CINXE.COM

Search results for: data combining

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: data combining</title> <meta name="description" content="Search results for: data combining"> <meta name="keywords" content="data combining"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="data combining" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="data combining"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 25815</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: data combining</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25545</span> Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Srinivasa%20Rao">P. Srinivasa Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Venkatesh%20Sharma"> K. Venkatesh Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Sadhya%20Devi"> G. Sadhya Devi</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Nagesh"> V. Nagesh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sensitivity" title="sensitivity">sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20level" title=" sensitive level"> sensitive level</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Preserving%20Data%20Publication%20%28PPDP%29" title=" Privacy Preserving Data Publication (PPDP)"> Privacy Preserving Data Publication (PPDP)</a>, <a href="https://publications.waset.org/abstracts/search?q=bottom-up%20generalization" title=" bottom-up generalization"> bottom-up generalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Big%20Data" title=" Big Data"> Big Data</a> </p> <a href="https://publications.waset.org/abstracts/71445/privacy-preserving-data-publishing-based-on-sensitivity-in-context-of-big-data-using-hive" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25544</span> Research on the Impact of Spatial Layout Design on College Students’ Learning and Mental Health: Analysis Based on a Smart Classroom Renovation Project in Shanghai, China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Dongqing">Zhang Dongqing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Concern for students' mental health and the application of intelligent advanced technologies are driving changes in teaching models. The traditional teacher-centered classroom is beginning to transform into a student-centered smart interactive learning environment. Nowadays, smart classrooms are compatible with constructivist learning. This theory emphasizes the role of teachers in the teaching process as helpers and facilitators of knowledge construction, and students learn by interacting with them. The spatial design of classrooms is closely related to the teaching model and should also be developed in the direction of smart classroom design. The goal is to explore the impact of smart classroom layout on student-centered teaching environment and teacher-student interaction under the guidance of constructivist learning theory, by combining the design process and feedback analysis of the smart transformation project on the campus of Tongji University in Shanghai. During the research process, the theoretical basis of constructivist learning was consolidated through literature research and case analysis. The integration and visual field analysis of the traditional and transformed indoor floor plans were conducted using space syntax tools. Finally, questionnaire surveys and interviews were used to collect data. The main conclusions are as followed: flexible spatial layouts can promote students' learning effects and mental health; the interactivity of smart classroom layouts is different and needs to be combined with different teaching models; the public areas of teaching buildings can also improve the interactive learning atmosphere by adding discussion space. This article provides a data-based research basis for improving students' learning effects and mental health, and provides a reference for future smart classroom design. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spatial%20layout" title="spatial layout">spatial layout</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20classroom" title=" smart classroom"> smart classroom</a>, <a href="https://publications.waset.org/abstracts/search?q=space%20syntax" title=" space syntax"> space syntax</a>, <a href="https://publications.waset.org/abstracts/search?q=renovation" title=" renovation"> renovation</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20environment" title=" educational environment"> educational environment</a> </p> <a href="https://publications.waset.org/abstracts/173966/research-on-the-impact-of-spatial-layout-design-on-college-students-learning-and-mental-health-analysis-based-on-a-smart-classroom-renovation-project-in-shanghai-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173966.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25543</span> A Fuzzy Kernel K-Medoids Algorithm for Clustering Uncertain Data Objects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Behnam%20Tavakkol">Behnam Tavakkol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Uncertain data mining algorithms use different ways to consider uncertainty in data such as by representing a data object as a sample of points or a probability distribution. Fuzzy methods have long been used for clustering traditional (certain) data objects. They are used to produce non-crisp cluster labels. For uncertain data, however, besides some uncertain fuzzy k-medoids algorithms, not many other fuzzy clustering methods have been developed. In this work, we develop a fuzzy kernel k-medoids algorithm for clustering uncertain data objects. The developed fuzzy kernel k-medoids algorithm is superior to existing fuzzy k-medoids algorithms in clustering data sets with non-linearly separable clusters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clustering%20algorithm" title="clustering algorithm">clustering algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20methods" title=" fuzzy methods"> fuzzy methods</a>, <a href="https://publications.waset.org/abstracts/search?q=kernel%20k-medoids" title=" kernel k-medoids"> kernel k-medoids</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertain%20data" title=" uncertain data"> uncertain data</a> </p> <a href="https://publications.waset.org/abstracts/123501/a-fuzzy-kernel-k-medoids-algorithm-for-clustering-uncertain-data-objects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25542</span> RFID and Intelligence: A Smart Authentication Method for Blind People​</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20Vishu">V. Vishu</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Manimegalai"> R. Manimegalai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES" title="AES">AES</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20key" title=" smart key"> smart key</a> </p> <a href="https://publications.waset.org/abstracts/55523/rfid-and-intelligence-a-smart-authentication-method-for-blind-people" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55523.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">241</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25541</span> Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nirmala%20Gopal">Nirmala Gopal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheetal%20Bhoola"> Sheetal Bhoola</a>, <a href="https://publications.waset.org/abstracts/search?q=Audecious%20Mugwagwa"> Audecious Mugwagwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20exploitation" title=" data exploitation"> data exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20organizations" title=" terrorist organizations"> terrorist organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20democracy" title=" data democracy"> data democracy</a> </p> <a href="https://publications.waset.org/abstracts/135640/democracy-bytes-interrogating-the-exploitation-of-data-democracy-by-radical-terrorist-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135640.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">204</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25540</span> Healthcare Data Mining Innovations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eugenia%20Jilinguirian">Eugenia Jilinguirian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data" title=" big data"> big data</a>, <a href="https://publications.waset.org/abstracts/search?q=individualised%20healthcare" title=" individualised healthcare"> individualised healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20solutions" title=" healthcare solutions"> healthcare solutions</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a> </p> <a href="https://publications.waset.org/abstracts/178640/healthcare-data-mining-innovations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178640.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25539</span> Recurrent Neural Networks for Classifying Outliers in Electronic Health Record Clinical Text </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duncan%20Wallace">Duncan Wallace</a>, <a href="https://publications.waset.org/abstracts/search?q=M-Tahar%20Kechadi"> M-Tahar Kechadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, Machine Learning (ML) approaches have been successfully applied to an analysis of patient symptom data in the context of disease diagnosis, at least where such data is well codified. However, much of the data present in Electronic Health Records (EHR) are unlikely to prove suitable for classic ML approaches. Furthermore, as scores of data are widely spread across both hospitals and individuals, a decentralized, computationally scalable methodology is a priority. The focus of this paper is to develop a method to predict outliers in an out-of-hours healthcare provision center (OOHC). In particular, our research is based upon the early identification of patients who have underlying conditions which will cause them to repeatedly require medical attention. OOHC act as an ad-hoc delivery of triage and treatment, where interactions occur without recourse to a full medical history of the patient in question. Medical histories, relating to patients contacting an OOHC, may reside in several distinct EHR systems in multiple hospitals or surgeries, which are unavailable to the OOHC in question. As such, although a local solution is optimal for this problem, it follows that the data under investigation is incomplete, heterogeneous, and comprised mostly of noisy textual notes compiled during routine OOHC activities. Through the use of Deep Learning methodologies, the aim of this paper is to provide the means to identify patient cases, upon initial contact, which are likely to relate to such outliers. To this end, we compare the performance of Long Short-Term Memory, Gated Recurrent Units, and combinations of both with Convolutional Neural Networks. A further aim of this paper is to elucidate the discovery of such outliers by examining the exact terms which provide a strong indication of positive and negative case entries. While free-text is the principal data extracted from EHRs for classification, EHRs also contain normalized features. Although the specific demographical features treated within our corpus are relatively limited in scope, we examine whether it is beneficial to include such features among the inputs to our neural network, or whether these features are more successfully exploited in conjunction with a different form of a classifier. In this section, we compare the performance of randomly generated regression trees and support vector machines and determine the extent to which our classification program can be improved upon by using either of these machine learning approaches in conjunction with the output of our Recurrent Neural Network application. The output of our neural network is also used to help determine the most significant lexemes present within the corpus for determining high-risk patients. By combining the confidence of our classification program in relation to lexemes within true positive and true negative cases, with an inverse document frequency of the lexemes related to these cases, we can determine what features act as the primary indicators of frequent-attender and non-frequent-attender cases, providing a human interpretable appreciation of how our program classifies cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20networks" title="artificial neural networks">artificial neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=data-mining" title=" data-mining"> data-mining</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20informatics" title=" medical informatics"> medical informatics</a> </p> <a href="https://publications.waset.org/abstracts/106726/recurrent-neural-networks-for-classifying-outliers-in-electronic-health-record-clinical-text" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106726.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25538</span> Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yunus%20Do%C4%9Fan">Yunus Doğan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmet%20Durap"> Ahmet Durap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clustering%20algorithms" title="clustering algorithms">clustering algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=coastal%20engineering" title=" coastal engineering"> coastal engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20summarization" title=" data summarization"> data summarization</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20methods" title=" statistical methods"> statistical methods</a> </p> <a href="https://publications.waset.org/abstracts/61856/summarizing-data-sets-for-data-mining-by-using-statistical-methods-in-coastal-engineering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61856.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25537</span> Vehicular Speed Detection Camera System Using Video Stream</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20A.%20Anser%20Pasha">C. A. Anser Pasha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a new Vehicular Speed Detection Camera System that is applicable as an alternative to traditional radars with the same accuracy or even better is presented. The real-time measurement and analysis of various traffic parameters such as speed and number of vehicles are increasingly required in traffic control and management. Image processing techniques are now considered as an attractive and flexible method for automatic analysis and data collections in traffic engineering. Various algorithms based on image processing techniques have been applied to detect multiple vehicles and track them. The SDCS processes can be divided into three successive phases; the first phase is Objects detection phase, which uses a hybrid algorithm based on combining an adaptive background subtraction technique with a three-frame differencing algorithm which ratifies the major drawback of using only adaptive background subtraction. The second phase is Objects tracking, which consists of three successive operations - object segmentation, object labeling, and object center extraction. Objects tracking operation takes into consideration the different possible scenarios of the moving object like simple tracking, the object has left the scene, the object has entered the scene, object crossed by another object, and object leaves and another one enters the scene. The third phase is speed calculation phase, which is calculated from the number of frames consumed by the object to pass by the scene. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=radar" title="radar">radar</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a>, <a href="https://publications.waset.org/abstracts/search?q=tracking" title=" tracking"> tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=segmentation" title=" segmentation"> segmentation</a> </p> <a href="https://publications.waset.org/abstracts/45316/vehicular-speed-detection-camera-system-using-video-stream" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45316.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25536</span> Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anny%20Retnowati">Anny Retnowati</a>, <a href="https://publications.waset.org/abstracts/search?q=Elisabeth%20Sundari"> Elisabeth Sundari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access" title="access">access</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20data" title=" health data"> health data</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20records" title=" medical records"> medical records</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a> </p> <a href="https://publications.waset.org/abstracts/163628/access-to-health-data-in-medical-records-in-indonesia-in-terms-of-personal-data-protection-principles-the-limitation-and-its-implication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25535</span> Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Martin%20B%C3%B6hmer">Martin Böhmer</a>, <a href="https://publications.waset.org/abstracts/search?q=Agatha%20Dabrowski"> Agatha Dabrowski</a>, <a href="https://publications.waset.org/abstracts/search?q=Boris%20Otto"> Boris Otto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a &ldquo;data knowledge model&rdquo;. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20management" title="data management">data management</a>, <a href="https://publications.waset.org/abstracts/search?q=digitization" title=" digitization"> digitization</a>, <a href="https://publications.waset.org/abstracts/search?q=industry%204.0" title=" industry 4.0"> industry 4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20engineering" title=" knowledge engineering"> knowledge engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=metamodel" title=" metamodel"> metamodel</a> </p> <a href="https://publications.waset.org/abstracts/65473/conceptualizing-the-knowledge-to-manage-and-utilize-data-assets-in-the-context-of-digitization-case-studies-of-multinational-industrial-enterprises" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25534</span> Analyzing the Street Pattern Characteristics on Young People’s Choice to Walk or Not: A Study Based on Accelerometer and Global Positioning Systems Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebru%20Cubukcu">Ebru Cubukcu</a>, <a href="https://publications.waset.org/abstracts/search?q=Gozde%20Eksioglu%20Cetintahra"> Gozde Eksioglu Cetintahra</a>, <a href="https://publications.waset.org/abstracts/search?q=Burcin%20Hepguzel%20Hatip"> Burcin Hepguzel Hatip</a>, <a href="https://publications.waset.org/abstracts/search?q=Mert%20Cubukcu"> Mert Cubukcu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Obesity and overweight cause serious health problems. Public and private organizations aim to encourage walking in various ways in order to cope with the problem of obesity and overweight. This study aims to understand how the spatial characteristics of urban street pattern, connectivity and complexity influence young people’s choice to walk or not. 185 public university students in Izmir, the third largest city in Turkey, participated in the study. Each participant had worn an accelerometer and a global positioning (GPS) device for a week. The accelerometer device records data on the intensity of the participant’s activity at a specified time interval, and the GPS device on the activities’ locations. Combining the two datasets, activity maps are derived. These maps are then used to differentiate the participants’ walk trips and motor vehicle trips. Given that, the frequency of walk and motor vehicle trips are calculated at the street segment level, and the street segments are then categorized into two as ‘preferred by pedestrians’ and ‘preferred by motor vehicles’. Graph Theory-based accessibility indices are calculated to quantify the spatial characteristics of the streets in the sample. Six different indices are used: (I) edge density, (II) edge sinuosity, (III) eta index, (IV) node density, (V) order of a node, and (VI) beta index. T-tests show that the index values for the ‘preferred by pedestrians’ and ‘preferred by motor vehicles’ are significantly different. The findings indicate that the spatial characteristics of the street network have a measurable effect on young people’s choice to walk or not. Policy implications are discussed. This study is funded by the Scientific and Technological Research Council of Turkey, Project No: 116K358. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=graph%20theory" title="graph theory">graph theory</a>, <a href="https://publications.waset.org/abstracts/search?q=walkability" title=" walkability"> walkability</a>, <a href="https://publications.waset.org/abstracts/search?q=accessibility" title=" accessibility"> accessibility</a>, <a href="https://publications.waset.org/abstracts/search?q=street%20network" title=" street network"> street network</a> </p> <a href="https://publications.waset.org/abstracts/89579/analyzing-the-street-pattern-characteristics-on-young-peoples-choice-to-walk-or-not-a-study-based-on-accelerometer-and-global-positioning-systems-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89579.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">225</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25533</span> Analysis and Forecasting of Bitcoin Price Using Exogenous Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J-C.%20Leneveu">J-C. Leneveu</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Chereau"> A. Chereau</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Mansart"> L. Mansart</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Mesbah"> T. Mesbah</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Wyka"> M. Wyka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network" title=" social network"> social network</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20trends" title=" financial trends"> financial trends</a>, <a href="https://publications.waset.org/abstracts/search?q=exogenous%20data" title=" exogenous data"> exogenous data</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20economy" title=" global economy"> global economy</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioral%20finance" title=" behavioral finance"> behavioral finance</a> </p> <a href="https://publications.waset.org/abstracts/29945/analysis-and-forecasting-of-bitcoin-price-using-exogenous-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25532</span> Methodology for the Analysis of Energy Efficiency in Pneumatics Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mario%20Lupaca">Mario Lupaca</a>, <a href="https://publications.waset.org/abstracts/search?q=Karol%20Munoz"> Karol Munoz</a>, <a href="https://publications.waset.org/abstracts/search?q=Victor%20De%20Negri"> Victor De Negri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present article presents a methodology for the improvement of the energy efficiency in pneumatic systems through the restoring of air. In this way, three techniques of expansion of a cylinder are identified: Expansion using the air of the compressor (conventional), restoring the air (efficient), and combining the air of the compressor and the restored air (hybrid). The methodology starts with the development of the GRAFCET of the system so that it can be decided whether to expand the cylinder in a conventional, efficient, or hybrid way. The methodology can be applied to any case. Finally, graphs of comparison between the three methods of expansion with certain cylinder strokes and workloads are presented, to facilitate the subsequent selection of one system or another. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energetic" title="energetic">energetic</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency" title=" efficiency"> efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=GRAFCET" title=" GRAFCET"> GRAFCET</a>, <a href="https://publications.waset.org/abstracts/search?q=methodology" title=" methodology"> methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=pneumatic" title=" pneumatic "> pneumatic </a> </p> <a href="https://publications.waset.org/abstracts/88840/methodology-for-the-analysis-of-energy-efficiency-in-pneumatics-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88840.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25531</span> Single Valued Neutrosophic Hesitant Fuzzy Rough Set and Its Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20M.%20Alsager">K. M. Alsager</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20O.%20Alshehri"> N. O. Alshehri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we proposed the notion of single valued neutrosophic hesitant fuzzy rough set, by combining single valued neutrosophic hesitant fuzzy set and rough set. The combination of single valued neutrosophic hesitant fuzzy set and rough set is a powerful tool for dealing with uncertainty, granularity and incompleteness of knowledge in information systems. We presented both definition and some basic properties of the proposed model. Finally, we gave a general approach which is applied to a decision making problem in disease diagnoses, and demonstrated the effectiveness of the approach by a numerical example. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=single%20valued%20neutrosophic%20fuzzy%20set" title="single valued neutrosophic fuzzy set">single valued neutrosophic fuzzy set</a>, <a href="https://publications.waset.org/abstracts/search?q=single%20valued%20neutrosophic%20fuzzy%20hesitant%20set" title=" single valued neutrosophic fuzzy hesitant set"> single valued neutrosophic fuzzy hesitant set</a>, <a href="https://publications.waset.org/abstracts/search?q=rough%20set" title=" rough set"> rough set</a>, <a href="https://publications.waset.org/abstracts/search?q=single%20valued%20neutrosophic%20hesitant%20fuzzy%20rough%20set" title=" single valued neutrosophic hesitant fuzzy rough set"> single valued neutrosophic hesitant fuzzy rough set</a> </p> <a href="https://publications.waset.org/abstracts/104161/single-valued-neutrosophic-hesitant-fuzzy-rough-set-and-its-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">272</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25530</span> On the Combination of Patient-Generated Data with Data from a Secure Clinical Network Environment: A Practical Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeroen%20S.%20de%20Bruin">Jeroen S. de Bruin</a>, <a href="https://publications.waset.org/abstracts/search?q=Karin%20Schindler"> Karin Schindler</a>, <a href="https://publications.waset.org/abstracts/search?q=Christian%20Schuh"> Christian Schuh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With increasingly more mobile health applications appearing due to the popularity of smartphones, the possibility arises that these data can be used to improve the medical diagnostic process, as well as the overall quality of healthcare, while at the same time lowering costs. However, as of yet there have been no reports of a successful combination of patient-generated data from smartphones with data from clinical routine. In this paper, we describe how these two types of data can be combined in a secure way without modification to hospital information systems, and how they can together be used in a medical expert system for automatic nutritional classification and triage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20health" title="mobile health">mobile health</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integration" title=" data integration"> data integration</a>, <a href="https://publications.waset.org/abstracts/search?q=expert%20systems" title=" expert systems"> expert systems</a>, <a href="https://publications.waset.org/abstracts/search?q=disease-related%20malnutrition" title=" disease-related malnutrition"> disease-related malnutrition</a> </p> <a href="https://publications.waset.org/abstracts/22668/on-the-combination-of-patient-generated-data-with-data-from-a-secure-clinical-network-environment-a-practical-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22668.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">477</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25529</span> The Prospects of Leveraging (Big) Data for Accelerating a Just Sustainable Transition around Different Contexts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sombol%20Mokhles">Sombol Mokhles</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper tries to show the prospects of utilising (big)data for enabling just the transition of diverse cities. Our key purpose is to offer a framework of applications and implications of utlising (big) data in comparing sustainability transitions across different cities. Relying on the cosmopolitan comparison, this paper explains the potential application of (big) data but also its limitations. The paper calls for adopting a data-driven and just perspective in including different cities around the world. Having a just and inclusive approach at the front and centre ensures a just transition with synergistic effects that leave nobody behind. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=just%20sustainable%20transition" title=" just sustainable transition"> just sustainable transition</a>, <a href="https://publications.waset.org/abstracts/search?q=cosmopolitan%20city%20comparison" title=" cosmopolitan city comparison"> cosmopolitan city comparison</a>, <a href="https://publications.waset.org/abstracts/search?q=cities" title=" cities"> cities</a> </p> <a href="https://publications.waset.org/abstracts/155482/the-prospects-of-leveraging-big-data-for-accelerating-a-just-sustainable-transition-around-different-contexts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155482.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25528</span> Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Modesta%20E.%20Ezema">Modesta E. Ezema</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20C.%20Ezema"> Christopher C. Ezema</a>, <a href="https://publications.waset.org/abstracts/search?q=Christian%20C.%20Ugwu"> Christian C. Ugwu</a>, <a href="https://publications.waset.org/abstracts/search?q=Udoka%20F.%20Eze"> Udoka F. Eze</a>, <a href="https://publications.waset.org/abstracts/search?q=Florence%20M.%20Babalola"> Florence M. Babalola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data" title="data">data</a>, <a href="https://publications.waset.org/abstracts/search?q=employee" title=" employee"> employee</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=work%20place" title=" work place"> work place</a> </p> <a href="https://publications.waset.org/abstracts/61588/strategic-workplace-security-the-role-of-malware-and-the-threat-of-internal-vulnerability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61588.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">382</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25527</span> Acceptance of Big Data Technologies and Its Influence towards Employee’s Perception on Job Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jia%20Yi%20Yap">Jia Yi Yap</a>, <a href="https://publications.waset.org/abstracts/search?q=Angela%20S.%20H.%20Lee"> Angela S. H. Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the use of big data technologies, organization can get result that they are interested in. Big data technologies simply load all the data that is useful for the organizations and provide organizations a better way of analysing data. The purpose of this research is to get employees’ opinion from films in Malaysia to explore the use of big data technologies in their organization in order to provide how it may affect the perception of the employees on job performance. Therefore, in order to identify will accepting big data technologies in the organization affect the perception of the employee, questionnaire will be distributed to different employee from different Small and medium-sized enterprises (SME) organization listed in Malaysia. The conceptual model proposed will test with other variables in order to see the relationship between variables. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data%20technologies" title="big data technologies">big data technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=employee" title=" employee"> employee</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20performance" title=" job performance"> job performance</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaire" title=" questionnaire"> questionnaire</a> </p> <a href="https://publications.waset.org/abstracts/59432/acceptance-of-big-data-technologies-and-its-influence-towards-employees-perception-on-job-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59432.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25526</span> Recreating Home: Restoration and Reflections on the Traditional Houses of Kucapungane</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sasala%20Taiban">Sasala Taiban</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores the process and reflections on the restoration of traditional slate houses in the Rukai tribe's old settlement of Kucapungane. Designated as a "Class II Historical Site" by the Ministry of the Interior in 1991 and listed by UNESCO's World Monuments Fund in 2016, Kucapungane holds significant historical and cultural value. However, due to government neglect, tribal migration, and the passing of elders, the traditional knowledge and techniques for constructing slate houses face severe discontinuity. Over the past decades, residents have strived to preserve and transmit these traditional skills through the restoration and reconstruction of their homes. This study employs a qualitative methodology, combining ethnographic fieldwork, historical analysis, and participatory observation. The research includes in-depth interviews, focus group discussions, and hands-on participation in restoration activities to gather comprehensive data. The paper reviews the historical evolution of Kucapungane, the restoration process, and the challenges encountered, such as insufficient resources, technical preservation issues, material acquisition problems, and lack of community recognition. Furthermore, it highlights the importance of house restoration in indigenous consciousness and cultural revival, proposing strategies to address current issues and promote preservation. Through these efforts, the cultural heritage of the Rukai tribe can be sustained and carried forward into the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rukai" title="rukai">rukai</a>, <a href="https://publications.waset.org/abstracts/search?q=kucapungane" title=" kucapungane"> kucapungane</a>, <a href="https://publications.waset.org/abstracts/search?q=slate%20house%20restoration" title=" slate house restoration"> slate house restoration</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20heritage" title=" cultural heritage"> cultural heritage</a> </p> <a href="https://publications.waset.org/abstracts/188216/recreating-home-restoration-and-reflections-on-the-traditional-houses-of-kucapungane" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">37</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25525</span> Constant Dimension Codes via Generalized Coset Construction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kanchan%20Singh">Kanchan Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheo%20Kumar%20Singh"> Sheo Kumar Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The fundamental problem of subspace coding is to explore the maximum possible cardinality Aq(n, d, k) of a set of k-dimensional subspaces of an n-dimensional vector space over Fq such that the subspace distance satisfies ds(W1, W2) ≥ d for any two distinct subspaces W1, W2 in this set. In this paper, we construct a new class of constant dimension codes (CDCs) by generalizing the coset construction and combining it with CDCs derived from parallel linkage construction and coset construction with an aim to improve the new lower bounds of Aq(n, d, k). We found a remarkable improvement in some of the lower bounds of Aq(n, d, k). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constant%20dimension%20codes" title="constant dimension codes">constant dimension codes</a>, <a href="https://publications.waset.org/abstracts/search?q=rank%20metric%20codes" title=" rank metric codes"> rank metric codes</a>, <a href="https://publications.waset.org/abstracts/search?q=coset%20construction" title=" coset construction"> coset construction</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20linkage%20construction" title=" parallel linkage construction"> parallel linkage construction</a> </p> <a href="https://publications.waset.org/abstracts/193021/constant-dimension-codes-via-generalized-coset-construction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193021.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">20</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25524</span> Computer Simulation to Investigate Magnetic and Wave-Absorbing Properties of Iron Nanoparticles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chuan-Wen%20Liu">Chuan-Wen Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Min-Hsien%20Liu"> Min-Hsien Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Chung-Chieh%20Tai"> Chung-Chieh Tai</a>, <a href="https://publications.waset.org/abstracts/search?q=Bing-Cheng%20Kuo"> Bing-Cheng Kuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng-Lung%20Chen"> Cheng-Lung Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Huazhen%20Shen"> Huazhen Shen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A recent surge in research on magnetic radar absorbing materials (RAMs) has presented researchers with new opportunities and challenges. This study was performed to gain a better understanding of the wave-absorbing phenomenon of magnetic RAMs. First, we hypothesized that the absorbing phenomenon is dependent on the particle shape. Using the Material Studio program and the micro-dot magnetic dipoles (MDMD) method, we obtained results from magnetic RAMs to support this hypothesis. The total MDMD energy of disk-like iron particles was greater than that of spherical iron particles. In addition, the particulate aggregation phenomenon decreases the wave-absorbance, according to both experiments and computational data. To conclude, this study may be of importance in terms of explaining the wave- absorbing characteristic of magnetic RAMs. Combining molecular dynamics simulation results and the theory of magnetization of magnetic dots, we investigated the magnetic properties of iron materials with different particle shapes and degrees of aggregation under external magnetic fields. The MDMD of the materials under magnetic fields of various strengths were simulated. Our results suggested that disk-like iron particles had a better magnetization than spherical iron particles. This result could be correlated with the magnetic wave- absorbing property of iron material. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wave-absorbing%20property" title="wave-absorbing property">wave-absorbing property</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetic%20material" title=" magnetic material"> magnetic material</a>, <a href="https://publications.waset.org/abstracts/search?q=micro-dot%20magnetic%20dipole" title=" micro-dot magnetic dipole"> micro-dot magnetic dipole</a>, <a href="https://publications.waset.org/abstracts/search?q=particulate%20aggregation" title=" particulate aggregation"> particulate aggregation</a> </p> <a href="https://publications.waset.org/abstracts/78242/computer-simulation-to-investigate-magnetic-and-wave-absorbing-properties-of-iron-nanoparticles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">490</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25523</span> The Derivation of a Four-Strain Optimized Mohr&#039;s Circle for Use in Experimental Reinforced Concrete Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Edvard%20P.%20G.%20Bruun">Edvard P. G. Bruun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the best ways of improving our understanding of reinforced concrete is through large-scale experimental testing. The gathered information is critical in making inferences about structural mechanics and deriving the mathematical models that are the basis for finite element analysis programs and design codes. An effective way of measuring the strains across a region of a specimen is by using a system of surface mounted Linear Variable Differential Transformers (LVDTs). While a single LVDT can only measure the linear strain in one direction, by combining several measurements at known angles a Mohr’s circle of strain can be derived for the whole region under investigation. This paper presents a method that can be used by researchers, which improves the accuracy and removes experimental bias in the calculation of the Mohr’s circle, using four rather than three independent strain measurements. Obtaining high quality strain data is essential, since knowing the angular deviation (shear strain) and the angle of principal strain in the region are important properties in characterizing the governing structural mechanics. For example, the Modified Compression Field Theory (MCFT) developed at the University of Toronto, is a rotating crack model that requires knowing the direction of the principal stress and strain, and then calculates the average secant stiffness in this direction. But since LVDTs can only measure average strains across a plane (i.e., between discrete points), localized cracking and spalling that typically occur in reinforced concrete, can lead to unrealistic results. To build in redundancy and improve the quality of the data gathered, the typical experimental setup for a large-scale shell specimen has four independent directions (X, Y, H, and V) that are instrumented. The question now becomes, which three should be used? The most common approach is to simply discard one of the measurements. The problem is that this can produce drastically different answers, depending on the three strain values that are chosen. To overcome this experimental bias, and to avoid simply discarding valuable data, a more rigorous approach would be to somehow make use of all four measurements. This paper presents the derivation of a method to draw what is effectively a Mohr’s circle of 'best-fit', which optimizes the circle by using all four independent strain values. The four-strain optimized Mohr’s circle approach has been utilized to process data from recent large-scale shell tests at the University of Toronto (Ruggiero, Proestos, and Bruun), where analysis of the test data has shown that the traditional three-strain method can lead to widely different results. This paper presents the derivation of the method and shows its application in the context of two reinforced concrete shells tested in pure torsion. In general, the constitutive models and relationships that characterize reinforced concrete are only as good as the experimental data that is gathered – ensuring that a rigorous and unbiased approach exists for calculating the Mohr’s circle of strain during an experiment, is of utmost importance to the structural research community. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reinforced%20concrete" title="reinforced concrete">reinforced concrete</a>, <a href="https://publications.waset.org/abstracts/search?q=shell%20tests" title=" shell tests"> shell tests</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohr%E2%80%99s%20circle" title=" Mohr’s circle"> Mohr’s circle</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20research" title=" experimental research"> experimental research</a> </p> <a href="https://publications.waset.org/abstracts/92464/the-derivation-of-a-four-strain-optimized-mohrs-circle-for-use-in-experimental-reinforced-concrete-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">235</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25522</span> Digital Planet: Readying for the Rise of the E-Consumer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bhaskar%20Chakravorti">Bhaskar Chakravorti</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Tunnard"> Christopher Tunnard</a>, <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Shankar%20Chaturvedi"> Ravi Shankar Chaturvedi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This report introduces the Digital Evolution Index (DEI) as a way to gauge the transformation of economies in the advanced and developing world from traditional brick-and-mortar to digitally enabled. The DEI measures the digital trajectories of 50 countries to provide actionable, data-informed insights for businesses, investors and policymakers. Created by The Fletcher School, in collaboration with MasterCard Worldwide and DataCash, the DEI analyzes the key underlying drivers and barriers that govern a country’s evolution into a digital economy: Demand, Supply, Institutional Environment and Innovation. A longitudinal analysis of these four drivers during the years 2008 to 2013 reveals both the current state of a country’s digital economy, as well as changes over time. Combining these two measures allows us to assign each country to one of four Trajectory Zones: • Stand Out countries have shown high levels of digital development in the past and continue to remain on an upward trajectory. • Stall Out countries have achieved a high level of evolution in the past but are losing momentum and risk falling behind. • Break Out countries have the potential to develop strong digital economies. Though their overall score is still low, they are moving upward and are poised to become Stand Out countries in the future. • Watch Out countries face significant opportunities and challenges, with low scores on both current level and upward motion of their DEI. Some may be able to overcome limitations with clever innovations and stopgap measures, while others seem to be stuck. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title="e-commerce">e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20evolution" title=" digital evolution"> digital evolution</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20commerce%20ecosystems" title=" digital commerce ecosystems"> digital commerce ecosystems</a>, <a href="https://publications.waset.org/abstracts/search?q=e-consumer" title=" e-consumer"> e-consumer</a> </p> <a href="https://publications.waset.org/abstracts/19751/digital-planet-readying-for-the-rise-of-the-e-consumer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25521</span> Data Poisoning Attacks on Federated Learning and Preventive Measures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beulah%20Rani%20Inbanathan">Beulah Rani Inbanathan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20poisoning" title="data poisoning">data poisoning</a>, <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title=" federated learning"> federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=edge%20computing" title=" edge computing"> edge computing</a> </p> <a href="https://publications.waset.org/abstracts/146321/data-poisoning-attacks-on-federated-learning-and-preventive-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146321.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25520</span> Simulation and Hardware Implementation of Data Communication Between CAN Controllers for Automotive Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20M.%20Kalayappan">R. M. Kalayappan</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Kathiravan"> N. Kathiravan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In automobile industries, Controller Area Network (CAN) is widely used to reduce the system complexity and inter-task communication. Therefore, this paper proposes the hardware implementation of data frame communication between one controller to other. The CAN data frames and protocols will be explained deeply, here. The data frames are transferred without any collision or corruption. The simulation is made in the KEIL vision software to display the data transfer between transmitter and receiver in CAN. ARM7 micro-controller is used to transfer data’s between the controllers in real time. Data transfer is verified using the CRO. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20area%20network%20%28CAN%29" title="control area network (CAN)">control area network (CAN)</a>, <a href="https://publications.waset.org/abstracts/search?q=automotive%20electronic%20control%20unit" title=" automotive electronic control unit"> automotive electronic control unit</a>, <a href="https://publications.waset.org/abstracts/search?q=CAN%202.0" title=" CAN 2.0"> CAN 2.0</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a> </p> <a href="https://publications.waset.org/abstracts/11122/simulation-and-hardware-implementation-of-data-communication-between-can-controllers-for-automotive-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25519</span> Improving the Statistics Nature in Research Information System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rajbir%20Cheema">Rajbir Cheema </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to introduce an integrated research information system, this will provide scientific institutions with the necessary information on research activities and research results in assured quality. Since data collection, duplication, missing values, incorrect formatting, inconsistencies, etc. can arise in the collection of research data in different research information systems, which can have a wide range of negative effects on data quality, the subject of data quality should be treated with better results. This paper examines the data quality problems in research information systems and presents the new techniques that enable organizations to improve their quality of research information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Research%20information%20systems%20%28RIS%29" title="Research information systems (RIS)">Research information systems (RIS)</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20information" title=" research information"> research information</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20sources" title=" heterogeneous sources"> heterogeneous sources</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20quality" title=" data quality"> data quality</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20cleansing" title=" data cleansing"> data cleansing</a>, <a href="https://publications.waset.org/abstracts/search?q=science%20system" title=" science system"> science system</a>, <a href="https://publications.waset.org/abstracts/search?q=standardization" title=" standardization"> standardization</a> </p> <a href="https://publications.waset.org/abstracts/123761/improving-the-statistics-nature-in-research-information-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123761.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25518</span> Data Mining Meets Educational Analysis: Opportunities and Challenges for Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carla%20Silva">Carla Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent development of information and communication technology enables us to acquire, collect, analyse data in various fields of socioeconomic – technological systems. Along with the increase of economic globalization and the evolution of information technology, data mining has become an important approach for economic data analysis. As a result, there has been a critical need for automated approaches to effective and efficient usage of massive amount of educational data, in order to support institutions to a strategic planning and investment decision-making. In this article, we will address data from several different perspectives and define the applied data to sciences. Many believe that 'big data' will transform business, government, and other aspects of the economy. We discuss how new data may impact educational policy and educational research. Large scale administrative data sets and proprietary private sector data can greatly improve the way we measure, track, and describe educational activity and educational impact. We also consider whether the big data predictive modeling tools that have emerged in statistics and computer science may prove useful in educational and furthermore in economics. Finally, we highlight a number of challenges and opportunities for future research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20analysis" title=" research analysis"> research analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=investment%20decision-making" title=" investment decision-making"> investment decision-making</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20research" title=" educational research"> educational research</a> </p> <a href="https://publications.waset.org/abstracts/57717/data-mining-meets-educational-analysis-opportunities-and-challenges-for-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57717.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25517</span> A Method of Detecting the Difference in Two States of Brain Using Statistical Analysis of EEG Raw Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Digvijaysingh%20S.%20Bana">Digvijaysingh S. Bana</a>, <a href="https://publications.waset.org/abstracts/search?q=Kiran%20R.%20Trivedi"> Kiran R. Trivedi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces various methods for the alpha wave to detect the difference between two states of brain. One healthy subject participated in the experiment. EEG was measured on the forehead above the eye (FP1 Position) with reference and ground electrode are on the ear clip. The data samples are obtained in the form of EEG raw data. The time duration of reading is of one minute. Various test are being performed on the alpha band EEG raw data.The readings are performed in different time duration of the entire day. The statistical analysis is being carried out on the EEG sample data in the form of various tests. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electroencephalogram%28EEG%29" title="electroencephalogram(EEG)">electroencephalogram(EEG)</a>, <a href="https://publications.waset.org/abstracts/search?q=biometrics" title=" biometrics"> biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG%20raw%20data" title=" EEG raw data"> EEG raw data</a> </p> <a href="https://publications.waset.org/abstracts/32552/a-method-of-detecting-the-difference-in-two-states-of-brain-using-statistical-analysis-of-eeg-raw-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32552.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">464</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25516</span> The Impact of Cloud Accounting on Boards of Directors in the Middle East and North African (MENA) Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Alqatan">Ahmad Alqatan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Purpose: The purpose of this study is to analyze how the adoption of cloud accounting systems influences the governance practices and performance of boards of directors in MENA countries. The research aims to identify the benefits and challenges associated with cloud accounting and its role in improving board efficiency and oversight. Methodology: This research employs a mixed-method approach, combining quantitative surveys and qualitative interviews with board members and financial officers from a diverse range of companies in the MENA region. The quantitative data is analyzed to determine patterns and correlations, while qualitative insights provide a deeper understanding of the contextual factors influencing cloud accounting adoption and its impacts. Findings: The findings indicate that cloud accounting significantly enhances the decision-making capabilities of boards by providing real-time financial information and facilitating better communication among board members. Companies using cloud accounting reports improved financial oversight and more timely and accurate financial reporting. However, the research also identifies challenges such as cybersecurity concerns, resistance to change, and the need for ongoing training and support. Practical Implications: The study suggests that MENA companies can benefit from investing in cloud accounting technologies to improve board governance and strategic decision-making. It highlights the importance of addressing cybersecurity issues and providing adequate training for board members to maximize the advantages of cloud accounting. Originality: This research contributes to the limited literature on cloud accounting in the MENA region, offering valuable insights for policymakers, business leaders, and academics. It underscores the transformative potential of cloud accounting for enhancing board performance and corporate governance in emerging markets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20accounting" title="cloud accounting">cloud accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=board%20of%20directors" title=" board of directors"> board of directors</a>, <a href="https://publications.waset.org/abstracts/search?q=MENA%20region" title=" MENA region"> MENA region</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20transparency" title=" financial transparency"> financial transparency</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20data" title=" real-time data"> real-time data</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-making" title=" decision-making"> decision-making</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20adoption" title=" technology adoption"> technology adoption</a> </p> <a href="https://publications.waset.org/abstracts/191055/the-impact-of-cloud-accounting-on-boards-of-directors-in-the-middle-east-and-north-african-mena-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191055.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">30</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=9" rel="prev">&lsaquo;</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=2">2</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=9">9</a></li> <li class="page-item active"><span class="page-link">10</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=13">13</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=860">860</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=861">861</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=data%20combining&amp;page=11" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10