Search results for: information and communication technology tools
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21300

Search results for: information and communication technology tools

17700 Application of Learning Media Based Augmented Reality on Molecular Geometry Concept

Authors: F. S. Irwansyah, I. Farida, Y. Maulana

Abstract:

Studying chemistry requires the ability to understand three levels of understanding in the form of macroscopic, submicroscopic and symbolic, but the lack of emphasis on the submicroscopic level leads to the understanding of chemical concepts becoming incomplete, due to the limitations of the tools capable of providing visualization of submicroscopic concepts. The purpose of this study describes the stages of making augmented reality learning media on the concept of molecular geometry and analyze the feasibility test result of augmented reality learning media on the concept of molecular geometry. This research uses Research and Development (R & D) method which produces a product of AR learning media on molecular geometry concept and test the effectiveness of the product. Research stages include concept analysis and learning indicators, design development, validation, feasibility, and limited testing. The stages of validation and limited trial are aimed to get feedback in the form of assessment, suggestion and improvement on learning aspect, material substance aspect, visual communication aspect and software engineering aspects and media feasibility in terms of media creation purpose to be used in learning. The results of the overall feasibility test obtained r-calculation 0,7-0,9 with the interpretation of high feasibility value, whereas the result of limited trial got the percentage of eligibility with the average value equal to 70,83-92,5%. This percentage indicates that AR's learning media product on the concept of molecular geometry, deserves to be used as a learning resource.

Keywords: android, augmented reality, chemical learning, geometry

Procedia PDF Downloads 210
17699 Millimeter Wave Antenna for 5G Mobile Communications Systems

Authors: Hind Mestouri

Abstract:

The study and simulation of a millimeter wave antenna for 5G mobile communication systems is the topic of this paper. We present at the beginning the general aspects of the 5G technology. We recall the objectives of the 5G standard, its architecture, and the parameters that characterize it. The proposed antenna model is designed using the CST Microwave Studio simulation software. Numerous methods are used at all steps of the design procedures, such as theoretical calculation of parameters, declaration of parameter values, and evaluation of the antenna through the obtained results. Initially, we were interested in the design of an antenna array at the 10 GHz frequency. Afterward, we also simulated and presented an antenna array at 2.5 GHz. For each antenna designed, a parametric study was conducted to understand and highlight the role and effects of the various parameters in order to optimize them and achieve a final efficient structure. The obtained results using CST Microwave Studio showed that the characteristics of the designed antennas (bandwidth, gain, radiation pattern) satisfy the specifications of 5G mobile communications.

Keywords: 5G, antenna array, millimeter wave, 10 GHz, CST Microwave Studio

Procedia PDF Downloads 84
17698 Fear and Anxiety among School Age Children Undergoing Dental Treatment in an Oral Health Unit

Authors: Maha Ibrahim Mohamed Khalifa

Abstract:

Background: Dental fear and anxiety lead to avoidance of dental treatment and deterioration of oral health. Aim of the study: To assess the levels of fear and anxiety among school-age children undergoing dental treatment. Setting: The study was conducted in Outpatient Dental Clinics at Benha Teaching Hospital. Research design: A descriptive research design was utilized to conduct the study. Sample: A purposive sample of 60 school-age children and their mothers attending at the previously mentioned setting was included. Tools: Three tools were used: Tool one: A structured interviewing questionnaire for Personal characteristics of children and their mothers. Tool two: Dental Subscale of Children's Fear Survey Schedule (CFSS-DS). Tool three: Modified Dental Anxiety Scale (MDAS). Results: It was illustrated that more than two-fifths (43.3%) of children had maximum fear and more than half of children (53.3%) had maximal anxiety. Conclusion: Many school-age children undergoing dental treatment suffer from high levels of fear and anxiety. Recommendations: The study recommended further research should be conducted to assess levels of fear and anxiety among children undergoing dental treatments and preferable nursing interventions for reducing their fears and anxieties.

Keywords: fear, anxiety, children, dental treatment

Procedia PDF Downloads 93
17697 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 143
17696 Impact of Human Resources Accounting on Employees' Performance in Organization

Authors: Hamid Saremi, Shida Hanafi

Abstract:

In an age of technology and economics, human capital has important and axial role in the organization and human resource accounting has a wide perception to key resources of organization i.e. human resources. Human resources accounting is new branch of accounting that has Short-lived and generally deals to a range of policies and measures that are related to various aspects of human resources and It gives importance to an organization's most important asset is its human resources and human resource management is the key to success in an organization and to achieve this important matter must review and evaluation of human resources data be with knowledge of accounting based on empirical studies and methods of measurement and reporting of human resources accounting information. Undoubtedly human resource management without information cannot be done and take decision and human resources accounting is practical way to inform the decision makers who are committed to harnessing human resources,, human resources accounting with applying accounting principles in the organization and is with conducting basic research on the extent of the of human resources accounting information" effect of employees' personal performance. In human resource accounting analysis and criteria and valuation of cost and manpower valuating is as the main resource in each Institute. Protection of human resources is a process that according to human resources accounting is for organization profitability. In fact, this type of accounting can be called as a major source in measurement and trends of costs and human resources valuation in each institution. What is the economic value of such assets? What is the amount of expenditures for education and training of professional individuals to value in asset account? What amount of funds spent should be considered as lost opportunity cost? In this paper, according to the literature of human resource accounting we have studied the human resources matter and its objectives and topic of the importance of human resource valuation on employee performance review and method of reporting of human resources according to different models.

Keywords: human resources, human resources, accounting, human capital, human resource management, valuation and cost of human resources, employees, performance, organization

Procedia PDF Downloads 552
17695 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 104
17694 Social Data Aggregator and Locator of Knowledge (STALK)

Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat

Abstract:

Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.

Keywords: social network, analysis, Facebook, Linkedin, git, big data

Procedia PDF Downloads 446
17693 Synchronous Versus Asynchronous Telecollaboration in Intercultural Communication

Authors: Vita Kalnberzina, Lauren Miller Anderson

Abstract:

The aim of the paper is to report on the results of the telecollaboration project results carried out between the students of the University of Latvia, National Louis University in the US, and Austral University in Chili during the Intercultural Communication course. The objectives of the study are 1) to compare different forms of student telecollaboration and virtual exchange, 2) to collect and analyse the student feedback on the telecollaboration project, 3) to evaluate the products (films) produced during the telecollaboration project. The methods of research used are as follows: Survey of the student feedback after the project, video text analysis of the films produced by the students, and interview of the students participating in the project. We would like to compare the results of a three-year collaboration project, where we tried out synchronous telecollaboration and asynchronous collaboration. The different variables that were observed were the impact of the different time zones, different language proficiency levels of students, and different curricula developed for collaboration. The main findings suggest that the effort spent by students to organize meetings in different time zones and to get to know each other diminishes the quality of the product developed and thus reduces the students' feeling of accomplishment. Therefore, we would like to propose that asynchronous collaboration where the national teams work on a film project specifically developed by the students of one university for the students of another university ends up with a better quality film, which in its turn appeals more to the students of the other university and creates a deeper intercultural bond between the collaborating students.

Keywords: telecollaboration, intercultural communication, synchronous collaboration, asynchronous collaboration

Procedia PDF Downloads 104
17692 Intelligent Fishers Harness Aquatic Organisms and Climate Change

Authors: Shih-Fang Lo, Tzu-Wei Guo, Chih-Hsuan Lee

Abstract:

Tropical fisheries are vulnerable to the physical and biogeochemical oceanic changes associated with climate change. Warmer temperatures and extreme weather have beendamaging the abundance and growth patterns of aquatic organisms. In recent year, the shrinking of fish stock and labor shortage have increased the threat to global aquacultural production. Thus, building a climate-resilient and sustainable mechanism becomes an urgent, important task for global citizens. To tackle the problem, Taiwanese fishermen applies the artificial intelligence (AI) technology. In brief, the AI system (1) measures real-time water quality and chemical parameters infish ponds; (2) monitors fish stock through segmentation, detection, and classification; and (3) implements fishermen’sprevious experiences, perceptions, and real-life practices. Applying this system can stabilize the aquacultural production and potentially increase the labor force. Furthermore, this AI technology can build up a more resilient and sustainable system for the fishermen so that they can mitigate the influence of extreme weather while maintaining or even increasing their aquacultural production. In the future, when the AI system collected and analyzed more and more data, it can be applied to different regions of the world or even adapt to the future technological or societal changes, continuously providing the most relevant and useful information for fishermen in the world.

Keywords: aquaculture, artificial intelligence (AI), real-time system, sustainable fishery

Procedia PDF Downloads 117
17691 On q-Non-extensive Statistics with Non-Tsallisian Entropy

Authors: Petr Jizba, Jan Korbel

Abstract:

We combine an axiomatics of Rényi with the q-deformed version of Khinchin axioms to obtain a measure of information (i.e., entropy) which accounts both for systems with embedded self-similarity and non-extensivity. We show that the entropy thus obtained is uniquely solved in terms of a one-parameter family of information measures. The ensuing maximal-entropy distribution is phrased in terms of a special function known as the Lambert W-function. We analyze the corresponding ‘high’ and ‘low-temperature’ asymptotics and reveal a non-trivial structure of the parameter space.

Keywords: multifractals, Rényi information entropy, THC entropy, MaxEnt, heavy-tailed distributions

Procedia PDF Downloads 446
17690 Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology

Authors: Tolga Hayit, Ucman Ergun, Ugur Fidan

Abstract:

Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area.

Keywords: Arduino, Bluetooth, glucose measurement, mobile health monitoring

Procedia PDF Downloads 326
17689 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 187
17688 A Study of Student Satisfaction of the Suan Sunandha Rajabhat University Radio Station

Authors: Prapoj Na Bangchang

Abstract:

The research aimed to study the satisfaction of Suan Sunandha Rajabhat University students towards the university radio station which broadcasts in both analog on FM 97.25 MHz and online via the university website. The sample used in this study consists of undergraduate students year 1 to year 4 from 6 faculties i.e. Faculty of Education, Faculty of Humanities and Social Sciences, Faculty of Management Science and Faculty of Industrial Technology, and Faculty of Fine and Applied Arts totaling 200 students. The tools used for data collection is survey. Data analysis applied statistics that are percentage, mean and standard deviation. The results showed that Suan Sunandha Rajabhat University students were satisfied to the place of listening service, followed by channels of broadcasting that cover both analog signals on 97.25 MHz FM and online via the Internet. However, the satisfaction level of the content offered was very low. Most of the students want the station to improve the content. Entertainment content was requested the most, followed by sports content. The lowest satisfaction level is with the broadcasting quality through analog signal. Most students asked the station to improve on the issue. However, overall, Suan Sunandha Rajabhat University students were satisfied with the university radio station broadcasted online via the university website.

Keywords: satisfaction, students, radio station, Suan Sunandha Rajabhat University

Procedia PDF Downloads 273
17687 Methodology for the Integration of Object Identification Processes in Handling and Logistic Systems

Authors: L. Kiefer, C. Richter, G. Reinhart

Abstract:

The uprising complexity in production systems due to an increasing amount of variants up to customer innovated products leads to requirements that hierarchical control systems are not able to fulfil. Therefore, factory planners can install autonomous manufacturing systems. The fundamental requirement for an autonomous control is the identification of objects within production systems. In this approach an attribute-based identification is focused for avoiding dose-dependent identification costs. Instead of using an identification mark (ID) like a radio frequency identification (RFID)-Tag, an object type is directly identified by its attributes. To facilitate that it’s recommended to include the identification and the corresponding sensors within handling processes, which connect all manufacturing processes and therefore ensure a high identification rate and reduce blind spots. The presented methodology reduces the individual effort to integrate identification processes in handling systems. First, suitable object attributes and sensor systems for object identification in a production environment are defined. By categorising these sensor systems as well as handling systems, it is possible to match them universal within a compatibility matrix. Based on that compatibility further requirements like identification time are analysed, which decide whether the combination of handling and sensor system is well suited for parallel handling and identification within an autonomous control. By analysing a list of more than thousand possible attributes, first investigations have shown, that five main characteristics (weight, form, colour, amount, and position of subattributes as drillings) are sufficient for an integrable identification. This knowledge limits the variety of identification systems and leads to a manageable complexity within the selection process. Besides the procedure, several tools, as an example a sensor pool are presented. These tools include the generated specific expert knowledge and simplify the selection. The primary tool is a pool of preconfigured identification processes depending on the chosen combination of sensor and handling device. By following the defined procedure and using the created tools, even laypeople out of other scientific fields can choose an appropriate combination of handling devices and sensors which enable parallel handling and identification.

Keywords: agent systems, autonomous control, handling systems, identification

Procedia PDF Downloads 181
17686 Online Social Network Vital to Hospitality and Tourism Marketing and Management

Authors: Nureni Asafe Yekini, Olawale Nasiru Lawal, Bola Dada, Gabriel Adeyemi Okunlola

Abstract:

This study is focused on the strengths and challenges associated with using the online social network as a rapidly evolving medium in marketing tourism services and businesses among the youths in Nigeria. The paper examines the Nigerian tourists’ attitude, mainly towards three aspects: application of Internet for travel and tourism; usage of online social networks in sharing travel and tourism experiences; and trust in electronic-media for marketing tourism businesses and services. The aim of this research is to determine the level of application of internet tools in marketing tourism businesses and services in Nigeria. This study reports an empirical analysis based on data obtained from a survey among 1004 Nigerian tourists. The outcome confirms the research hypothesis and points to crucial importance of introducing online social network site for marketing tourism businesses and services in Nigeria, and increasing the awareness for Nigeria as a tourist destination. Moreover, the paper strongly recommends the use of online social network as a tool for marketing tourism businesses and services, and the need for identifying effective framework for application of ICT tools in marketing tourism businesses and services in Nigeria at large.

Keywords: tourism business, internet, online social networks, tourism services, ICT

Procedia PDF Downloads 361
17685 Aromatic Medicinal Plant Classification Using Deep Learning

Authors: Tsega Asresa Mengistu, Getahun Tigistu

Abstract:

Computer vision is an artificial intelligence subfield that allows computers and systems to retrieve meaning from digital images. It is applied in various fields of study self-driving cars, video surveillance, agriculture, Quality control, Health care, construction, military, and everyday life. Aromatic and medicinal plants are botanical raw materials used in cosmetics, medicines, health foods, and other natural health products for therapeutic and Aromatic culinary purposes. Herbal industries depend on these special plants. These plants and their products not only serve as a valuable source of income for farmers and entrepreneurs, and going to export not only industrial raw materials but also valuable foreign exchange. There is a lack of technologies for the classification and identification of Aromatic and medicinal plants in Ethiopia. The manual identification system of plants is a tedious, time-consuming, labor, and lengthy process. For farmers, industry personnel, academics, and pharmacists, it is still difficult to identify parts and usage of plants before ingredient extraction. In order to solve this problem, the researcher uses a deep learning approach for the efficient identification of aromatic and medicinal plants by using a convolutional neural network. The objective of the proposed study is to identify the aromatic and medicinal plant Parts and usages using computer vision technology. Therefore, this research initiated a model for the automatic classification of aromatic and medicinal plants by exploring computer vision technology. Morphological characteristics are still the most important tools for the identification of plants. Leaves are the most widely used parts of plants besides the root, flower and fruit, latex, and barks. The study was conducted on aromatic and medicinal plants available in the Ethiopian Institute of Agricultural Research center. An experimental research design is proposed for this study. This is conducted in Convolutional neural networks and Transfer learning. The Researcher employs sigmoid Activation as the last layer and Rectifier liner unit in the hidden layers. Finally, the researcher got a classification accuracy of 66.4 in convolutional neural networks and 67.3 in mobile networks, and 64 in the Visual Geometry Group.

Keywords: aromatic and medicinal plants, computer vision, deep convolutional neural network

Procedia PDF Downloads 446
17684 Benefits of Automobile Electronic Technology in the Logistics Industry in Third World Countries

Authors: Jonathan Matyenyika

Abstract:

In recent years, automobile manufacturers have increasingly produced vehicles equipped with cutting-edge automotive electronic technology to match the fast-paced digital world of today; this has brought about various benefits in different business sectors that make use of these vehicles as a means of turning over a profit. In the logistics industry, vehicles equipped with this technology have proved to be very utilitarian; this paper focuses on the benefits automobile electronic equipped vehicles have in the logistics industry. Automotive vehicle manufacturers have introduced new technological electronic features to their vehicles to enhance and improve the overall performance, efficiency, safety and driver comfort. Some of these features have proved to be beneficial to logistics operators. To start with the introduction of adaptive cruise control in long-distance haulage vehicles, to see how this system benefits the drivers, we carried out research in the form of interviews with long-distance truck drivers with the main question being, what major difference have they experienced since they started to operate vehicles equipped with this technology to which most stated they had noticed that they are less tired and are able to drive longer distances as compared to when they used vehicles not equipped with this system. As a result, they can deliver faster and take on the next assignment, thus improving efficiency and bringing in more monetary return for the logistics company. Secondly, the introduction of electric hybrid technology, this system allows the vehicle to be propelled by electric power stored in batteries located in the vehicle instead of fossil fuel. Consequently, this benefits the logistic company as vehicles become cheaper to run as electricity is more affordable as compared to fossil fuel. The merging of electronic systems in vehicles has proved to be of great benefit, as my research proves that this can benefit the logistics industry in plenty of ways.

Keywords: logistics, manufacturing, hybrid technology, haulage vehicles

Procedia PDF Downloads 62
17683 Contribution to the Development of a New Design of Dentist's Gowns: A Case Study of Using Infra-Red Technology and Pressure Sensors

Authors: Tran Thi Anh Dao, M. Arnold, L. Schacher, D. C. Adolphe, G. Reys

Abstract:

During tooth extraction or implant surgery, dentists are in contact with numerous infectious germs from patients' saliva and blood. For that reason, dentist's clothes have to play their role of protection from contamination. In addition, dentist's apparels should be not only protective but also comfortable and breathable because dentists have to perform many operations and treatments on patients throughout the day with high concentration and intensity. However, this type of protective garments has not been studied scientifically, whereas dentists are facing new risks and eager for looking for a comfortable personal protective equipment. For that reason, we have proposed some new designs of dentist's gown. They were expected to diminish heat accumulation that are considered as an important factor in reducing the level of comfort experienced by users. Experiments using infra-red technology were carried out in order to compare the breathable properties between a traditional gown and a new design with open zones. Another experiment using pressure sensors was also carried out to study ergonomic aspects trough the flexibility of movements of sleeves. The sleeves-design which is considered comfortable and flexible will be chosen for the further step. The results from the two experiments provide valuable information for the development of a new design of dentists' gowns in order to achieve maximum levels of cooling and comfort for the human body.

Keywords: garment, dentists, comfort, design, protection, thermal

Procedia PDF Downloads 223
17682 Patient Service Improvement in Public Emergency Department Using Discrete Event Simulation

Authors: Dana Mohammed, Fatemah Abdullah, Hawraa Ali, Najat Al-Shaer, Rawan Al-Awadhi, , Magdy Helal

Abstract:

We study the patient service performance at the emergency department of a major Kuwaiti public hospital, using discrete simulation and lean concepts. In addition to the common problems in such health care systems (over crowdedness, facilities planning and usage, scheduling and staffing, capacity planning) the emergency department suffered from several cultural and patient behavioural issues. Those contributed significantly to the system problems and constituted major obstacles in maintaining the performance in control. This led to overly long waiting times and the potential of delaying providing help to critical cases. We utilized the visual management tools to mitigate the impact of the patients’ behaviours and attitudes and improve the logistics inside the system. In addition a proposal is made to automate the date collection and communication within the department using RFID-based barcoding system. Discrete event simulation models were developed as decision support systems; to study the operational problems and assess achieved improvements. The simulation analysis resulted in cutting the patient delays to about 35% of their current values by reallocating and rescheduling the medical staff. Combined with the application of the visual management concepts, this provided the basis to improving patient service without any major investments.

Keywords: simulation, visual management, health care system, patient

Procedia PDF Downloads 480
17681 The Communication of Audit Report: Key Audit Matters in United Kingdom

Authors: L. Sierra, N. Gambetta, M. A. Garcia-Benau, M. Orta

Abstract:

Financial scandals and financial crisis have led to an international debate on the value of auditing. In recent years there have been significant legislative reforms aiming to increase markets’ confidence in audit services. In particular, there has been a significant debate on the need to improve the communication of auditors with audit reports users as a way to improve its informative value and thus, to improve audit quality. The International Auditing and Assurance Standards Board (IAASB) has proposed changes to the audit report standards. The International Standard on Auditing 701, Communicating Key Audit Matters (KAM) in the Independent Auditor's Report, has introduced new concepts that go beyond the auditor's opinion and requires to disclose the risks that, from the auditor's point of view, are more significant in the audited company information. Focusing on the companies included in the Financial Times Stock Exchange 100 index, this study aims to focus on the analysis of the determinants of the number of KAM disclosed by the auditor in the audit report and moreover, the analysis of the determinants of the different type of KAM reported during the period 2013-2015. To test the hypotheses in the empirical research, two different models have been used. The first one is a linear regression model to identify the client’s characteristics, industry sector and auditor’s characteristics that are related to the number of KAM disclosed in the audit report. Secondly, a logistic regression model is used to identify the determinants of the number of each KAM type disclosed in the audit report; in line with the risk-based approach to auditing financial statements, we categorized the KAM in 2 groups: Entity-level KAM and Accounting-level KAM. Regarding the auditor’s characteristics impact on the KAM disclosure, the results show that PwC tends to report a larger number of KAM while KPMG tends to report less KAM in the audit report. Further, PwC reports a larger number of entity-level risk KAM while KPMG reports less account-level risk KAM. The results also show that companies paying higher fees tend to have more entity-level risk KAM and less account-level risk KAM. The materiality level is positively related to the number of account-level risk KAM. Additionally, these study results show that the relationship between client’s characteristics and number of KAM is more evident in account-level risk KAM than in entity-level risk KAM. A highly leveraged company carries a great deal of risk, but due to this, they are usually subject to strong capital providers monitoring resulting in less account-level risk KAM. The results reveal that the number of account-level risk KAM is strongly related to the industry sector in which the company operates assets. This study helps to understand the UK audit market, provides information to auditors and finally, it opens new research avenues in the academia.

Keywords: FTSE 100, IAS 701, key audit matters, auditor’s characteristics, client’s characteristics

Procedia PDF Downloads 233
17680 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 151
17679 Instructional Consequences of the Transiency of Spoken Words

Authors: Slava Kalyuga, Sujanya Sombatteera

Abstract:

In multimedia learning, written text is often transformed into spoken (narrated) text. This transient information may overwhelm limited processing capacity of working memory and inhibit learning instead of improving it. The paper reviews recent empirical studies in modality and verbal redundancy effects within a cognitive load framework and outlines conditions under which negative effects of transiency may occur. According to the modality effect, textual information accompanying pictures should be presented in an auditory rather than visual form in order to engage two available channels of working memory – auditory and visual - instead of only one of them. However, some studies failed to replicate the modality effect and found differences opposite to those expected. Also, according to the multimedia redundancy effect, the same information should not be presented simultaneously in different modalities to avoid unnecessary cognitive load imposed by the integration of redundant sources of information. However, a few studies failed to replicate the multimedia redundancy effect too. Transiency of information is used to explain these controversial results.

Keywords: cognitive load, transient information, modality effect, verbal redundancy effect

Procedia PDF Downloads 382
17678 Low-Cost Space-Based Geoengineering: An Assessment Based on Self-Replicating Manufacturing of in-Situ Resources on the Moon

Authors: Alex Ellery

Abstract:

Geoengineering approaches to climate change mitigation are unpopular and regarded with suspicion. Of these, space-based approaches are regarded as unworkable and enormously costly. Here, a space-based approach is presented that is modest in cost, fully controllable and reversible, and acts as a natural spur to the development of solar power satellites over the longer term as a clean source of energy. The low-cost approach exploits self-replication technology which it is proposed may be enabled by 3D printing technology. Self-replication of 3D printing platforms will enable mass production of simple spacecraft units. Key elements being developed are 3D-printable electric motors and 3D-printable vacuum tube-based electronics. The power of such technologies will open up enormous possibilities at low cost including space-based geoengineering.

Keywords: 3D printing, in-situ resource utilization, self-replication technology, space-based geoengineering

Procedia PDF Downloads 428
17677 Utilization of Informatics to Transform Clinical Data into a Simplified Reporting System to Examine the Analgesic Prescribing Practices of a Single Urban Hospital’s Emergency Department

Authors: Rubaiat S. Ahmed, Jemer Garrido, Sergey M. Motov

Abstract:

Clinical informatics (CI) enables the transformation of data into a systematic organization that improves the quality of care and the generation of positive health outcomes.Innovative technology through informatics that compiles accurate data on analgesic utilization in the emergency department can enhance pain management in this important clinical setting. We aim to establish a simplified reporting system through CI to examine and assess the analgesic prescribing practices in the EDthrough executing a U.S. federal grant project on opioid reduction initiatives. Queried data points of interest from a level-one trauma ED’s electronic medical records were used to create data sets and develop informational/visual reporting dashboards (on Microsoft Excel and Google Sheets) concerning analgesic usage across several pre-defined parameters and performance metrics using CI. The data was then qualitatively analyzed to evaluate ED analgesic prescribing trends by departmental clinicians and leadership. During a 12-month reporting period (Dec. 1, 2020 – Nov. 30, 2021) for the ongoing project, about 41% of all ED patient visits (N = 91,747) were for pain conditions, of which 81.6% received analgesics in the ED and at discharge (D/C). Of those treated with analgesics, 24.3% received opioids compared to 75.7% receiving opioid alternatives in the ED and at D/C, including non-pharmacological modalities. Demographics showed among patients receiving analgesics, 56.7% were aged between 18-64, 51.8% were male, 51.7% were white, and 66.2% had government funded health insurance. Ninety-one percent of all opioids prescribed were in the ED, with intravenous (IV) morphine, IV fentanyl, and morphine sulfate immediate release (MSIR) tablets accounting for 88.0% of ED dispensed opioids. With 9.3% of all opioids prescribed at D/C, MSIR was dispensed 72.1% of the time. Hydrocodone, oxycodone, and tramadol usage to only 10-15% of the time, and hydromorphone at 0%. Of opioid alternatives, non-steroidal anti-inflammatory drugs were utilized 60.3% of the time, 23.5% with local anesthetics and ultrasound-guided nerve blocks, and 7.9% with acetaminophen as the primary non-opioid drug categories prescribed by ED providers. Non-pharmacological analgesia included virtual reality and other modalities. An average of 18.5 ED opioid orders and 1.9 opioid D/C prescriptions per 102.4 daily ED patient visits was observed for the period. Compared to other specialties within our institution, 2.0% of opioid D/C prescriptions are given by ED providers, compared to the national average of 4.8%. Opioid alternatives accounted for 69.7% and 30.3% usage, versus 90.7% and 9.3% for opioids in the ED and D/C, respectively.There is a pressing need for concise, relevant, and reliable clinical data on analgesic utilization for ED providers and leadership to evaluate prescribing practices and make data-driven decisions. Basic computer software can be used to create effective visual reporting dashboards with indicators that convey relevant and timely information in an easy-to-digest manner. We accurately examined our ED's analgesic prescribing practices using CI through dashboard reporting. Such reporting tools can quickly identify key performance indicators and prioritize data to enhance pain management and promote safe prescribing practices in the emergency setting.

Keywords: clinical informatics, dashboards, emergency department, health informatics, healthcare informatics, medical informatics, opioids, pain management, technology

Procedia PDF Downloads 148
17676 The Impact of Cloud Accounting on Boards of Directors in the Middle East and North African (MENA) Countries

Authors: Ahmad Alqatan

Abstract:

Purpose: The purpose of this study is to analyze how the adoption of cloud accounting systems influences the governance practices and performance of boards of directors in MENA countries. The research aims to identify the benefits and challenges associated with cloud accounting and its role in improving board efficiency and oversight. Methodology: This research employs a mixed-method approach, combining quantitative surveys and qualitative interviews with board members and financial officers from a diverse range of companies in the MENA region. The quantitative data is analyzed to determine patterns and correlations, while qualitative insights provide a deeper understanding of the contextual factors influencing cloud accounting adoption and its impacts. Findings: The findings indicate that cloud accounting significantly enhances the decision-making capabilities of boards by providing real-time financial information and facilitating better communication among board members. Companies using cloud accounting reports improved financial oversight and more timely and accurate financial reporting. However, the research also identifies challenges such as cybersecurity concerns, resistance to change, and the need for ongoing training and support. Practical Implications: The study suggests that MENA companies can benefit from investing in cloud accounting technologies to improve board governance and strategic decision-making. It highlights the importance of addressing cybersecurity issues and providing adequate training for board members to maximize the advantages of cloud accounting. Originality: This research contributes to the limited literature on cloud accounting in the MENA region, offering valuable insights for policymakers, business leaders, and academics. It underscores the transformative potential of cloud accounting for enhancing board performance and corporate governance in emerging markets.

Keywords: cloud accounting, board of directors, MENA region, corporate governance, financial transparency, real-time data, decision-making, cybersecurity, technology adoption

Procedia PDF Downloads 41
17675 Passengers’ Behavior Analysis under the Public Transport Disruption: An Agent-Based Simulation

Authors: M. Rahimi, F. Corman

Abstract:

This paper study the travel behavior of passengers in a public transport disruption under information provision strategies. We develop a within-day approach for multi-agent simulation to evaluate the behavior of the agents, under comprehensive scenarios through various information exposure, equilibrium, and non-equilibrium scenarios. In particular, we quantify the effects of information strategies in disruption situation on passengers’ satisfaction, number of involved agents, and the caused delay. An agent-based micro-simulation model (MATSim) is applied for the city of Zürich, Switzerland, for the purpose of activity-based simulation in a multimodal network. Statistic outcome is analysed for all the agents who may be involved in the disruption. Agents’ movement in the public transport network illustrates agents’ adaptations to available information about the disruption. Agents’ delays and utility reveal that information significantly affects agents’ satisfaction and delay in public transport disruption. Besides, while the earlier availability of the information causes the fewer consequent delay for the involved agents, however, it also leads to more amount of affected agents.

Keywords: agent-based simulation, disruption management, passengers’ behavior simulation, public transport

Procedia PDF Downloads 157
17674 21st Century Business Dynamics: Acting Local and Thinking Global through Extensive Business Reporting Language (XBRL)

Authors: Samuel Faboyede, Obiamaka Nwobu, Samuel Fakile, Dickson Mukoro

Abstract:

In the present dynamic business environment of corporate governance and regulations, financial reporting is an inevitable and extremely significant process for every business enterprise. Several financial elements such as Annual Reports, Quarterly Reports, ad-hoc filing, and other statutory/regulatory reports provide vital information to the investors and regulators, and establish trust and rapport between the internal and external stakeholders of an organization. Investors today are very demanding, and emphasize greatly on authenticity, accuracy, and reliability of financial data. For many companies, the Internet plays a key role in communicating business information, internally to management and externally to stakeholders. Despite high prominence being attached to external reporting, it is disconnected in most companies, who generate their external financial documents manually, resulting in high degree of errors and prolonged cycle times. Chief Executive Officers and Chief Financial Officers are increasingly susceptible to endorsing error-laden reports, late filing of reports, and non-compliance with regulatory acts. There is a lack of common platform to manage the sensitive information – internally and externally – in financial reports. The Internet financial reporting language known as eXtensible Business Reporting Language (XBRL) continues to develop in the face of challenges and has now reached the point where much of its promised benefits are available. This paper looks at the emergence of this revolutionary twenty-first century language of digital reporting. It posits that today, the world is on the brink of an Internet revolution that will redefine the ‘business reporting’ paradigm. The new Internet technology, eXtensible Business Reporting Language (XBRL), is already being deployed and used across the world. It finds that XBRL is an eXtensible Markup Language (XML) based information format that places self-describing tags around discrete pieces of business information. Once tags are assigned, it is possible to extract only desired information, rather than having to download or print an entire document. XBRL is platform-independent and it will work on any current or recent-year operating system, or any computer and interface with virtually any software. The paper concludes that corporate stakeholders and the government cannot afford to ignore the XBRL. It therefore recommends that all must act locally and think globally now via the adoption of XBRL that is changing the face of worldwide business reporting.

Keywords: XBRL, financial reporting, internet, internal and external reports

Procedia PDF Downloads 293
17673 Construction Technology of Modified Vacuum Pre-Loading Method for Slurry Dredged Soil

Authors: Ali H. Mahfouz, Gao Ming-Jun, Mohamad Sharif

Abstract:

Slurry dredged soil at coastal area has a high water content, poor permeability, and low surface intensity. Hence, it is infeasible to use vacuum preloading method to treat this type of soil foundation. For the special case of super soft ground, a floating bridge is first constructed on muddy soil and used as a service road and platform for implementing the modified vacuum preloading method. The modified technique of vacuum preloading and its construction process for the super soft soil foundation improvement is then studied. Application of modified vacuum preloading method shows that the technology and its construction process are highly suitable for improving the super soft soil foundation in coastal areas.

Keywords: super soft foundation, dredger fill, vacuum preloading, foundation treatment, construction technology

Procedia PDF Downloads 614
17672 Exploring the 1,3-Dipolar Cycloaddition Reaction between Nitrilimine and 6-Methyl-4,5-dihydropyridazin-3(2h)-one through MEDT and Molecular Docking Analysis

Authors: Zineb Ouahdi

Abstract:

Spirocyclic compound derivatives, with their unique heterocyclic motifs, serve as a continual source of inspiration in the pursuit of developing potential therapeutic agents. These compounds are diverse in their chemical structures; some have fully saturated skeletons, while others are partially unsaturated. Nevertheless, these compounds share a characteristic feature with natural products - the presence of at least one heteroatom in one of their rings. The inclusion of a C = O dipolarophile in pyridazinones imparts an exciting aspect for 1,3-dipolar cycloaddition reactions, the focal point of our study. Our research has involved a detailed theoretical investigation of the reaction between ethyl (Z)-2-bromo-2-(2-(p-tolyl)hydrazono)acetate and 6-methyl-4,5-dihydropyridazine-3(2H)-one. This has been accomplished using the DFT/B3LYP/6-31g(d,p) method, intending to illuminate the chemical pathway of this reaction. The chemical reactivity theories we used for this purpose included FMO, TS, and local and global indices derived from conceptual DFT. The theoretical framework outlined in this study allowed us to propose a reaction mechanism for cycloaddition reactions. It also enabled the identification of the potential activities of the analyzed compounds (P1, P2, P3, P4, P5, and P6) against the major protease of the coronavirus disease (COVID-19). This was achieved using various computational tools, including AutoDock Tools, Autodock Vina, Autodock 4, and PYRX.

Keywords: MEDT, pyridazin, cycloaddition, FMO, DFT, docking

Procedia PDF Downloads 107
17671 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 311