Browse Items (9795 total)
Sort by:
-
Data Modeling and Analysis for the Internet of Medical Things
Smart biomedical technology greatly assists in rapid disease screening and diagnosis within hospitals. One innovative device, a smart inhaler, incorporates sensors to track medication doses, usage patterns, and effectiveness. These inhalers provide valuable support to asthma sufferers, allowing for improved condition management and better patient outcomes. Asthma, a chronic respiratory disease affecting millions worldwide, causes airway constriction and swelling, resulting in breathing difficulties. Typically, medication such as inhaled corticosteroids and bronchodilators is used for management. However, medication adherence is often inadequate, leading to worsened outcomes and exacerbations. Smart inhalers aim to address this challenge by enabling users to monitor medication usage and compliance. Equipped with sensors, the inhalers track when, how much, and how frequently the prescribed medication is taken. The collected data is then transmitted to a mobile app or web portal, accessible to patients and healthcare providers. This integration facilitates medication tracking and provides personalized coaching for improved asthma control. The gathered data serves multiple purposes, including helping patients monitor their medication use and adherence. Patients can receive feedback on their treatment plan adherence and utilize the app to set medication reminders, promoting adherence and enhancing outcomes. 2024 CRC Press. -
Data Privacy
Data privacy is a private and public phenomenon and its operations have implications for the individual and the society. This understanding of privacy ceases it from being viewed as a simple technological process and highlights different factors that are associated with it. While on one hand, the right to privacy is seen as integral to the freedom of the individual, on the other hand, it is also seen as the ability to hide certain information for malpractice. This chapter delves into this existing dichotomy of data privacy and simplifies various terms and operations that have emerged in the field of study. A discussion is facilitated on the concept and its associated areas. The chapter looks at privacy regimes in different countries to note emerging developments and also presents a critique of the practice to bring forth shortcomings and enable change. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Data Reduction Techniques in Wireless Sensor Networks with AI
Due to their numerous uses in practically every part of life and their related problems, such as energy saving, a longer life cycle, and better resource usage, the research of wireless sensor networks is ongoing. Its extensive use successfully saves and processes a considerable volume of sensor data. Since the sensor nodes are frequently placed in challenging locations where less expensive resources are required for data collection and processing, this presents a new difficulty. One method for minimizing the quantity of sensor data is data reduction. A review of data reduction methods has been provided in this publication. The different data reduction approaches that have been put forth over the years have been examined, along with their advantages and disadvantages, ways in which they can be helpful, and whether or not using them in contexts with limited resources is worthwhile. 2022 IEEE. -
Data Science in the Medical Field
Data science has the potential to influence and improve fundamental services such as the healthcare sector. This book recognizes this fact by analyzing the potential uses of data science in healthcare. Every human body produces 2 TB of data each day. This information covers brain activity, stress level, heart rate, blood sugar level, and many other things. More sophisticated technology, such as data science, allows clinicians and researchers to handle such a massive volume of data to track the health of patients. The book focuses on the potential and the tools of data science to identify the signs of illness at an extremely early stage. 2025 Elsevier Inc. All rights are reserved including those for text and data mining AI training and similar technologies. -
Data science: simulating and development of outcome based teaching method
The educational researcher has a wealth of options to apply analytics to extract meaningful insights to improve teaching and learning due to the growing availability of educational data. Teaching analytics, in contrast to learning analytics, examines the quality of the classroom environment and the efficacy of the instructional methods used to improve student learning. To investigate the potential of analytics in the classroom without jeopardizing students' privacy, we suggest a data science strategy that uses simulated data using pseudocode to build test cases for educational endeavors. Hopefully, this method's findings will contribute to creating a teaching outcome model (TOM) that can be used to motivate and evaluate educator performance. In Splunk, the study's simulated methodology was carried out. Splunk is a real-time Big Data dashboard that can gather and analyze massive amounts of machine-generated data. We provide the findings as a set of visual dashboards depicting recurring themes and developments in classroom effectiveness. Our study's overarching goal is to help bolster a culture of data-informed decision-making at academic institutions by applying a scientific method to educational data. 2023 IEEE. -
Data science: the Artificial Intelligence (AI) algorithms-inspired use cases
The data science field is growing fast with the faster maturity and stability of its implementation technologies. We had been fiddling with traditional data analytics methods. But now, with Artificial Intelligence (AI), it is possible to embark on predictive and prescriptive insights generation in time. There are several data science (DS) use cases emerging with the wider adoption and adaptation of AI technologies and tools. This chapter is dedicated to illustrate various AI-inspired use cases. The Institution of Engineering and Technology 2022. -
Data Security
Corporates, industries, and governments have completely digitized their infrastructure, processes, and data or running towards completed digitalization. This data could be text files, different types of databases, accounts, and networks. The data living in the digital format needs to be preserved and also protected from unauthorized access. If this data remains open for access, any unauthorized user can destroy, encrypt, or corrupt the data, making the data unusable. There are implications of data security threats such as data breaches and data spills, beyond cost and can spell doom for the business. Hence the data needs to be protected from such threats. Data security is a mechanism through which data is protected and prevented from loss due to unauthorized access. It is a mix of practices and processes to ensure data remains protected from unauthorized use and readily accessible for authorized use. Data Security is essential for achieving data privacy in general. To define appropriate security measures, we must define the difference between a data breach and a data leak. Data security mechanisms could be data-centric such as identity and access management, encryption and tokenization, and backup and recovery. A defined data governance and compliance can also ensure data security. This chapter will explain why there is a need for data security, methods and processes to achieve data security, and touch upon some of the data security laws and regulations. We will also see a case study on how hackers exploited a vulnerability to mount a data security attack worldwide and how data security mechanisms could have prevented it. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Data Security-Based Routing in MANETs Using Key Management Mechanism
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire networks security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols. 2022 by the authors. Licensee MDPI, Basel, Switzerland. -
Data set on impact of COVID-19 on mental health of internal migrant workers in India: Corona Virus Anxiety Scale (CAS) approach
The article presents a unique dataset on mental health of internal Migrant workers in India. The dataset was constructed during the pandemic when the entire nation was the victim of stringent measures to curtail the spread of Corona Virus in the form of travel restrictions and lockdowns. We collected this data in our pursuit to submit a paper in response to call for paper in the Journal titled Migration and health. Non-availability of authentic data about the internal migrant workers triggered this effort to compile the data. We have recorded 1350 responses out of a 6897 Sample through snowball sampling method. Every respondent is said to be a referee for further driving of sample. The responses were collected between June 2 and August 30, 2020 through the telephonic interviews. Also, the consent of the respondents has been duly obtained for publication of the data without revealing their identity. The interview schedule was adopted by using Corona virus Anxiety Scale (CAS) which uses four dimension model namely Cognitive, Emotional, Behavioral and Psychological. The Interview schedule was originally designed in English but was later translated into three different languages after consulting the language experts. This article provides descriptive statistics of study variables along with socio economic factors. This dataset provides a significant platform for further research related to CAS and in assessment of mental health of vulnerable groups. 2021 -
Data visualization and toss related analysis of IPL teams and batsmen performances
Sports play a very significant role in the development of the human persona. Getting involved in games like Cricket and other various sports help us to build character, discipline, confidence and physical fitness. Indian Premier League, IPL provides the most successful form of cricket as it gives opportunities to young and talented players to show case their talents on various pitch. Decision-makers are the utmost customers for all fundamentals in the sports analytics framework. Sports analytics has been a smash hit in shaping success for many players and teams in various sports. Sports analytics and data visualization can play a crucial role in selecting the best players for a team. This paper is about the Toss Related analysis and the breadth of data visualization in supporting the decision makers for identifying inherent players for their teams. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Data visualization: Experiment to impose ddos attack and its recovery on software-defined networks
The entire network is doing paradigm shift towards the software-defined networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX [2], Ryu [3], Floodlight [4], Open- DayLight [6], ONOS [7] and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However, more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack. Springer Nature Singapore Pte Ltd. 2020. -
Data-driven behaviour finance for mutual fund investment decision making
When it comes to money and investing funds, the individual portfolio investor isn't always as logical as he feels he is, which is why there's a whole school of thought dedicated to explaining why people behave in irrational and weird ways. The primary objective of this research is to investigate the effects of five major behavioural biases on individual investor decisions in a metro city India, with a focus on mutual funds, as well as to examine how individuals make decisions to ensure that their investments generate greater returns for a better future. The statistical evidence shows that a variety of behavioural elements have a significant part in people' investment decision-making patterns, which has an impact on the population's economic situation. The purpose of this study is to illustrate how an individual's perspective, attitude, and conduct affect mutual fund investments. 2023, IGI Global. -
Data-Driven Decision Making
This book delves into contemporary business analytics techniques across sectors for critical decision-making. It combines data, mathematical and statistical models, and information technology to present alternatives for decision evaluation. Offering systematic mechanisms, it explores business contexts, factors, and relationships to foster competitiveness. Beyond managerial perspectives, it includes contributions from professionals, academics, and scholars worldwide, delivering comprehensive knowledge and skills through diverse viewpoints, cases, and applications of analytical tools. As an international business science reference, it targets professionals, academics, researchers, doctoral scholars, postgraduate students, and research organizations seeking a nuanced understanding of modern business analytics. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Data-Driven Decision Making in the VUCA Context: Harnessing Data for Informed Decisions
Data-driven decision making (DDDM) has evolved from being a strategic advantage to a necessity for organizations aiming to thrive in the dynamic business contexts. It is about using data as a tool to enhance strategic thinking, scenario planning, and adaptation in rapidly changing environments. It involves leveraging data and analytics to navigate the challenges of volatility, uncertainty, complexity, and ambiguity. By embracing DDDM, organizations can enhance their decision-making processes, gain a competitive edge, and navigate the challenges of volatility, uncertainty, complexity, and ambiguity with greater confidence. However, successful implementation requires addressing challenges, fostering a data-driven culture, and continually adapting best practices to meet the evolving demands of the VUCA environment. This chapter discusses how organizations leverage DDDM in VUCA context to support effective and rapid decision making aligned with organizations vision. Particularly, it would offer insights to transit from volatility to vision, uncertainty to understanding, complexity to clarity, and ambiguity to agility. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Data: A Key to HR Analytics for Talent Management
The past few years have witnessed a significant rise in job openings across various industries worldwide. This trend has highlighted the need for companies to plan and recruit better talent to keep up with the demand for skilled employees. As a result, Human Resource (HR) professionals are now using workforce planning and HR analytics to address the challenges of finding and retaining the right employees. With the help of technological advancements in HR systems, businesses are leveraging data and insights to understand workplace dynamics better. Workforce planning has thus become crucial for organizations of all sizes to ensure they have the necessary talent to achieve their goals in the present and future. This chapter delves deeper and examines the importance of workforce planning and how HR analytics can help companies achieve their strategic objectives. Talent Management is about analyzing the workforce skill requirements of the organization. It needs a strategic plan to ensure the appropriate people are in the right roles at the right times. Talent Management is a crucial element of every businesss performance. In this process, data play a pivotal role in evaluating the existing workforce and planning for future workforce needs. Based on this, a strategy is developed to fill gaps or prospective shortages. Organizations can achieve their goals by using talent planning and collecting data about upcoming projects and skill requirements based on market needs. For example, talent planning is essential in the healthcare sector to guarantee that hospitals and clinics have enough doctors, nurses, and other healthcare workers to fulfill the rising demand for healthcare services. HR analytics is the key to talent management, enabling organizations to stay competitive, enhance productivity, and achieve long-term strategic objectives. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Data: An Anchor for Decision- Making to Build the Future Workforce Management System
In this digital era, the change in business environments and the nature of work lead to skill gaps. Training the workforce on desired skill sets must fill these skill gaps. Data play a crucial role in identifying the skills needed and helping organizations to plan the future workforce. Data is essential for any organizations growth and success in the dynamic market. Knowing the skill set in advance allows organizations and individuals to plan the business and skill requirements well. The way work is done may be impacted by these structural changes as the world is changing swiftly. Building the abilities necessary for the uncertain environments of the present and future environments is also crucial for training the employees. However, such skills must first be acknowledged and appreciated before being developed. Empirical data must support the methodology for valuing such abilities and skills. This chapter outlines the significance of data in skill identification for individuals to be future-ready. Finding the most relevant abilities in a given environment is the first step toward their formalization and acceptance at the systems level. It also presents the importance of creating skill matrices for students and organizations. The skill matrix objectively quantifies skill value for specific occupations and the possible trajectories to acquire those skill sets. This metric will allow policymakers to navigate this fast-changing workforce landscape and focus resources to ensure that skills are needed as students transition into the workforce and have skills that enable them to transition. 2024 selection and editorial matter, Alex Khang, Sita Rani, Rashmi Gujrati, Hayri Uygun, and Shashi Kant Gupta; individual chapters, the contributors. -
Database aware memory reconstruction for object oriented programming paradigm
Data storage is a big challenge in front of industries and researchers when its growing enormously. Traditional data storage strategy was fulfilling the business needs till the data was in structured format. But now due to Internet of Things (IoT) compatible devices unstructured data is more than structured one. In such cases traditional data storage strategy won't work efficiently. Initially data storage devices used to store the data irrespective of its logical storage. It means the record was stored either in array format or block format. Such type of storage was not matching physical and logical structure. Logically, structured data is generated as an attribute of particular entity, but physically it gets stored in a sequential memory storage either as file or as memory block. Object Based Storage pattern(OBS) stores the data in the way object gets generated by the programmer and accordingly memory is allocated for that object. Object contains all the data related to that particular entity which makes it easy to retrieve it back. Current study includes comparative advantages, operations and study of different service providers of object-based storage. We also focused on the current need of object-based storage structure for big data analysis and cloud computing. International Journal of Scientific and Technology Research. All rights reserved. -
Dataset exploring organizational culture of K-12 schools
Culture can be understood as an explicit social product arising from social interaction as an intentional or unintentional consequence of behavior. Educational Institutions culture differs from other organizational cultures as it impacts teachers' performance and students' learning. In this survey the definition of organizational culture used is given by Schein, The deeper level of basic assumptions and beliefs that are, learned responses to the group's problems of survival in its external environment and its problems of internal integration; are shared by members of an organization; that operate unconsciously; and that define in a basic taken -for-granted fashion in an organization's view of itself and its environment [1]. The data contains 1158 cases collected from K-12 School teachers on their perception of values and beliefs of their organizational culture using the OCTAPACE scale. Convenience sampling is used to obtain the data from teachers. The questionnaire was administered personally to teachers from sixty-five Private aided, Private unaided and Government schools. The eight dimensions measuring values and beliefs of Educational Institutions organizational culture are Pro-action, Authenticity, Openness, Collaboration, Experimenting, Trust, Confrontation and Autonomy. Descriptive statistics are computed from the dataset. The dataset can be used by researchers for meta analysis on organizational culture and school management can explore in depth the need for an organizational culture of autonomy, experimenting, collaboration and openness among teachers. 2022 The Authors -
Date Palm: Genomic Designing for Improved Nutritional Quality
Date palm (Phoenix dactylifera L.) is one of the oldest fruit trees known where a significant amount of breeding has been carried out to improve various agronomic and nutritional characteristics. Numerous studies have been done to improve the nutritional composition and quality of the fruit due to its significant biological properties. Various strategies have been formulated for improving the agronomic characters through biofortification as well as preserving through postharvesting techniques. Modern breeding practices using molecular markers have significantly helped to identify the phenotypic, as well as genotypic, diversity for the selection of superior date palm cultivars, advanced agronomic characters like nutritional quality, disease resistance, and yield. Availability of the whole genome sequence, organellar sequence, and genetic map of date palm has helped breeders in modification and improvement of the characteristics. With the availability of bioinformatic tools and gene editing knowledge, the nutritional composition of date palm can be effectively manipulated to develop better crops along with good agronomic characters and resistance to diseases. The authors have compiled the nutritional composition of date palm fruits and detail the strategies to edit the genome and improve nutritional quality. Springer Nature Singapore Pte Ltd. 2023. -
DATING APPS, FORMS OF ABUSE AND PERSONALITY TYPE
[No abstract available]