Search results for: Shannon information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14591

Search results for: Shannon information theory

11291 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India

Authors: Mani Gupta

Abstract:

This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.

Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics

Procedia PDF Downloads 344
11290 UKIYO-E: User Knowledge Improvement Based on Youth Oriented Entertainment, Art Appreciation Support by Interacting with Picture

Authors: Haruya Tamaki, Tsugunosuke Sakai, Ryuichi Yoshida, Ryohei Egusa, Shigenori Inagaki, Etsuji Yamaguchi, Fusako Kusunoki, Miki Namatame, Masanori Sugimoto, Hiroshi Mizoguchi

Abstract:

Art appreciation is important as part of children education. Art appreciation can enrich sensibility and creativity. To enrich sensibility and creativity, the children have to learning knowledge of picture such as social and historical backgrounds and author intention. High learning effect can acquire by actively learning. In short, it is important that encourage learning of the knowledge about pictures actively. It is necessary that children feel like interest to encourage learning of the knowledge about pictures actively. In a general art museum, comments on pictures are done through writing. Thus, we expect that this method cannot arouse the interest of the children in pictures, because children feel like boring. In brief, learning about the picture information is difficult. Therefore, we are developing an art-appreciation support system that will encourage learning of the knowledge about pictures actively by children feel like interest. This system uses that Interacting with Pictures to learning of the knowledge about pictures. To Interacting with Pictures, children have to utterance by themselves. We expect that will encourage learning of the knowledge about pictures actively by Interacting with Pictures. To more actively learning, children can choose who talking with by information that location and movement of the children. This system must be able to acquire real-time knowledge of the location, movement, and voice of the children. We utilize the Microsoft’s Kinect v2 sensor and its library, namely, Kinect for Windows SDK and Speech Platform SDK v11 for this purpose. By using these sensor and library, we can determine the location, movement, and voice of the children. As the first step of this system, we developed ukiyo-e game that use ukiyo-e to appreciation object. Ukiyo-e is a traditional Japanese graphic art that has influenced the western society. Therefore, we believe that the ukiyo-e game will be appreciated. In this study, we applied talking to pictures to learn information about the pictures because we believe that learning information about the pictures by talking to the pictures is more interesting than commenting on the pictures using only texts. However, we cannot confirm if talking to the pictures is more interesting than commenting using texts only. Thus, we evaluated through EDA measurement whether the user develops an interest in the pictures while talking to them using voice recognition or by commenting on the pictures using texts only. Hence, we evaluated that children have interest to picture while talking to them using voice recognition through EDA measurement. In addition, we quantitatively evaluate that enjoyed this game or not and learning information about the pictures for primary schoolchildren. In this paper, we summarize these two evaluation results.

Keywords: actively learning, art appreciation, EDA, Kinect V2

Procedia PDF Downloads 273
11289 Preferred Service Delivery options for Female Sex Workers in the Riverine Area of lome, Togo

Authors: Gbone Akou Sophie

Abstract:

Lome state in Togo is considered to have the highest HIV prevalence in Togo according to NAIIS 2023, with the prevalence of 5.5%, Female Sex Workers (FSW) are one of the most vulnerable population, and they are vital in HIV programming. They have the highest HIV prevalence compared to others such as HRM, PWID and Transgender in lome State, Togo. Evidence from Integrated Biological Behavioral Surveillance Survey shows increasing burden of HIV infection from 13.7% in 20018 to 17.2% in 2020 and now 22.9% in 2021 among Female Sex Workers (FSW). This shows their HIV prevalence has been rising over time. The vulnerability status of the FSW in the riverine areas of lome is heightened because of cultural and economic issues where there is exchange of sex for commodities with cross border traders as well as limited access to HIV prevention information. Methods:A cross sectional study which recruited 120 FSW from two Riverine LGAs of Agoe and Kpehenou LGA of Lome State using both snowballing and simple random sampling technique. While semi-structured questionnaire was used as an instrument for data collection among the 120 FSW respondents. Additional information was also elicited from 10 FSW key opinion leaders and community members through in-depth interviews (IDI). Results: 44(36%) of respondents were willing to receive regular HIV care and services as well as visit for STI check-ups at any service point. However, 47(40%) were willing to receive services at private facilities alone, 10 (8%) were willing to receive services at public facilities, 6 (5%) were willing to access services in their homes rather than in the health facility. 13 (11%) were also willing to have peers assist in getting HIV testing services. Conclusion: integrated differentiated model of care for HIV services helps improve HIV services uptake among FSW community especially in the hard- to reach riverine areas which will further lead to epidemic control. Also targeted HIV information should be designed to suit the learning needs of the hard-to reach communities like the riverine areas. More peer educators should be engaged to ensure information and other HIV services reach the riverine communities.

Keywords: female sex workers ( FSW), human immuno-deficiency virus(HIV), prevanlence, service delivery

Procedia PDF Downloads 48
11288 The Role of Citizen Journalism on the Rising of Public Awareness in the Kurdistan Region Government-Iraq

Authors: Abdulsamad Qadir Hussien

Abstract:

The development of new technology in recent years has offered ordinary people various online digital platform tools and internet access to provide news stories, information, and subjects of public interest in the Kurdistan Region Government-Iraq (KRI). This shifting aspect has offered more chances for ordinary people to engage with other individuals on many issues in order to discuss and argue matters relating to their everyday lives. The key purpose of this research project will examine the role of citizen journalism in the increase of public awareness in the Kurdish community in the KRi; particularly, citizen journalism provides a new opportunity for ordinary people to raise their voices about problems and public matters in the KRI. The sample of this research project encompasses ordinary people who use social media platforms as sources of information and news concerning the KRI government policy. In the research project, the focus is on the ordinary people who are interacting with the blogs, posts, and footage that are produced by citizen journalism. The questionnaire was sent to more than 1,000 participants in the Kurdish community; this aspect produces statistically acceptable numbers to obtain a significant result for this research project. The sampling process is mainly based on the survey method in this study. The online questionnaire form includes many sections, which are divided into four key sections. The first section contains socio-demographic questions, including gender, age, and level of education. The research project applied the survey method in order to gather data and information surrounding the role of citizen journalism in increasing awareness of individuals in the Kurdish community. For this purpose, the researcher designed a questionnaire as the primary tool for the data collection process from ordinary people who use social media as a source of news and information. During the research project, online questionnaires were mailed in two ways – via Facebook and email – to participants in the Kurdish community, and this questionnaire looked for answers to questions from ordinary people, such as to what extent citizen journalism helps users to obtain information and news about public affairs and government policy. The research project found that citizen journalism has an essential role in increasing awareness of the Kurdish community, especially mainstream journalism has helped ordinary people to raise their voices in the KRI. Furthermore, citizen journalism carries more advantages as digital sources of news, footage, and information related to public affairs. This study provides useful tools to fore the news stories that are unreachable to professional journalists in the KRI.

Keywords: citizen journalism, public awareness, demonstration and democracy, social media news

Procedia PDF Downloads 47
11287 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 291
11286 Assigning Moral Positions Caused by Environmental Degradation in San Buenaventura Public Housing Complex in Ixtapaluca, State of Mexico, Mexico

Authors: Ángel O. Aldape, José M. Bustos, José G. Guízar

Abstract:

Building companies providing public housing in Mexico, such as INFONAVIT, Casas GEO, Casas ARA, among others, provide low-interest home loans for thousands of Mexican families and individuals to buy a home. However, once this goal is achieved, these companies are not responsible for the care and maintenance of green areas and waste collection services because, technically, it is the local municipalities’ responsibility to provide these services to the community. However, this does not always occur with local municipalities. To study this problem, the San Buenaventura public housing complex was selected. This housing complex is located in the municipality of Ixtapaluca, State of Mexico (Estado de Mexico), Mexico. To our best knowledge, there are currently no formal studies about San Buenaventura that can offer effective options and/or better ways of sorting and disposing households’ wastes, as well as improving local green areas (community gardens and parks). Only a few web-blogs and periodical reports have addressed these serious problems that directly affect the social and psychological well-being of residents. The main goal of this research project aims to improve our understanding towards the existing ontological elements that emerge from residents’ discourses (in the form of informal talks and gossip) and discover the socio-physical elements that they use to assign moral positions onto others or onto themselves. The theoretical framework used in this study is based on two constructionist theories: positioning theory and site ontology. The first theory offered the opportunity to explore the rights, duties, and obligations assigned to a social role (or moral position) of the participants. The second theory provided a constructionist philosophical base that includes various socio-physical elements that are considered to assign personal or community meanings to particular contexts. Both theories contributed to defining personal dispositions and/or attitudes to carry out concrete social action or practice. The theoretical framework was guided by a relativistic ontology that allowed the researcher to better interpret the reality of the participants of this study. A descriptive-interpretative methodology was used, and two qualitative methods were arranged based on the theoretical framework proposed as follows: a semi-structured focus group interview, and direct observations. The semi-structured focus group was carried out with four residents of San Buenaventura and covert observations of public spaces and houses were carried out. These were analysed and interpreted by the researcher and assisted by NVivo software. The results suggest that the participants assigned moral traits of responsibility to other residents regarding the problem of the neglect of the green areas and waste pollution. The results suggest that all participants agreed to assign moral traits to other residents making them liable for the environmental degradation and the decay of green areas. They neither assigned any moral duty nor responsible moral traits onto themselves towards environmental protection or destruction. Overall, the participants in this study pointed out that external ontological elements such as the local government, infrastructure or cleaning services were not main cause of these environmental problems but rather the general lack of moral duty and disposition of other residents.

Keywords: conversation, environment, housing, moral, ontology, position, public, site, talks

Procedia PDF Downloads 193
11285 Relationships between Social Entrepreneurship, CSR and Social Innovation: In Theory and Practice

Authors: Krisztina Szegedi, Gyula Fülöp, Ádám Bereczk

Abstract:

The shared goal of social entrepreneurship, corporate social responsibility and social innovation is the advancement of society. The business model of social enterprises is characterized by unique strategies based on the competencies of the entrepreneurs, and is not aimed primarily at the maximization of profits, but rather at carrying out goals for the benefit of society. Corporate social responsibility refers to the active behavior of a company, by which it can create new solutions to meet the needs of society, either on its own or in cooperation with other social stakeholders. The objectives of this article are to define concepts, describe and integrate relevant theoretical models, develop a model and introduce some examples of international practice that can inspire initiatives for social development.

Keywords: corporate social responsibility, CSR, social innovation, social entrepreneurship

Procedia PDF Downloads 306
11284 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring

Authors: Seung-Lock Seo

Abstract:

This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.

Keywords: data mining, process data, monitoring, safety, industrial processes

Procedia PDF Downloads 383
11283 Bio-Inspired Information Complexity Management: From Ant Colony to Construction Firm

Authors: Hamza Saeed, Khurram Iqbal Ahmad Khan

Abstract:

Effective information management is crucial for any construction project and its success. Primary areas of information generation are either the construction site or the design office. There are different types of information required at different stages of construction involving various stakeholders creating complexity. There is a need for effective management of information flows to reduce uncertainty creating complexity. Nature provides a unique perspective in terms of dealing with complexity, in particular, information complexity. System dynamics methodology provides tools and techniques to address complexity. It involves modeling and simulation techniques that help address complexity. Nature has been dealing with complex systems since its creation 4.5 billion years ago. It has perfected its system by evolution, resilience towards sudden changes, and extinction of unadaptable and outdated species that are no longer fit for the environment. Nature has been accommodating the changing factors and handling complexity forever. Humans have started to look at their natural counterparts for inspiration and solutions for their problems. This brings forth the possibility of using a biomimetics approach to improve the management practices used in the construction sector. Ants inhabit different habitats. Cataglyphis and Pogonomyrmex live in deserts, Leafcutter ants reside in rainforests, and Pharaoh ants are native to urban developments of tropical areas. Detailed studies have been done on fifty species out of fourteen thousand discovered. They provide the opportunity to study the interactions in diverse environments to generate collective behavior. Animals evolve to better adapt to their environment. The collective behavior of ants emerges from feedback through interactions among individuals, based on a combination of three basic factors: The patchiness of resources in time and space, operating cost, environmental stability, and the threat of rupture. If resources appear in patches through time and space, the response is accelerating and non-linear, and if resources are scattered, the response follows a linear pattern. If the acquisition of energy through food is faster than energy spent to get it, the default is to continue with an activity unless it is halted for some reason. If the energy spent is rather higher than getting it, the default changes to stay put unless activated. Finally, if the environment is stable and the threat of rupture is low, the activation and amplification rate is slow but steady. Otherwise, it is fast and sporadic. To further study the effects and to eliminate the environmental bias, the behavior of four different ant species were studied, namely Red Harvester ants (Pogonomyrmex Barbatus), Argentine ants (Linepithema Humile), Turtle ants (Cephalotes Goniodontus), Leafcutter ants (Genus: Atta). This study aims to improve the information system in the construction sector by providing a guideline inspired by nature with a systems-thinking approach, using system dynamics as a tool. Identified factors and their interdependencies were analyzed in the form of a causal loop diagram (CLD), and construction industry professionals were interviewed based on the developed CLD, which was validated with significance response. These factors and interdependencies in the natural system corresponds with the man-made systems, providing a guideline for effective use and flow of information.

Keywords: biomimetics, complex systems, construction management, information management, system dynamics

Procedia PDF Downloads 124
11282 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 216
11281 Theoretical Investigation on Electronic and Magnetic Properties of Cubic PrMnO3 Perovskite

Authors: B. Bouadjemi, S. Bentata, W. Benstaali, A. Abbad, T. Lantri, A. Zitouni

Abstract:

The purpose of this study was to investigate the structural,electronic and magnetic properties of the cubic praseodymium oxides perovskites PrMnO3. It includes our calculations based on the use of the density functional theory (DFT) with both generalized gradient approximation (GGA) and GGA+U approaches, The spin polarized electronic band structures and densities of states as well as the integer value of the magnetic moment of the unit cell (6 μB) illustrate that PrMnO3 is half-metallic ferromagnetic. The study prove that the compound is half-metallic ferromagnetic however the results obtained, make the cubic PrMnO3 a promising candidate for application in spintronics.

Keywords: cubic, DFT, electronic properties, magnetic moment, spintronics

Procedia PDF Downloads 453
11280 Band Structure Computation of GaMnAs Using the Multiband k.p Theory

Authors: Khadijah B. Alziyadi, Khawlh A. Alzubaidi, Amor M. Alsayari

Abstract:

Recently, GaMnAs diluted magnetic semiconductors(DMSs) have received considerable attention because they combine semiconductor and magnetic properties. GaMnAs has been used as a model DMS and as a test bed for many concepts and functionalities of spintronic devices. In this paper, a theoretical study on the band structure ofGaMnAswill be presented. The model that we used in this study is the 8-band k.p methodwherespin-orbit interaction, spin splitting, and strain are considered. The band structure of GaMnAs will be calculated in different directions in the reciprocal space. The effect of manganese content on the GaMnAs band structure will be discussed. Also, the influence of strain, which varied continuously from tensile to compressive, on the different bands will be studied.

Keywords: band structure, diluted magnetic semiconductor, k.p method, strain

Procedia PDF Downloads 131
11279 Calculated Structural and Electronic Properties of Mg and Bi

Authors: G. Patricia Abdel Rahim, Jairo Arbey Rodriguez M, María Guadalupe Moreno Armenta

Abstract:

The present study shows the structural, electronic and magnetic properties of magnesium (Mg) and bismuth (Bi) in a supercell (1X1X5). For both materials were studied in five crystalline structures: rock salt (NaCl), cesium chloride (CsCl), zinc-blende (ZB), wurtzite (WZ), and nickel arsenide (NiAs), using the Density Functional Theory (DFT), the Generalized Gradient Approximation (GGA), and the Full Potential Linear Augmented Plane Wave (FP-LAPW) method. By means of fitting the Murnaghan's state equation we determine the lattice constant, the bulk modulus and it's derived with the pressure. Also we calculated the density of states (DOS) and the band structure.

Keywords: bismuth, magnesium, pseudo-potential, supercell

Procedia PDF Downloads 805
11278 Performance of the Strong Stability Method in the Univariate Classical Risk Model

Authors: Safia Hocine, Zina Benouaret, Djamil A¨ıssani

Abstract:

In this paper, we study the performance of the strong stability method of the univariate classical risk model. We interest to the stability bounds established using two approaches. The first based on the strong stability method developed for a general Markov chains. The second approach based on the regenerative processes theory . By adopting an algorithmic procedure, we study the performance of the stability method in the case of exponential distribution claim amounts. After presenting numerically and graphically the stability bounds, an interpretation and comparison of the results have been done.

Keywords: Marcov chain, regenerative process, risk model, ruin probability, strong stability

Procedia PDF Downloads 304
11277 Improve Student Performance Prediction Using Majority Vote Ensemble Model for Higher Education

Authors: Wade Ghribi, Abdelmoty M. Ahmed, Ahmed Said Badawy, Belgacem Bouallegue

Abstract:

In higher education institutions, the most pressing priority is to improve student performance and retention. Large volumes of student data are used in Educational Data Mining techniques to find new hidden information from students' learning behavior, particularly to uncover the early symptom of at-risk pupils. On the other hand, data with noise, outliers, and irrelevant information may provide incorrect conclusions. By identifying features of students' data that have the potential to improve performance prediction results, comparing and identifying the most appropriate ensemble learning technique after preprocessing the data, and optimizing the hyperparameters, this paper aims to develop a reliable students' performance prediction model for Higher Education Institutions. Data was gathered from two different systems: a student information system and an e-learning system for undergraduate students in the College of Computer Science of a Saudi Arabian State University. The cases of 4413 students were used in this article. The process includes data collection, data integration, data preprocessing (such as cleaning, normalization, and transformation), feature selection, pattern extraction, and, finally, model optimization and assessment. Random Forest, Bagging, Stacking, Majority Vote, and two types of Boosting techniques, AdaBoost and XGBoost, are ensemble learning approaches, whereas Decision Tree, Support Vector Machine, and Artificial Neural Network are supervised learning techniques. Hyperparameters for ensemble learning systems will be fine-tuned to provide enhanced performance and optimal output. The findings imply that combining features of students' behavior from e-learning and students' information systems using Majority Vote produced better outcomes than the other ensemble techniques.

Keywords: educational data mining, student performance prediction, e-learning, classification, ensemble learning, higher education

Procedia PDF Downloads 93
11276 On Chromaticity of Wheels

Authors: Zainab Yasir Abed Al-Rekaby, Abdul Jalil M. Khalaf

Abstract:

Let the vertices of a graph such that every two adjacent vertices have different color is a very common problem in the graph theory. This is known as proper coloring of graphs. The possible number of different proper colorings on a graph with a given number of colors can be represented by a function called the chromatic polynomial. Two graphs G and H are said to be chromatically equivalent, if they share the same chromatic polynomial. A Graph G is chromatically unique, if G is isomorphic to H for any graph H such that G is chromatically equivalent to H. The study of chromatically equivalent and chromatically unique problems is called chromaticity. This paper shows that a wheel W12 is chromatically unique.

Keywords: chromatic polynomial, chromatically equivalent, chromatically unique, wheel

Procedia PDF Downloads 411
11275 Software Vulnerability Markets: Discoverers and Buyers

Authors: Abdullah M. Algarni, Yashwant K. Malaiya

Abstract:

Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.

Keywords: risk management, software security, vulnerability discoverers, vulnerability markets

Procedia PDF Downloads 237
11274 An Integrated Architecture of E-Learning System to Digitize the Learning Method

Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem

Abstract:

The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.

Keywords: database, e-learning, LMS, Moodle

Procedia PDF Downloads 166
11273 Evaluation of the Notifiable Diseases Surveillance System, South, Haiti, 2022

Authors: Djeamsly Salomon

Abstract:

Background: Epidemiological surveillance is a dynamic national system used to observe all aspects of the evolution of priority health problems, through: collection, analysis, systematic interpretation of information, and dissemination of results with necessary recommendations. The study was conducted to assess the mandatory disease surveillance system in the Sud Department. Methods: A study was conducted from March to May 2021 with key players involved in surveillance at the level of health institutions in the department . The CDC's 2021 updated guideline was used to evaluate the system. We collected information about the operation, attributes, and usefulness of the surveillance system using interviewer-administered questionnaires. Epi-Info7.2 and Excel 2016 were used to generate the mean, frequencies and proportions. Results: Of 30 participants, 23 (77%) were women. The average age was 39 years[30-56]. 25 (83%) had training in epidemiological surveillance. (50%) of the forms checked were signed by the supervisor. Collection tools were available at (80%). Knowledge of at least 7 notifiable diseases was high (100%). Among the respondents, 29 declared that the collection tools were simple, 27 had already filled in a notification form. The maximum time taken to fill out a form was 10 minutes. The feedback between the different levels was done at (60%). Conclusion: The surveillance system is useful, simple, acceptable, representative, flexible, stable and responsive. The data generated was of high quality. However, it is threatened by the lack of supervision of sentinel sites, lack of investigation and weak feedback. This evaluation demonstrated the urgent need to improve supervision in the sites and to feedback information. Strengthen epidemiological surveillance.

Keywords: evaluation, notifiable diseases, surveillance, system

Procedia PDF Downloads 64
11272 A Model of Condensation and Solidification of Metallurgical Vapor in a Supersonic Nozzle

Authors: Thien X. Dinh, Peter Witt

Abstract:

A one-dimensional model for the simulation of condensation and solidification of a metallurgical vapor in the mixture of gas during supersonic expansion is presented. In the model, condensation is based on critical nucleation and drop-growth theory. When the temperature falls below the supercooling point, all the formed liquid droplets in the condensation phase are assumed to solidify at an infinite rate. The model was verified with a Computational Fluid Dynamics simulation of magnesium vapor condensation and solidification. The obtained results are in reasonable agreement with CFD data. Therefore, the model is a promising, efficient tool for use in the design process for supersonic nozzles applied in mineral processes since it is faster than the CFD counterpart by an order of magnitude.

Keywords: condensation, metallurgical flow, solidification, supersonic expansion

Procedia PDF Downloads 48
11271 Prioritizing Temporary Shelter Areas for Disaster Affected People Using Hybrid Decision Support Model

Authors: Ashish Trivedi, Amol Singh

Abstract:

In the recent years, the magnitude and frequency of disasters have increased at an alarming rate. Every year, more than 400 natural disasters affect global population. A large-scale disaster leads to destruction or damage to houses, thereby rendering a notable number of residents homeless. Since humanitarian response and recovery process takes considerable time, temporary establishments are arranged in order to provide shelter to affected population. These shelter areas are vital for an effective humanitarian relief; therefore, they must be strategically planned. Choosing the locations of temporary shelter areas for accommodating homeless people is critical to the quality of humanitarian assistance provided after a large-scale emergency. There has been extensive research on the facility location problem both in theory and in application. In order to deliver sufficient relief aid within a relatively short timeframe, humanitarian relief organisations pre-position warehouses at strategic locations. However, such approaches have received limited attention from the perspective of providing shelters to disaster-affected people. In present research work, this aspect of humanitarian logistics is considered. The present work proposes a hybrid decision support model to determine relative preference of potential shelter locations by assessing them based on key subjective criteria. Initially, the factors that are kept in mind while locating potential areas for establishing temporary shelters are identified by reviewing extant literature and through consultation from a panel of disaster management experts. In order to determine relative importance of individual criteria by taking into account subjectivity of judgements, a hybrid approach of fuzzy sets and Analytic Hierarchy Process (AHP) was adopted. Further, Technique for order preference by similarity to ideal solution (TOPSIS) was applied on an illustrative data set to evaluate potential locations for establishing temporary shelter areas for homeless people in a disaster scenario. The contribution of this work is to propose a range of possible shelter locations for a humanitarian relief organization, using a robust multi criteria decision support framework.

Keywords: AHP, disaster preparedness, fuzzy set theory, humanitarian logistics, TOPSIS, temporary shelters

Procedia PDF Downloads 182
11270 Digital Divide and Its Impact on the Students’ Performance

Authors: Aissa Hanifi

Abstract:

People across different world societies are using information and communication technology (ICT) for different purposes. Unfortunately, in contemporary societies, some people have little access to ICT and thus cannot have effective participation in society compared with those who have better access. The purpose of this study is to test the impact of ICTs on university life in general and students' performance in particular. The study relied on an online survey questionnaire that was administered to 30 undergraduate students at Chef University. The findings of the survey revealed that there is still an important number of students who do not have easy access to ICT. Such limited access to ICTs is attributed to varied factors. Some students live in rural areas, where due to the poor internet coverage, they face difficulties in competing with students who live in urban areas with better ICT access. The lack of ICT access has hindered the students' university performance in general and their language skills, and the exchange of information with teachers and classmates.

Keywords: access, communication, ICT, performance, technology

Procedia PDF Downloads 97
11269 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 197
11268 Determinants of Conference Service Quality as Perceived by International Attendees

Authors: Shiva Hashemi, Azizan Marzuki, S. Kiumarsi

Abstract:

In recent years, conference destinations have been highly competitive; therefore, it is necessary to know about the behaviours of conference participants such as the process of their decision-making and the assessment of perceived conference quality. A conceptual research framework based on the Theory of Planned Behaviour model is presented in this research to get better understanding factors that influence it. This research study highlights key factors presented in previous studies in which behaviour intentions of participants are affected by the quality of conference. Therefore, this study is believed to provide an idea that conference participants should be encouraged to contribute to the quality and behaviour intention of the conference.

Keywords: conference, attendees, service quality, perceives value, trust, behavioural intention.

Procedia PDF Downloads 297
11267 The Impact of Childhood Cancer on Young Adult Survivors: A Life Course Perspective

Authors: Bridgette Merriman, Wen Fan

Abstract:

Background: Existing cancer survivorship literature explores varying physical, psychosocial, and psychological late effects experienced by survivors of childhood cancer. However, adolescent and young adult (AYA) survivors of childhood cancer are understudied compared to their adult and pediatric cancer counterparts. Furthermore, existing quality of life (QoL) research fails to account for how cancer survivorship affects survivors across the lifespan. Given that prior research suggests positive cognitive appraisals of adverse events - such as cancer - mitigate detrimental psychosocial symptomologies later in life; it is crucial to understand cancer’s impacts on AYA survivors of childhood malignancies across the life course in order to best support these individuals and prevent maladaptive psychosocial outcomes. Methods: This qualitative study adopted the life-course perspective to investigate the experiences of AYA survivors of childhood malignancies. Eligible patients included AYA 21-30 years old who were diagnosed with cancer <18 years old and off active treatment for >2 years. Participants were recruited through social media posts. Study fulfillment included taking part in one semi-structured video interview to explore areas of survivorship previously identified as being specific to AYA survivors. Interviews were transcribed, coded, and analyzed in accordance with narrative analysis and life-course theory. This study was approved by the Boston College Institutional Review Board. Results: Of 28 individuals who met inclusion criteria and expressed interest in the study, nineteen participants (12 women, 7 men, mean age 25.4 years old) completed the study. Life course theory analysis revealed that events relating to childhood cancer are interconnected throughout the life course rather than isolated events. This “trail of survivorship” includes age at diagnosis, transitioning to life after cancer, and relationships with other childhood survivors. Despite variability in objective characteristics surrounding these events, participants recalled positive experiences regarding at least one checkpoint, ultimately finding positive meaning from their cancer experience. Conclusions: These findings suggest that favorable subjective experiences at these checkpoints are critical in fostering positive conceptions of childhood malignancy for AYA survivors of childhood cancer. Ultimately, healthcare professionals and communities may use these findings to guide support resources and interventions for childhood cancer patients and AYA survivors, therein minimizing detrimental psychosocial effects and maximizing resiliency.

Keywords: medical sociology, pediatric oncology, survivorship, qualitative, life course perspective

Procedia PDF Downloads 53
11266 Use of Pragmatic Cues for Word Learning in Bilingual and Monolingual Children

Authors: Isabelle Lorge, Napoleon Katsos

Abstract:

BACKGROUND: Children growing up in a multilingual environment face challenges related to the need to monitor the speaker’s linguistic abilities, more frequent communication failures, and having to acquire a large number of words in a limited amount of time compared to monolinguals. As a result, bilingual learners may develop different word learning strategies, rely more on some strategies than others, and engage cognitive resources such as theory of mind and attention skills in different ways. HYPOTHESIS: The goal of our study is to investigate whether multilingual exposure leads to improvements in the ability to use pragmatic inference for word learning, i.e., to use speaker cues to derive their referring intentions, often by overcoming lower level salience effects. The speaker cues we identified as relevant are (a) use of a modifier with or without stress (‘the WET dax’ prompting the choice of the referent which has a dry counterpart), (b) referent extension (‘this is a kitten with a fep’ prompting the choice of the unique rather than shared object), (c) referent novelty (choosing novel action rather than novel object which has been manipulated already), (d) teacher versus random sampling (assuming the choice of specific examples for a novel word to be relevant to the extension of that new category), and finally (e) emotional affect (‘look at the figoo’ uttered in a sad or happy voice) . METHOD: To this end, we implemented on a touchscreen computer a task corresponding to each of the cues above, where the child had to pick the referent of a novel word. These word learning tasks (a), (b), (c), (d) and (e) were adapted from previous word learning studies. 113 children have been tested (54 reception and 59 year 1, ranging from 4 to 6 years old) in a London primary school. Bilingual or monolingual status and other relevant information (age of onset, proficiency, literacy for bilinguals) is ascertained through language questionnaires from parents (34 out of 113 received to date). While we do not yet have the data that will allow us to test for effect of bilingualism, we can already see that performances are far from approaching ceiling in any of the tasks. In some cases the children’s performances radically differ from adults’ in a qualitative way, which means that there is scope for quantitative and qualitative effects to arise between language groups. The findings should contribute to explain the puzzling speed and efficiency that bilinguals demonstrate in acquiring competence in two languages.

Keywords: bilingualism, pragmatics, word learning, attention

Procedia PDF Downloads 122
11265 Coupling of Reticular and Fuzzy Set Modelling in the Analysis of the Action Chains from Socio-Ecosystem, Case of the Renewable Natural Resources Management in Madagascar

Authors: Thierry Ganomanana, Dominique Hervé, Solo Randriamahaleo

Abstract:

Management of Malagasy renewable natural re-sources allows, in the case of forest, the mobilization of several actors with norms and/or territory. The interaction in this socio-ecosystem is represented by a graph of two different relationships in which most of action chains, from individual activities under the continuous of forest dynamic and discrete interventions by institutional, are also studied. The fuzzy set theory is adapted to graduate the elements of the set Illegal Activities in the space of sanction’s institution by his severity and in the space of degradation of forest by his extent.

Keywords: fuzzy set, graph, institution, renewable resource, system

Procedia PDF Downloads 75
11264 Investigation on Electronic and Magnetic Properties of Transition Metals Doped Zinc Selenide

Authors: S. Bentata, W. Benstaali, A. Abbad, H. A. Bentounes, B. Bouadjemi

Abstract:

The full potential linear augmented plane wave (FPLAPW) based on density-functional theory (DFT) is employed to study the electronic, magnetic and optical properties of some transition metals doped ZnSe. Calculations are carried out by varying the doped atoms. Four 3D transition elements were used as a dopant: Cr, Mn, Co and Cu in order to induce spin polarization. Our results show that, Mn and Cu-doped ZnSe could be used in spintronic devices only if additional dopants are introduced, on the contrary, transition elements showing delocalized quality such as Cr, and Co doped ZnSe might be promising candidates for application in spintronic.

Keywords: spin-up, spin-down, magnetic properties, transition metal, composite materials

Procedia PDF Downloads 257
11263 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 347
11262 Electronic States at SnO/SnO2 Heterointerfaces

Authors: A. Albar, U. Schwingenschlogel

Abstract:

Device applications of transparent conducting oxides require a thorough understanding of the physical and chemical properties of the involved interfaces. We use ab-initio calculations within density functional theory to investigate the electronic states at the SnO/SnO2 hetero-interface. Tin dioxide and monoxide are transparent materials with high n-type and p-type mobilities, respectively. This work aims at exploring the modifications of the electronic states, in particular the charge transfer, in the vicinity of the hetero-interface. The (110) interface is modeled by a super-cell approach in order to minimize the mismatch between the lattice parameters of the two compounds. We discuss the electronic density of states as a function of the distance to the interface.

Keywords: density of states, ab-initio calculations, interface states, charge transfer

Procedia PDF Downloads 401