115 research outputs found

    A Contractual Dilemma: Where Arbitration Agreements and Delegation Provisions Collide

    Get PDF
    Interpretation of arbitration agreements continues to present unique and challenging issues in Missouri law. Arbitration is a mainstay of the wider field of alternative dispute resolution, seeking to merge the competing interests of would-be litigants in a speedier, less expensive, less formalized environment. Delegation provisions, however, serve as an additional analytical hurdle in determining when and what disputes can be rightfully sent to arbitration. At first glance, a seemingly irreconcilable dilemma is presented. Must assent to the arbitration agreement, and thus the delegation provision, exist before the dispute will be sent to arbitration? Or is the simple appearance of a delegation provision, combined with an absence of an explicit challenge to that same provision, per se sufficient to send the arbitrability dispute to the arbitrator

    Risky Business: Breakfast Sandwiches, Course of Employment, and Revisiting Missouri Workers’ Compensation Law

    Get PDF
    Since its inception, the Missouri Workers’ Compensation scheme has presented interesting and complex problems regarding workplace risk allocation. To avoid workplace injuries, employees and employers engage in significant preventative behaviors. One such action by employers is employee monitoring. Clearly, however, constant workplace monitoring is not feasible. This inherent limitation leads to this Note’s initial inquiry: at what point do the actions of employees taken out of sight of their employers create compensable claims under the existing Missouri Workers’ Compensation system, and what inefficiencies may result from requiring that employers provide compensation for the injuries that arise from such actions? Boothe v. DISH Network, Inc. provided a new perspective on this question while evaluating an employee’s claim deriving from a vehicular accident

    Administration Security Issues in Cloud Computing

    Get PDF
    This paper discover the most administration security issues in Cloud Computing in term of trustworthy and gives the reader a big visualization of the concept of the Service Level Agreement in Cloud Computing and it’s some security issues. Finding a model that mostly guarantee that the data be saved secure within setting for factors which are data location, duration of keeping the data in cloud environment, trust between customer and provider, and procedure of formulating the SLA

    Enhancing Hadoop MapReduce Performance for Scientific Data using NoSQL Database

    Get PDF
    Scientific data sets usually have similar jobs that are frequently applied to the data by different users. In addition, many of these data sets are unstructured, complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. In this poster, we represent a Hadoop MapReduce environment that uses genomic and biological data as an example of unstructured and complex data

    Improving Hadoop Performance by Using Metadata of Related Jobs in Text Datasets Via Enhancing MapReduce Workflow

    Get PDF
    Cloud Computing provides different services to the users with regard to processing data. One of the main concepts in Cloud Computing is BigData and BigData analysis. BigData is a complex, un-structured or very large size of data. Hadoop is a tool or an environment that is used to process BigData in parallel processing mode. The idea behind Hadoop is, rather than send data to the servers to process. Hadoop divides a job into small tasks and sends them to servers. These servers contain data, process the tasks and send the results back to the master node in Hadoop. Hadoop contains some limitations that could be developed to have a higher performance in executing jobs. These limitations are mostly because of data locality in the cluster, jobs and tasks scheduling, CPU execution time, or resource allocations in Hadoop. Data locality and efficient resource allocation remains a challenge in cloud computing MapReduce platform. We propose an enhanced Hadoop architecture that reduces the computation cost associated with BigData analysis. At the same time, the proposed architecture addresses the issue of resource allocation in native Hadoop. The proposed architecture provides an efficient distributed clustering approach for dedicated cloud computing environments. Enhanced Hadoop architecture leverages on NameNode’s ability to assign jobs to the TaskTrakers (DataNodes) within the cluster. By adding controlling features to the NameNode, it can intelligently direct and assign tasks to the DataNodes that contain the required data. Our focus is on extracting features and building a metadata table that carries information about the existence and the location of the data blocks in the cluster. This enables NameNode to direct the jobs to specific DataNodes without going through the whole data sets in the cluster. It should be noted that newly build lookup table is an addition to the metadata table that already exists in the native Hadoop. Our development is about processing real text in text data sets that might be readable such as books, or not readable such as DNA data sets. To test the performance of proposed architecture, we perform DNA sequence matching and alignment of various short genome sequences. Comparing with native Hadoop, proposed Hadoop reduced CPU time, number of read operations, input data size, and another different factors

    Computational Prediction Algorithms and Tools Used in Educational Data Mining: A Review

    Get PDF
     في الأيام الأخيرة ، ظهرت مجموعة متنوعة من الأدوات لأغراض أداء التنقيب عن البيانات التعليمية (EDM). تظهر أنظمة التعليم الحالية أن هناك عدة عوامل تؤثر على أداء الطلاب. أولاً وقبل كل شيء ، يحتاج الطلاب إلى الدافع من أجل التعلم وهذا الدافع  يؤدي إلى نجاحهم. يعد التنبؤ بأداء الطلاب مجالًا مهمًا للبحث في استخراج البيانات التعليمية ، لا سيما من خلال تطبيق تقنيات التنقيب عن البيانات المختلفة. تركز غالبية أبحاث EDM على خوارزميات التنبؤ. يقدم العمل الحالي مراجعة لخوارزميات التنقيب في البيانات والأدوات التي تم تبنيها في  EDM . كما يوفر نظرة ثاقبة للخوارزميات وأدوات التنقيب عن البيانات القوية الأكثر استخدامًا في التنبؤ بأداء الطلاب . سيكون هذا مفيدًا بشكل أساسي للمعلمين والمرشدين والمؤسسات ، مما يزيد من مستويات الطلاب الدراسية.Abstract In recent days, a wide variety of tools have appeared for performing educational data mining (EDM) . The current education systems show that there are several factors affecting students’ performances. First and foremost, students need motivation in order to learn  and this  motivation results into their success.  The prediction of student performances is an important field of research in Educational Data Mining, particularly through the application of different data mining techniques. The majority of EDM research focuses on prediction algorithms. The current work presents a review of the data mining predicting algorithms and tools that have been adopted in EDM. It also provides insight into the algorithms and powerful data mining tools that most widely used in student performance prediction. This will mainly be of use for  educators, instructors and institutions, increasing the students’ levels of study

    Internet of Things Communication Reference Model and Traffic Engineer System (TES)

    Get PDF
    Abstract. One of the biggest challenges facing Internet of is the existing infrastructure of Internet and its mechanism of action. This paper proposes a new system, which sends the full Internet best path (between source and destination objects) to source object on IoT. This will help data of source object to reach its final destination object faster. This system saves most of recalculation of the Internet best paths again and again in the Internet Routers during a data trip. The authors call this system Traffic Engineer System (TES). The most important effect of this system is that it changes the form of "Internet of Things Communication Reference Model". This paper merges two addressing layers (IP/ID and Link) from this model in one new layer; where routers transition data through one address and the data have its full best path

    Impact of Aspiration in the Assessing Process of Pediatric Lung Disease

    Get PDF
    This study aimed at analyzing the impact of Aspiration in the assessing process of pediatric lung disease, as the affected children will frequently encounter a situation where swallowing is insecure and aspiration is likely. Besides analyzing the Aspiration of foreign matter into the airways and lungs that can cause a wide spectrum of pulmonary disorders with various presentations. And discussing the type of syndrome resulting from aspiration depends on the quantity and nature of the aspirated material, the chronicity, and the host responses. Considering that Aspiration is most likely to occur in subjects with a decreased level of consciousness, compromised airway defense mechanisms, dysphagia, gastroesophageal reflux, and recurrent vomiting

    Anti-infective and cytotoxic properties of Bupleurum marginatum

    Get PDF
    Bupleurum marginatum Wall. ex DC (Apiaceae) is a perennial herb widely used in traditional Chinese and Kampo medicine for the treatment of various infectious diseases. The biological activities of B. marginatum have not been fully investigated. This study aims to investigate the antitrypanosomal, antimicrobial and antiviral activities of methanol (ME) and dichloromethane (DCM) extracts of B. marginatum aerial parts and the ability of both extracts to inhibit the growth of different cancer cell lines. Methods Phytochemical characterization of the extracts was performed by LC-MS profiling. The antitrypanosomal activity was evaluated using the resazurin method. The antimicrobial activity was assessed using agar diffusion and microdilution methods, and the minimum inhibitory concentration (MIC) values were determined. The antiviral activity was determined for 6.25, 12.5, and 50 μg/mL doses using a plaque reduction assay. Cytotoxicity was investigated in eight cancer cell lines (Caco-2, CCL-81, CCRF-CEM, COS-7, HL-60, MIA PaCa-2, MCF-7, and PANC-1) using the MTT assay and the caspase 3/7 activity was determined over the range of 62.5–1000 μg/mL. Results Phytochemical analyses resulted in the characterization of 15 components, mainly flavonoids and lignans. The DCM extract showed significant antitrypanosomal activity (IC50: 36.21 μg/mL) and moderate activity against Streptococcus pyogenes (MIC value: 0.25 mg/mL). At a dose of 12.5 μg/mL, the DCM extract inhibited 73.6% of the plaque production by hepatitis A virus. CCRF-CEM cells were the most sensitive to both extracts (IC50: 12.5–22.7 μg/mL). The cytotoxicity was mediated by induction of apoptosis (19-fold increase in the cellular caspase 3/7 level after treatment with the DCM extract at 1 mg/mL). Conclusions ME and DCM extract of B. marginatum showed anti-infective and antiproliferative effects

    Developing a Collaborative Strategy to Manage and Preserve Cultural Heritage During the Libyan Conflict. The Case of the Gebel Nafusa

    Get PDF
    The paper discusses the potential of a collaborative scheme for the development of a protocol for recording and managing the cultural heritage in Libya. The critical political situation in the country urges the development of cultural heritage management policies in order to protect it more thoroughly and consistently. Moving on from the numerous international initiatives and projects dealing with a mostly “remote” approach to the issue, the project here presented to engages with staff members of the Department of Antiquities (DoA) in the development of a joint strategy for the application of remote sensing and geographical information systems (GIS) to the preservation and monitoring of Libyan cultural heritage. A series of training courses resulted in an initial development of new ways of recording and analysing field data for a better awareness of the full range of threats that the archaeology of the country is subject to. Focussing on the case of the Jebel Nafusa, the training involved the assessment of site visibility on satellite imagery, the analysis of high-resolution satellite datasets for archaeological mapping, the creation of a GIS spatial database of field data, and the mapping of risks and threats to archaeology from remote sensing data. This led to the creation of of a risk map showing the areas that are affected by a number of threats, thus giving the DoA a tool to prioritise future fieldwork to keep the assessment of site damage up to date. Only a collaborative approach can lead to a sustainable strategy for the protection of the invaluable cultural heritage of Libya
    corecore