Search results for: information propagation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11435

Search results for: information propagation

11135 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 278
11134 A Review of Information Systems Development in Developing Countries

Authors: B. N. Asare, O. A. Ajigini

Abstract:

Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.

Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model

Procedia PDF Downloads 380
11133 Germplasm Collections and Morphological Studies of Andropogongayanus-Andropogon tectorum Complex in Southwestern Nigeria

Authors: Ojo F. M., Nwekeocha C. C., Faluyi J. O.

Abstract:

Morphological studies were carried out on Andropogongayanus-Andropogontectorum complex collected in Southwestern Nigeria to provide full characterizationof the two species of Andropogon; elucidating their population dynamics. Morphological data from selected accessions of A. gayanus and A. tectorum from different parts of Southwestern Nigeria were collected and characterized using an adaptation of the Descriptors for Wild and Cultivated Rice (Oryza spp). Preliminary morphological descriptions were carried out at the points of collection. Garden populations were raised from the vegetative parts of some accessions, and hybrids were maintained in Botanical Garden of the Obafemi Awolowo University, Ile- Ife. The data obtained were subjected to inferential tests and Duncan’s multiple range test. This study has revealed distribution pattern of the two species in the area of study, which suggests a south-ward migration of Andropogongayanus from the northern vegetational zones of Nigeria to the southern ecological zones. The migration of A. gayanus around Igbeti with occasional occurrence of A. tectorum along the roadsides without any distinct phenotypic hybrid and Budo-Ode in Oyo State has been established as the southern limit of the spread of A. gayanus, the migration of A. gayanus to the South is not an invasion but a slow process. A. gayanus was not encountered in Osun, Ondo, Ekiti, and Ogun States. Andropogongayanus and Andropogon tectorum not only emerge from the rootstocks rapidly but can also produce independent propagules by rooting at some nodes. The plants can spread by means of these propagules even if it does not produce sexual or apomictic seeds. This potential for vegetative propagation, in addition to the perennial habit, confer considerable advantage for colonization by the Andropogongayanus-AndropogontectorumComplex.

Keywords: accessions, distribution, migration, propagation

Procedia PDF Downloads 116
11132 Cracking Performance of Bituminous Concrete Mixes Containing High Percentage of RAP Material

Authors: Bicky Agarwal, Ambika Behl, Rajiv Kumar, Ashish Dhamaniya

Abstract:

India ranks second for having the largest road network in the world after the United States (U.S.). According to the National Asphalt Pavement Association (NAPA), the U.S. produced about 94.6 million tons of Reclaimed Asphalt Pavement (RAP) in 2021. Despite the benefits of RAP usage, it is not widely adopted in many countries, including India. Rising asphalt binder costs and environmental concerns have spurred interest in using RAP material in asphalt mixtures. However, increasing RAP content may have adverse effects on certain characteristics of asphalt mixtures, such as cracking resistance. Cracking is a common pavement issue that affects the lifespan and durability of hot-mix asphalt pavements. Assessing cracking resistance is crucial in pavement design. Various laboratory tests and performance indicators are utilized to evaluate cracking resistance. This study aims to use the Texas Overlay Tester (TOT) to assess the impact of reclaimed asphalt pavement (RAP) on the cracking resistance of Bituminous Concrete (BC-II) mixes. Following the Marshall Mix Design method, asphalt mixes with RAP contents of 0% (Control), 30%, 40%, 50%, and 60% were prepared and tested at their Optimum Binder Content (OBC). The ITS results showed that the control mix had an ITS value of 1.2 MPa, with slight decreases observed in mixes containing up to 60% RAP, although these changes were not statistically significant (p=0.538>0.05). The TSR tests indicated that all mixes exceeded the minimum requirement of 80%. The Texas Overlay Test (TOT) was used to evaluate cracking performance and revealed that higher RAP contents had a negative impact on fatigue resistance. The 50% RAP mix exhibited the highest CFE, indicating that it has the best resistance to crack propagation despite having a lower number of cycles to failure. All mixes were categorized as falling into the Soft-crack-resistant quadrant, indicating their ability to resist crack propagation while being more susceptible to crack initiation.

Keywords: RAP, BC-II, HMA, TOT

Procedia PDF Downloads 31
11131 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 704
11130 Standardized Description and Modeling Methods of Semiconductor IP Interfaces

Authors: Seongsoo Lee

Abstract:

IP reuse is an effective design methodology for modern SoC design to reduce effort and time. However, description and modeling methods of IP interfaces are different due to different IP designers. In this paper, standardized description and modeling methods of IP interfaces are proposed. It consists of 11 items such as IP information, model provision, data type, description level, interface information, port information, signal information, protocol information, modeling level, modeling information, and source file. The proposed description and modeling methods enables easy understanding, simulation, verification, and modification in IP reuse.

Keywords: interface, standardization, description, modeling, semiconductor IP

Procedia PDF Downloads 502
11129 Earnings-Related Information, Cognitive Bias, and the Disposition Effect

Authors: Chih-Hsiang Chang, Pei-Shan Kao

Abstract:

This paper discusses the reaction of investors in the Taiwan stock market to the most probable unknown earnings-related information and the most probable known earnings-related information. As compared with the previous literature regarding the effect of an official announcement of earnings forecast revision, this paper further analyzes investors’ cognitive bias toward the unknown and known earnings-related information, and the role of media during the investors' reactions to the foresaid information shocks. The empirical results show that both the unknown and known earnings-related information provides useful information content for a stock market. In addition, cognitive bias and disposition effect are the behavioral pitfalls that commonly occur in the process of the investors' reactions to the earnings-related information. Finally, media coverage has a remarkable influence upon the investors' trading decisions.

Keywords: cognitive bias, role of media, disposition effect, earnings-related information, behavioral pitfall

Procedia PDF Downloads 224
11128 About the Interface Bonding Safety of Adhesively Bonded Concrete Joints Under Cracking: A Fracture Energetic Approach

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives are increasingly being used in the construction sector. On the one hand, this concerns dowel reinforcements using chemical anchors. On the other hand, the sealing and repair of cracks in structural concrete components are still on the rise. In the field of bonding, the interface between the joined materials is the most critical area. Therefore, it is of immense importance to characterize and investigate this section sufficiently by fracture analysis. Since standardized mechanical test methods are not sufficiently capable of doing this, recourse is made to an innovative concept based on fracture energy. Therefore, a series of experimental tests were performed using the so-called GF-principle to study the interface bonding safety of adhesively bonded concrete joints. Several different structural adhesive systems based on epoxy, CA/A hybrid, PUR, MS polymer, dispersion, and acrylate were selected for bonding concrete substrates. The results show that stable crack propagation and prevention of uncontrolled failure in bonded concrete joints depend very much on the adhesive system used, and only fracture analytical evaluation methods can provide empirical information on this.

Keywords: interface bonding safety, adhesively bonded concrete joints, GF-principle, fracture analysis

Procedia PDF Downloads 304
11127 Nuclear Fuel Safety Threshold Determined by Logistic Regression Plus Uncertainty

Authors: D. S. Gomes, A. T. Silva

Abstract:

Analysis of the uncertainty quantification related to nuclear safety margins applied to the nuclear reactor is an important concept to prevent future radioactive accidents. The nuclear fuel performance code may involve the tolerance level determined by traditional deterministic models producing acceptable results at burn cycles under 62 GWd/MTU. The behavior of nuclear fuel can simulate applying a series of material properties under irradiation and physics models to calculate the safety limits. In this study, theoretical predictions of nuclear fuel failure under transient conditions investigate extended radiation cycles at 75 GWd/MTU, considering the behavior of fuel rods in light-water reactors under reactivity accident conditions. The fuel pellet can melt due to the quick increase of reactivity during a transient. Large power excursions in the reactor are the subject of interest bringing to a treatment that is known as the Fuchs-Hansen model. The point kinetic neutron equations show similar characteristics of non-linear differential equations. In this investigation, the multivariate logistic regression is employed to a probabilistic forecast of fuel failure. A comparison of computational simulation and experimental results was acceptable. The experiments carried out use the pre-irradiated fuels rods subjected to a rapid energy pulse which exhibits the same behavior during a nuclear accident. The propagation of uncertainty utilizes the Wilk's formulation. The variables chosen as essential to failure prediction were the fuel burnup, the applied peak power, the pulse width, the oxidation layer thickness, and the cladding type.

Keywords: logistic regression, reactivity-initiated accident, safety margins, uncertainty propagation

Procedia PDF Downloads 291
11126 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange

Authors: Dora Triki, Irena Vida, Claude Obadia

Abstract:

Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.

Keywords: conation, e-Forum, information exchange, members participation

Procedia PDF Downloads 158
11125 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 429
11124 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion

Authors: Rui Liu, Klaus Greve

Abstract:

The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.

Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization

Procedia PDF Downloads 288
11123 The Role of Information Technology in the Supply Chain Management

Authors: Azar Alizadeh, Mohammad Reza Naserkhaki

Abstract:

The application of the IT systems for collecting and analyzing the data can have a significant effect on the performance of any company. In recent decade, different advancements and achievements in the field of information technology have changed the industry compared to the previous decade. The adoption and application of the information technology are one of the ways to achieve a distinctive competitive personality to the companies and their supply chain. The acceptance of the IT and its proper implementation cam reinforce and improve the cooperation between different parts of the supply chain by rapid transfer and distribution of the precise information and the application of the informational systems, leading to the increase in the supply chain efficiency. The main objective of this research is to study the effects and applications of the information technology on and in the supply chain management and to introduce the effective factors on the acceptance of information technology in the companies. Moreover, in order to understand the subject, we will investigate the role and importance of the information and electronic commerce in the supply chain and the characteristics of the supply chain based on the information flow approach.

Keywords: electronic commerce, industry, information technology, management, supply chain, system

Procedia PDF Downloads 485
11122 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 662
11121 Comparison of Growth Medium Efficiency into Stevia (Stevia rebaudiana Bertoni) Shoot Biomass and Stevioside Content in Thin-Layer System, TIS RITA® Bioreactor, and Bubble Column Bioreactor

Authors: Nurhayati Br Tarigan, Rizkita Rachmi Esyanti

Abstract:

Stevia (Stevia rebaudiana Bertoni) has a great potential to be used as a natural sweetener because it contains steviol glycoside, which is approximately 100 - 300 times sweeter than sucrose, yet low calories. Vegetative and generative propagation of S. rebaudiana is inefficient to produce stevia biomass and stevioside. One of alternative for stevia propagation is in vitro shoot culture. This research was conducted to optimize the best medium for shoot growth and to compare the bioconversion efficiency and stevioside production of S. rebaudiana shoot culture cultivated in thin layer culture (TLC), recipient for automated temporary immersion system (TIS RITA®) bioreactor, and bubble column bioreactor. The result showed that 1 ppm of Kinetin produced a healthy shoot and the highest number of leaves compared to BAP. Shoots were then cultivated in TLC, TIS RITA® bioreactor, and bubble column bioreactor. Growth medium efficiency was determined by yield and productivity. TLC produced the highest growth medium efficiency of S. rebaudiana, the yield was 0.471 ± 0.117 gbiomass.gsubstrate-1, and the productivity was 0.599 ± 0.122 gbiomass.Lmedium-1.day-1. While TIS RITA® bioreactor produced the lowest yield and productivity, 0.182 ± 0.024 gbiomass.gsubstrate-1 and 0.041 ± 0.0002 gbiomass.Lmedium-1.day-1 respectively. The yield of bubble column bioreactor was 0.354 ± 0.204 gbiomass.gsubstrate-1 and the productivity was 0,099 ± 0,009 gbiomass.Lmedium-1.day-1. The stevioside content from the highest to the lowest was obtained from stevia shoot which was cultivated on TLC, TIS RITA® bioreactor, and bubble column bioreactor; the content was 93,44 μg/g, 42,57 μg/g, and 23,03 μg/g respectively. All three systems could be used to produce stevia shoot biomass, but optimization on the number of nutrition and oxygen intake was required in each system.

Keywords: bubble column, growth medium efficiency, Stevia rebaudiana, stevioside, TIS RITA®, TLC

Procedia PDF Downloads 267
11120 An Investigation for Information Asymmetry Nexus IPO Under-Pricing: A Case of Pakistan

Authors: Saqib Mehmood, Naveed Iqbal Chaudhry, Asif Mehmood

Abstract:

This study intends to investigate the information asymmetry theories of IPO and under-pricing in Pakistan. The purpose of the study is to validate the information asymmetry about firm value which leads to under-pricing. A total of 55 IPOs listed from 2000-2011 were included in this study. OLS multiple regression was applied to achieve the objectives of this study. The findings of the study confirm the significance of information asymmetry on under-pricing in Pakistan. The findings have implications for issuing firms and prospective investors.

Keywords: information asymmetry, initial public offerings, under-pricing, firm value

Procedia PDF Downloads 481
11119 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model

Authors: Mohammed Nasser Al-Suqri

Abstract:

Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.

Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman

Procedia PDF Downloads 115
11118 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 381
11117 Model of Cosserat Continuum Dispersion in a Half-Space with a Scatterer

Authors: Francisco Velez, Juan David Gomez

Abstract:

Dispersion effects on the Scattering for a semicircular canyon in a micropolar continuum are analyzed, by using a computational finite element scheme. The presence of microrotational waves and the dispersive SV waves affects the propagation of elastic waves. Here, a contrast with the classic model is presented, and the dependence with the micropolar parameters is studied.

Keywords: scattering, semicircular canyon, wave dispersion, micropolar medium, FEM modeling

Procedia PDF Downloads 544
11116 The Adoption of Process Management for Accounting Information Systems in Thailand

Authors: Manirath Wongsim

Abstract:

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption

Procedia PDF Downloads 467
11115 Geometric Imperfections in Lattice Structures: A Simulation Strategy to Predict Strength Variability

Authors: Xavier Lorang, Ahmadali Tahmasebimoradi, Chetra Mang, Sylvain Girard

Abstract:

The additive manufacturing processes (e.g. selective laser melting) allow us to produce lattice structures which have less weight, higher impact absorption capacity, and better thermal exchange property compared to the classical structures. Unfortunately, geometric imperfections (defects) in the lattice structures are by-products results of the manufacturing process. These imperfections decrease the lifetime and the strength of the lattice structures and alternate their mechanical responses. The objective of the paper is to present a simulation strategy which allows us to take into account the effect of the geometric imperfections on the mechanical response of the lattice structure. In the first part, an identification method of geometric imperfection parameters of the lattice structure based on point clouds is presented. These point clouds are based on tomography measurements. The point clouds are fed into the platform LATANA (LATtice ANAlysis) developed by IRT-SystemX to characterize the geometric imperfections. This is done by projecting the point clouds of each microbeam along the beam axis onto a 2D surface. Then, by fitting an ellipse to the 2D projections of the points, the geometric imperfections are characterized by introducing three parameters of an ellipse; semi-major/minor axes and angle of rotation. With regard to the calculated parameters of the microbeam geometric imperfections, a statistical analysis is carried out to determine a probability density law based on a statistical hypothesis. The microbeam samples are randomly drawn from the density law and are used to generate lattice structures. In the second part, a finite element model for the lattice structure with the simplified geometric imperfections (ellipse parameters) is presented. This numerical model is used to simulate the generated lattice structures. The propagation of the uncertainties of geometric imperfections is shown through the distribution of the computed mechanical responses of the lattice structures.

Keywords: additive manufacturing, finite element model, geometric imperfections, lattice structures, propagation of uncertainty

Procedia PDF Downloads 186
11114 Online Information Seeking: A Review of the Literature in the Health Domain

Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad

Abstract:

The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.

Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT

Procedia PDF Downloads 274
11113 Formulating Rough Approximations in Information Tables with Possibilistic Information

Authors: Michinori Nakata, Hiroshi Sakai

Abstract:

A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.

Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations

Procedia PDF Downloads 321
11112 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 148
11111 Adhesive Bonded Joints Characterization and Crack Propagation in Composite Materials under Cyclic Impact Fatigue and Constant Amplitude Fatigue Loadings

Authors: Andres Bautista, Alicia Porras, Juan P. Casas, Maribel Silva

Abstract:

The Colombian aeronautical industry has stimulated research in the mechanical behavior of materials under different loading conditions aircrafts are generally exposed during its operation. The Calima T-90 is the first military aircraft built in the country, used for primary flight training of Colombian Air Force Pilots, therefore, it may be exposed to adverse operating situations such as hard landings which cause impact loads on the aircraft that might produce the impact fatigue phenomenon. The Calima T-90 structure is mainly manufactured by composites materials generating assemblies and subassemblies of different components of it. The main method of bonding these components is by using adhesive joints. Each type of adhesive bond must be studied on its own since its performance depends on the conditions of the manufacturing process and operating characteristics. This study aims to characterize the typical adhesive joints of the aircraft under usual loads. To this purpose, the evaluation of the effect of adhesive thickness on the mechanical performance of the joint under quasi-static loading conditions, constant amplitude fatigue and cyclic impact fatigue using single lap-joint specimens will be performed. Additionally, using a double cantilever beam specimen, the influence of the thickness of the adhesive on the crack growth rate for mode I delamination failure, as a function of the critical energy release rate will be determined. Finally, an analysis of the fracture surface of the test specimens considering the mechanical interaction between the substrate (composite) and the adhesive, provide insights into the magnitude of the damage, the type of failure mechanism that occurs and its correlation with the way crack propagates under the proposed loading conditions.

Keywords: adhesive, composites, crack propagation, fatigue

Procedia PDF Downloads 204
11110 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies

Authors: Dumitru Valentin Florentin

Abstract:

The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.

Keywords: information technologies, impact, company, Romania, empirical study

Procedia PDF Downloads 424
11109 Evaluation of Cyclic Steam Injection in Multi-Layered Heterogeneous Reservoir

Authors: Worawanna Panyakotkaew, Falan Srisuriyachai

Abstract:

Cyclic steam injection (CSI) is a thermal recovery technique performed by injecting periodically heated steam into heavy oil reservoir. Oil viscosity is substantially reduced by means of heat transferred from steam. Together with gas pressurization, oil recovery is greatly improved. Nevertheless, prediction of effectiveness of the process is difficult when reservoir contains degree of heterogeneity. Therefore, study of heterogeneity together with interest reservoir properties must be evaluated prior to field implementation. In this study, thermal reservoir simulation program is utilized. Reservoir model is firstly constructed as multi-layered with coarsening upward sequence. The highest permeability is located on top layer with descending of permeability values in lower layers. Steam is injected from two wells located diagonally in quarter five-spot pattern. Heavy oil is produced by adjusting operating parameters including soaking period and steam quality. After selecting the best conditions for both parameters yielding the highest oil recovery, effects of degree of heterogeneity (represented by Lorenz coefficient), vertical permeability and permeability sequence are evaluated. Surprisingly, simulation results show that reservoir heterogeneity yields benefits on CSI technique. Increasing of reservoir heterogeneity impoverishes permeability distribution. High permeability contrast results in steam intruding in upper layers. Once temperature is cool down during back flow period, condense water percolates downward, resulting in high oil saturation on top layers. Gas saturation appears on top after while, causing better propagation of steam in the following cycle due to high compressibility of gas. Large steam chamber therefore covers most of the area in upper zone. Oil recovery reaches approximately 60% which is of about 20% higher than case of heterogeneous reservoir. Vertical permeability exhibits benefits on CSI. Expansion of steam chamber occurs within shorter time from upper to lower zone. For fining upward permeability sequence where permeability values are reversed from the previous case, steam does not override to top layers due to low permeability. Propagation of steam chamber occurs in middle of reservoir where permeability is high enough. Rate of oil recovery is slower compared to coarsening upward case due to lower permeability at the location where propagation of steam chamber occurs. Even CSI technique produces oil quite slowly in early cycles, once steam chamber is formed deep in the reservoir, heat is delivered to formation quickly in latter cycles. Since reservoir heterogeneity is unavoidable, a thorough understanding of its effect must be considered. This study shows that CSI technique might be one of the compatible solutions for highly heterogeneous reservoir. This competitive technique also shows benefit in terms of heat consumption as steam is injected periodically.

Keywords: cyclic steam injection, heterogeneity, reservoir simulation, thermal recovery

Procedia PDF Downloads 459
11108 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 402
11107 Value Relevance of Accounting Information: Empirical Evidence from China

Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li

Abstract:

This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.

Keywords: accounting information, response time, value relevance, stock price

Procedia PDF Downloads 96
11106 Building a Model for Information Literacy Education in School Settings

Authors: Tibor Koltay

Abstract:

Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.

Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory

Procedia PDF Downloads 147