Search results for: incremental information content
13136 Evaluating the Impact of Judicial Review of 2003 “Radical Surgery” Purging Corrupt Officials from Kenyan Courts
Authors: Charles A. Khamala
Abstract:
In 2003, constrained by an absent “rule of law culture” and negative economic growth, the new Kenyan government chose to pursue incremental judicial reforms rather than comprehensive constitutional reforms. President Mwai Kibaki’s first administration’s judicial reform strategy was two pronged. First, to implement unprecedented “radical surgery,” he appointed a new Chief Justice who instrumentally recommended that half the purportedly-corrupt judiciary should be removed by Presidential tribunals of inquiry. Second, the replacement High Court judges, initially, instrumentally-endorsed the “radical surgery’s” administrative decisions removing their corrupt predecessors. Meanwhile, retention of the welfare-reducing Constitution perpetuated declining public confidence in judicial institutions culminating in refusal by the dissatisfied opposition party to petition the disputed 2007 presidential election results, alleging biased and corrupt courts. Fatefully, widespread post-election violence ensued. Consequently, the international community prompted the second Kibaki administration to concede to a new Constitution. Suddenly, the High Court then adopted a non-instrumental interpretation to reject the 2003 “radical surgery.” This paper therefore critically analyzes whether the Kenyan court’s inconsistent interpretations–pertaining to the constitutionality of the 2003 “radical surgery” removing corruption from Kenya’s courts–was predicated on political expediency or human rights principles. If justice “must also seen to be done,” then pursuit of the CJ’s, Judicial Service Commission’s and president’s political or economic interests must be limited by respect for the suspected judges and magistrates’ due process rights. The separation of powers doctrine demands that the dismissed judges should have a right of appeal which entails impartial review by a special independent oversight mechanism. Instead, ignoring fundamental rights, Kenya’s new Supreme Court’s interpretation of another round of vetting under the new 2010 Constitution, ousts the High Court’s judicial review jurisdiction altogether, since removal of judicial corruption is “a constitutional imperative, akin to a national duty upon every judicial officer to pave way for judicial realignment and reformulation.”Keywords: administrative decisions, corruption, fair hearing, judicial review, (non) instrumental
Procedia PDF Downloads 48213135 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications
Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani
Abstract:
In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks
Procedia PDF Downloads 10113134 Healthcare Providers’ Perception Towards Utilization of Health Information Applications and Its Associated Factors in Healthcare Delivery in Health Facilities in Cape Coast Metropolis, Ghana
Authors: Richard Okyere Boadu, Godwin Adzakpah, Nathan Kumasenu Mensah, Kwame Adu Okyere Boadu, Jonathan Kissi, Christiana Dziyaba, Rosemary Bermaa Abrefa
Abstract:
Information and communication technology (ICT) has significantly advanced global healthcare, with electronic health (e-Health) applications improving health records and delivery. These innovations, including electronic health records, strengthen healthcare systems. The study investigates healthcare professionals' perceptions of health information applications and their associated factors in the Cape Coast Metropolis of Ghana's health facilities. Methods: We used a descriptive cross-sectional study design to collect data from 632 healthcare professionals (HCPs), in the three purposively selected health facilities in the Cape Coast municipality of Ghana in July 2022. Shapiro-Wilk test was used to check the normality of dependent variables. Descriptive statistics were used to report means with corresponding standard deviations for continuous variables. Proportions were also reported for categorical variables. Bivariate regression analysis was conducted to determine the factors influencing the Benefits of Information Technology (BoIT); Barriers to Information Technology Use (BITU); and Motives of Information Technology Use (MoITU) in healthcare delivery. Stata SE version 15 was used for the analysis. A p-value of less than 0.05 served as the basis for considering a statistically significant accepting hypothesis. Results: Healthcare professionals (HCPs) generally perceived moderate benefits (Mean score (M)=5.67) from information technology (IT) in healthcare. However, they slightly agreed that barriers like insufficient computers (M=5.11), frequent system downtime (M=5.09), low system performance (M=5.04), and inadequate staff training (M=4.88) hindered IT utilization. Respondents slightly agreed that training (M=5.56), technical support (M=5.46), and changes in work procedures (M=5.10) motivated their IT use. Bivariate regression analysis revealed significant influences of education, working experience, healthcare profession, and IT training on attitudes towards IT utilization in healthcare delivery (BoIT, BITU, and MoITU). Additionally, the age of healthcare providers, education, and working experience significantly influenced BITU. Ultimately, age, education, working experience, healthcare profession, and IT training significantly influenced MoITU in healthcare delivery. Conclusions: Healthcare professionals acknowledge moderate benefits of IT in healthcare but encounter barriers like inadequate resources and training. Motives for IT use include staff training and support. Bivariate regression analysis shows education, working experience, profession, and IT training significantly influence attitudes toward IT adoption. Targeted interventions and policies can enhance IT utilization in the Cape Coast Metropolis, Ghana.Keywords: health information application, utilization of information application, information technology use, healthcare
Procedia PDF Downloads 6513133 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain
Authors: M. Pushparani, A. Sagaya
Abstract:
Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems
Procedia PDF Downloads 28513132 Studies on the Use of Sewage Sludge in Agriculture or in Incinerators
Authors: Catalina Iticescu, Lucian Georgescu, Mihaela Timofti, Dumitru Dima, Gabriel Murariu
Abstract:
The amounts of sludge resulting from the treatment of domestic and industrial wastewater can create serious environmental problems if no solutions are found to eliminate them. At present, the predominant method of sewage sludge disposal is to store and use them in agricultural applications. The sewage sludge has fertilizer properties and can be used to enrich agricultural soils due to the nutrient content. In addition to plant growth (nitrogen and phosphorus), the sludge also contains heavy metals in varying amounts. An increasingly used method is the incineration of sludge. Thermal processes can be used to convert large amounts of sludge into useful energy. The sewage sludge analyzed for the present paper was extracted from the Wastewater Treatment Station (WWTP) Galati, Romania. The physico-chemical parameters determined were: pH (upH), nutrients and heavy metals. The determination methods were electrochemical, spectrophotometric and energy dispersive X–ray analyses (EDX). The results of the tests made on the content of nutrients in the sewage sludge have shown that existing nutrients can be used to increase the fertility of agricultural soils. The conclusion reached was that these sludge can be safely used on agricultural land and with good agricultural productivity results. To be able to use sewage sludge as a fuel, we need to know its calorific values. For wet sludge, the caloric power is low, while for dry sludge it is high. Higher calorific value and lower calorific value are determined only for dry solids. The apparatus used to determine the calorific power was a Parr 6755 Solution Calorimeter Calorimeter (Parr Instrument Company USA 2010 model). The calorific capacities for the studied sludge indicate that they can be used successfully in incinerators. Mixed with coal, they can also be used to produce electricity. The advantages are: it reduces the cost of obtaining electricity and considerably reduces the amount of sewage sludge.Keywords: agriculture, incinerators, properties, sewage sludge
Procedia PDF Downloads 17113131 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 30613130 Gender Roles in Modern Indian Marriages
Authors: Parul Bhandari
Abstract:
An image of a modern and progressive India garners the rhetoric of ‘choice’ marriages, gender egalitarian relationships, and search for ‘love’ in conjugal unions. Such an image especially resonates with the lives of young professionals, who, largely belonging to the middle class, consider themselves to be the global face India. While this rhetoric of ‘progress’ and ‘love’ is abounding in both Indian and non-Indian public discourses, it is imperative to scientifically analyse the veracity of these claims. This paper thus queries and problematises the notions of being modern and progressive, through the lens of gender roles as expected and desired in a process of matchmaking. The fieldwork conducted is based on qualitative methodology, involving in-depth interviews with 100 highly qualified professionals, (60 men and 40 women), between the age of 24-31, belonging to the Hindu religion and of varied castes and communities, who are residing in New Delhi, and are in the process of spouse-selection or have recently completed it. Further, an analysis of the structure and content of matrimonial websites, which have fast emerged as the new method of matchmaking, was also undertaken. The main finding of this paper is that gender asymmetries continue to determine a suitable match, whether in ‘arranged’ or ‘love’ marriages. This is demonstrated by analysing the expectations of gender roles and gender practices of both men and women, to construct an ideal of a ‘good match’. On the basis of the interviews and the content of matrimonial websites, the paper discusses the characteristics of a ‘suitable boy’ and a ‘suitable girl’, and the ways in which these are received (practiced or criticised) by the young men and women themselves. It is then concluded that though an ideal of ‘compatibility’ and love determines conjugal desires, traditional gender roles, that, for example, consider men as the primary breadwinner and women as responsible for the domestic sphere, continue to dictate urban Indian marriages.Keywords: gender, India, marriage, middle class
Procedia PDF Downloads 27013129 “I” on the Web: Social Penetration Theory Revised
Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology
Abstract:
The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information
Procedia PDF Downloads 37213128 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure
Authors: Jiri Barta, Jiří F. Urbanek
Abstract:
This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity
Procedia PDF Downloads 29913127 Sustainability Impact Assessment of Construction Ecology to Engineering Systems and Climate Change
Authors: Moustafa Osman Mohammed
Abstract:
Construction industry, as one of the main contributor in depletion of natural resources, influences climate change. This paper discusses incremental and evolutionary development of the proposed models for optimization of a life-cycle analysis to explicit strategy for evaluation systems. The main categories are virtually irresistible for introducing uncertainties, uptake composite structure model (CSM) as environmental management systems (EMSs) in a practice science of evaluation small and medium-sized enterprises (SMEs). The model simplified complex systems to reflect nature systems’ input, output and outcomes mode influence “framework measures” and give a maximum likelihood estimation of how elements are simulated over the composite structure. The traditional knowledge of modeling is based on physical dynamic and static patterns regarding parameters influence environment. It unified methods to demonstrate how construction systems ecology interrelated from management prospective in procedure reflects the effect of the effects of engineering systems to ecology as ultimately unified technologies in extensive range beyond constructions impact so as, - energy systems. Sustainability broadens socioeconomic parameters to practice science that meets recovery performance, engineering reflects the generic control of protective systems. When the environmental model employed properly, management decision process in governments or corporations could address policy for accomplishment strategic plans precisely. The management and engineering limitation focuses on autocatalytic control as a close cellular system to naturally balance anthropogenic insertions or aggregation structure systems to pound equilibrium as steady stable conditions. Thereby, construction systems ecology incorporates engineering and management scheme, as a midpoint stage between biotic and abiotic components to predict constructions impact. The later outcomes’ theory of environmental obligation suggests either a procedures of method or technique that is achieved in sustainability impact of construction system ecology (SICSE), as a relative mitigation measure of deviation control, ultimately.Keywords: sustainability, environmental impact assessment, environemtal management, construction ecology
Procedia PDF Downloads 39313126 Potential Application of Artocarpus odoratisimmus Seed Flour in Bread Production
Authors: Hasmadi Mamat, Noorfarahzilah Masri
Abstract:
The search for lesser known and underutilized crops, many of which are potentially valuable as human and animal foods has been the focus of research in recent years. Tarap (Artocarpus odoratisimmus) is one of the most delicious tropical fruit and can be found extensively in Borneo, particularly in Sabah and Sarawak. This study was conducted in order to determine the proximate composition, mineral contents as well as to study the effect of the seed flour on the quality of bread produced. Tarap seed powder (TSP) was incorporated (up to 20%) with wheat flour and used to produce bread. The moisture content, ash, protein, fat, ash, carbohydrates, and dietary fiber were measured using AOAC methods while the mineral content was determined using AAS. The effect of substitution of wheat flour with Tarap seed flour on the quality of dough and bread was investigated using various techniques. Farinograph tests were applied to determine the effect of seaweed powder on the rheological properties of wheat flour dough, while texture profile analysis (TPA) was used to measure the textural properties of the final product. Besides that sensory evaluations were also conducted. On a dry weight basis, the TSP was composed of 12.50% moisture, 8.78% protein, 15.60% fat, 1.17% ash, 49.65% carbohydrate and 12.30% of crude fiber. The highest mineral found were Mg, followed by K, Ca, Fe and Na respectively. Farinograh results found that as TSP percentage increased, dough consistency, water absorption capacity and development time of dough decreased. Sensory analysis results showed that bread with 10% of TSP was the most accepted by panelists where the highest acceptability score were found for aroma, taste, colour, crumb texture as well as overall acceptance. The breads with more than 10% of TSP obtained lower acceptability score in most of attributes tested.Keywords: tarap seed, proximate analysis, bread, sensory evaluation
Procedia PDF Downloads 18213125 A Methodological Approach to Development of Mental Script for Mental Practice of Micro Suturing
Authors: Vaikunthan Rajaratnam
Abstract:
Intro: Motor imagery (MI) and mental practice (MP) can be an alternative to acquire mastery of surgical skills. One component of using this technique is the use of a mental script. The aim of this study was to design and develop a mental script for basic micro suturing training for skill acquisition using a low-fidelity rubber glove model and to describe the detailed methodology for this process. Methods: This study was based on a design and development research framework. The mental script was developed with 5 expert surgeons performing a cognitive walkthrough of the repair of a vertical opening in a rubber glove model using 8/0 nylon. This was followed by a hierarchal task analysis. A draft script was created, and face and content validity assessed with a checking-back process. The final script was validated with the recruitment of 28 participants, assessed using the Mental Imagery Questionnaire (MIQ). Results: The creation of the mental script is detailed in the full text. After assessment by the expert panel, the mental script had good face and content validity. The average overall MIQ score was 5.2 ± 1.1, demonstrating the validity of generating mental imagery from the mental script developed in this study for micro suturing in the rubber glove model. Conclusion: The methodological approach described in this study is based on an instructional design framework to teach surgical skills. This MP model is inexpensive and easily accessible, addressing the challenge of reduced opportunities to practice surgical skills. However, while motor skills are important, other non-technical expertise required by the surgeon is not addressed with this model. Thus, this model should act a surgical training augment, but not replace it.Keywords: mental script, motor imagery, cognitive walkthrough, verbal protocol analysis, hierarchical task analysis
Procedia PDF Downloads 10313124 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning
Authors: Kuliya Muhammed
Abstract:
This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.Keywords: electronic, ICT, institution, internet, learning, technology
Procedia PDF Downloads 38813123 Dewatering of Brewery Sludge through the Use of Biopolymers
Authors: Audrey Smith, M. Saifur Rahaman
Abstract:
The waste crisis has become a global issue, forcing many industries to reconsider their disposal methods and environmental practices. Sludge is a form of waste created in many fields, which include water and wastewater, pulp and paper, as well as from breweries. The composition of this sludge differs between sources and can, therefore, have varying disposal methods or future applications. When looking at the brewery industry, it produces a significant amount of sludge with a high water content. In order to avoid landfilling, this waste can further be processed into a valuable material. Specifically, the sludge must undergo dewatering, a process which typically involves the addition of coagulants like aluminum sulfate or ferric chloride. These chemicals, however, limit the potential uses of the sludge since it will contain traces of metals. In this case, the desired outcome of the brewery sludge would be to produce animal feed; however, these conventional coagulants would add a toxic component to the sludge. The use of biopolymers like chitosan, which act as a coagulant, can be used to dewater brewery sludge while allowing it to be safe for animal consumption. Chitosan is also a by-product created by the shellfish processing industry and therefore reduces the environmental imprint since it involves using the waste from one industry to treat the waste from another. In order to prove the effectiveness of this biopolymer, experiments using jar-tests will be utilised to determine the optimal dosages and conditions, while variances of contaminants like ammonium will also be observed. The efficiency of chitosan can also be compared to other polysaccharides to determine which is best suited for this waste. Overall a significant separation has been achieved between the solid and liquid content of the waste during the coagulation-flocculation process when applying chitosan. This biopolymer can, therefore, be used to dewater brewery sludge such that it can be repurposed as animal feed. The use of biopolymers can also be applied to treat sludge from other industries, which can reduce the amount of waste produced and allow for more diverse options for reuse.Keywords: animal feed, biopolymer, brewery sludge, chitosan
Procedia PDF Downloads 15913122 The Status Quo, Consensus and Debates on Urbanization in Chinese Education: A General Overview of Research from the 1990s
Authors: Jingqian Xiao
Abstract:
The rapid wave of urbanization triggered by China’s economic growth over the past few decades has inevitably impacted the country’s educational landscape. Educational spaces in China shifted during the 1990s when, due to the government’s tax reforms, large numbers of rural schools were abolished or merged with urban schools, resulting in an “urbanization” of school content and values. While urbanized education is now the status quo, there is as yet no literature review, to our best knowledge, that comprehensively summarizes academic work on this phenomenon. Besides, most research on Chinese educational urbanization relies on basic policy deductions, and there is room for improvement in both the quality and quantity of empirical research on this topic. This paper, therefore, reviews relevant literature on educational urbanization in China from three interrelated factors that shape educational inequality between urban and rural China, namely the urbanization in educational space, school content, and educational values. Results find that the main discussion on Chinese educational urbanization often addresses how Chinese rural education can be improved by reforming the urbanization model to revitalize rural society. While the complete urbanization of Chinese education does not seem feasible, the rapidly changing nature of China’s development patterns and political landscape means the course of Chinese education may shift at any time. When the government does decide to fulfill its intentions to improve the countryside, many formerly dilapidated rural schools may be revived, but for the moment, both rural and urban education in China suffers from governmental neglect. In addition, the breakout of COVID-19, which led to a sudden spread of online education that reopened the gap between the educational conditions and the cultural capital of families in rural and urban areas, has also posed new challenges for China’s attempts to resolve conflicting interests between urban and rural schools and promote educational equality.Keywords: Chinese education, educational inequality, rural and urban education, urbanization in education
Procedia PDF Downloads 12513121 Rumour Containment Using Monitor Placement and Truth Propagation
Authors: Amrah Maryam
Abstract:
The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation
Procedia PDF Downloads 16113120 Deficiencies in Vitamin A and Iron Supply Potential of Selected Indigenous Complementary Foods of Infants in Uganda
Authors: Richard Kajjura, Joyce Kikafunda, Roger Whitehead
Abstract:
Introduction: Indigenous complementary recipes for children (6-23 months) are bulky and inextricably linked. The potential contribution of indigenous complementary foods to infant’s vitamin A and iron needs is not well investigated in Uganda. Less is known whether children in Uganda are living with or without adequate supply of vitamin A and iron nutrients. In this study, vitamin A and iron contents were assessed in the complementary foods fed to infants aged 6-11 months in a Peri-urban setting in Kampala District in Central Uganda. Objective: Assessment of vitamin A and iron contents of indigenous complementary foods of children as fed and associated demographic factor. Method: In a cross sectional study design, one hundred and three (153) households with children aged 6-11 months were randomly selected to participate in the assessment. Complementary food samples were collected from the children’s mothers/caretakers at the time of feeding the child. The mothers’ socio-demographic characteristics of age, education, marital status, occupation and sex collected a semi-qualitative questionnaire. The Vitamin A and iron contents in the complementary foods were analyzed using a UV/VIS spectrophotometer for vitamin A and Atomic Absorption spectrophotometer for iron samples. The data was analyzed using Gene-stat software program. Results: The mean vitamin A content was 97.0± 72.5 µg while that of iron was 1.5 ± 0.4 mg per 100g of food sample as fed. The contribution of indigenous complementary foods found was 32% for vitamin A and 15% iron of the recommended dietary allowance. Age of children was found to be significantly associated Vitamin A and Iron supply potential. Conclusion: The contribution of indigenous complementary foods to infant’s vitamin A and iron needs was low. Complementary foods in Uganda are more likely to be deficient in vitamin A and iron content. Nutrient dense dietary supplementation should be intervened in to make possible for Ugandan children attain full growth potential.Keywords: indigenous complementary food, infant, iron, vitamin A
Procedia PDF Downloads 47813119 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China
Authors: Lan Luo
Abstract:
In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects
Procedia PDF Downloads 34313118 Advertising Disability Index: A Content Analysis of Disability in Television Commercial Advertising from 2018
Authors: Joshua Loebner
Abstract:
Tectonic shifts within the advertising industry regularly and repeatedly present a deluge of data to be intuited across a spectrum of key performance indicators with innumerable interpretations where live campaigns are vivisected to pivot towards coalescence amongst a digital diaspora. But within this amalgam of analytics, validation, and creative campaign manipulation, where do diversity and disability inclusion fit in? In 2018 several major brands were able to answer this question definitely and directly by incorporating people with disabilities into advertisements. Disability inclusion, representation, and portrayals are documented annually across a number of different media, from film to primetime television, but ongoing studies centering on advertising have not been conducted. Symbols and semiotics in advertising often focus on a brand’s features and benefits, but this analysis on advertising and disability shows, how in 2018, creative campaigns and the disability community came together with the goal to continue the momentum and spark conversations. More brands are welcoming inclusion and sharing positive portrayals of intersectional diversity and disability. Within the analysis and surrounding scholarship, a multipoint analysis of each advertisement and meta-interpretation of the research has been conducted to provide data, clarity, and contextualization of insights. This research presents an advertising disability index that can be monitored for trends and shifts in future studies and to provide further comparisons and contrasts of advertisements. An overview of the increasing buying power within the disability community and population changes among this group anchors the significance and size of the minority in the US. When possible, viewpoints from creative teams and advertisers that developed the ads are brought into the research to further establish understanding, meaning, and individuals’ purposeful approaches towards disability inclusion. Finally, the conclusion and discussion present key takeaways to learn from the research, build advocacy and action both within advertising scholarship and the profession. This study, developed into an advertising disability index, will answer questions of how people with disabilities are represented in each ad. In advertising that includes disability, there is a creative pendulum. At one extreme, among many other negative interpretations, people with disables are portrayed in a way that conveys pity, fosters ableism and discrimination, and shows that people with disabilities are less than normal from a societal and cultural perspective. At the other extreme, people with disabilities are portrayed with a type of undue inspiration, considered inspiration porn, or superhuman, otherwise known as supercrip, and in ways that most people with disabilities could never achieve, or don’t want to be seen for. While some ads reflect both extremes, others stood out for non-polarizing inclusion of people with disabilities. This content analysis explores television commercial advertisements to determine the presence of people with disabilities and any other associated disability themes and/or concepts. Content analysis will allow for measuring the presence and interpretation of disability portrayals in each ad.Keywords: advertising, brand, disability, marketing
Procedia PDF Downloads 11713117 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela
Authors: Maria Antonieta Erna Castillo Holly
Abstract:
During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela
Procedia PDF Downloads 13113116 Generation of Research Ideas Through a Matrix in the Field of International Comparative Education
Authors: Saleh Alzahrani
Abstract:
The studies in the field of International Comparative Education in the Arabic world and the middle east are scarcity. However, some International Comparative Education Researchers and post graduates face a challenge concerning of a selection of a distinguished study to improve their national education system. It requires a considerable effort. According to that, the matrix of scientific research in comparative and international education is designed to help specialists, researchers and graduate students in generating a variety of research ideas in a short time in this field. The matrix is built by using content analysis method of comparative education research published in the Arab journals from 1980 to 2017. Then, qualitative input with the in-depth focus analysis tool is utilized according to the root theory. The matrix consists of two axes; vertical (X) and horizontal (Y). The number of fields in the vertical axis are 6 domains, including 105 variables. The horizontal axis is two fields which are pre-university education that incorporate educational stages and contemporary formulations including (23) variables. The second field is the university education in its public universities and contemporary formulas including (15) variables. The researcher can access topics, ideas and research points through the matrix of scientific research in comparative and international education by selecting of any subject on the vertical axis (X) from (1) to (105) and selecting of any subject on the horizontal axis (Y) from (B) to (U). The cell where the axes intersect with the chosen fields can generate an idea or a research point conveniently and easily through the words that have been monitored by the user. These steps can be repeated to generate new ideas and research points. Many graduate researchers have been trained on using of this matrix which gave them more potential to generate an appropriate study serving the national education.Keywords: content analysis method, comparative education, international education, matrix, root theory
Procedia PDF Downloads 13313115 Citizen Journalist: A Case Study of Audience Participation in Mainstream TV News Production in India
Authors: Sindhu Manjesh
Abstract:
This paper examines citizen journalism in India, specifically the inclusion of user-generated content (UGC) by mainstream media, by focusing on the case study of the Citizen Journalist show on CNN-News 18, a national television news broadcaster. It studies the processes of production involved in Citizen Journalist to find out how professional journalists and citizens interact to put together the show in order to help readers understand the relationship between journalists and the public in the evolving media landscape of India, the world’s largest democracy, and a leader in the Global South. Using an in-depth case study approach involving newsroom ethnography, interviews, and an examination of Citizen Journalist content, it studies the implications of audience participation for traditional journalistic routines and values – specifically gatekeeping and objectivity. Citizen Journalist began to much fanfare and promise about including neglected citizen views and voices. Based on evidence gathered, this study, however, argues that claims made by CNN-News18 about democratizing news production through Citizen Journalist were overstated. It made some effort to do this and broadcast a lot of important stories. But overall, in terms of bringing in citizen voices, it did not live up to its initial promise because the show was anchored in traditional journalistic norms and roles and the channel’s economic imperatives. Professional journalists were ironically the producers of 'citizen journalism' in this case. Mainstream media’s authority in defining journalistic work –who says what, where, when, why, and how– remains predominant in India. This has implications for democratic participation in India. The example of Citizen Journalist –the model it followed, its partial success, and many limitations– could well presage outcomes for other news outlets, in India and beyond, which copy its template.Keywords: citizen journalism, digital journalism, participatory journalism, public sphere
Procedia PDF Downloads 12013114 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables
Authors: Agah Tugrul Korucu
Abstract:
Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers
Procedia PDF Downloads 35313113 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 9613112 The Impact Of Environmental Management System ISO 14001 Adoption on Firm Performance
Authors: Raymond Treacy, Paul Humphreys, Ronan McIvor, Trevor Cadden, Alan McKittrick
Abstract:
This study employed event study methodology to examine the role of institutions, resources and dynamic capabilities in the relationship between the Environmental Management System ISO 14001 adoption and firm performance. Utilising financial data from 140 ISO 14001 certified firms and 320 non-certified firms, the results of the study suggested that the UK and Irish manufacturers were not implementing ISO 14001 solely to gain legitimacy. In contrast, the results demonstrated that firms were fully integrating the ISO 14001 standard within their operations as certified firms were able to improve both financial and operating performance when compared to non-certified firms. However, while there were significant and long lasting improvements for employee productivity, manufacturing cost efficiency, return on assets and sales turnover, the sample firms operating cycle and fixed asset efficiency displayed evidence of diminishing returns in the long-run, underlying the observation that no operating advantage based on incremental improvements can be everlasting. Hence, there is an argument for investing in dynamic capabilities which help renew and refresh the resource base and help the firm adapt to changing environments. Indeed, the results of the regression analysis suggest that dynamic capabilities for innovation acted as a moderator in the relationship between ISO 14001 certification and firm performance. This, in turn, will have a significant and symbiotic influence on sustainability practices within the participating organisations. The study not only provides new and original insights, but demonstrates pragmatically how firms can take advantage of environmental management systems as a moderator to significantly enhance firm performance. However, while it was shown that firm innovation aided both short term and long term ROA performance, adaptive market capabilities only aided firms in the short-term at the marketing strategy deployment stage. Finally, the results have important implications for firms operating in an economic recession as the results suggest that firms should scale back investment in R&D while operating in an economic downturn. Conversely, under normal trading conditions, consistent and long term investments in R&D was found to moderate the relationship between ISO 14001 certification and firm performance. Hence, the results of the study have important implications for academics and management alike.Keywords: supply chain management, environmental management systems, quality management, sustainability, firm performance
Procedia PDF Downloads 30813111 The Potency of Sandfish (Holothuria scraba) Flesh Powder to Improve Reproduction Quality of Man
Authors: E. Riani, T. T. Irawadi, S. Nurjanah, K. Syamsu, E. G. Said, Suprihatin, M. R. Cordova
Abstract:
Especially coastal, Indonesian and Chinese communities have utilized sandfish to improve reproduction quality of men. This study aimed to examine the nutrition on sandfish flesh that has the potency to improve reproduction quality of men. The materials used were sandfish with weight of 200-500 g, and then analysis of proximate, analysis of amino acid, analysis of fatty acid and analysis of mineral contained in the sandfish were performed. The results showed that protein content (39.96%) was the main component of the flesh; the carbohydrate and fat were 25.43% and 4.18%, respectively. Sandfish powder contains several essential amino acids and nonessential amino acids. Nine of ten amino acids needed by human body are contained in sandfish powder, i.e. arginine, histidine, isoleucine, leucine, lysine, methionine, phenylalanine, tryptophan, threonine and valine; only tryptophan that are not contained in sandfish powder. Sandfish powder contains saturated fatty acid kaproat, kaprilat, kaprat, laurat, miristat, stearat, arakhidat and behenat; monosaturated fatty acids (MUFA) and polyunsaturated fatty acids (PUFA). MUFA is composed of fatty acid oleat, while PUFA is composed fatty acid omega 3 (linonenat, eicosapentaenoic acid and docosahexaenoic acid) and omega 6 (linoleat and arakhidonat). The minerals contained in sandfish powder are macrominerals and microminerals. Based on the findings, the nutrition in sandfish powder has a good potency to improve reproduction of men, especially PUFA for the maturation of spermatozoa, zinc for production function and spermatogenesis, motility of spermatozoa, acromoson reaction; Mg for transformation of genetic information and motility of spermatozoa; calcium for spermatogenesis, capacity and fertilization of spermatozoa. Thus, sandfish flesh powder has the potency to improve reproduction quality of men.Keywords: sandfish flesh powder, nutrition, reproduction quality, men
Procedia PDF Downloads 45513110 In vivo Iron Availability and Profile Lipid Composition in Anemic Rats Fed on Diets with Black Rice Bran Extract
Authors: Nurlaili E. P., Astuti M., Marsono Y., Naruki S.
Abstract:
Iron is an essential nutrient with limited bioavailability. Nutritional anemia caused mainly by iron deficiency is the most recognized nutritional problem in both countries as well as affluent societies. Rice (Oryza sativa L.) has become the most important cereal crop for the improvement of human health due to the starch, protein, oil, and the majority of micronutrients, particularly in Asian countries. In this study, the iron availability and profile lipid were evaluated for the extracts from Cibeusi varieties (black rices) of ancient rice brans. Results: The quality of K, B, R, E diets groups shows the same effect on the growth of rats. This indicate that groups is as efficiently utilized by the body as E diets. Hematocrit and MCHC levels of rats fed K, B, R and E diets were not significantly (P< 0.05). MCV and MCH levels of rats K, B, R were significantly (P< 0.05) with E groups but rats K, B, R were not significantly (P< 0.05). The iron content in the serum of rats fed with K, B, R and E diets were not significantly (P< 0.05). The highest level of iron in the serum was founded in the B group. The iron content in the liver of rats fed with K, B, R and E diets were not significantly (P< 0.05). The highest level of iron in the liver was founded in the R group. HDL cholesterol levels were significantly (P< 0.05) between rats of fed B, E with K, R, but K and R were not significantly (P< 0.05). LDL cholesterol levels of rats fed K and E significantly (P< 0.05) with B and R. Conclusions: the bran of pigmented rice varieties has, with some exceptions, greater antioxidant and free-radical scavenging activities. The results also show that pigmented rice extracts acted as pro-oxidants in the lipid peroxidation assay, possibly by mechanisms described for the pro-oxidant activities of tocopherol and ascorbic. Pigmented rice bran extracts more effectively increases iron stores and reduces the prevalence of iron deficiency. And reduces cholesterol, TG and LDL cholesterol and increses HDL cholesterol.Keywords: anemia, black rice bran extract, iron, profile lipid
Procedia PDF Downloads 48413109 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 21913108 Microbubbles Enhanced Synthetic Phorbol Ester Degradation by Ozonolysis
Authors: D. Kuvshinov, A. Siswanto, W. Zimmerman
Abstract:
A phorbol-12-myristate-13-acetate (TPA) is a synthetic analogue of phorbol ester (PE), a natural toxic compound of Euphorbiaceae plant. The oil extracted from plants of this family is useful source for primarily biofuel. However this oil can also be used as a food stock due to its significant nutrition content. The limitations for utilizing the oil as a food stock are mainly due to a toxicity of PE. Nowadays a majority of PE detoxification processes are expensive as include multi steps alcohol extraction sequence. Ozone is considered as a strong oxidative agent. It reaction with PE it attacks the carbon double bond of PE. This modification of PE molecular structure results into nontoxic ester with high lipid content. This report presents data on development of simple and cheap PE detoxification process with water application as a buffer and ozone as reactive component. The core of this new technique is a simultaneous application of new microscale plasma unit for ozone production and patented gas oscillation technology. In combination with a reactor design the technology permits ozone injection to the water-TPA mixture in form of microbubbles. The efficacy of a heterogeneous process depends on diffusion coefficient which can be controlled by contact time and interface area. The low velocity of rising microbubbles and high surface to volume ratio allow fast mass transfer to be achieved during the process. Direct injection of ozone is the most efficient process for a highly reactive and short lived chemical. Data on the plasma unit behavior are presented and influence of the gas oscillation technology to the microbubbles production mechanism has been discussed. Data on overall process efficacy for TPA degradation is shown.Keywords: microbubble, ozonolysis, synthetic phorbol ester, chemical engineering
Procedia PDF Downloads 21713107 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 419