Social network analysis is a method of big data analysis which reveals the nature
of connections between objects, including implicit connections. This is a tool of interest
since it can be applied to large data sets, manual processing of which is very laborintensive,
while automated processing through self-learning linguistic engines requires
a lot of resources. In this regard a study was carried out: it was aimed at development
and testing of social network analysis tools and creating a research algorithm which is
applicable to solve a wide range of analytical and search tasks. The current image of
Russia and its activities in the Arctic was chosen as a case.
The research algorithm helps to discover implicit patterns and trends, relate
information flows and events with relevant newsworthy events and news stories to form
a “clear” view of the study object and key actors which this object is associated with.
The work contributes to filling the gap in scientific literature, caused by insufficient
development of applied issues of using social network analysis to solve managerial
tasks, while theoretical papers, which describe the theory and methodology of such an
analysis, are abundant.
Next generation big data analytics state of the artNazrul Islam
This document reviews recent research on network big data, including different data types (online network data, mobile/IoT data, geography data, spatial temporal data, streaming/real-time data, and visual data), storage models, privacy and security issues, analysis methods, and applications. It discusses the trends in network big data moving from simple online social network data to include more data sources and data that has spatial, temporal, and real-time components. The challenges of analyzing large and diverse datasets from networks are also addressed.
A forecasting of stock trading price using time series information based on b...IJECEIAES
Big data is a large set of structured or unstructured data that can collect, store, manage, and analyze data with existing database management tools. And it means the technique of extracting value from these data and interpreting the results. Big data has three characteristics: The size of existing data and other data (volume), the speed of data generation (velocity), and the variety of information forms (variety). The time series data are obtained by collecting and recording the data generated in accordance with the flow of time. If the analysis of these time series data, found the characteristics of the data implies that feature helps to understand and analyze time series data. The concept of distance is the simplest and the most obvious in dealing with the similarities between objects. The commonly used and widely known method for measuring distance is the Euclidean distance. This study is the result of analyzing the similarity of stock price flow using 793,800 closing prices of 1,323 companies in Korea. Visual studio and Excel presented calculate the Euclidean distance using an analysis tool. We selected “000100” as a target domestic company and prepared for big data analysis. As a result of the analysis, the shortest Euclidean distance is the code “143860” company, and the calculated value is “11.147”. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.
Novel holistic architecture for analytical operation on sensory data relayed...IJECEIAES
With increasing adoption of the sensor-based application, there is an exponential rise of the sensory data that eventually take the shape of the big data. However, the practicality of executing high end analytical operation over the resource-constrained big data has never being studied closely. After reviewing existing approaches, it is explored that there is no cost-effective schemes of big data analytics over large scale sensory data processiing that can be directly used as a service. Therefore, the propsoed system introduces a holistic architecture where streamed data after performing extraction of knowedge can be offered in the form of services. Implemented in MATLAB, the proposed study uses a very simplistic approach considering energy constrained of the sensor nodes to find that proposed system offers better accuracy, reduced mining duration (i.e. faster response time), and reduced memory dependencies to prove that it offers cost effective analytical solution in contrast to existing system.
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
Top 10 Read articles in Web & semantic technologydannyijwest
This document discusses the future of cloud computing in government IT. It begins by defining cloud computing and examining its growing adoption across both private and public sectors globally. The document then outlines challenges for governments transitioning to cloud computing, including workforce and computing resource issues. The author presents a six-step strategy for government agencies to migrate to the cloud. Finally, it explores implications of the continued cloud computing revolution for public sector organizations and the IT community.
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...Editor IJCATR
In this paper we focus on some techniques for solving data mining tasks such as: Statistics, Decision Trees and Neural
Networks. The new approach has succeed in defining some new criteria for the evaluation process, and it has obtained valuable results
based on what the technique is, the environment of using each techniques, the advantages and disadvantages of each technique, the
consequences of choosing any of these techniques to extract hidden predictive information from large databases, and the methods of
implementation of each technique. Finally, the paper has presented some valuable recommendations in this field.
This document discusses uncertainty in big data analytics. It begins by providing background on big data, defining the common "5 V's" characteristics of big data - volume, variety, velocity, veracity, and value. It then discusses uncertainty, which exists in big data due to noise, incompleteness, and inconsistency in data. The document surveys techniques for big data analytics and how uncertainty impacts machine learning, natural language processing, and other artificial intelligence approaches. It identifies challenges that uncertainty presents and strategies for mitigating uncertainty in big data analytics.
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkIJECEIAES
Recent progress on real-time systems are growing high in information technology which is showing importance in every single innovative field. Different applications in IT simultaneously produce the enormous measure of information that should be taken care of. In this paper, a novel algorithm of adaptive knowledge-based Bayesian network is proposed to deal with the impact of big data congestion in decision processing. A Bayesian system show is utilized to oversee learning arrangement toward all path for the basic leadership process. Information of Bayesian systems is routinely discharged as an ideal arrangement, where the examination work is to find a development that misuses a measurably inspired score. By and large, available information apparatuses manage this ideal arrangement by methods for normal hunt strategies. As it required enormous measure of information space, along these lines it is a tedious method that ought to be stayed away from. The circumstance ends up unequivocal once huge information include in hunting down ideal arrangement. A calculation is acquainted with achieve quicker preparing of ideal arrangement by constraining the pursuit information space. The proposed algorithm consists of recursive calculation intthe inquiry space. The outcome demonstrates that the ideal component of the proposed algorithm can deal with enormous information by processing time, and a higher level of expectation rates.
Next generation big data analytics state of the artNazrul Islam
This document reviews recent research on network big data, including different data types (online network data, mobile/IoT data, geography data, spatial temporal data, streaming/real-time data, and visual data), storage models, privacy and security issues, analysis methods, and applications. It discusses the trends in network big data moving from simple online social network data to include more data sources and data that has spatial, temporal, and real-time components. The challenges of analyzing large and diverse datasets from networks are also addressed.
A forecasting of stock trading price using time series information based on b...IJECEIAES
Big data is a large set of structured or unstructured data that can collect, store, manage, and analyze data with existing database management tools. And it means the technique of extracting value from these data and interpreting the results. Big data has three characteristics: The size of existing data and other data (volume), the speed of data generation (velocity), and the variety of information forms (variety). The time series data are obtained by collecting and recording the data generated in accordance with the flow of time. If the analysis of these time series data, found the characteristics of the data implies that feature helps to understand and analyze time series data. The concept of distance is the simplest and the most obvious in dealing with the similarities between objects. The commonly used and widely known method for measuring distance is the Euclidean distance. This study is the result of analyzing the similarity of stock price flow using 793,800 closing prices of 1,323 companies in Korea. Visual studio and Excel presented calculate the Euclidean distance using an analysis tool. We selected “000100” as a target domestic company and prepared for big data analysis. As a result of the analysis, the shortest Euclidean distance is the code “143860” company, and the calculated value is “11.147”. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.
Novel holistic architecture for analytical operation on sensory data relayed...IJECEIAES
With increasing adoption of the sensor-based application, there is an exponential rise of the sensory data that eventually take the shape of the big data. However, the practicality of executing high end analytical operation over the resource-constrained big data has never being studied closely. After reviewing existing approaches, it is explored that there is no cost-effective schemes of big data analytics over large scale sensory data processiing that can be directly used as a service. Therefore, the propsoed system introduces a holistic architecture where streamed data after performing extraction of knowedge can be offered in the form of services. Implemented in MATLAB, the proposed study uses a very simplistic approach considering energy constrained of the sensor nodes to find that proposed system offers better accuracy, reduced mining duration (i.e. faster response time), and reduced memory dependencies to prove that it offers cost effective analytical solution in contrast to existing system.
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
Top 10 Read articles in Web & semantic technologydannyijwest
This document discusses the future of cloud computing in government IT. It begins by defining cloud computing and examining its growing adoption across both private and public sectors globally. The document then outlines challenges for governments transitioning to cloud computing, including workforce and computing resource issues. The author presents a six-step strategy for government agencies to migrate to the cloud. Finally, it explores implications of the continued cloud computing revolution for public sector organizations and the IT community.
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...Editor IJCATR
In this paper we focus on some techniques for solving data mining tasks such as: Statistics, Decision Trees and Neural
Networks. The new approach has succeed in defining some new criteria for the evaluation process, and it has obtained valuable results
based on what the technique is, the environment of using each techniques, the advantages and disadvantages of each technique, the
consequences of choosing any of these techniques to extract hidden predictive information from large databases, and the methods of
implementation of each technique. Finally, the paper has presented some valuable recommendations in this field.
This document discusses uncertainty in big data analytics. It begins by providing background on big data, defining the common "5 V's" characteristics of big data - volume, variety, velocity, veracity, and value. It then discusses uncertainty, which exists in big data due to noise, incompleteness, and inconsistency in data. The document surveys techniques for big data analytics and how uncertainty impacts machine learning, natural language processing, and other artificial intelligence approaches. It identifies challenges that uncertainty presents and strategies for mitigating uncertainty in big data analytics.
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkIJECEIAES
Recent progress on real-time systems are growing high in information technology which is showing importance in every single innovative field. Different applications in IT simultaneously produce the enormous measure of information that should be taken care of. In this paper, a novel algorithm of adaptive knowledge-based Bayesian network is proposed to deal with the impact of big data congestion in decision processing. A Bayesian system show is utilized to oversee learning arrangement toward all path for the basic leadership process. Information of Bayesian systems is routinely discharged as an ideal arrangement, where the examination work is to find a development that misuses a measurably inspired score. By and large, available information apparatuses manage this ideal arrangement by methods for normal hunt strategies. As it required enormous measure of information space, along these lines it is a tedious method that ought to be stayed away from. The circumstance ends up unequivocal once huge information include in hunting down ideal arrangement. A calculation is acquainted with achieve quicker preparing of ideal arrangement by constraining the pursuit information space. The proposed algorithm consists of recursive calculation intthe inquiry space. The outcome demonstrates that the ideal component of the proposed algorithm can deal with enormous information by processing time, and a higher level of expectation rates.
The document discusses developing an integrated framework to utilize big data for higher education institutions in Saudi Arabia. It aims to develop a framework to support decision making and improve performance in education sectors using big data. The study collected data through surveys and interviews to analyze factors affecting adoption and implementation of big data. The framework addresses issues related to adoption of big data in education.
A Review of Big Data Analytics in Sector of Higher EducationIJERA Editor
This paper is about the use of big data analytics in higher education. In this paper, we see what the big data is and where does it come from. We will also try to find why the big data analytics has become a buzzword in almost every sector today through our literature review on the big data analytics and its applications in higher education sector. Then we see what the big educational data is, how it is generated and analyzed. We found that the two most important types of analytics are- Learning and academic analytics which will be discussed. Several papers describe the benefits of implementation of analytics in the education sector and the opportunities provided which will be discussed in this paper. We also found that the basic characteristics such as size, speed, variety and some other factors are responsible for some issues and challenges to the use of analytics in this sector. We will discuss those issues and challenges and discuss some proposed solutions to address them.
There are numerous ways to analyse the web information, generally web substance are housed in
large information sets and basic inquiries are utilized to parse such information sets. As the requests
expanded with time, mining web information amended to meet challenging task in a web analysis.
Machine learning methodologies are the most up to date one to go into these analysis forms. Different
approaches like decision trees, association rules, Meta heuristic and basic learning methods are embraced
for making web data appraisal and mining data from various web instances. This study will highlight these
approaches in perspective of web investigation. One of the prime goals of this exploration is to investigate
more data mining approaches alongside machine learning systems, and to express emerging collaboration
of web analytics with artificial intelligence.
A comprehensive survey of link mining and anomalies detectioncsandit
This document provides an overview of link mining and its application to anomalies detection. It discusses the emergence of link mining, key link mining tasks including object-related, graph-related and link-related tasks. Challenges of link mining are described along with applications. Different types of anomalies are defined and three main approaches to anomalies detection - supervised, semi-supervised and unsupervised - are outlined along with common methods like nearest neighbor, clustering, statistical and information-based approaches.
Big data is a prominent term which characterizes the improvement and availability of data in all three
formats like structure, unstructured and semi formats. Structure data is located in a fixed field of a record
or file and it is present in the relational data bases and spreadsheets whereas an unstructured data file
includes text and multimedia contents. The primary objective of this big data concept is to describe the
extreme volume of data sets i.e. both structured and unstructured. It is further defined with three “V”
dimensions namely Volume, Velocity and Variety, and two more “V” also added i.e. Value and Veracity.
Volume denotes the size of data, Velocity depends upon the speed of the data processing, Variety is
described with the types of the data, Value which derives the business value and Veracity describes about
the quality of the data and data understandability. Nowadays, big data has become unique and preferred
research areas in the field of computer science. Many open research problems are available in big data
and good solutions also been proposed by the researchers even though there is a need for development of
many new techniques and algorithms for big data analysis in order to get optimal solutions. In this paper,
a detailed study about big data, its basic concepts, history, applications, technique, research issues and
tools are discussed.
New Research Articles - 2018 November Issue-International Journal of Artifici...gerogepatton
This document summarizes several papers published in the November 2018 issue of the International Journal of Artificial Intelligence and Applications (IJAIA). The first paper proposes a movie genre recommendation system using machine learning algorithms to predict preferences from survey data with imbalanced responses and unequal classification costs. The second paper describes a hybrid fuzzy neural network and expert system to aid effort forecasting for software development projects based on complexity factors. It was tested on a real database and showed promising results.
Data Mining of Project Management Data: An Analysis of Applied Research Studies.Gurdal Ertek
Data collected and generated through and posterior to projects, such as data residing in project management software and post project review documents, can be a major source of actionable insights and competitive advantage. This paper presents a rigorous
methodological analysis of the applied research published in academic literature, on the application of data mining (DM) for project management (PM). The objective of the paper is to provide a comprehensive analysis and discussion of where and how data mining is applied for project management data and to provide practical insights for future research in the field.
https://dl.acm.org/citation.cfm?id=3176714
https://ertekprojects.com/ftp/papers/2017/ertek_et_al_2017_Data_Mining_of_Project_Management_Data.pdf
This document summarizes student submissions from an assignment on the historical roots of engineering systems given to PhD students over four years. The assignment involved student teams researching the connections between a historical root and a modern methodology in engineering systems.
The summaries provided insights into the development and interrelations of fields underlying engineering systems. Key findings included that fields are highly interrelated, with some individuals like Herbert Simon appearing pivotal. Surprising connections were found, such as between cybernetics and business strategy. Students reported gaining knowledge of engineering systems fields and concepts through exploring the assignment topics. Overall, the assignment was seen as valuable for learning about the field, though its benefits declined over time.
A SURVEY OF LINK MINING AND ANOMALIES DETECTIONIJDKP
This document discusses link mining and its application in detecting anomalies. It begins by defining link mining as focusing on discovering explicit links between objects, as opposed to data mining which aims to find patterns within datasets. The document then surveys different types of anomalies that can be detected through link mining, including contextual, point, collective, online, and distributed anomalies. It also discusses challenges in link mining like logical vs statistical dependencies and the skewed class distribution problem in link prediction. Applications of link mining mentioned include social networks, epidemiology, and bibliographic analysis. Overall, the document provides an overview of the emerging field of link mining and its relevance for detecting unusual or anomalous links within linked datasets.
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINijmpict
This document summarizes a research study that mapped the knowledge domain of public sector cloud computing. The study utilized 188 research publications from the Web of Science database and the CiteSpace visualization software. Key findings included:
1) The top publishing countries were Canada, the US, Australia, China, and the UK. The top institutions were from Malaysia, Australia, and the UK.
2) Author collaboration was limited, though a few nascent research clusters were identified. The most published authors were from the Middle East, Malaysia, Australia, and China. The most co-cited authors focused on cloud standards and technologies.
3) The top co-cited journals were Communications of the ACM, NIST Special
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
Big Data must be processed with advanced collection and analysis tools, based on predetermined algorithms, in order to obtain relevant information. Algorithms must also take into account invisible aspects for direct perceptions. Big Data issues is multi-layered. A distributed parallel architecture distributes data on multiple servers (parallel execution environments) thus dramatically improving data processing speeds. Big Data provides an infrastructure that allows for highlighting uncertainties, performance, and availability of components.
DOI: 10.13140/RG.2.2.12784.00004
Information Science and Technology (IST): The Nature and View from the Domai...Scientific Review SR
Information Science is a Science of Sciences responsible for Information Solution besides its
Technological Solution. Information Science [IS] is a broad field and combination of many fields of Science,
Engineering, Management, Humanities and so on. Information Science during its origin developed as Information
Field for Information activities such as collection, selection, organization, processing and management, and
dissemination. Information Science sometimes treated as Information Studies or Library Science; however, there
are many differences between Information Science and these two. Information Science is today emerging as an
important name in Science and Technology and in several cases, the nomenclature of Information Science
become popular as Information Science and Technology (IST). This paper talks about Information Science and its
nature in the contemporary scenario with a brief discussion on earlier facets etc
Mining Social Media Data for Understanding Drugs UsageIRJET Journal
This document discusses mining social media data to understand drug usage. It proposes using big data techniques like Hadoop and MapReduce to extract and analyze data from social networks about drug abuse. The methodology involves collecting data from platforms using crawlers, storing it in Hadoop, filtering it, then applying complex analysis using cloud computing. Prior work on extracting health information from social media and multi-scale community detection in networks is reviewed. The challenges of privacy preservation and scalability when anonymizing big healthcare datasets are also discussed.
The document discusses tools and techniques for big data analytics, including A/B testing, crowdsourcing, machine learning, and data mining. It provides an overview of the big data analysis pipeline, including data acquisition, information extraction, integration and representation, query processing and analysis, and interpretation. The document also discusses fields where big data is relevant like industry, healthcare, and research. It analyzes tools like A/B testing, machine learning, and data mining techniques in more detail.
Performance analysis of data mining algorithms with neural networkIAEME Publication
The document summarizes research combining neural networks with three data mining algorithms (CHARM, Top K Rules, and CM-SPAM) to improve data mining results. It first provides background on data mining and classification problems. It then discusses artificial neural networks and how they are trained. Next, it outlines how the three algorithms (CHARM, Top K Rules, CM-SPAM) can be integrated with neural networks for association rule mining and sequential pattern mining. The overall goal is to leverage neural networks to generate more accurate and useful patterns from large datasets.
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
A Comprehensive Overview of Advance Techniques, Applications and Challenges i...IRJTAE
— The field of data science uses scientific methods, algorithms, processes, and systems to extract
insights and knowledge from structured and unstructured data. It combines principles from mathematics,
statistics, computer science, and domain expertise to analyse, interpret, and present data in meaningful ways. Its
primary aim is to uncover patterns, trends, and correlations across various domains to aid in making informed
decisions, predictions, and optimizations. Data science encompasses data collection, cleaning, analysis,
interpretation, and communication of findings. Techniques such as machine learning, statistical analysis, data
mining, and data visualization are commonly employed to derive valuable insights and solve complex problems.
Data scientists use programming languages and tools to manage large volumes of data, transforming raw
information into actionable intelligence, driving innovation, and enabling evidence-based decision-making in
businesses, research, and various other applications. This review seeks to provide a valuable resource for
researchers, practitioners, and enthusiasts who wish to gain in-depth knowledge and understanding of data
science and its implications for the ever-evolving data-driven world.
This document summarizes recent research areas in computer science. It discusses how computer science has impacted fields like science, medicine, business and mobile communication through research in areas such as algorithms, data management, distributed systems, e-commerce, education, hardware/architecture, human-computer interaction, machine intelligence, networking, security, software engineering and speech processing. It provides examples of current research topics including data mining, machine learning, artificial intelligence, bioinformatics, and education technology. The document concludes that computer science is a vast field with many problems left to solve across these research areas.
This document discusses big data and its challenges related to the Internet of Things (IoT). It first defines big data and explains how the aggregation of data from many IoT systems can lead to big data. It then discusses some key challenges of big data, including issues with data volume, velocity, variety, and veracity. Specific challenges for big data from IoT systems are also reviewed, such as authentication, security, and uncertainty of data. Finally, the document outlines some potential solutions to big data challenges, such as using MapReduce for heterogeneous data, data cleaning techniques for inconsistencies, and cloud-based security platforms for IoT devices.
The document discusses developing an integrated framework to utilize big data for higher education institutions in Saudi Arabia. It aims to develop a framework to support decision making and improve performance in education sectors using big data. The study collected data through surveys and interviews to analyze factors affecting adoption and implementation of big data. The framework addresses issues related to adoption of big data in education.
A Review of Big Data Analytics in Sector of Higher EducationIJERA Editor
This paper is about the use of big data analytics in higher education. In this paper, we see what the big data is and where does it come from. We will also try to find why the big data analytics has become a buzzword in almost every sector today through our literature review on the big data analytics and its applications in higher education sector. Then we see what the big educational data is, how it is generated and analyzed. We found that the two most important types of analytics are- Learning and academic analytics which will be discussed. Several papers describe the benefits of implementation of analytics in the education sector and the opportunities provided which will be discussed in this paper. We also found that the basic characteristics such as size, speed, variety and some other factors are responsible for some issues and challenges to the use of analytics in this sector. We will discuss those issues and challenges and discuss some proposed solutions to address them.
There are numerous ways to analyse the web information, generally web substance are housed in
large information sets and basic inquiries are utilized to parse such information sets. As the requests
expanded with time, mining web information amended to meet challenging task in a web analysis.
Machine learning methodologies are the most up to date one to go into these analysis forms. Different
approaches like decision trees, association rules, Meta heuristic and basic learning methods are embraced
for making web data appraisal and mining data from various web instances. This study will highlight these
approaches in perspective of web investigation. One of the prime goals of this exploration is to investigate
more data mining approaches alongside machine learning systems, and to express emerging collaboration
of web analytics with artificial intelligence.
A comprehensive survey of link mining and anomalies detectioncsandit
This document provides an overview of link mining and its application to anomalies detection. It discusses the emergence of link mining, key link mining tasks including object-related, graph-related and link-related tasks. Challenges of link mining are described along with applications. Different types of anomalies are defined and three main approaches to anomalies detection - supervised, semi-supervised and unsupervised - are outlined along with common methods like nearest neighbor, clustering, statistical and information-based approaches.
Big data is a prominent term which characterizes the improvement and availability of data in all three
formats like structure, unstructured and semi formats. Structure data is located in a fixed field of a record
or file and it is present in the relational data bases and spreadsheets whereas an unstructured data file
includes text and multimedia contents. The primary objective of this big data concept is to describe the
extreme volume of data sets i.e. both structured and unstructured. It is further defined with three “V”
dimensions namely Volume, Velocity and Variety, and two more “V” also added i.e. Value and Veracity.
Volume denotes the size of data, Velocity depends upon the speed of the data processing, Variety is
described with the types of the data, Value which derives the business value and Veracity describes about
the quality of the data and data understandability. Nowadays, big data has become unique and preferred
research areas in the field of computer science. Many open research problems are available in big data
and good solutions also been proposed by the researchers even though there is a need for development of
many new techniques and algorithms for big data analysis in order to get optimal solutions. In this paper,
a detailed study about big data, its basic concepts, history, applications, technique, research issues and
tools are discussed.
New Research Articles - 2018 November Issue-International Journal of Artifici...gerogepatton
This document summarizes several papers published in the November 2018 issue of the International Journal of Artificial Intelligence and Applications (IJAIA). The first paper proposes a movie genre recommendation system using machine learning algorithms to predict preferences from survey data with imbalanced responses and unequal classification costs. The second paper describes a hybrid fuzzy neural network and expert system to aid effort forecasting for software development projects based on complexity factors. It was tested on a real database and showed promising results.
Data Mining of Project Management Data: An Analysis of Applied Research Studies.Gurdal Ertek
Data collected and generated through and posterior to projects, such as data residing in project management software and post project review documents, can be a major source of actionable insights and competitive advantage. This paper presents a rigorous
methodological analysis of the applied research published in academic literature, on the application of data mining (DM) for project management (PM). The objective of the paper is to provide a comprehensive analysis and discussion of where and how data mining is applied for project management data and to provide practical insights for future research in the field.
https://dl.acm.org/citation.cfm?id=3176714
https://ertekprojects.com/ftp/papers/2017/ertek_et_al_2017_Data_Mining_of_Project_Management_Data.pdf
This document summarizes student submissions from an assignment on the historical roots of engineering systems given to PhD students over four years. The assignment involved student teams researching the connections between a historical root and a modern methodology in engineering systems.
The summaries provided insights into the development and interrelations of fields underlying engineering systems. Key findings included that fields are highly interrelated, with some individuals like Herbert Simon appearing pivotal. Surprising connections were found, such as between cybernetics and business strategy. Students reported gaining knowledge of engineering systems fields and concepts through exploring the assignment topics. Overall, the assignment was seen as valuable for learning about the field, though its benefits declined over time.
A SURVEY OF LINK MINING AND ANOMALIES DETECTIONIJDKP
This document discusses link mining and its application in detecting anomalies. It begins by defining link mining as focusing on discovering explicit links between objects, as opposed to data mining which aims to find patterns within datasets. The document then surveys different types of anomalies that can be detected through link mining, including contextual, point, collective, online, and distributed anomalies. It also discusses challenges in link mining like logical vs statistical dependencies and the skewed class distribution problem in link prediction. Applications of link mining mentioned include social networks, epidemiology, and bibliographic analysis. Overall, the document provides an overview of the emerging field of link mining and its relevance for detecting unusual or anomalous links within linked datasets.
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINijmpict
This document summarizes a research study that mapped the knowledge domain of public sector cloud computing. The study utilized 188 research publications from the Web of Science database and the CiteSpace visualization software. Key findings included:
1) The top publishing countries were Canada, the US, Australia, China, and the UK. The top institutions were from Malaysia, Australia, and the UK.
2) Author collaboration was limited, though a few nascent research clusters were identified. The most published authors were from the Middle East, Malaysia, Australia, and China. The most co-cited authors focused on cloud standards and technologies.
3) The top co-cited journals were Communications of the ACM, NIST Special
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
Big Data must be processed with advanced collection and analysis tools, based on predetermined algorithms, in order to obtain relevant information. Algorithms must also take into account invisible aspects for direct perceptions. Big Data issues is multi-layered. A distributed parallel architecture distributes data on multiple servers (parallel execution environments) thus dramatically improving data processing speeds. Big Data provides an infrastructure that allows for highlighting uncertainties, performance, and availability of components.
DOI: 10.13140/RG.2.2.12784.00004
Information Science and Technology (IST): The Nature and View from the Domai...Scientific Review SR
Information Science is a Science of Sciences responsible for Information Solution besides its
Technological Solution. Information Science [IS] is a broad field and combination of many fields of Science,
Engineering, Management, Humanities and so on. Information Science during its origin developed as Information
Field for Information activities such as collection, selection, organization, processing and management, and
dissemination. Information Science sometimes treated as Information Studies or Library Science; however, there
are many differences between Information Science and these two. Information Science is today emerging as an
important name in Science and Technology and in several cases, the nomenclature of Information Science
become popular as Information Science and Technology (IST). This paper talks about Information Science and its
nature in the contemporary scenario with a brief discussion on earlier facets etc
Mining Social Media Data for Understanding Drugs UsageIRJET Journal
This document discusses mining social media data to understand drug usage. It proposes using big data techniques like Hadoop and MapReduce to extract and analyze data from social networks about drug abuse. The methodology involves collecting data from platforms using crawlers, storing it in Hadoop, filtering it, then applying complex analysis using cloud computing. Prior work on extracting health information from social media and multi-scale community detection in networks is reviewed. The challenges of privacy preservation and scalability when anonymizing big healthcare datasets are also discussed.
The document discusses tools and techniques for big data analytics, including A/B testing, crowdsourcing, machine learning, and data mining. It provides an overview of the big data analysis pipeline, including data acquisition, information extraction, integration and representation, query processing and analysis, and interpretation. The document also discusses fields where big data is relevant like industry, healthcare, and research. It analyzes tools like A/B testing, machine learning, and data mining techniques in more detail.
Performance analysis of data mining algorithms with neural networkIAEME Publication
The document summarizes research combining neural networks with three data mining algorithms (CHARM, Top K Rules, and CM-SPAM) to improve data mining results. It first provides background on data mining and classification problems. It then discusses artificial neural networks and how they are trained. Next, it outlines how the three algorithms (CHARM, Top K Rules, CM-SPAM) can be integrated with neural networks for association rule mining and sequential pattern mining. The overall goal is to leverage neural networks to generate more accurate and useful patterns from large datasets.
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
A Comprehensive Overview of Advance Techniques, Applications and Challenges i...IRJTAE
— The field of data science uses scientific methods, algorithms, processes, and systems to extract
insights and knowledge from structured and unstructured data. It combines principles from mathematics,
statistics, computer science, and domain expertise to analyse, interpret, and present data in meaningful ways. Its
primary aim is to uncover patterns, trends, and correlations across various domains to aid in making informed
decisions, predictions, and optimizations. Data science encompasses data collection, cleaning, analysis,
interpretation, and communication of findings. Techniques such as machine learning, statistical analysis, data
mining, and data visualization are commonly employed to derive valuable insights and solve complex problems.
Data scientists use programming languages and tools to manage large volumes of data, transforming raw
information into actionable intelligence, driving innovation, and enabling evidence-based decision-making in
businesses, research, and various other applications. This review seeks to provide a valuable resource for
researchers, practitioners, and enthusiasts who wish to gain in-depth knowledge and understanding of data
science and its implications for the ever-evolving data-driven world.
This document summarizes recent research areas in computer science. It discusses how computer science has impacted fields like science, medicine, business and mobile communication through research in areas such as algorithms, data management, distributed systems, e-commerce, education, hardware/architecture, human-computer interaction, machine intelligence, networking, security, software engineering and speech processing. It provides examples of current research topics including data mining, machine learning, artificial intelligence, bioinformatics, and education technology. The document concludes that computer science is a vast field with many problems left to solve across these research areas.
This document discusses big data and its challenges related to the Internet of Things (IoT). It first defines big data and explains how the aggregation of data from many IoT systems can lead to big data. It then discusses some key challenges of big data, including issues with data volume, velocity, variety, and veracity. Specific challenges for big data from IoT systems are also reviewed, such as authentication, security, and uncertainty of data. Finally, the document outlines some potential solutions to big data challenges, such as using MapReduce for heterogeneous data, data cleaning techniques for inconsistencies, and cloud-based security platforms for IoT devices.
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
This document discusses how analytics can help organizations derive business value from big data. It describes how statistical analysis, machine learning, optimization and text mining can extract meaningful insights from social media, online commerce, telecommunications, smart utility meters, and improve security. While tools exist to analyze big data, challenges remain around data security, privacy, and developing skilled talent. The paper aims to illustrate how existing algorithms can generate value from different industry use cases.
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSijistjournal
The growth of smart and intelligent devices known as sensors generate large amount of data. These generated data over a time span takes such a large volume which is designated as big data. The data structure of repository holds unstructured data. The traditional data analytics methods well developed and used widely to analyze structured data and to limit extend the semi-structured data which involves additional processing over heads. The similar methods used to analyze unstructured data are different because of distributed computing approach where as there is a possibility of centralized processing in case of structured and semi-structured data. The under taken work is confined to analysis of both verities of methods. The result of this study is targeted to introduce methods available to analyze big data.
Social networking sites are a significant source of information to know the behavior of users and to know
what is occupying society of all ages and accordingly helpful information can be provided to specialists
and decision-makers. According to official sources, 98.43% of Saudi youth use social networking sites. The
study and analysis of social media data are done to provide the necessary information to increase
investment opportunities within the Kingdom of Saudi Arabia, by studying and analyzing what people
occupy on the communication sites through their tweets about the labor market and investment. Given the
huge volume of data and also its randomness, a survey of the data will be done and collected from through
keywords, the priority of arranging the data, and recording it as (positive - negative - mixed). The study
analysis and conclusion will be based on data-mining and its techniques of analysis and deduction
.
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...ijcsit
Social networking sites are a significant source of information to know the behavior of users and to know
what is occupying society of all ages and accordingly helpful information can be provided to specialists
and decision-makers. According to official sources, 98.43% of Saudi youth use social networking sites. The
study and analysis of social media data are done to provide the necessary information to increase
investment opportunities within the Kingdom of Saudi Arabia, by studying and analyzing what people
occupy on the communication sites through their tweets about the labor market and investment. Given the
huge volume of data and also its randomness, a survey of the data will be done and collected from through
keywords, the priority of arranging the data, and recording it as (positive - negative - mixed). The study
analysis and conclusion will be based on data-mining and its techniques of analysis and deduction.
A survey of big data and machine learning IJECEIAES
This paper presents a detailed analysis of big data and machine learning (ML) in the electrical power and energy sector. Big data analytics for smart energy operations, applications, impact, measurement and control, and challenges are presented in this paper. Big data and machine learning approaches need to be applied after analyzing the power system problem carefully. Determining the match between the strengths of big data and machine learning for solving the power system problem is of utmost important. They can be of great help to plan and operate the traditional grid/smart grid (SG). The basics of big data and machine learning are described in detailed manner along with their applications in various fields such as electrical power and energy, health care and life sciences, government, telecommunications, web and digital media, retailers, finance, e-commerce and customer service, etc. Finally, the challenges and opportunities of big data and machine learning are presented in this paper.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of
such advanced technology, there will be always a question regarding its impact on our social life,
environment and economy thus impacting all efforts exerted towards sustainable development. In the
information era, enormous amounts of data have become available on hand to decision makers. Big data
refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to
handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be
studied and provided in order to handle and extract value and knowledge from these datasets for different
industries and business operations. Numerous use cases have shown that AI can ensure an effective supply
of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the
different methods and scenario which can be applied to AI and big data, as well as the opportunities
provided by the application in various business operations and crisis management domains.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of
such advanced technology, there will be always a question regarding its impact on our social life,
environment and economy thus impacting all efforts exerted towards sustainable development. In the
information era, enormous amounts of data have become available on hand to decision makers. Big data
refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to
handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be
studied and provided in order to handle and extract value and knowledge from these datasets for different
industries and business operations. Numerous use cases have shown that AI can ensure an effective supply
of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the
different methods and scenario which can be applied to AI and big data, as well as the opportunities
provided by the application in various business operations and crisis management domains.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of such advanced technology, there will be always a question regarding its impact on our social life, environment and economy thus impacting all efforts exerted towards sustainable development. In the information era, enormous amounts of data have become available on hand to decision makers. Big data refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets for different industries and business operations. Numerous use cases have shown that AI can ensure an effective supply of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the different methods and scenario which can be applied to AI and big data, as well as the opportunities provided by the application in various business operations and crisis management domains.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
This document summarizes a research paper that analyzed social subgroups and community structure on social networking websites. The paper used the NodeXL tool to analyze Twitter data and identify the most influential group discussing "foreign affairs". It found that 232 users tweeted about foreign affairs, forming 30 groups. The largest group had 71 users and 93 unique connections. Network analysis metrics like in-degree, betweenness centrality, and eigenvector centrality identified the most influential users within the network discussing foreign affairs. This analysis can help organizations understand influential users and groups discussing certain topics on social media.
McKinsey Global Institute Big data The next frontier for innova.docxandreecapon
McKinsey Global Institute
Big data: The next frontier for innovation, competition, and productivity 27
2. Bigdatatechniquesand technologies
A wide variety of techniques and technologies has been developed and adapted to aggregate, manipulate, analyze, and visualize big data. These techniques and technologies draw from several fields including statistics, computer science, applied mathematics, and economics. This means that an organization that intends to derive value from big data has to adopt a flexible, multidisciplinary approach. Some techniques and technologies were developed in a world with access to far smaller volumes and variety in data, but have been successfully adapted so that they are applicable to very large sets of more diverse data. Others have been developed more recently, specifically to capture value from big data. Some were developed by academics and others by companies, especially those with online business models predicated on analyzing big data.
This report concentrates on documenting the potential value that leveraging big data can create. It is not a detailed instruction manual on how to capture value, a task that requires highly specific customization to an organization’s context, strategy, and capabilities. However, we wanted to note some of the main techniques and technologies that can be applied to harness big data to clarify the way some
of the levers for the use of big data that we describe might work. These are not comprehensive lists—the story of big data is still being written; new methods and tools continue to be developed to solve new problems. To help interested readers find a particular technique or technology easily, we have arranged these lists alphabetically. Where we have used bold typefaces, we are illustrating the multiple interconnections between techniques and technologies. We also provide a brief selection of illustrative examples of visualization, a key tool for understanding very large-scale data and complex analyses in order to make better decisions.
TECHNIQUES FOR ANALYZING BIG DATA
There are many techniques that draw on disciplines such as statistics and computer science (particularly machine learning) that can be used to analyze datasets. In this section, we provide a list of some categories of techniques applicable across a range of industries. This list is by no means exhaustive. Indeed, researchers continue to develop new techniques and improve on existing ones, particularly in response to the need
to analyze new combinations of data. We note that not all of these techniques strictly require the use of big data—some of them can be applied effectively to smaller datasets (e.g., A/B testing, regression analysis). However, all of the techniques we list here can be applied to big data and, in general, larger and more diverse datasets can be used to generate more numerous and insightful results than smaller, less diverse ones.
A/B testing. A technique in which a control group is compa ...
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
HI5030 Business Systems Analysis And Design.docxwrite4
This document summarizes 7 academic articles related to information architecture, UX/UI design, and methodologies for data collection and analysis. The articles discuss various approaches to evaluating information usefulness, blockchain adoption challenges, integrating chatbots for education, dual process models for addressing design problems, developing secure smart infrastructure projects, factors for technology business growth and survival, and optimizing UX/UI for customer satisfaction. The document analyzes the quantitative and qualitative methods used in each study and the key findings regarding information structure, interface design, and user experience.
At Ikeen Technologies, we combine expertise in various domains, including software development, web design, data analytics, artificial intelligence, and cloud computing, to offer comprehensive solutions that meet the unique needs of our clients. Our team of skilled professionals possesses deep industry knowledge and technical
Techeduxon is a cutting-edge technology company that specializes in developing innovative solutions and educational tools for the field of education. With a strong focus on integrating technology into learning environments, Techeduxon aims to enhance the educational experience for students and educators alike.
At Techeduxon, a team of passionate engineers, designers, and educators collaborate to create high-quality products that address the evolving needs of modern education. Their range of offerings includes software applications, interactive learning platforms, hardware devices, and curriculum resources.
This document discusses challenges and outlooks related to big data. It begins with an introduction describing how big data is being collected and analyzed in various fields such as science, education, healthcare, urban planning, and more. It then outlines the key phases in big data analysis: data acquisition and recording, information extraction and cleaning, data integration and representation, query processing and analysis, and result interpretation. For each phase, it discusses challenges and how existing techniques can be applied or extended to address big data issues. Some of the major challenges discussed are data scale, heterogeneity, lack of structure, privacy, timeliness, provenance, and visualization across the entire big data analysis pipeline.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
2. A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova
http://www.iaeme.com/IJCIET/index.asp 292 editor@iaeme.com
Cite this Article: A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova,
Managerial Decision Support Algorithm Based on Network Analysis and Big Data,
International Journal of Civil Engineering and Technology, 10(02), 2019, pp. 291–300
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=02
1. INTRODUCTION
In recent years, information systems have become significantly more important to support
managerial decisions. The role of innovative solutions and digitalization as well as the
introduction of new type information systems are shown in Akhmetshin et al. (2018);
Kolmakov et al. (2015); Miheeva et al. (2018); Polyakova et al. (2018); Sycheva et al. (2018)
[1, 2, 13, 16, 21, 26]. Analysis of the information received through traditional tools no longer
meets requirements of efficiency and maximum coverage, which makes these tools ineffective
in planning and controlling. According to Wong and Wang (2003) [27], the success of a
decision support system relies mainly on its capability to process large data sets and efficiently
extract useful knowledge from the data, especially knowledge which is previously unknown to
the decision makers. Tools and infrastructure have already been developed to collect, process
and store big data, which made it possible to build a system to determine and develop indicator
systems that allow decisions to be made taking into account the diversity of input data. Some
solutions and their methodological grounds are described in a number of works. For example,
Brunello et al. (2019) [7] present a data-driven decision support system for front office business
process outsourcing and a way to extend it to a decision management system. Demirkan and
Delen (2013) [9] provide rationale for data management systems’ integration with decision
support systems and propose a specific look at data management as a service within a company.
There are more and more studies aimed at finding alternative or specific tools to
substantiate solutions, as well as studies which show development software evaluation criteria
(Power, 2008; Bonczek et al., 1981) [22, 6]. For instance, in Seydel (2006) [23], the
multicriteria decision problem is described, and a typically descriptive (rather than
prescriptive) tool, data envelopment analysis, is summarized, along with a hypothetical but
typical example of a multicriteria decision. Authors discuss issues related to building a
decision-making model that assists in trade-offs between the pros and cons of open data
(Zuiderwijk and Janssen, 2015) [28], as well as the specifics of support systems in different
areas: healthcare (Berndt et al., 2003; Sun et al., 2010) [4, 25], construction management (Chau
et al., 2003) [8], security (Oatley et al., 2006) [18].
To discover the nature of signal propagation in technical systems, social network analysis
can also be used as a big data processing tool. In the social area, it can be applied to study
recognition of certain ideas, concepts and images, as well as to identify their distribution
channels. Network building and visualization are quite common in modern works, including
journalistic articles. But they do not fully reveal analytical and search capabilities of social
network analysis.
1.1. Big Data and Its Role in Building Analytics Systems
Today, many people believe that the problem of supporting management decisions can be
solved with digital resources and big data operationalization. Unlocking the potential of big
data – a massive amount of structured and unstructured information that is difficult to process
with traditional methods – has several advantages: online diagnostic results, analysis of the
entire data sets, not samples, the use of machine algorithms that can identify implicit
interactions.
3. Managerial Decision Support Algorithm Based on Network Analysis and Big Data
http://www.iaeme.com/IJCIET/index.asp 293 editor@iaeme.com
Big data analytics technologies make it possible to process and systematize large
unstructured data sets and reveal hidden patterns. Basically, we can say that dealing with big
data is related to solving three classes of tasks:
– storage of data that cannot be used efficiently through conventional relational databases;
– structuring or clustering data of various types (text, images, etc.)
– processing and analysis of data sets to identify hidden patterns, search for new
information (data mining), verify and adjust existing forecast and analytical models and make
predictions.
There are various data processing methods such as predictive analytics tools, query and
reporting tools, reconstruction tools with mathematical analogies, translation, analytical
processing, etc. All of them are associated with specific algorithms determined by the goals
and objectives of the analysis. In particular, images, social networks, geographical location
data, texts, statistical data, voice data can be subject to analytical processing. Both traditional
analytics tools and modern machine learning methods are applicable to receive deeper and less
obvious outcomes: A/B testing, association rule analysis, classification, cluster analysis, data
fusion and integration, data mining, genetic algorithms, machine learning, network analysis,
optimization, pattern recognition, sentiment analysis, signal processing, spatial analysis,
directional learning, etc. In some cases, data modeling can be applied. Modeling technologies
include artificial intelligence, cognitive neural networks and predictive models.
Social network analysis based on big data concepts creates special opportunities. It
efficiently supplements traditional approaches to data analysis, forecasting various socio-
economic processes and goal setting based on known functional dependencies.
1.2. Big Data Network Analysis as a Decision-Making Support Tool
Network analysis is based on graph theory, which is the study of graphs in discrete
mathematics. It was invented by L. Euler who introduced the problem of Seven Bridges of
Königsberg in 1736. A graph is represented as a set of vertices (nodes) connected by edges, a
network is defined as a set of nodes represented by any actors (individuals, organizations,
objects, etc.), and the nodes are interconnected by arcs (directed or indirected).
One of the first theories that formed the basis of network analysis is the six degrees of
separation theory proposed by S. Milgram and J. Travers in 1969. According to this theory,
any two people on the Earth are separated by only five levels of common acquaintances. The
modern concept of social network analysis is founded by Fienberg, Meyer and Wasserman
(1985) [10], further developed by Haythornthwaite (1996) [12] whose idea was to identify
information exchange routes to improve the delivery of information services. Later Otte and
Rousseau (2002) [19] postulated that social network analysis was not a formal theory in
sociology but rather a strategy for investigating social structures. Thy proposed its applicability
to transportation, services and communications development.
In the last decade, new data storage and processing algorithms and tools were developed.
They allow networks to be built based on big data. Building networks can lead to the following
results:
– Determination of agents of influence in networks (in social systems – opinion leaders);
– measuring the effectiveness of information distribution channels;
– Operational monitoring of reactions on different relevant issues;
– Analysis of transactions and other interactions between actors and their groups;
– object classification and clustering.
4. A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova
http://www.iaeme.com/IJCIET/index.asp 294 editor@iaeme.com
Yet several issues arise regarding business administration and decision-making. Bonchi et
al. (2011) [5] mention the lack of understanding of the potential business applications of mining
social networks and a gap between the techniques developed by the research community and
their deployment in real-world applications.
One specific usage of SNA adopted in this paper is known as “consensus formation, as well
as of collaborative decision-making process”, as in Shum et al. (2013) [24] who describe it as
the unique feature of combining knowledge organization with social mapping to provide
interesting insights on the social processes activated within a collaborative decision-making
initiative.
2. DATA USED AND DECISION-MAKING MODELING
In the empirical part of the study, the goal was to test social network analysis tools and develop
the research algorithm which can be applied to solve a wide range of analytical and search
tasks. It was achieved. Scientific works describe general models that can facilitate data
integration and implementation of results, as well as be the basis of implementation of
particular solutions. For example, in Liang (1985) [15], general framework for model
management was suggested. It can integrate model management and data management and
handle issues in model management such as model creation, model modification and model
use. A task to identify the image of Russia and its perception abroad in terms of its activities in
the Arctic became a pilot. It was assumed that reliable and detailed information based on
identified implicit connections would help to make right managerial decisions and form a state
program to support the activities of the Russian Federation in the Arctic.
In order to identify opinion leaders, study the architecture of connections between them
and make managerial decisions on the need for corrective actions or lack thereof, a list of
keywords or phrases that could become markers for further search was identified. To assess the
image of Russia in the Arctic, a set of 50 phrases was formed with the expert approach. These
phrases presumably characterize how Russia and its activities in the region are perceived
abroad. The study of relationships through a set of associations will allow the "cloud"
describing overall problems to be reached through several nodes.
The set involves all active actors who speak about the studied issues. This is a global
segment geographically represented by any country, but limited to the English-speaking
audience. Since the study object is the image of Russia in the Arctic abroad, and, as for
geopolitical interest, the most significant is the opinion of representatives from the North
Atlantic region (Europe, North America), Twitter was chosen as a media source.
The implementation of the managerial decision support algorithm based on network
analysis and big data involved:
– Assessment of the existing basic approaches to investigation of processes, based on multi-
criteria measurements
– Creation of the architecture of an innovative information analytical system to collect and
process big data extracted from the Internet
– Development of algorithms to collect, process, filter and analyze big data which
characterize the studied process
– Development of the concept of big data usage to support managerial decisions based on
prompt tracking and process assessment
– Justification of proposals for the integration of the proposed system into the information
support infrastructure for managerial decision-making.
5. Managerial Decision Support Algorithm Based on Network Analysis and Big Data
http://www.iaeme.com/IJCIET/index.asp 295 editor@iaeme.com
In the generalized algorithm of an information analytical system based on big data, there
are several components that involve data collection, storage, analysis and result visualization.
They are aimed at data collection from the Internet, enriching texts through linguistic
processing, fact extraction, transformations based on statistical research and transition from
business analysis to intuitive research. This classification is quite generalized since each
element can be represented as a subsystem and divided into subcomponents, and functions of
the subcomponents can migrate based on specifics of problems and software.
In order to solve the set tasks, particular software solutions were developed – data collection
and processing algorithms, as well as their implementation as a user interface. The functionality
of the developed software solutions ensured automation of the following actions:
1. Data collection algorithms for the following social networks: Twitter, Facebook,
Instagram.
2. Input data binding module (actors from different sources in one system).
3. Module for displaying / filtering / received database.
4. Tool for data export in XML / JSON / CSV for further analysis.
These procedures resulted in the database which the network is built on.
3. RESULTS AND DISCUSSION
The visualization of the actor network built on the keyword “Arctic” is shown in Figure 1 and
has over 4,000 edges in total. It should be noted that all actors and their messages are identified.
Their specific addresses and messages are not presented in the figure (only visual limitation).
However, they are contained in the database and each of them can be identified if necessary.
Figure 1. Unstructured visualization of the source data set network
Obviously, without structuring through special algorithms, the network gives limited
opportunities to interpret its connections and identify more or less homogeneous groups of
actors. Thus, in Figure 2, it becomes apparent that there are groups of actors which form some
sort of clusters.
6. A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova
http://www.iaeme.com/IJCIET/index.asp 296 editor@iaeme.com
Figure 2 Structured visualization of the source data set network
The use of clustering algorithms makes it possible to determine that over 40 clusters are
allocated in the studied data set, the largest of them are represented by a large number of actors
and the connections between them. The most representative are Clusters 1 (red in the center of
Figure 3), 2 (in the upper part of Figure 4) and Cluster 4 (in the lower part of Figure 3).
Figure 3 Clustering results
Clusters 1 and 2 have a common denominator related to global warming and Arctic ice
preservation. In particular, the first cluster is presented by the following message by the United
Nations Environment Programme and the social activity around it: "Arctic sea ice may vanish
during the summer this century even if #ParisAgreement target is met – scientists"). It is this
7. Managerial Decision Support Algorithm Based on Network Analysis and Big Data
http://www.iaeme.com/IJCIET/index.asp 297 editor@iaeme.com
message and the users' reactions to it – the further distribution of the message across its subnet
– form the most significant information driver in the data sample in the considered period.
Cluster 4 is also close to environmental issues, but, as part of it, problems of a possible
hydrocarbon exploration ban in Arctic Norway are discussed. It should be noted that the
division of actors into clusters does not mean the "uniqueness" of the subject of their discussion.
Thus, climate and environmental issues are predominant in the context of the word “Arctic” in
the English segment of Twitter. Other contexts include Arctic flora and fauna reflected in photo
collections. Very few actors consolidated around the opposition to the current US President D.
Trump consider the Arctic as a scene of geopolitical battles.
There are no politically oriented actors among ten actors with the highest popularity index
(in-degree) (see Table 1).
Table 1 Characteristics of the most popular actors in the sample
Actor In-degree
Prevalent subjects
of posts
Amount
Followers Posts
@unep
UN Environment
Program
116 Climate 604,000 21,300
@awwcuteness Aww Cuteness 59 Animal photos 332,000 23,300
@climatecentral Climate Central 54 Climate 60,600 46,800
@mwobs
Mount Washington
Observatory
52 Climate 9,205 1,851
@bendahanl Luci 39
Natura photos,
incl. the Arctic
42,600 119
@mjventrice Michael Ventrice 38
Метеорология
Meteorology
10,700 11,500
@foeeurope Friends of the Earth 34
Environmental
protection
24,900 7,070
@crystal_fishy Crystal Fish 34 Animal photos 37,100 364,000
@travelinglens Vivienne Gucwa 28 Nature photos 47,900 16,500
@unfccc
United Nations climate
change secretariat
26 Climate 368,000 19,000
The identified structure of information space does not show signs of a system policy, since,
in this network discourse, Russia's activities in the Arctic evince stereotypes about the country.
4. CONCLUSION
Promising areas and opportunities of research include:
1. Potential reconfiguration of connections based on building networks excluding impacts
from certain factors. The correspondence with the desired image can require reconfiguring the
connections on the basis of filtering influential factors. Assessment of the sensitivity of the
existing communication architecture and their strengths (network metrics) to a set of factors is
a task that allows an image to be modeled. Assessment of factor influence should make it
possible to develop recommendations for updating the strategy of promoting and developing a
new “collective” image.
2. One of the promising applications for the study results may be segmentation of the
information field, both according to obvious (geography, age, etc.) and non-obvious criteria
(information dissemination models, key actors and clusters, specifics of interests of a relevant
group).
8. A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova
http://www.iaeme.com/IJCIET/index.asp 298 editor@iaeme.com
3. It is also advantageous to compare the structure of networks built on a similar principle,
but for other objects (e.g. the perception of the US role in the Middle East). It is likely that
existing patterns of information dissemination and the formation of associative pairs may be of
interest in terms of their adaptation to development of the study problems. This area involves
the search for successful practices in the territory development by countries, the search for
successful brand promotion experience, identification of architectures of the existing networks
which describe these practices, and their distribution for existing problems.
4. The study of certain subgraphs (networks within a network) may be required in terms of
particular areas of influence on some aspects of the considered problem. For example, the study
of the subgraph of a political leader will help to form targeted recommendations. Furthermore,
many researchers associate further scientific progress in the issue with studying possible
communication architectures, their modeling and connections with specific situations.
A promising area for the development of systems based on big data may be their integration
with broader software and hardware solutions, which are information and analytical platforms
for unstructured data, including geo-informational, social behavioral data and natural language
data. Opportunities of new approaches to the study of phenomena in different spheres are
shown in studies by Kolmakov et al. (2019); Nikiforov et al. (2018); Polyakova and Simarova
(2014) [14, 17, 20]. This will help to fully use analytics based on available information,
visualize, aggregate and accumulate obtained results and process them with intelligent
mechanisms detecting hidden dependencies and patterns.
A significant area of the development of the functionality is integration with geographic
information systems and services that consider geolocation of objects, which can enrich
information and analytical resources of the managerial decision-making system through
potential analysis of movements using secondary data, spatial dynamics of public opinion,
accurate referencing, and systematization. This will allow processes to be modeled in dynamics
and in the future, taking into account the spatial factor.
REFERENCES
[1] Akhmetshin, E. M., Dzhavatov, D. K., Sverdlikova, E. A., Sokolov, M. S., Avdeeva, O. A.
and Yavkin, G. P. The influence of innovation on social and economic development of the
Russian regions. European Research Studies Journal, 21(Special Issue 2), 2018, pp. 767-
776.
[2] Akhmetshin, E. M., Kovalenko, K. E., Goloshchapova, L. V., Polyakova, A. G., Erzinkyan,
E. A. and Murzagalina, G. M. Approaches to social entrepreneurship in Russia and foreign
countries. Journal of Entrepreneurship Education, 21(Special Issue 2), 2018
[3] Akhmetshin, E. M., Kovalenko, K. E., Yavkin, G. P., Shchetinina, E. V., Borodina, N. V.
and Marochkina, S. S. Problems of formation driving skills in the educational process of
driving schools. Journal of Entrepreneurship Education, 21(Special Issue 2), 2018
[4] Berndt, D. J., Hevner, A. R. and Studnicki, J. The catch data warehouse: Support for
community health care decision-making. Decision Support Systems, 35(3), 2003, pp. 367-
384.
[5] Bonchi, F., Castillo, C., Gionis, A. and Jaimes, A. Social network analysis and mining for
business applications. ACM Transactions on Intelligent Systems and Technology, 2(3),
2011
[6] Bonczek, R. H., Holsapple, C. W. and Whinston, A. B. Generalized decision support
system using predicate calculus and network data base management. Operations Research,
29(2), 1981, pp. 263-281.
9. Managerial Decision Support Algorithm Based on Network Analysis and Big Data
http://www.iaeme.com/IJCIET/index.asp 299 editor@iaeme.com
[7] Brunello, A., Gallo, P., Marzano, E., Montanari, A. and Vitacolonna, N. An event-based
data warehouse to support decisions in multi-channel, multi-service contact centers. Journal
of Cases on Information Technology, 21(1), 2019, pp. 33-51.
[8] Chau, K. W., Cao, Y., Anson, M. and Zhang, J. Application of data warehouse and decision
support system in construction management. Automation in Construction, 12(2), 2003, pp.
213-224.
[9] Demirkan, H. and Delen, D. Leveraging the capabilities of service-oriented decision
support systems: Putting analytics and big data in cloud. Decision Support Systems, 55(1),
2013, pp. 412-421.
[10] Fienberg, S. E., Meyer, M. M. and Wasserman, S. S. Statistical analysis of multiple
sociometric relations. Journal of the American Statistical Association, 80(389), 1985, pp.
51-67.
[11] Granovetter, M. The impact of social structure on economic outcomes. Journal of
Economic Perspectives, 19(1), 2005, pp. 33-50.
[12] Debalina Banerjee, P. Jagadeesh and Ramamohan Rao .P, Risk Analysis and Decision
Support in Transportation Megaprojects, International Journal of Civil Engineering and
Technology, 8(7), 2017, pp. 836–845.
[13] Haythornthwaite, C. Social network analysis: An approach and technique for the study of
information exchange. Library and Information Science Research, 18(4), 1996, pp. 323-
342.
[14] Kolmakov, V. V., Polyakova, A. G. and Shalaev, V. S. An analysis of the impact of venture
capital investment on economic growth and innovation: Evidence from the USA and
Russia. Economic Annals, 60(207), 2015, pp. 7-37.
[15] Kolmakov, V. V., Polyakova, A. G., Karpova, S. V. and Golovina, A. N. Methodological
approach to cluster development based on competitive specialization of regions. Economy
of Region, 15(1), 2019.
[16] Lily Montarcih Limantara, Suwanto Marsudi and Apollinaris Didien Trimartini, Study Of
Development Planning Evaluation on the Utilization of Kali Baru River Basin with
Ribasim Decision Support System, International Journal of Civil Engineering and
Technology, 9(12), 2018, pp. 949–960
[17] Jugdeep Kaur and Seema Baghla, Modified Decision Table Classifier By Using Decision
Support and Confidence In Online Shopping Dataset. International Journal of Computer
Engineering & Technology, 8(6), 2017, pp. 83–88.
[18] Liang, T. Integrating model management with data management in decision support
systems. Decision Support Systems, 1(3), 1985, pp. 221-232.
[19] Miheeva, N. M., Voronkova, O. Y., Magsumov, T. A., Bulanakova, M. A., Kulchytskiy,
A. V. and Polyakova, A. G. Public diplomacy development stages through the black sea
economic cooperation organization. International Journal of Mechanical Engineering and
Technology, 9(11), 2018, pp. 1382-1391.
[20] Nikiforov, S. A., Larina, O. G., Yatsenko, K. V., Galiullin, R. R., Gabdulkhakov, R. B. and
Yavkin, G. P. Cultural revolution of stalinism in its regional context. International Journal
of Mechanical Engineering and Technology, 9(11), 2018, pp. 1229-1241.
[21] Bakhytzhan Akhmetov, Lazat Kydyralina, Valeriy Lakhno, Gennady Mohylnyi, Jamilya
Akhmetova and Anar Tashimova, Model for a computer decision support system on mutual
investment in the cybersecurity of educational institutions, International Journal of
Mechanical Engineering and Technology, 9(10), 2018, pp. 1114–1122.
[22] Oatley, G., Ewart, B. and Zeleznikow, J. Decision support systems for police: Lessons from
the application of data mining techniques to "soft" forensic evidence. Artificial Intelligence
and Law, 14(1-2), 2006, pp. 35-100.
10. A. G. Polyakova, M. P. Loginov, E. V. Strelnikov and N. V. Usova
http://www.iaeme.com/IJCIET/index.asp 300 editor@iaeme.com
[23] Otte, E. and Rousseau, R. Social network analysis: A powerful strategy, also for the
information sciences. Journal of Information Science, 28(6), 2002, pp. 441-453.
[24] Polyakova, A. G. and Simarova, I. S. The conceptual model of a region development
administration considering the level of spatial relatedness. Economy of Region, 2, 2014,
pp. 32-42.
[25] Polyakova, A. G., Akhmetshin, E. M., Goloshchapova, L. V., Rakhmeeva, I. I., Noeva, E.
E. and Rakovskiy, V. I. A model of regional economic space modernization. European
Research Studies Journal, 21(Special Issue 2), 2018, pp. 624-634.
[26] Power, D. J. Understanding data-driven decision support systems. Information Systems
Management, 25(2), 2008, pp. 149-154.
[27] Seydel, J. Data envelopment analysis for decision support. Industrial Management and Data
Systems, 106(1), 2006, pp. 81-95.
[28] Shum, S. B., Cannavacciuolo, L., De Liddo, A., Iandoli, L. and Quinto, I. Using social
network analysis to support collective decision-making process. In: Engineering effective
decision support technologies: New models and applications. IGI Global, 2013, pp. 87-103.
[29] Sun, J., Sow, D., Hu, J. and Ebadollahi, S. A system for mining temporal physiological data
streams for advanced prognostic decision support. IEEE International Conference on Data
Mining, ICDM, 2010, pp. 1061-1066.
[30] Sycheva, I. N., Ovchinnicov, Y. L., Voronkova, O. Yu., Akhmetshin, E. M., Kolmakov, V.
V. and Vasilieva, A. G. Economic potential and development prospects of small businesses
in rural areas. European Research Studies Journal, 21(4), 2018, pp. 292-303.
[31] Wong, A. K. C. and Wang, Y. Pattern discovery: A data driven approach to decision
support. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and
Reviews, 33(1), 2003, pp. 114-124.
[32] Zuiderwijk, A. and Janssen, M. Towards decision support for disclosing data: Closed or
open data? Information Polity, 20(2-3), 2015, pp. 103-117.