CINXE.COM
Search results for: violation data discovery
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: violation data discovery</title> <meta name="description" content="Search results for: violation data discovery"> <meta name="keywords" content="violation data discovery"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="violation data discovery" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="violation data discovery"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 25658</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: violation data discovery</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25658</span> Research of Data Cleaning Methods Based on Dependency Rules</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Bao">Yang Bao</a>, <a href="https://publications.waset.org/abstracts/search?q=Shi%20Wei%20Deng"> Shi Wei Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=WangQun%20Lin"> WangQun Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20cleaning" title="data cleaning">data cleaning</a>, <a href="https://publications.waset.org/abstracts/search?q=dependency%20rules" title=" dependency rules"> dependency rules</a>, <a href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery" title=" violation data discovery"> violation data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20repair" title=" data repair"> data repair</a> </p> <a href="https://publications.waset.org/abstracts/31348/research-of-data-cleaning-methods-based-on-dependency-rules" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">564</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25657</span> Structure Function and Violation of Scale Invariance in NCSM: Theory and Numerical Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20R.%20Bekli">M. R. Bekli</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Mebarki"> N. Mebarki</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Chadou"> I. Chadou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we focus on the structure functions and violation of scale invariance in the context of non-commutative standard model (NCSM). We find that this violation appears in the first order of perturbation theory and a non-commutative version of the DGLAP evolution equation is deduced. Numerical analysis and comparison with experimental data imposes a new bound on the non-commutative parameter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NCSM" title="NCSM">NCSM</a>, <a href="https://publications.waset.org/abstracts/search?q=structure%20function" title=" structure function"> structure function</a>, <a href="https://publications.waset.org/abstracts/search?q=DGLAP%20equation" title=" DGLAP equation"> DGLAP equation</a>, <a href="https://publications.waset.org/abstracts/search?q=standard%20model" title=" standard model"> standard model</a> </p> <a href="https://publications.waset.org/abstracts/16515/structure-function-and-violation-of-scale-invariance-in-ncsm-theory-and-numerical-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16515.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">611</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25656</span> Testing a Moderated Mediation Model of Person–Organization Fit, Organizational Support, and Feelings of Violation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chi-Tai%20Shen">Chi-Tai Shen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to examine whether perceived organizational support moderates the relationship between person–former organization fit and person–organization fit after the mediating effect of feelings of violation. A two-stage data collection method was used. Based on our research requirements, we only approached participants who were involuntary turnover from their former organizations and looking for a new job. Our final usable sample was comprised of a total of 264 participants from Taiwan. We followed Muller, Judd, and Yzerbyt, and Preacher, Rucker, and Hayes’s suggestions to test our moderated mediation model. This study found that employee perceived organizational support moderated the indirect effect of person–former organization fit on person–organization fit (through feelings of violation). Our study ends with a discussion of the main research findings and their limitations and presents suggestions regarding the direction of future studies and the empirical implications of the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=person%E2%80%93organization%20fit" title="person–organization fit">person–organization fit</a>, <a href="https://publications.waset.org/abstracts/search?q=feelings%20of%20violation" title=" feelings of violation"> feelings of violation</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20support" title=" organizational support"> organizational support</a>, <a href="https://publications.waset.org/abstracts/search?q=moderated%20mediation" title=" moderated mediation"> moderated mediation</a> </p> <a href="https://publications.waset.org/abstracts/64313/testing-a-moderated-mediation-model-of-person-organization-fit-organizational-support-and-feelings-of-violation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64313.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25655</span> Psychological Contract Breach and Violation Relationships with Stress and Wellbeing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazeelat%20Duran">Fazeelat Duran</a>, <a href="https://publications.waset.org/abstracts/search?q=Darren%20Bishopp"> Darren Bishopp</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20Woodhams"> Jessica Woodhams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Negative emotions resulting from the breach of perceived obligations by an employer is called the psychological contract violation. Employees perceiving breach and feelings of negative emotions result in adverse outcomes for both the employee and employer. This paper aims to identify the relationships between contract breach, violation, stress and wellbeing and investigate whether fairness and self-efficacy mediate the relationships. A mixed method approach was used to analyze the online-surveys and semi-structured interviews with the police officers. It was identified that the psychological contract violation predicts stress and job-related well-being. Fairness and self-efficacy were identified as significant mediators to understand the underlying mechanisms of association. Whilst, in the interviews social support was identified as a popular mediator. Practical implications for employers are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract%20violation%20and%20breach" title="psychological contract violation and breach">psychological contract violation and breach</a>, <a href="https://publications.waset.org/abstracts/search?q=stressors" title=" stressors"> stressors</a>, <a href="https://publications.waset.org/abstracts/search?q=depression" title=" depression"> depression</a>, <a href="https://publications.waset.org/abstracts/search?q=anxiety" title=" anxiety"> anxiety</a> </p> <a href="https://publications.waset.org/abstracts/95975/psychological-contract-breach-and-violation-relationships-with-stress-and-wellbeing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25654</span> Knowledge Discovery from Production Databases for Hierarchical Process Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pavol%20Tanuska">Pavol Tanuska</a>, <a href="https://publications.waset.org/abstracts/search?q=Pavel%20Vazan"> Pavel Vazan</a>, <a href="https://publications.waset.org/abstracts/search?q=Michal%20Kebisek"> Michal Kebisek</a>, <a href="https://publications.waset.org/abstracts/search?q=Dominika%20Jurovata"> Dominika Jurovata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper gives the results of the project that was oriented on the usage of knowledge discoveries from production systems for needs of the hierarchical process control. One of the main project goals was the proposal of knowledge discovery model for process control. Specifics data mining methods and techniques was used for defined problems of the process control. The gained knowledge was used on the real production system, thus, the proposed solution has been verified. The paper documents how it is possible to apply new discovery knowledge to be used in the real hierarchical process control. There are specified the opportunities for application of the proposed knowledge discovery model for hierarchical process control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hierarchical%20process%20control" title="hierarchical process control">hierarchical process control</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20from%20databases" title=" knowledge discovery from databases"> knowledge discovery from databases</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20control" title=" process control"> process control</a> </p> <a href="https://publications.waset.org/abstracts/2816/knowledge-discovery-from-production-databases-for-hierarchical-process-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2816.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25653</span> Application of Data Mining Techniques for Tourism Knowledge Discovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teklu%20Urgessa">Teklu Urgessa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wookjae%20Maeng"> Wookjae Maeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Joong%20Seek%20Lee"> Joong Seek Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification%20algorithms" title="classification algorithms">classification algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery" title=" knowledge discovery"> knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism" title=" tourism"> tourism</a> </p> <a href="https://publications.waset.org/abstracts/59419/application-of-data-mining-techniques-for-tourism-knowledge-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25652</span> Psychological Contract Violation and Occupational Stressors amongst UK Police Officers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazeelat%20Duran">Fazeelat Duran</a>, <a href="https://publications.waset.org/abstracts/search?q=Darren%20Bishopp"> Darren Bishopp</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20%20Woodhams"> Jessica Woodhams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Psychological contract refers to the perceptions of an employee and their employer regarding their mutual obligations towards each other. The rationale for applying the psychological contract theory in UK policing was to investigate its impact on their wellbeing because the psychological contract is a useful tool in identifying factors having a negative effect on the wellbeing of employees. The paper will report on a study, which examined how occupational stressors and psychological contract violation may influence the wellbeing (e.g. Physical Stress and General Health) of a sample of police officers (N=127). The design of the study was cross-sectional and based on data collected through a self-report survey. The results of hierarchical regression analyses and structural equation model, suggest that occupational stressors and psychological contract violation play a critical role in both physical and psychological health. The implications of these findings and the utility of considering the psychological contract will be discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=police%20officers" title="police officers">police officers</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract" title=" psychological contract"> psychological contract</a>, <a href="https://publications.waset.org/abstracts/search?q=occupational%20stressors" title=" occupational stressors"> occupational stressors</a>, <a href="https://publications.waset.org/abstracts/search?q=wellbeing" title=" wellbeing"> wellbeing</a> </p> <a href="https://publications.waset.org/abstracts/60743/psychological-contract-violation-and-occupational-stressors-amongst-uk-police-officers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60743.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25651</span> Knowledge-Driven Decision Support System Based on Knowledge Warehouse and Data Mining by Improving Apriori Algorithm with Fuzzy Logic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pejman%20Hosseinioun">Pejman Hosseinioun</a>, <a href="https://publications.waset.org/abstracts/search?q=Hasan%20Shakeri"> Hasan Shakeri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghasem%20Ghorbanirostam"> Ghasem Ghorbanirostam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, we have seen an increasing importance of research and study on knowledge source, decision support systems, data mining and procedure of knowledge discovery in data bases and it is considered that each of these aspects affects the others. In this article, we have merged information source and knowledge source to suggest a knowledge based system within limits of management based on storing and restoring of knowledge to manage information and improve decision making and resources. In this article, we have used method of data mining and Apriori algorithm in procedure of knowledge discovery one of the problems of Apriori algorithm is that, a user should specify the minimum threshold for supporting the regularity. Imagine that a user wants to apply Apriori algorithm for a database with millions of transactions. Definitely, the user does not have necessary knowledge of all existing transactions in that database, and therefore cannot specify a suitable threshold. Our purpose in this article is to improve Apriori algorithm. To achieve our goal, we tried using fuzzy logic to put data in different clusters before applying the Apriori algorithm for existing data in the database and we also try to suggest the most suitable threshold to the user automatically. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery" title=" knowledge discovery"> knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20discovery" title=" data discovery"> data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a> </p> <a href="https://publications.waset.org/abstracts/48155/knowledge-driven-decision-support-system-based-on-knowledge-warehouse-and-data-mining-by-improving-apriori-algorithm-with-fuzzy-logic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48155.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25650</span> Data Mining As A Tool For Knowledge Management: A Review </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maram%20Saleh">Maram Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Data%20Mining" title="Data Mining">Data Mining</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20management" title=" Knowledge management"> Knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20discovery" title=" Knowledge discovery"> Knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=Knowledge%20creation." title=" Knowledge creation."> Knowledge creation.</a> </p> <a href="https://publications.waset.org/abstracts/137030/data-mining-as-a-tool-for-knowledge-management-a-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137030.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25649</span> Direct CP Violation in Baryonic B-Hadron Decays</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20Q.%20Geng">C. Q. Geng</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20K.%20Hsiao"> Y. K. Hsiao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study direct CP-violating asymmetries (CPAs) in the baryonic B decays of B- -> p\bar{p}M and Λb decays of Λb ®pM andΛb -> J/ΨpM with M=π-, K-,ρ-,K*- based on the generalized factorization method in the standard model (SM). In particular, we show that the CPAs in the vector modes of B-®p\bar{p}K* and Λb -> p K*- can be as large as 20%. We also discuss the simplest purely baryonic decays of Λb-> p\bar{p}n, p\bar{p}Λ, Λ\bar{p}Λ, and Λ\bar{Λ}Λ. We point out that some of CPAs are promising to be measured by the current as well as future B facilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CP%20violation" title="CP violation">CP violation</a>, <a href="https://publications.waset.org/abstracts/search?q=B%20decays" title=" B decays"> B decays</a>, <a href="https://publications.waset.org/abstracts/search?q=baryonic%20decays" title=" baryonic decays"> baryonic decays</a>, <a href="https://publications.waset.org/abstracts/search?q=%CE%9Bb%20decays" title=" Λb decays"> Λb decays</a> </p> <a href="https://publications.waset.org/abstracts/51614/direct-cp-violation-in-baryonic-b-hadron-decays" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51614.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">255</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25648</span> Algorithms used in Spatial Data Mining GIS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vahid%20Bairami%20Rad">Vahid Bairami Rad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Extracting knowledge from spatial data like GIS data is important to reduce the data and extract information. Therefore, the development of new techniques and tools that support the human in transforming data into useful knowledge has been the focus of the relatively new and interdisciplinary research area ‘knowledge discovery in databases’. Thus, we introduce a set of database primitives or basic operations for spatial data mining which are sufficient to express most of the spatial data mining algorithms from the literature. This approach has several advantages. Similar to the relational standard language SQL, the use of standard primitives will speed-up the development of new data mining algorithms and will also make them more portable. We introduced a database-oriented framework for spatial data mining which is based on the concepts of neighborhood graphs and paths. A small set of basic operations on these graphs and paths were defined as database primitives for spatial data mining. Furthermore, techniques to efficiently support the database primitives by a commercial DBMS were presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spatial%20data%20base" title="spatial data base">spatial data base</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20database" title=" knowledge discovery database"> knowledge discovery database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20relationship" title=" spatial relationship"> spatial relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20data%20mining" title=" predictive data mining"> predictive data mining</a> </p> <a href="https://publications.waset.org/abstracts/29004/algorithms-used-in-spatial-data-mining-gis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">460</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25647</span> Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chothmal">Chothmal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc%20networks" title="ad hoc networks">ad hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service" title=" quality of service"> quality of service</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20streaming" title=" video streaming"> video streaming</a>, <a href="https://publications.waset.org/abstracts/search?q=H.264%2FSVC" title=" H.264/SVC"> H.264/SVC</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20routes" title=" multiple routes"> multiple routes</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20traces" title=" video traces"> video traces</a> </p> <a href="https://publications.waset.org/abstracts/46573/signal-strength-based-multipath-routing-for-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25646</span> Review and Comparison of Associative Classification Data Mining Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Suzan%20Wedyan">Suzan Wedyan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data mining is one of the main phases in the Knowledge Discovery Database (KDD) which is responsible of finding hidden and useful knowledge from databases. There are many different tasks for data mining including regression, pattern recognition, clustering, classification, and association rule. In recent years a promising data mining approach called associative classification (AC) has been proposed, AC integrates classification and association rule discovery to build classification models (classifiers). This paper surveys and critically compares several AC algorithms with reference of the different procedures are used in each algorithm, such as rule learning, rule sorting, rule pruning, classifier building, and class allocation for test cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=associative%20classification" title="associative classification">associative classification</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=rule%20ranking" title=" rule ranking"> rule ranking</a>, <a href="https://publications.waset.org/abstracts/search?q=rule%20pruning" title=" rule pruning"> rule pruning</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/4191/review-and-comparison-of-associative-classification-data-mining-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25645</span> Network Word Discovery Framework Based on Sentence Semantic Vector Similarity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ganfeng%20Yu">Ganfeng Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuefeng%20Ma"> Yuefeng Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Shanliang%20Yang"> Shanliang Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The word discovery is a key problem in text information retrieval technology. Methods in new word discovery tend to be closely related to words because they generally obtain new word results by analyzing words. With the popularity of social networks, individual netizens and online self-media have generated various network texts for the convenience of online life, including network words that are far from standard Chinese expression. How detect network words is one of the important goals in the field of text information retrieval today. In this paper, we integrate the word embedding model and clustering methods to propose a network word discovery framework based on sentence semantic similarity (S³-NWD) to detect network words effectively from the corpus. This framework constructs sentence semantic vectors through a distributed representation model, uses the similarity of sentence semantic vectors to determine the semantic relationship between sentences, and finally realizes network word discovery by the meaning of semantic replacement between sentences. The experiment verifies that the framework not only completes the rapid discovery of network words but also realizes the standard word meaning of the discovery of network words, which reflects the effectiveness of our work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=text%20information%20retrieval" title="text information retrieval">text information retrieval</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20word%20discovery" title=" new word discovery"> new word discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20extraction" title=" information extraction"> information extraction</a> </p> <a href="https://publications.waset.org/abstracts/153917/network-word-discovery-framework-based-on-sentence-semantic-vector-similarity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153917.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25644</span> Updating Stochastic Hosting Capacity Algorithm for Voltage Optimization Programs and Interconnect Standards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Burica">Nicholas Burica</a>, <a href="https://publications.waset.org/abstracts/search?q=Nina%20Selak"> Nina Selak </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ADHCAT (Automated Distribution Hosting Capacity Assessment Tool) was designed to run Hosting Capacity Analysis on the ComEd system via a stochastic DER (Distributed Energy Resource) placement on multiple power flow simulations against a set of violation criteria. The violation criteria in the initial version of the tool captured a limited amount of issues that individual departments design against for DER interconnections. Enhancements were made to the tool to further align with individual department violation and operation criteria, as well as the addition of new modules for use for future load profile analysis. A reporting engine was created for future analytical use based on the simulations and observations in the tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20energy%20resources" title="distributed energy resources">distributed energy resources</a>, <a href="https://publications.waset.org/abstracts/search?q=hosting%20capacity" title=" hosting capacity"> hosting capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnect" title=" interconnect"> interconnect</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20optimization" title=" voltage optimization"> voltage optimization</a> </p> <a href="https://publications.waset.org/abstracts/127789/updating-stochastic-hosting-capacity-algorithm-for-voltage-optimization-programs-and-interconnect-standards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25643</span> CERD: Cost Effective Route Discovery in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anuradha%20Banerjee">Anuradha Banerjee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence, we require energy efficient route discovery technique to enhance their lifetime and network performance. In this paper, we propose an energy-efficient route discovery technique CERD that greatly reduces the number of route requests flooded into the network and also gives priority to the route request packets sent from the routers that has communicated with the destination very recently, in single or multi-hop paths. This does not only enhance the lifetime of nodes but also decreases the delay in tracking the destination. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad%20hoc%20network" title="ad hoc network">ad hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency" title=" energy efficiency"> energy efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding" title=" flooding"> flooding</a>, <a href="https://publications.waset.org/abstracts/search?q=node%20lifetime" title=" node lifetime"> node lifetime</a>, <a href="https://publications.waset.org/abstracts/search?q=route%20discovery" title=" route discovery"> route discovery</a> </p> <a href="https://publications.waset.org/abstracts/20336/cerd-cost-effective-route-discovery-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20336.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">347</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25642</span> Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Quangyen%20Tran">Quangyen Tran</a>, <a href="https://publications.waset.org/abstracts/search?q=YeZhuang%20Tian"> YeZhuang Tian</a>, <a href="https://publications.waset.org/abstracts/search?q=Chengfeng%20Li"> Chengfeng Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract" title="psychological contract">psychological contract</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract%20violation" title=" psychological contract violation"> psychological contract violation</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title=" job satisfaction"> job satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=subordinate%20employees" title=" subordinate employees"> subordinate employees</a>, <a href="https://publications.waset.org/abstracts/search?q=employers%E2%80%99%20obligation" title=" employers’ obligation"> employers’ obligation</a> </p> <a href="https://publications.waset.org/abstracts/3227/psycholgical-contract-violation-and-its-impact-on-job-satisfaction-level-a-study-on-subordinate-employees-in-enterprises-of-hanoi-vietnam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3227.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25641</span> A Review on Existing Challenges of Data Mining and Future Research Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hema%20Bhardwaj">Hema Bhardwaj</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Srinivasa%20Rao"> D. Srinivasa Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technology for analysing, processing, and extracting meaningful data from enormous and complicated datasets can be termed as "big data." The technique of big data mining and big data analysis is extremely helpful for business movements such as making decisions, building organisational plans, researching the market efficiently, improving sales, etc., because typical management tools cannot handle such complicated datasets. Special computational and statistical issues, such as measurement errors, noise accumulation, spurious correlation, and storage and scalability limitations, are brought on by big data. These unique problems call for new computational and statistical paradigms. This research paper offers an overview of the literature on big data mining, its process, along with problems and difficulties, with a focus on the unique characteristics of big data. Organizations have several difficulties when undertaking data mining, which has an impact on their decision-making. Every day, terabytes of data are produced, yet only around 1% of that data is really analyzed. The idea of the mining and analysis of data and knowledge discovery techniques that have recently been created with practical application systems is presented in this study. This article's conclusion also includes a list of issues and difficulties for further research in the area. The report discusses the management's main big data and data mining challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20techniques" title=" knowledge discovery techniques"> knowledge discovery techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining%20challenges" title=" data mining challenges"> data mining challenges</a> </p> <a href="https://publications.waset.org/abstracts/160836/a-review-on-existing-challenges-of-data-mining-and-future-research-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160836.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25640</span> Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sabera%20Sultana">Sabera Sultana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civilian%20protection" title="civilian protection">civilian protection</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20humanitarian%20laws" title=" international humanitarian laws"> international humanitarian laws</a>, <a href="https://publications.waset.org/abstracts/search?q=liberation%20war%20of%20Bangladesh" title=" liberation war of Bangladesh"> liberation war of Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=protected%20status" title=" protected status"> protected status</a> </p> <a href="https://publications.waset.org/abstracts/119719/protected-status-violation-of-the-provisions-of-protected-status-under-international-humanitarian-law-during-the-liberation-war-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119719.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">219</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25639</span> Intuitional Insight in Islamic Mysticism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Bakhtyar">Maryam Bakhtyar</a>, <a href="https://publications.waset.org/abstracts/search?q=Pegah%20Akrami"> Pegah Akrami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intuition" title="intuition">intuition</a>, <a href="https://publications.waset.org/abstracts/search?q=discovery" title=" discovery"> discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=mystical%20insight" title=" mystical insight"> mystical insight</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20knowledge" title=" personal knowledge"> personal knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=superficial%20discovery" title=" superficial discovery"> superficial discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=spiritual%20discovery" title=" spiritual discovery"> spiritual discovery</a> </p> <a href="https://publications.waset.org/abstracts/155560/intuitional-insight-in-islamic-mysticism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25638</span> Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=June-Jei%20Kuo">June-Jei Kuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yi-Chuan%20Hsieh"> Yi-Chuan Hsieh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=web-scale%20discovery%20system" title="web-scale discovery system">web-scale discovery system</a>, <a href="https://publications.waset.org/abstracts/search?q=discovery%20system" title=" discovery system"> discovery system</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20system%20success%20model" title=" information system success model"> information system success model</a>, <a href="https://publications.waset.org/abstracts/search?q=flow%20theory" title=" flow theory"> flow theory</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20library" title=" academic library"> academic library</a> </p> <a href="https://publications.waset.org/abstracts/119923/study-of-evaluation-model-based-on-information-system-success-model-and-flow-theory-using-web-scale-discovery-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119923.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25637</span> Proposing an Architecture for Drug Response Prediction by Integrating Multiomics Data and Utilizing Graph Transformers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nishank%20Raisinghani">Nishank Raisinghani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Efficiently predicting drug response remains a challenge in the realm of drug discovery. To address this issue, we propose four model architectures that combine graphical representation with varying positions of multiheaded self-attention mechanisms. By leveraging two types of multi-omics data, transcriptomics and genomics, we create a comprehensive representation of target cells and enable drug response prediction in precision medicine. A majority of our architectures utilize multiple transformer models, one with a graph attention mechanism and the other with a multiheaded self-attention mechanism, to generate latent representations of both drug and omics data, respectively. Our model architectures apply an attention mechanism to both drug and multiomics data, with the goal of procuring more comprehensive latent representations. The latent representations are then concatenated and input into a fully connected network to predict the IC-50 score, a measure of cell drug response. We experiment with all four of these architectures and extract results from all of them. Our study greatly contributes to the future of drug discovery and precision medicine by looking to optimize the time and accuracy of drug response prediction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drug%20discovery" title="drug discovery">drug discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=transformers" title=" transformers"> transformers</a>, <a href="https://publications.waset.org/abstracts/search?q=graph%20neural%20networks" title=" graph neural networks"> graph neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multiomics" title=" multiomics"> multiomics</a> </p> <a href="https://publications.waset.org/abstracts/169926/proposing-an-architecture-for-drug-response-prediction-by-integrating-multiomics-data-and-utilizing-graph-transformers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25636</span> The Consequences of Complaint Offenses against Copyright Protection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chryssantus%20Kastowo">Chryssantus Kastowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Theresia%20Anita%20Christiani"> Theresia Anita Christiani</a>, <a href="https://publications.waset.org/abstracts/search?q=Anny%20Retnowati"> Anny Retnowati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=copyright" title="copyright">copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=enforcement" title=" enforcement"> enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a> </p> <a href="https://publications.waset.org/abstracts/116167/the-consequences-of-complaint-offenses-against-copyright-protection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25635</span> Recent Advances in Data Warehouse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fahad%20Hanash%20Alzahrani">Fahad Hanash Alzahrani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes some recent advances in a quickly developing area of data storing and processing based on Data Warehouses and Data Mining techniques, which are associated with software, hardware, data mining algorithms and visualisation techniques having common features for any specific problems and tasks of their implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20warehouse" title="data warehouse">data warehouse</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20in%20databases" title=" knowledge discovery in databases"> knowledge discovery in databases</a>, <a href="https://publications.waset.org/abstracts/search?q=on-line%20analytical%20processing" title=" on-line analytical processing"> on-line analytical processing</a> </p> <a href="https://publications.waset.org/abstracts/63299/recent-advances-in-data-warehouse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63299.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25634</span> Application of Causal Inference and Discovery in Curriculum Evaluation and Continuous Improvement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lunliang%20Zhong">Lunliang Zhong</a>, <a href="https://publications.waset.org/abstracts/search?q=Bin%20Duan"> Bin Duan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The undergraduate graduation project is a vital part of the higher education curriculum, crucial for engineering accreditation. Current evaluations often summarize data without identifying underlying issues. This study applies the Peter-Clark algorithm to analyze causal relationships within the graduation project data of an Electronics and Information Engineering program, creating a causal model. Structural equation modeling confirmed the model's validity. The analysis reveals key teaching stages affecting project success, uncovering problems in the process. Introducing causal discovery and inference into project evaluation helps identify issues and propose targeted improvement measures. The effectiveness of these measures is validated by comparing the learning outcomes of two student cohorts, stratified by confounding factors, leading to improved teaching quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=causal%20discovery" title="causal discovery">causal discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=causal%20inference" title=" causal inference"> causal inference</a>, <a href="https://publications.waset.org/abstracts/search?q=continuous%20improvement" title=" continuous improvement"> continuous improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter-Clark%20algorithm" title=" Peter-Clark algorithm"> Peter-Clark algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20equation%20modeling" title=" structural equation modeling"> structural equation modeling</a> </p> <a href="https://publications.waset.org/abstracts/191014/application-of-causal-inference-and-discovery-in-curriculum-evaluation-and-continuous-improvement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">18</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25633</span> The Standard of Reasonableness in Fundamental Rights Adjudication under the Indian Constitution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nandita%20Narayan">Nandita Narayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In most constitutional democracies, courts have been the gatekeepers of fundamental rights. The task of determining whether a violation is in fact justified, therefore, is judicial. Any state action, legislative or administrative, has to be tested by the application of two standards – first, the action must be within the scope of the authority conferred by law and, second, it must be reasonable. If any action, within the scope of the authority conferred by law is found to be unreasonable, it will be struck down as unconstitutional or ultra vires. This paper seeks to analyse the varying standards of reasonableness adopted by the Supreme Court of India where there is a violation of fundamental rights by state action. This is sought to be done by scrutinising case laws and classifying the legality of the violation under one of three levels of judicial scrutiny—strict, intermediate, or weak. The paper concludes by proving that there is an irregularity in the standards adopted, thus resulting in undue discretionary power of the judiciary which strikes at the very concept of reasonableness and ultimately becomes arbitrary in nature. This conclusion is reached by the comparison of reasonableness review of fundamental rights in other jurisdictions such as the USA and Canada. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20law" title="constitutional law">constitutional law</a>, <a href="https://publications.waset.org/abstracts/search?q=judicial%20review" title=" judicial review"> judicial review</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20rights" title=" fundamental rights"> fundamental rights</a>, <a href="https://publications.waset.org/abstracts/search?q=reasonableness" title=" reasonableness"> reasonableness</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a> </p> <a href="https://publications.waset.org/abstracts/86499/the-standard-of-reasonableness-in-fundamental-rights-adjudication-under-the-indian-constitution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86499.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25632</span> Tuberculosis Massive Active Case Discovery in East Jakarta 2016-2017: The Role of Ketuk Pintu Layani Dengan Hati and Juru Pemantau Batuk (Jumantuk) Cadre Programs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ngabilas%20Salama">Ngabilas Salama</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Indonesia has the 2nd highest number of incidents of tuberculosis (TB). It accounts for 1.020.000 new cases per year, only 30% of which has been reported. To find the lost 70%, a massive active case discovery was conducted through two programs: Ketuk Pintu Layani Dengan Hati (KPLDH) and Kader Juru Pemantau Batuk (Jumantuk cadres), who also plays a role in child TB screening. Methods: Data was collected and analyzed through Tuberculosis Integrated Online System from 2014 to 2017 involving 129 DOTS facility with 86 primary health centers in East Jakarta. Results: East Jakarta consists of 2.900.722 people. KPLDH program started in February 2016 consisting of 84 teams (310 people). Jumantuk cadres was formed 4 months later (218 orang). The number of new TB cases in East Jakarta (primary health center) from 2014 to June 2017 respectively is as follows: 6.499 (2.637), 7.438 (2.651), 8.948 (3.211), 5.701 (1.830). Meanwhile, the percentage of child TB case discovery in primary health center was 8,5%, 9,8%, 12,1% from 2014 to 2016 respectively. In 2017, child TB case discovery was 13,1% for the first 3 months and 16,5% for the next 3 months. Discussion: Increased TB incidence rate from 2014 to 2017 was 14,4%, 20,3%, and 27,4% respectively in East Jakarta, and 0,5%, 21,1%, and 14% in primary health center. This reveals the positive role of KPLDH and Jumantuk in TB detection and reporting. Likewise, these programs were responsible for the increase in child TB case discovery, especially in the first 3 months of 2017 (Ketuk Pintu TB Day program) and the next 3 months (active TB screening). Conclusion: KPLDH dan Jumantuk are actively involved in increasing TB case discovery in both adults and children. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tuberculosis" title="tuberculosis">tuberculosis</a>, <a href="https://publications.waset.org/abstracts/search?q=case%20discovery%20program" title=" case discovery program"> case discovery program</a>, <a href="https://publications.waset.org/abstracts/search?q=primary%20health%20center" title=" primary health center"> primary health center</a>, <a href="https://publications.waset.org/abstracts/search?q=cadre" title=" cadre"> cadre</a> </p> <a href="https://publications.waset.org/abstracts/82501/tuberculosis-massive-active-case-discovery-in-east-jakarta-2016-2017-the-role-of-ketuk-pintu-layani-dengan-hati-and-juru-pemantau-batuk-jumantuk-cadre-programs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25631</span> Application of Knowledge Discovery in Database Techniques in Cost Overruns of Construction Projects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mai%20Ghazal">Mai Ghazal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Hammad"> Ahmed Hammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cost overruns in construction projects are considered as worldwide challenges since the cost performance is one of the main measures of success along with schedule performance. To overcome this problem, studies were conducted to investigate the cost overruns' factors, also projects' historical data were analyzed to extract new and useful knowledge from it. This research is studying and analyzing the effect of some factors causing cost overruns using the historical data from completed construction projects. Then, using these factors to estimate the probability of cost overrun occurrence and predict its percentage for future projects. First, an intensive literature review was done to study all the factors that cause cost overrun in construction projects, then another review was done for previous researcher papers about mining process in dealing with cost overruns. Second, a proposed data warehouse was structured which can be used by organizations to store their future data in a well-organized way so it can be easily analyzed later. Third twelve quantitative factors which their data are frequently available at construction projects were selected to be the analyzed factors and suggested predictors for the proposed model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20management" title="construction management">construction management</a>, <a href="https://publications.waset.org/abstracts/search?q=construction%20projects" title=" construction projects"> construction projects</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20overrun" title=" cost overrun"> cost overrun</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20performance" title=" cost performance"> cost performance</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20warehousing" title=" data warehousing"> data warehousing</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery" title=" knowledge discovery"> knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a> </p> <a href="https://publications.waset.org/abstracts/85161/application-of-knowledge-discovery-in-database-techniques-in-cost-overruns-of-construction-projects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25630</span> Ontology-Driven Knowledge Discovery and Validation from Admission Databases: A Structural Causal Model Approach for Polytechnic Education in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bernard%20Igoche%20Igoche">Bernard Igoche Igoche</a>, <a href="https://publications.waset.org/abstracts/search?q=Olumuyiwa%20Matthew"> Olumuyiwa Matthew</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Bednar"> Peter Bednar</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Gegov"> Alexander Gegov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study presents an ontology-driven approach for knowledge discovery and validation from admission databases in Nigerian polytechnic institutions. The research aims to address the challenges of extracting meaningful insights from vast amounts of admission data and utilizing them for decision-making and process improvement. The proposed methodology combines the knowledge discovery in databases (KDD) process with a structural causal model (SCM) ontological framework. The admission database of Benue State Polytechnic Ugbokolo (Benpoly) is used as a case study. The KDD process is employed to mine and distill knowledge from the database, while the SCM ontology is designed to identify and validate the important features of the admission process. The SCM validation is performed using the conditional independence test (CIT) criteria, and an algorithm is developed to implement the validation process. The identified features are then used for machine learning (ML) modeling and prediction of admission status. The results demonstrate the adequacy of the SCM ontological framework in representing the admission process and the high predictive accuracies achieved by the ML models, with k-nearest neighbors (KNN) and support vector machine (SVM) achieving 92% accuracy. The study concludes that the proposed ontology-driven approach contributes to the advancement of educational data mining and provides a foundation for future research in this domain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=admission%20databases" title="admission databases">admission databases</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20data%20mining" title=" educational data mining"> educational data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology-driven%20knowledge%20discovery" title=" ontology-driven knowledge discovery"> ontology-driven knowledge discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=polytechnic%20education" title=" polytechnic education"> polytechnic education</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20causal%20model" title=" structural causal model"> structural causal model</a> </p> <a href="https://publications.waset.org/abstracts/184064/ontology-driven-knowledge-discovery-and-validation-from-admission-databases-a-structural-causal-model-approach-for-polytechnic-education-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184064.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25629</span> Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjed%20Sid%20Ahmed">Amjed Sid Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Rosilah%20Hassan"> Rosilah Hassan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nor%20Effendy%20Othman"> Nor Effendy Othman </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CGA" title="CGA">CGA</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=NDP" title=" NDP"> NDP</a>, <a href="https://publications.waset.org/abstracts/search?q=SEND" title=" SEND"> SEND</a> </p> <a href="https://publications.waset.org/abstracts/31309/lightweight-cryptographically-generated-address-for-ipv6-neighbor-discovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31309.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=855">855</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=856">856</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>