Search results for: data poisoning
24159 A Review on Big Data Movement with Different Approaches
Authors: Nay Myo Sandar
Abstract:
With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques
Procedia PDF Downloads 5324158 Optimized Approach for Secure Data Sharing in Distributed Database
Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal
Abstract:
In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.Keywords: ER-schema, electronic record, P2P framework, API, query formulation
Procedia PDF Downloads 30024157 Enhanced Modification Effect of CeO2 on Pt-Pd Binary Catalysts for Formic Acid Oxidation
Authors: Azeem Ur Rehman, Asma Tayyaba
Abstract:
This article deals with the promotional effects of CeO2 on PtPd/CeO2-OMC electro catalysts. The synthesized catalysts are characterized using different physico chemical techniques and evaluated in a formic acid oxidation fuel cell. N2 adsorption/desorption analysis shows that CeO2 modification increases the surface area of OMC from 1005 m2/g to 1119 m2/g. SEM, XRD and TEM analysis reveal that the presence of CeO2 enhances the active metal(s) dispersion on the CeO2-OMC surface. The average particle size of the dispersed metal decreases with the increase of Pt/Pd ratio on CeO2-OMC support. Cyclic voltametry measurement of Pd/CeO2-OMC gives 12 % higher anodic current activity with 83 mV negative shift of the peak potential as compared to unmodified Pd/OMC. In bimetallic catalysts, the addition of Pt improves the activity and stability of the catalysts significantly. Among the bimetallic samples, Pd3Pt1/CeO2-OMC displays superior current density (74.6 mA/cm2), which is 28.3 times higher than that of Pt/CeO2-OMC. It also shows higher stability in extended period of runs with least indication of CO poisoning effects.Keywords: CeO2, ordered mesoporous carbon (OMC), electro catalyst, formic acid fuel cell
Procedia PDF Downloads 46524156 Virulence Genes of Salmonella typhimurium and Salmonella enteritidis Isolated from Milk and Dairy Products
Authors: E. Rahimi, S. Shaigannia
Abstract:
Salmonella typhimurium and Salmonella enteritidis are important infectious agents causing food poisoning and food-borne gastrointestinal diseases. This study was carried out in order to investigate the distribution of virulence genes and antimicrobial resistance properties of S. typhimurium and S. enteritidis isolated from ruminant milk and dairy products in Iran. Overall 360 raw and pasteurized milk and traditional and commercial dairy products were purchased from random selected supermarkets and retail stories of Isfahan province, Iran. Samples were cultured immediately and those found positive for Salmonella were analyzed for the presence of S. typhimurium, S. enteritidis and several putative genes using PCR. Totally, 13 (3.61%), 8 (2.22%), 1 (0.27%) and 4 (1.11%) samples were found to be contaminated with Salmonella spp., S. typhimurium, S. enteritidis and other species of Salmonella, respectively. PCR results showed that invA, rfbJ, fliC and spv were the detected virulence genes in S. typhimurium and S. enteritidis positive samples. To the authors’ knowledge, the present study is the first prevalence report of virulence genes of S. typhimurium and S. enteritidis isolated from ruminant milk and traditional and commercial dairy products in Iran.Keywords: Salmonella typhimurium, Salmonella enteritidis, virulence genes, ruminant milk, dairy products
Procedia PDF Downloads 60724155 Sudden Death of a Cocaine Body Packer: An Autopsy Examination Findings
Authors: Parthasarathi Pramanik
Abstract:
Body packing is a way of transfer drugs across the international border or any drug prohibited area. The drugs are usually hidden in body packets inside the anatomical body cavities like mouth, intestines, rectum, ear, vagina etc. Cocaine is a very common drug for body packing across the world. A 48 year old male was reported dead in his hotel after complaining of chest pain and vomiting. At autopsy, there were eighty-two white cylindrical body packs in the stomach, small and large intestines. Seals of few of the packets were opened. Toxicological examination revealed presence of cocaine in the stomach, liver, kidney and hair samples. Microscopically, presence of myocardial necrosis with interstitial oedema along with hypertrophy and fibrosis of the myocardial fibre suggested heart failure due to cocaine cardio toxicity. However, focal lymphocyte infiltration and perivascular fibrosis in the myocardium also indicated chronic cocaine toxicity of the deceased. After careful autopsy examination it was considered the victim was died due congestive heart failure secondary to acute and chronic cocaine poisoning.Keywords: cardiac failure, cocaine, body packer, sudden death
Procedia PDF Downloads 29124154 The Optimal Production of Long-Beans in the Swamp Land by Application of Rhizobium and Rice Husk Ash
Authors: Hasan Basri Jumin
Abstract:
The swamp land contains high iron, aluminum, and low pH. Calcium and magnesium in the rice husk ash can reduce plant poisoning so that plant growth increases in fertility. The first factor was the doze of rice husk, and the second factor was 0.0 g rhizobium inoculant /kg seed, 4.0 g rhizobium inoculant/kg seed, 8 g rhizobium inoculant /kg seed, and 12 g l rhizobium inoculant /kg seed. The plants were maintained under light conditions with a + 11.45 – 12.15 hour photoperiod. The combination between rhizobium inoculant and rice husk ash has been an interacting effect on the production of long bean pod fresh weight. The mean relative growth rate, net assimilation rate, and pod fresh weight are increased by a combination of husk rice ash and rhizobium inoculant. Rice husk ash affected increases the availability of nitrogen in the land, albeit in poor condition of nutrition. Rhizobium is active in creating a fixation of nitrogen in the atmosphere because rhizobium increases the abilities of intercellular and symbiotic nitrogen in the long beans. The combination of rice husk ash and rhizobium could be effected to create a thriving in the land.Keywords: aluminium, calcium, fixation, iron, nitrogen
Procedia PDF Downloads 7924153 Data Mining Algorithms Analysis: Case Study of Price Predictions of Lands
Authors: Julio Albuja, David Zaldumbide
Abstract:
Data analysis is an important step before taking a decision about money. The aim of this work is to analyze the factors that influence the final price of the houses through data mining algorithms. To our best knowledge, previous work was researched just to compare results. Furthermore, before using the data of the data set, the Z-Transformation were used to standardize the data in the same range. Hence, the data was classified into two groups to visualize them in a readability format. A decision tree was built, and graphical data is displayed where clearly is easy to see the results and the factors' influence in these graphics. The definitions of these methods are described, as well as the descriptions of the results. Finally, conclusions and recommendations are presented related to the released results that our research showed making it easier to apply these algorithms using a customized data set.Keywords: algorithms, data, decision tree, transformation
Procedia PDF Downloads 34424152 Application of Blockchain Technology in Geological Field
Authors: Mengdi Zhang, Zhenji Gao, Ning Kang, Rongmei Liu
Abstract:
Management and application of geological big data is an important part of China's national big data strategy. With the implementation of a national big data strategy, geological big data management becomes more and more critical. At present, there are still a lot of technology barriers as well as cognition chaos in many aspects of geological big data management and application, such as data sharing, intellectual property protection, and application technology. Therefore, it’s a key task to make better use of new technologies for deeper delving and wider application of geological big data. In this paper, we briefly introduce the basic principle of blockchain technology at the beginning and then make an analysis of the application dilemma of geological data. Based on the current analysis, we bring forward some feasible patterns and scenarios for the blockchain application in geological big data and put forward serval suggestions for future work in geological big data management.Keywords: blockchain, intellectual property protection, geological data, big data management
Procedia PDF Downloads 5224151 Genomic Diversity of Clostridium perfringens Strains in Food and Human Sources
Authors: Asma Afshari, Abdollah Jamshidi, Jamshid Razmyar, Mehrnaz Rad
Abstract:
Clostridium perfringens is a serious pathogen which causes enteric diseases in domestic animals and food poisoning in humans. Spores can survive cooking processes and play an important role in the possible onset of disease. In this study RAPD-PCR and REP-PCR were used to examine the genetic diversity of 49isolates ofC. Perfringens type A from 3 different sources. The results of RAPD-PCR revealed the most genetic diversity among poultry isolates, while human isolates showed the least genetic diversity. Cluster analysis obtained from RAPD_PCR and based on the genetic distances split the 49 strains into five distinct major clusters (A, B, C, D, and E). Cluster A and C were composed of isolates from poultry meat, cluster B was composed of isolates from human feces, cluster D was composed of isolates from minced meat, poultry meat and human feces and cluster E was composed of isolates from minced meat. Further characterization of these strains by using (GTG) 5 fingerprint repetitive sequence-based PCR analysis did not show further differentiation between various types of strains. To our knowledge, this is the first study in which the genetic diversity of C. perfringens isolates from different types of meats and human feces has been investigated.Keywords: C. perfringens, genetic diversity, RAPD-PCR, REP-PCR
Procedia PDF Downloads 45924150 Frequent Item Set Mining for Big Data Using MapReduce Framework
Authors: Tamanna Jethava, Rahul Joshi
Abstract:
Frequent Item sets play an essential role in many data Mining tasks that try to find interesting patterns from the database. Typically it refers to a set of items that frequently appear together in transaction dataset. There are several mining algorithm being used for frequent item set mining, yet most do not scale to the type of data we presented with today, so called “BIG DATA”. Big Data is a collection of large data sets. Our approach is to work on the frequent item set mining over the large dataset with scalable and speedy way. Big Data basically works with Map Reduce along with HDFS is used to find out frequent item sets from Big Data on large cluster. This paper focuses on using pre-processing & mining algorithm as hybrid approach for big data over Hadoop platform.Keywords: frequent item set mining, big data, Hadoop, MapReduce
Procedia PDF Downloads 38924149 The Role Of Data Gathering In NGOs
Authors: Hussaini Garba Mohammed
Abstract:
Background/Significance: The lack of data gathering is affecting NGOs world-wide in general to have good data information about educational and health related issues among communities in any country and around the world. For example, HIV/AIDS smoking (Tuberculosis diseases) and COVID-19 virus carriers is becoming a serious public health problem, especially among old men and women. But there is no full details data survey assessment from communities, villages, and rural area in some countries to show the percentage of victims and patients, especial with this world COVID-19 virus among the people. These data are essential to inform programming targets, strategies, and priorities in getting good information about data gathering in any society.Keywords: reliable information, data assessment, data mining, data communication
Procedia PDF Downloads 15524148 Confinement and Storage of Cyanate in the Nano Scale via Nanolayered Structures
Authors: Osama Saber
Abstract:
Cyanate is one such anion which is produced during protein poisoning in the body and has been studied extensively in the field of biochemistry because of its toxicity. The present work aims at confinement and storage of cyanate in the nano scale. It was achieved through the intercalation of cyanate anions into nanolayerd structures of Ni-Al LDH. In addition, the effect of aging time on the intercalation of cyanate was clarified using X-ray diffraction and scanning electron microscopy. Furthermore, the effect of cations on the affinity towards the intercalation of cyanate anions inside LDH structure was studied by replacement of tetra-valent cations Ti4+ instead of the tri-vallent cations Al3+ during the preparation of LDH structure. X-ray diffraction patterns of the Ni-Ti LDH showed that the interlayer spacing was 0.73 nm. This spacing was smaller than that of Ni-Al LDH suggesting that the interlayered anions into Ni-Ti LDH are different from those into Ni-Al LDH. Thermal analyses (TG, DTG, and DTA) and Infra-red spectra revealed the presence of only cyanate anions into Ni-Ti LDH while, in the case of Ni-Al LDH, both cyanate and carbonate anions were observed. SEM images showed plate-like morphology for both Ni-Ti and Ni-Al LDHs although the shapes of their plates are not similar. Our results suggested that the LDH structures containing titanium cations have higher affinity for cyanate anions than those containing aluminum cations. Therefore, this choice for cyanate in the interlayered spacing widens the applicability to study the effect of the confinement on the toxicity of cyanate by bio researchers.Keywords: nanolayered structures, Ni-Al LDH, Ni-Ti LDH, intercalation of cyanate anions, urea hydrolysis
Procedia PDF Downloads 48024147 The Application of Data Mining Technology in Building Energy Consumption Data Analysis
Authors: Liang Zhao, Jili Zhang, Chongquan Zhong
Abstract:
Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.Keywords: data mining, data analysis, prediction, optimization, building operational performance
Procedia PDF Downloads 81624146 To Handle Data-Driven Software Development Projects Effectively
Authors: Shahnewaz Khan
Abstract:
Machine learning (ML) techniques are often used in projects for creating data-driven applications. These tasks typically demand additional research and analysis. The proper technique and strategy must be chosen to ensure the success of data-driven projects. Otherwise, even exerting a lot of effort, the necessary development might not always be possible. In this post, an effort to examine the workflow of data-driven software development projects and its implementation process in order to describe how to manage a project successfully. Which will assist in minimizing the added workload.Keywords: data, data-driven projects, data science, NLP, software project
Procedia PDF Downloads 5424145 The Relationship Between Artificial Intelligence, Data Science, and Privacy
Authors: M. Naidoo
Abstract:
Artificial intelligence often requires large amounts of good quality data. Within important fields, such as healthcare, the training of AI systems predominately relies on health and personal data; however, the usage of this data is complicated by various layers of law and ethics that seek to protect individuals’ privacy rights. This research seeks to establish the challenges AI and data sciences pose to (i) informational rights, (ii) privacy rights, and (iii) data protection. To solve some of the issues presented, various methods are suggested, such as embedding values in technological development, proper balancing of rights and interests, and others.Keywords: artificial intelligence, data science, law, policy
Procedia PDF Downloads 8124144 Nutritional Characteristics, Mineral contents, Amino acid Composition and Phytochemical Analysis of Eryngium alpinium Leaf Protein Concentrates
Authors: Owonikoko A. D., Odoje O. F.
Abstract:
Fresh sample of Eryngium alpinum was purchased and processed for leaf protein concentrates with a view to evaluating its nutritional potential, mineral composition, amino acid characteristics and phytochemical constituents. Using standard analytical methods. The proximate composition of the leaf protein concentrates revealed moisture content;(5.35±0.21)g/100g, ash;(11.37±0.43)g/100g, crude protein;(48.17±0.46)g/100g, crude fat;(15.38±0.07)g/100g, crude fibre (3.05±0.46)g/100g, and Nitrogen free extractive; (16.68±0.30) g/100g. The mineral content was: Na;(51.88±0.23) mg/100g, K;(65.40±0.32)mg/100g, Ca; (86.89±0.46)mg/100g, Mg;(49.27±0.42) mg/100g, Zn;(0.62±0.03)mg/100g, Fe (6.65±0.43)mg/100g, Mn;(0.96±0.54)mg/100g, Cd;(0.28±0.04)mg/100g, P; (8.55±0.97)mg/100g, while selenium, lead and mercury were not detected in the sample indicating that the sample is free of causing risk of metal poisoning. The results of phytochemical constituents showed phytate; (18.34±0.36)mg/100g, flavonoid (0.25±0.41)mg/100g. The sample contain both essential and non-essential amino acid, with the highest value of Glutamic acid (12.26) and the lowest value of Tryptophan 1.05. the content of the leaf protein content shows that the sample is fit for dietary consumption and could as well be processed to be used as food additives.Keywords: mineral composition, phytochemical analysis, leaf protein concentrates, eryngium alpinum
Procedia PDF Downloads 7624143 Simulation Data Summarization Based on Spatial Histograms
Authors: Jing Zhao, Yoshiharu Ishikawa, Chuan Xiao, Kento Sugiura
Abstract:
In order to analyze large-scale scientific data, research on data exploration and visualization has gained popularity. In this paper, we focus on the exploration and visualization of scientific simulation data, and define a spatial V-Optimal histogram for data summarization. We propose histogram construction algorithms based on a general binary hierarchical partitioning as well as a more specific one, the l-grid partitioning. For effective data summarization and efficient data visualization in scientific data analysis, we propose an optimal algorithm as well as a heuristic algorithm for histogram construction. To verify the effectiveness and efficiency of the proposed methods, we conduct experiments on the massive evacuation simulation data.Keywords: simulation data, data summarization, spatial histograms, exploration, visualization
Procedia PDF Downloads 15524142 Algorithms used in Spatial Data Mining GIS
Authors: Vahid Bairami Rad
Abstract:
Extracting knowledge from spatial data like GIS data is important to reduce the data and extract information. Therefore, the development of new techniques and tools that support the human in transforming data into useful knowledge has been the focus of the relatively new and interdisciplinary research area ‘knowledge discovery in databases’. Thus, we introduce a set of database primitives or basic operations for spatial data mining which are sufficient to express most of the spatial data mining algorithms from the literature. This approach has several advantages. Similar to the relational standard language SQL, the use of standard primitives will speed-up the development of new data mining algorithms and will also make them more portable. We introduced a database-oriented framework for spatial data mining which is based on the concepts of neighborhood graphs and paths. A small set of basic operations on these graphs and paths were defined as database primitives for spatial data mining. Furthermore, techniques to efficiently support the database primitives by a commercial DBMS were presented.Keywords: spatial data base, knowledge discovery database, data mining, spatial relationship, predictive data mining
Procedia PDF Downloads 42524141 Data Stream Association Rule Mining with Cloud Computing
Authors: B. Suraj Aravind, M. H. M. Krishna Prasad
Abstract:
There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.Keywords: data stream, association rule mining, cloud computing, frequent itemsets
Procedia PDF Downloads 46924140 A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques
Authors: Tosin Ige
Abstract:
Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining.Keywords: data, privacy, data mining, association rule, privacy preserving, mining technique
Procedia PDF Downloads 12724139 Big Data: Concepts, Technologies and Applications in the Public Sector
Authors: A. Alexandru, C. A. Alexandru, D. Coardos, E. Tudora
Abstract:
Big Data (BD) is associated with a new generation of technologies and architectures which can harness the value of extremely large volumes of very varied data through real time processing and analysis. It involves changes in (1) data types, (2) accumulation speed, and (3) data volume. This paper presents the main concepts related to the BD paradigm, and introduces architectures and technologies for BD and BD sets. The integration of BD with the Hadoop Framework is also underlined. BD has attracted a lot of attention in the public sector due to the newly emerging technologies that allow the availability of network access. The volume of different types of data has exponentially increased. Some applications of BD in the public sector in Romania are briefly presented.Keywords: big data, big data analytics, Hadoop, cloud
Procedia PDF Downloads 27824138 Semantic Data Schema Recognition
Authors: Aïcha Ben Salem, Faouzi Boufares, Sebastiao Correia
Abstract:
The subject covered in this paper aims at assisting the user in its quality approach. The goal is to better extract, mix, interpret and reuse data. It deals with the semantic schema recognition of a data source. This enables the extraction of data semantics from all the available information, inculding the data and the metadata. Firstly, it consists of categorizing the data by assigning it to a category and possibly a sub-category, and secondly, of establishing relations between columns and possibly discovering the semantics of the manipulated data source. These links detected between columns offer a better understanding of the source and the alternatives for correcting data. This approach allows automatic detection of a large number of syntactic and semantic anomalies.Keywords: schema recognition, semantic data profiling, meta-categorisation, semantic dependencies inter columns
Procedia PDF Downloads 39224137 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 10624136 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment
Authors: Michael Gidey Gebru
Abstract:
Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output
Procedia PDF Downloads 1424135 The Economic Limitations of Defining Data Ownership Rights
Authors: Kacper Tomasz Kröber-Mulawa
Abstract:
This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.Keywords: antitrust, data, data ownership, digital economy, property rights
Procedia PDF Downloads 4824134 Protecting the Cloud Computing Data Through the Data Backups
Authors: Abdullah Alsaeed
Abstract:
Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.
Procedia PDF Downloads 5524133 Missing Link Data Estimation with Recurrent Neural Network: An Application Using Speed Data of Daegu Metropolitan Area
Authors: JaeHwan Yang, Da-Woon Jeong, Seung-Young Kho, Dong-Kyu Kim
Abstract:
In terms of ITS, information on link characteristic is an essential factor for plan or operation. But in practical cases, not every link has installed sensors on it. The link that does not have data on it is called “Missing Link”. The purpose of this study is to impute data of these missing links. To get these data, this study applies the machine learning method. With the machine learning process, especially for the deep learning process, missing link data can be estimated from present link data. For deep learning process, this study uses “Recurrent Neural Network” to take time-series data of road. As input data, Dedicated Short-range Communications (DSRC) data of Dalgubul-daero of Daegu Metropolitan Area had been fed into the learning process. Neural Network structure has 17 links with present data as input, 2 hidden layers, for 1 missing link data. As a result, forecasted data of target link show about 94% of accuracy compared with actual data.Keywords: data estimation, link data, machine learning, road network
Procedia PDF Downloads 48424132 Customer Data Analysis Model Using Business Intelligence Tools in Telecommunication Companies
Authors: Monica Lia
Abstract:
This article presents a customer data analysis model using business intelligence tools for data modelling, transforming, data visualization and dynamic reports building. Economic organizational customer’s analysis is made based on the information from the transactional systems of the organization. The paper presents how to develop the data model starting for the data that companies have inside their own operational systems. The owned data can be transformed into useful information about customers using business intelligence tool. For a mature market, knowing the information inside the data and making forecast for strategic decision become more important. Business Intelligence tools are used in business organization as support for decision-making.Keywords: customer analysis, business intelligence, data warehouse, data mining, decisions, self-service reports, interactive visual analysis, and dynamic dashboards, use cases diagram, process modelling, logical data model, data mart, ETL, star schema, OLAP, data universes
Procedia PDF Downloads 39324131 Removal of Heavy Metals from Aqueous Solutions by Low-Cost Materials: A Review
Authors: I. Nazari, B. Shaabani, P. Abaasifar
Abstract:
In small quantities certain heavy metals are nutritionally essential for a healthy life. The heavy metals linked most often to human poisoning are lead, mercury, arsenic, and cadmium. Other heavy metals including copper, zinc and chromium are actually required by the body in small quantity but can also be toxic in large doses. Nowadays, we have contamination to this heavy metals in some untreated industrial waste waters and even in several populated cities drinking waters around the world. The contamination of ground and underground water sources to heavy metals can be concentrated and travel up to food chain by drinking water and agricultural products. In recent years, the need for safe and economical methods for removal of heavy metals from contaminated water has necessitated research interest towards the finding low-cost alternatives. Bio-adsorbents have emerged as low-cost and efficient materials for the removal of heavy metals from waste and ground waters. The bio-adsorbents have an affinity for heavy metals ions to form metal complexes or chelates due to having functional groups including carboxyl, hydroxyl, imidazole, and etc. The objective of this study is to review researches in less expensive adsorbents and their utilization possibilities for various low-cost bio-adsorbents such as coffee beans, rice husk, and saw dust for the removal of heavy metals from contaminated waters.Keywords: heavy metals, water pollution, bio-adsorbents, low cost adsorbents
Procedia PDF Downloads 32624130 Opening up Government Datasets for Big Data Analysis to Support Policy Decisions
Authors: K. Hardy, A. Maurushat
Abstract:
Policy makers are increasingly looking to make evidence-based decisions. Evidence-based decisions have historically used rigorous methodologies of empirical studies by research institutes, as well as less reliable immediate survey/polls often with limited sample sizes. As we move into the era of Big Data analytics, policy makers are looking to different methodologies to deliver reliable empirics in real-time. The question is not why did these people do this for the last 10 years, but why are these people doing this now, and if the this is undesirable, and how can we have an impact to promote change immediately. Big data analytics rely heavily on government data that has been released in to the public domain. The open data movement promises greater productivity and more efficient delivery of services; however, Australian government agencies remain reluctant to release their data to the general public. This paper considers the barriers to releasing government data as open data, and how these barriers might be overcome.Keywords: big data, open data, productivity, data governance
Procedia PDF Downloads 341