcare at lower cost can be provided. Hadoop is an open source software framework for distributed processing of large data sets across clusters of commodity hardware using a simple programming model. The core components of Hadoop include Hadoop Distributed File System which offers way to store large amount of data across multiple machines and MapReduce which offers way to process large data sets with a parallel, distributed algorithm on a cluster. Hadoop ecosystem also includes various other tools such as Hive (a SQL-like query language), Pig (a higher level query language for MapReduce), Hbase(a columnar data store), etc. In this paper an analysis has been done as how healthcare big data can be processed and analyzed using Hadoop ecosystem.

Keywords: big data analytics, Hadoop, healthcare data, towards quality healthcare

Procedia PDF Downloads 382
24007 Data Disorders in Healthcare Organizations: Symptoms, Diagnoses, and Treatments

Authors: Zakieh Piri, Shahla Damanabi, Peyman Rezaii Hachesoo

Abstract:

Introduction: Healthcare organizations like other organizations suffer from a number of disorders such as Business Sponsor Disorder, Business Acceptance Disorder, Cultural/Political Disorder, Data Disorder, etc. As quality in healthcare care mostly depends on the quality of data, we aimed to identify data disorders and its symptoms in two teaching hospitals. Methods: Using a self-constructed questionnaire, we asked 20 questions in related to quality and usability of patient data stored in patient records. Research population consisted of 150 managers, physicians, nurses, medical record staff who were working at the time of study. We also asked their views about the symptoms and treatments for any data disorders they mentioned in the questionnaire. Using qualitative methods we analyzed the answers. Results: After classifying the answers, we found six main data disorders: incomplete data, missed data, late data, blurred data, manipulated data, illegible data. The majority of participants believed in their important roles in treatment of data disorders while others believed in health system problems. Discussion: As clinicians have important roles in producing of data, they can easily identify symptoms and disorders of patient data. Health information managers can also play important roles in early detection of data disorders by proactively monitoring and periodic check-ups of data.

Keywords: data disorders, quality, healthcare, treatment

Procedia PDF Downloads 407
24006 Big Data and Analytics in Higher Education: An Assessment of Its Status, Relevance and Future in the Republic of the Philippines

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

One of the unique challenges provided by the twenty-first century to Philippine higher education is the utilization of Big Data. The higher education system in the Philippines is generating burgeoning amounts of data that contains relevant data that can be used to generate the information and knowledge needed for accurate data-driven decision making. This study examines the status, relevance and future of Big Data and Analytics in Philippine higher education. The insights gained from the study may be relevant to other developing nations similarly situated as the Philippines.

Keywords: big data, data analytics, higher education, republic of the philippines, assessment

Procedia PDF Downloads 313
24005 Personality as a Predictor of Knowledge Hiding Behavior: Case Study of Alpha Electronics

Authors: Sadeeqa Khan, Muhammad Usman

Abstract:

Employees’ knowledge hiding behaviors can be detrimental to employees’ interpersonal relationships and individual and organizational learning and creativity. However, to the best of the authors’ knowledge, the literature on the contingencies, antecedents and outcomes of employees’ knowledge hiding behaviors is still in its infancy. On the other hand, not everyone who hides knowledge hides it the same way, as individuals are different, so do their behaviors. This study explores the links between employees’ personality traits and their knowledge hiding behaviors. By using a single case study as a research methodology and collecting data through 28 semi-structured interviews from employees working in Alpha Electronics (the pseudo name of the company to ascertain anonymity) operating in Pakistan, we foreground the patterns of relationships between employees’ personality traits and knowledge hiding behaviors – rationalized hiding, evasive hiding and playing dumb. Our findings suggest that employees high on extraversion involve in evasive knowledge hiding; while employees low on extraversion (introverts) demonstrate rationalized hiding. Moreover, both extrovert and introvert employees involve in playing dumb in situations that involve risk for their jobs and careers. For instance, when knowledge is requested from their managers, both extrovert and introvert employees tend to play dumb, as in such cases, evasive and rationalized hiding can be harmful to their job and career-related interests and motives. Other than theoretical contributions, the study offers important implications for organizations faced with the challenges of shortage of skills and knowledge.

Keywords: knowledge hiding, personality, rationalized hiding, playing dumb, evasive hiding

Procedia PDF Downloads 184
24004 Data Management and Analytics for Intelligent Grid

Authors: G. Julius P. Roy, Prateek Saxena, Sanjeev Singh

Abstract:

Power distribution utilities two decades ago would collect data from its customers not later than a period of at least one month. The origin of SmartGrid and AMI has subsequently increased the sampling frequency leading to 1000 to 10000 fold increase in data quantity. This increase is notable and this steered to coin the tern Big Data in utilities. Power distribution industry is one of the largest to handle huge and complex data for keeping history and also to turn the data in to significance. Majority of the utilities around the globe are adopting SmartGrid technologies as a mass implementation and are primarily focusing on strategic interdependence and synergies of the big data coming from new information sources like AMI and intelligent SCADA, there is a rising need for new models of data management and resurrected focus on analytics to dissect data into descriptive, predictive and dictatorial subsets. The goal of this paper is to is to bring load disaggregation into smart energy toolkit for commercial usage.

Keywords: data management, analytics, energy data analytics, smart grid, smart utilities

Procedia PDF Downloads 754
24003 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive

Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh

Abstract:

Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.

Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data

Procedia PDF Downloads 263
24002 Analysis of Aquifer Productivity in the Mbouda Area (West Cameroon)

Authors: Folong Tchoffo Marlyse Fabiola, Anaba Onana Achille Basile

Abstract:

Located in the western region of Cameroon, in the BAMBOUTOS department, the city of Mbouda belongs to the Pan-African basement. The water resources exploited in this region consist of surface water and groundwater from weathered and fractured aquifers within the same basement. To study the factors determining the productivity of aquifers in the Mbouda area, we adopted a methodology based on collecting data from boreholes drilled in the region, identifying different types of rocks, analyzing structures, and conducting geophysical surveys in the field. The results obtained allowed us to distinguish two main types of rocks: metamorphic rocks composed of amphibolites and migmatitic gneisses and igneous rocks, namely granodiorites and granites. Several types of structures were also observed, including planar structures (foliation and schistosity), folded structures (folds), and brittle structures (fractures and lineaments). A structural synthesis combines all these elements into three major phases of deformation. Phase D1 is characterized by foliation and schistosity, phase D2 is marked by shear planes and phase D3 is characterized by open and sealed fractures. The analysis of structures (fractures in outcrops, Landsat lineaments, subsurface structures) shows a predominance of ENE-WSW and WNW-ESE directions. Through electrical surveys and borehole data, we were able to identify the sequence of different geological formations. Four geo-electric layers were identified, each with a different electrical conductivity: conductive, semi-resistive, or resistive. The last conductive layer is considered a potentially aquiferous zone. The flow rates of the boreholes ranged from 2.6 to 12 m3/h, classified as moderate to high according to the CIEH classification. The boreholes were mainly located in basalts, which are mineralogically rich in ferromagnesian minerals. This mineral composition contributes to their high productivity as they are more likely to be weathered. The boreholes were positioned along linear structures or at their intersections.

Keywords: Mbouda, Pan-African basement, productivity, west-Cameroon

Procedia PDF Downloads 32
24001 A Fuzzy Kernel K-Medoids Algorithm for Clustering Uncertain Data Objects

Authors: Behnam Tavakkol

Abstract:

Uncertain data mining algorithms use different ways to consider uncertainty in data such as by representing a data object as a sample of points or a probability distribution. Fuzzy methods have long been used for clustering traditional (certain) data objects. They are used to produce non-crisp cluster labels. For uncertain data, however, besides some uncertain fuzzy k-medoids algorithms, not many other fuzzy clustering methods have been developed. In this work, we develop a fuzzy kernel k-medoids algorithm for clustering uncertain data objects. The developed fuzzy kernel k-medoids algorithm is superior to existing fuzzy k-medoids algorithms in clustering data sets with non-linearly separable clusters.

Keywords: clustering algorithm, fuzzy methods, kernel k-medoids, uncertain data

Procedia PDF Downloads 179
24000 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 172
23999 Do Interventions for Increasing Minorities' Access to Higher Education Work? The Case of Ethiopians in Israel

Authors: F. Nasser-Abu Alhija

Abstract:

In many countries, much efforts and resources are devoted to empowering and integrating minorities within the mainstream population. Major ventures in this route are crafted in higher education institutions where different outreach programs and methods such as lenient entry requirements, monitory incentives, learning skills workshops, tutoring and mentoring, are utilized. Although there is some information regarding these programs, their effectiveness still needs to be thoroughly examined. The Ethiopian community In Israel is one of the minority groups that has been targeted by sponsoring foundations and higher education institutions with the aim to ease the access, persistence and success of its young people in higher education and later in the job market. The evaluation study we propose to present focuses on the implementation of a program designed for this purpose. This program offers relevant candidates for study at a prestigious university a variety of generous incentives that include tuitions, livening allowance, tutoring, mentoring, skills and empowerment workshops and cultural meetings. Ten students were selected for the program and they started their studies in different subject areas before three and half years. A longitudinal evaluation has been conducted since the implementation of the program. Data were collected from different sources: participating students, program coordinator, mentors, tutors, program documents and university records. Questionnaires and interviews were used for collecting data on the different components of the program and on participants' perception of their effectiveness. Participants indicate that the lenient entry requirements and the monitory incentives are critical for starting their studies. During the first year, skills and empowering workshops, torturing and mentoring were evaluated as very important for persistence and success in studies. Tutoring was perceived as very important also at the second year but less importance is attributed to mentoring. Mixed results regarding integration in the Israeli culture emerged. The results are discussed with reference to findings from different settings around the world.

Keywords: access to higher education, minority groups, monitory incentives, torturing, mentoring

Procedia PDF Downloads 354
23998 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 59
23997 Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises

Authors: Martin Böhmer, Agatha Dabrowski, Boris Otto

Abstract:

The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a “data knowledge model”. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research.

Keywords: data management, digitization, industry 4.0, knowledge engineering, metamodel

Procedia PDF Downloads 329
23996 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 333
23995 A Framework Factors Influencing Accounting Information Systems Adoption Success

Authors: Manirath Wongsim

Abstract:

AIS plays an important role in business management, strategic and can provide assistance in all phases of decision making. Thus, many organisations needs to be seen as well adopting AIS, which is critical to a company in order to organise, manage and operate process in all sections. In order to implement AIS successfully, it is important to understand the underlying factors that influence the AIS adoption. Therefore, this research intends to study this perspective of factors influence and impact on AIS adoption’s success. The model has been designed to illustrate factors influences in AIS adoption. It also attempts to identify the critical success factors that organisations should focus on, to ensure the adoption on accounting process. This framework will be developed from case studies by collecting qualitative and quantitative data. Case study and survey methodology were adopted for this research. Case studies in two Thai- organisations were carried out. The results of the two main case studies suggested 9 factors that may have impact on in AIS adoption. Survey instrument was developed based on the findings from case studies. Two large-scale surveys were sent to selected members of Thailand Accountant, and Thailand Computer Society to further develop and test the research framework. The top three critical factors for ensuring AIS adoption were: top management commitment, steering committees, and Technical capability of AIS personnel. That is, it is now clear which factors impact in AIS adoption, and which of those factors are critical success factors for ensuring AIS adoption successes

Keywords: accounting information system, accounting information systems adoption, and inflecting AIS adoption

Procedia PDF Downloads 370
23994 Performance Improvement of Photovoltaic Module at Different Tilt Angle in Kuwait

Authors: Hussain Bunyan, Wesam Ali

Abstract:

In this paper we will study the performance of a Silicon Photovoltaic (PV) system with different tilt angle arrangement in Kuwait (latitude 30˚ N). In this study the PV system is installed facing south, collecting maximum solar radiation at noon, and their angles are from 00 to 900 respectively, during full year at the Solstice and Equinox periods and aiming for a higher angle than 300 with competitive output power. The results show that the performance and the output power of the PV system with 50˚ tilt angle, is equivalent to the latitude tilt angle (30˚) during a full year.

Keywords: photovoltaic model, tilt angle, solar collector, PV system performance, State of Kuwait

Procedia PDF Downloads 490
23993 Performance of Photovoltaic Module at Different Tilt Angles

Authors: Hussain Bunyan, Wesam Ali

Abstract:

In this paper we will study the performance of a Silicon Photovoltaic (PV) system with different tilt angle arrangement in Kuwait (latitude 30˚ N). In the study the PV system is installed facing South, collecting maximum solar radiation at noon, and their angles are from 00 to 900 respectively, during full year at the Solstice and Equinox periods, aiming for a higher angle than 300 with competitive output power. The results show that the performance and the output power of the PV system with 50˚ tilt angle, is equivalent to the latitude tilt angle (30˚) during a full year.

Keywords: photovoltaic model, tilt angle, solar collector, PV system performance, State of Kuwait

Procedia PDF Downloads 464