Search results for: information security awareness
11200 A Study on the Impacts of Computer Aided Design on the Architectural Design Process
Authors: Halleh Nejadriahi, Kamyar Arab
Abstract:
Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.Keywords: architecture, architectural practice, computer aided design (CAD), design process
Procedia PDF Downloads 36011199 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)
Authors: Sopio Totibadze
Abstract:
Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.Keywords: femicide, hate language, media discourse, sociolinguistics
Procedia PDF Downloads 8311198 The Nuclear Power Plant Environment Monitoring System through Mobile Units
Authors: P. Tanuska, A. Elias, P. Vazan, B. Zahradnikova
Abstract:
This article describes the information system for measuring and evaluating the dose rate in the environment of nuclear power plants Mochovce and Bohunice in Slovakia. The article presents the results achieved in the implementation of the EU project–Research of monitoring and evaluation of non-standard conditions in the area of nuclear power plants. The objectives included improving the system of acquisition, measuring and evaluating data with mobile and autonomous units applying new knowledge from research. The article provides basic and specific features of the system and compared to the previous version of the system, also new functions.Keywords: information system, dose rate, mobile devices, nuclear power plant
Procedia PDF Downloads 37611197 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer
Authors: Saadia Drissi
Abstract:
The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer
Procedia PDF Downloads 54511196 Going Viral: Expanding a Student-Run COVID-19 Journal Club to Social Media
Authors: Joseph Dodson, Robert Roth, Alexander Hodakowski, Leah Greenfield, Melissa Porterhouse, Natalie Maltby, Rachel Sadowsky
Abstract:
Introduction: Throughout the COVID-19 pandemic, countless research publications were released regarding SARS-CoV-2 and its variants, suggested treatments, and vaccine safety and efficacy. Daily publication of research became overwhelming for health professionals and the general public to stay informed. To address this problem, a group of 70 students across the four colleges at Rush University created the “Rush University COVID-19 Journal Club.” To broaden the available audience, the journal club then expanded to social media. Methods: Easily accessible and understandable summaries of the research were written by students and sent to faculty sponsors for feedback. Following the revision, summaries were published weekly on the Rush University COVID-19 Journal Club website for clinicians and students to use for reference. An Instagram page was then created, and information was further condensed into succinct posts to address COVID-19 “FAQs.” Next, a survey was distributed to followers of the Instagram page with questions meant to assess the effectiveness of the platform and gain feedback. A 5-point Likert scale was used as the primary question format. Results: The Instagram page accrued 749 followers and posted 52 unique posts over a 2 year period. Preliminary results from the surveys demonstrate that over 80% of respondents strongly agree that the Instagram posts 1) are an effective platform for the public presentation of factual COVID-19-related information; 2) provide relevant and valuable information; 3) provide information that is clear, concise, and can be easily understood. Conclusion: These results suggest that the Rush COVID-19 Journal Club was able to successfully create a social media presence and convey information without sacrificing scholarly integrity. Other academic institutions may benefit from the application of this model to help students and clinicians with the interpretation and evaluation of research topics with large bodies of evidence.Keywords: SARS-CoV-2, COVID-19, public health, social media, SARS-CoV-2 vaccine, SARS-CoV-2 variants
Procedia PDF Downloads 12811195 Comparison of Sourcing Process in Supply Chain Operation References Model and Business Information Systems
Authors: Batuhan Kocaoglu
Abstract:
Although using powerful systems like ERP (Enterprise Resource Planning), companies still cannot benchmark their processes and measure their process performance easily based on predefined SCOR (Supply Chain Operation References) terms. The purpose of this research is to identify common and corresponding processes to present a conceptual model to model and measure the purchasing process of an organization. The main steps for the research study are: Literature review related to 'procure to pay' process in ERP system; Literature review related to 'sourcing' process in SCOR model; To develop a conceptual model integrating 'sourcing' of SCOR model and 'procure to pay' of ERP model. In this study, we examined the similarities and differences between these two models. The proposed framework is based on the assumptions that are drawn from (1) the body of literature, (2) the authors’ experience by working in the field of enterprise and logistics information systems. The modeling framework provides a structured and systematic way to model and decompose necessary information from conceptual representation to process element specification. This conceptual model will help the organizations to make quality purchasing system measurement instruments and tools. And offered adaptation issues for ERP systems and SCOR model will provide a more benchmarkable and worldwide standard business process.Keywords: SCOR, ERP, procure to pay, sourcing, reference model
Procedia PDF Downloads 36211194 Effects of Age and Energy Expenditure on Obesity Among Adults in Abeokuta, Nigeria
Authors: Adeniyi Samuel Adekoya
Abstract:
The study assessed the independent effects of age and energy expenditure on the risks of obesity among adults (20-64 years). A cross-sectional study with changes in age, changes in work and leisure-time, and physical activities information played roles, with cut-off for energy expenditure and BMI in rural and urban localities. Physical activity information determined the energy expenditure, while the BMI determined the risk of obesity among the subjects. Statistically, age has a strong and direct association with obesity in both rural and urban settings, while energy expenditure was inverse in its association. Findings from the this study showed that in developing societies, age tends to be a risk factor for obesity, whereas energy expenditure is to be protective. Level of education and economic development are also relevant modifiers of the influences exerted by these variables.Keywords: age, energy expenditure, BMI, rural/urban
Procedia PDF Downloads 43111193 Developing Communicative Skills in Foreign Languages by Video Tasks
Authors: Ekaterina G. Lipatova
Abstract:
The developing potential of a video task in teaching foreign languages involves the opportunities to improve four aspects of speech production process: listening, reading, speaking and writing. A video represents the sequence of actions, realized in the pictures logically connected and verbalized speech flow that simplifies and stimulates the process of perception. In this connection listening skills of students are developed effectively as well as their intellectual properties such as synthesizing, analyzing and generalizing the information. In terms of teaching capacity, a video task, in our opinion, is more stimulating than a traditional listening, since it involves the student into the plot of the communicative situation, emotional background and potentially makes them react to the gist in the cognitive and communicative ways. To be an effective method of teaching the video task should be structured in the way of psycho-linguistic characteristics of speech production process, in other words, should include three phases: before-watching, while-watching and after-watching. The system of tasks provided to each phase might involve the situations on reflecting to the video content in the forms of filling-the-gap tasks, multiple choice, True-or-False tasks (reading skills), exercises on expressing the opinion, project fulfilling (writing and speaking skills). In the before-watching phase we offer the students to adjust their perception mechanism to the topic and the problem of the chosen video by such task as “what do you know about such a problem?”, “is it new for you?”, “have you ever faced the situation of…?”. Then we proceed with the lexical and grammatical analysis of language units that form the body of a speech sample to lessen the perception and develop the student’s lexicon. The goal of while-watching phase is to build the student’s awareness about the problem presented in the video and challenge their inner attitude towards what they have seen by identifying the mistakes in the statements about the video content or making the summary, justifying their understanding. Finally, we move on to development of their speech skills within the communicative situation they observed and learnt by stimulating them to search the similar ideas in their backgrounds and represent them orally or in the written form or express their own opinion on the problem. It is compulsory to highlight, that a video task should contain the urgent, valid and interesting event related to the future profession of the student, since it will help to activate cognitive, emotional, verbal and ethic capacity of students. Also, logically structured video tasks are easily integrated into the system of e-learning and can provide the opportunity for the students to work with the foreign language on their own.Keywords: communicative situation, perception mechanism, speech production process, speech skills
Procedia PDF Downloads 24511192 Empirical Investigation of Gender Differences in Information Processing Style, Tinkering, and Self-Efficacy for Robot Tele-Operation
Authors: Dilruba Showkat, Cindy Grimm
Abstract:
As robots become more ubiquitous, it is significant for us to understand how different groups of people respond to possible ways of interacting with the robot. In this study, we focused on gender differences while users were tele-operating a humanoid robot that was physically co-located with them. We investigated three factors during the human-robot interaction (1) information processing strategy (2) self-efficacy and (3) tinkering or exploratory behavior. The experimental results show that the information on how to use the robot was processed comprehensively by the female participants whereas males processed them selectively (p < 0.001). Males were more confident when using the robot than females (p = 0.0002). Males tinkered more with the robot than females (p = 0.0021). We found that tinkering was positively correlated (p = 0.0068) with task success and negatively correlated (p = 0.0032) with task completion time. Tinkering might have resulted in greater task success and lower task completion time for males. Findings from this research can be used for making design decisions for robots and open new research directions. Our results show the importance of accounting for gender differences when developing interfaces for interacting with robots and open new research directions.Keywords: humanoid robots, tele-operation, gender differences, human-robot interaction
Procedia PDF Downloads 16711191 Marine Ecosystem Mapping of Taman Laut Labuan: The First Habitat Mapping Effort to Support Marine Parks Management in Malaysia
Authors: K. Ismail, A. Ali, R. C. Hasan, I. Khalil, Z. Bachok, N. M. Said, A. M. Muslim, M. S. Che Din, W. S. Chong
Abstract:
The marine ecosystem in Malaysia holds invaluable potential in terms of economics, food security, pharmaceuticals components and protection from natural hazards. Although exploration of oil and gas industry and fisheries are active within Malaysian waters, knowledge of the seascape and ecological functioning of benthic habitats is still extremely poor in the marine parks around Malaysia due to the lack of detailed seafloor information. Consequently, it is difficult to manage marine resources effectively, protect ecologically important areas and set legislation to safeguard the marine parks. The limited baseline data hinders scientific linkage to support effective marine spatial management in Malaysia. This became the main driver behind the first seabed mapping effort at the national level. Taman Laut Labuan (TLL) is located to the west coast of Sabah and to the east of South China Sea. The total area of TLL is approximately 158.15 km2, comprises of three islands namely Pulau Kuraman, Rusukan Besar and Rusukan Kecil and is characterised by shallow fringing reef with few submerged shallow reef. The unfamiliar rocky shorelines limit the survey of multibeam echosounder to area with depth more than 10 m. Whereas, singlebeam and side scan sonar systems were used to acquire the data for area with depth less than 10 m. By integrating data from multibeam bathymetry and backscatter with singlebeam bathymetry and side sonar images, we produce a substrate map and coral coverage map for the TLL using i) marine landscape mapping technique and ii) RSOBIA ArcGIS toolbar (developed by T. Le Bas). We take the initiative to explore the ability of aerial drone and satellite image (WorldView-3) to derive the depths and substrate type within the intertidal and subtidal zone where it is not accessible via acoustic mapping. Although the coverage was limited, the outcome showed a promising technique to be incorporated towards establishing a guideline to facilitate a standard practice for efficient marine spatial management in Malaysia.Keywords: habitat mapping, marine spatial management, South China Sea, National seabed mapping
Procedia PDF Downloads 22411190 An Information Matrix Goodness-of-Fit Test of the Conditional Logistic Model for Matched Case-Control Studies
Authors: Li-Ching Chen
Abstract:
The case-control design has been widely applied in clinical and epidemiological studies to investigate the association between risk factors and a given disease. The retrospective design can be easily implemented and is more economical over prospective studies. To adjust effects for confounding factors, methods such as stratification at the design stage and may be adopted. When some major confounding factors are difficult to be quantified, a matching design provides an opportunity for researchers to control the confounding effects. The matching effects can be parameterized by the intercepts of logistic models and the conditional logistic regression analysis is then adopted. This study demonstrates an information-matrix-based goodness-of-fit statistic to test the validity of the logistic regression model for matched case-control data. The asymptotic null distribution of this proposed test statistic is inferred. It needs neither to employ a simulation to evaluate its critical values nor to partition covariate space. The asymptotic power of this test statistic is also derived. The performance of the proposed method is assessed through simulation studies. An example of the real data set is applied to illustrate the implementation of the proposed method as well.Keywords: conditional logistic model, goodness-of-fit, information matrix, matched case-control studies
Procedia PDF Downloads 29211189 A Review Paper for Detecting Zero-Day Vulnerabilities
Authors: Tshegofatso Rambau, Tonderai Muchenje
Abstract:
Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.Keywords: zero-day attacks, exploitation, vulnerabilities
Procedia PDF Downloads 10211188 The Chronological Changes between Law and Politics in Shi’i Understanding
Authors: Sumeyra Yakar
Abstract:
The idea of this research had its genesis from the writer's interest in Shi'i school and religio-political atmosphere in contemporary Iran. The research aims to identify how the past dynamics between political and legal figures and their relationship between each other affect contemporary relationship between political and religious authorities at the local and global level. It attempts to explore religio-politic Shi'i figures and their relationship with the official jurisprudence from the 15th century to the contemporary period. The mutual interaction between the opinion and acts of political figures and jurisprudential institutions enlightens the role of religious values to control the mass population. After the collapse of the Safawīd Dynasty, Shi'i believers lost their political guardian and legal independence, and the situation gave them the inspiration to create unique ideologies or political approaches to solve the governance crisis. The analysis of authoritative political figures and their scholastic contributions elucidate the connection between political powers and religious doctrines under the protection of sectarian oriented theocratic governments. Additionally, understanding the incremental influence of political (historical) Shi'i figures into religious doctrines shed lights on the chronological development of peculiar government style and authoritative hierarchy in contemporary Shi’i communities. The research as being interdisciplinary one offers to create an academic awareness between legal and political factors in Shi’i school of thought and encompasses political, religious, social, financial and cultural atmospheres of the countries in which the political figures lived. The Iranian regime enshrines the principle of vilāyāt-i faqīh (guardianship of the jurist) which enables jurists to solve the conflict between law as an ideal system, in theory, and law in practice. The paper aims to show how the religious, educational system works in harmony with the governmental authorities with the concept of vilāyāt-i faqīh in Iran and contributes to the creation of religious custom in the society. Contemporary relationship between the political figures and religious authorities in Iran will be explained by religio-legal dimensions. The methodology that will be applied by the study has been chosen in order to acquire information and deduce conclusions from the opinions of the scholars. Thus, the research method is mainly descriptive and qualitative. Three lines of description are pursued throughout the study; the explanation of political ideas belonging to the religio-political figures theoretically depending on written texts; the description of approaches adopted by contemporary Iranian and Saudi scholars relating to the legal systems (theoretically); and the explanation of the responses of governmental authorities.Keywords: clergy (‘ulamā), guardianship of the jurist (vilāyāt-i faqīh), Iran, Shi’i figures
Procedia PDF Downloads 12711187 Currency Exchange Rate Forecasts Using Quantile Regression
Authors: Yuzhi Cai
Abstract:
In this paper, we discuss a Bayesian approach to quantile autoregressive (QAR) time series model estimation and forecasting. Together with a combining forecasts technique, we then predict USD to GBP currency exchange rates. Combined forecasts contain all the information captured by the fitted QAR models at different quantile levels and are therefore better than those obtained from individual models. Our results show that an unequally weighted combining method performs better than other forecasting methodology. We found that a median AR model can perform well in point forecasting when the predictive density functions are symmetric. However, in practice, using the median AR model alone may involve the loss of information about the data captured by other QAR models. We recommend that combined forecasts should be used whenever possible.Keywords: combining forecasts, MCMC, predictive density functions, quantile forecasting, quantile modelling
Procedia PDF Downloads 25611186 The Implications of Some Social Variables in Increasing the Unemployed in Egypt
Authors: Mohamed Elkhouli
Abstract:
This research sets out to identify some social factors or variables that may need to be controlled in order to decrease the volume of unemployed in Egypt. As well as, it comes to investigate the relationship between a set of social variables and unemployment issue in Egypt in the sake of determining the most important social variables influencing the rise of unemployed during the time series targeted (2002-2012). Highlighting the unemployment issue is becoming an increasingly important topic in all countries throughout the world resulting from expand their globalization efforts. In general, the study tries to determine what the most social priorities are likely to adopt seriously by the Egypt's government in order to solve the unemployed problem. The results showed that the low value for both of small projects and the total value of disbursed social security respectively have significant impact on increasing the No. of unemployed in Egypt, according to the target period by the current study.Keywords: Egypt, social status, unemployment, unemployed
Procedia PDF Downloads 32611185 Gaussian Operations with a Single Trapped Ion
Authors: Bruna G. M. Araújo, Pedro M. M. Q. Cruz
Abstract:
In this letter, we review the literature of the major concepts that govern Gaussian quantum information. As we work with quantum information and computation with continuous variables, Gaussian states are needed to better describe these systems. Analyzing a single ion locked in a Paul trap we use the interaction picture to obtain a toolbox of Gaussian operations with the ion-laser interaction Hamiltionian. This is achieved exciting the ion through the combination of two lasers of distinct frequencies corresponding to different sidebands of the external degrees of freedom. First we study the case of a trap with 1 mode and then the case with 2 modes. In this way, we achieve different continuous variables gates just by changing the external degrees of freedom of the trap and combining the Hamiltonians of blue and red sidebands.Keywords: Paul trap, ion-laser interaction, Gaussian operations
Procedia PDF Downloads 68611184 Circular Economy-Relationship of Natural Water Collection System, Afforestation and Country Park Towards Environmental Sustainability
Authors: Kwok Tak Kit
Abstract:
The government and community have raised their awareness of the benefits of water reuse. Deforestation has a significant effect to climate change as it causes the drying out of the tropical rainforest and hence increases the chance of natural hazards. The loss of forests due to natural fire or human factors would be threatening the storage and supply of clean water. In this paper, we will focus on the discussion of the relationship of the natural water collection system, afforestation and country parks towards environmental sustainability and circular economy with a case study of water conservation policy and strategy in Hong Kong and Singapore for further research. The UN General Assembly launched the Water Action Decade in 2018 to mobilize action that will help to tackle the growing challenge of water scarcity through water conservation and protect and restore water-related ecosystems, including forests, wetlands, rivers, aquifers and lakes.Keywords: afforestation, environmental sustainability, water conservation, circular economy, climate change, sustainable development goal
Procedia PDF Downloads 12911183 Optimal Data Selection in Non-Ergodic Systems: A Tradeoff between Estimator Convergence and Representativeness Errors
Authors: Jakob Krause
Abstract:
Past Financial Crisis has shown that contemporary risk management models provide an unjustified sense of security and fail miserably in situations in which they are needed the most. In this paper, we start from the assumption that risk is a notion that changes over time and therefore past data points only have limited explanatory power for the current situation. Our objective is to derive the optimal amount of representative information by optimizing between the two adverse forces of estimator convergence, incentivizing us to use as much data as possible, and the aforementioned non-representativeness doing the opposite. In this endeavor, the cornerstone assumption of having access to identically distributed random variables is weakened and substituted by the assumption that the law of the data generating process changes over time. Hence, in this paper, we give a quantitative theory on how to perform statistical analysis in non-ergodic systems. As an application, we discuss the impact of a paragraph in the last iteration of proposals by the Basel Committee on Banking Regulation. We start from the premise that the severity of assumptions should correspond to the robustness of the system they describe. Hence, in the formal description of physical systems, the level of assumptions can be much higher. It follows that every concept that is carried over from the natural sciences to economics must be checked for its plausibility in the new surroundings. Most of the probability theory has been developed for the analysis of physical systems and is based on the independent and identically distributed (i.i.d.) assumption. In Economics both parts of the i.i.d. assumption are inappropriate. However, only dependence has, so far, been weakened to a sufficient degree. In this paper, an appropriate class of non-stationary processes is used, and their law is tied to a formal object measuring representativeness. Subsequently, that data set is identified that on average minimizes the estimation error stemming from both, insufficient and non-representative, data. Applications are far reaching in a variety of fields. In the paper itself, we apply the results in order to analyze a paragraph in the Basel 3 framework on banking regulation with severe implications on financial stability. Beyond the realm of finance, other potential applications include the reproducibility crisis in the social sciences (but not in the natural sciences) and modeling limited understanding and learning behavior in economics.Keywords: banking regulation, non-ergodicity, risk management, semimartingale modeling
Procedia PDF Downloads 14811182 A Summary-Based Text Classification Model for Graph Attention Networks
Authors: Shuo Liu
Abstract:
In Chinese text classification tasks, redundant words and phrases can interfere with the formation of extracted and analyzed text information, leading to a decrease in the accuracy of the classification model. To reduce irrelevant elements, extract and utilize text content information more efficiently and improve the accuracy of text classification models. In this paper, the text in the corpus is first extracted using the TextRank algorithm for abstraction, the words in the abstract are used as nodes to construct a text graph, and then the graph attention network (GAT) is used to complete the task of classifying the text. Testing on a Chinese dataset from the network, the classification accuracy was improved over the direct method of generating graph structures using text.Keywords: Chinese natural language processing, text classification, abstract extraction, graph attention network
Procedia PDF Downloads 10011181 The Antecedents of Customer-to-Customer Interaction to Brand and Communication Strategy: A Marketer’s Perspective
Authors: Kartina Sury Kariman
Abstract:
Brand-to-customer (B2C) engagement has been well established through the traditional platform such as direct sales, advertising, customer service center, customer hotline as well as brand usage experiences. Increasingly, interest to B2C has evolved to include customer-to-customer (C2C) interaction analysis aligned with the vast growth of web 2.0. Hence, discussion on C2C interaction and brand strategy have captured social media as it enables brands and C2C interaction to be connected in various ways, providing opportunities for marketers to shape their brand engagement strategy while reaching C2C as the targeted outcomes. The objective here is to provide a preliminary review of C2C interaction consisting the antecedents and consequences while highlighting areas of research interest within the context from marketers perspective and the business outcomes. This paper discusses how C2C interaction defines marketers’ brand and communication strategy and how social media trend shapes the strategy when promoting the awareness of life insurance industry and educating the target market.Keywords: social media, brand engagement, customer interaction, customer engagement, brand strategy, life insurance
Procedia PDF Downloads 46011180 Design of Permanent Sensor Fault Tolerance Algorithms by Sliding Mode Observer for Smart Hybrid Powerpack
Authors: Sungsik Jo, Hyeonwoo Kim, Iksu Choi, Hunmo Kim
Abstract:
In the SHP, LVDT sensor is for detecting the length changes of the EHA output, and the thrust of the EHA is controlled by the pressure sensor. Sensor is possible to cause hardware fault by internal problem or external disturbance. The EHA of SHP is able to be uncontrollable due to control by feedback from uncertain information, on this paper; the sliding mode observer algorithm estimates the original sensor output information in permanent sensor fault. The proposed algorithm shows performance to recovery fault of disconnection and short circuit basically, also the algorithm detect various of sensor fault mode.Keywords: smart hybrid powerpack (SHP), electro hydraulic actuator (EHA), permanent sensor fault tolerance, sliding mode observer (SMO), graphic user interface (GUI)
Procedia PDF Downloads 54911179 Managing Information Technology: An Overview of Information Technology Governance
Authors: Mehdi Asgarkhani
Abstract:
Today, investment on Information Technology (IT) solutions in most organizations is the largest component of capital expenditure. As capital investment on IT continues to grow, IT managers and strategists are expected to develop and put in practice effective decision making models (frameworks) that improve decision-making processes for the use of IT in organizations and optimize the investment on IT solutions. To be exact, there is an expectation that organizations not only maximize the benefits of adopting IT solutions but also avoid the many pitfalls that are associated with rapid introduction of technological change. Different organizations depending on size, complexity of solutions required and processes used for financial management and budgeting may use different techniques for managing strategic investment on IT solutions. Decision making processes for strategic use of IT within organizations are often referred to as IT Governance (or Corporate IT Governance). This paper examines IT governance - as a tool for best practice in decision making about IT strategies. Discussions in this paper represent phase I of a project which was initiated to investigate trends in strategic decision making on IT strategies. Phase I is concerned mainly with review of literature and a number of case studies, establishing that the practice of IT governance, depending on the complexity of IT solutions, organization's size and organization's stage of maturity, varies significantly – from informal approaches to sophisticated formal frameworks.Keywords: IT governance, corporate governance, IT governance frameworks, IT governance components, aligning IT with business strategies
Procedia PDF Downloads 40611178 Assessment of the CSR of Telecom Operators in Cote d’Ivoire
Authors: Odile Amoncou, Djedje-Kossu Zahui
Abstract:
The integration of a Corporate Social Responsibility (CSR) approach within a company appears nowadays as a fundamental system of response to the different problems that threaten our planet. The abusive exploitation of natural resources, social inequalities, discrimination and poverty are some examples. Thus, faced with these different global problems, each company must include in its operating system measures or actions with the aim not only of achieving Sustainable Development Goals (SDGs) but also for the improvement of its performance and its brand internationally. The objective of this article is to assess the implementation of CSR by telecommunication companies. It is our belief that given its high energy consumption and proximity to society, the telecom sector must pay particular attention to environmental and social issues. Our study examines the CSR of three Ivorian telecom operators, namely ORANGE CI, MOOV Africa and MTN, by applying a series of performance indicators related to CSR management. We hope that our study will raise awareness about sustainability issues for all other Ivorian companies but also sub-Sahara African companies in general in order to encourage CEOs to make CSR concept a top priority.Keywords: CSR, telecom, SDGs, cote d’Ivoire
Procedia PDF Downloads 8011177 Knowledge, Perception and Practice of Deworming among Mothers of Under-Five Children in Rural Communities of Lafia Local Government Area, North Central Nigeria
Authors: Bahago I. N., Oyewole O. E.
Abstract:
Nigeria has the second highest prevalence of intestinal worms globally, which has not declined since the 1970s, especially in rural communities. Identifying the gaps in self-care practice will pave a way for a suitable intervention. This study investigated the knowledge, perception, and practice of deworming among mothers of under-five children in rural communities of Lafia Local Government Area, Nasarawa State. This study was descriptive cross-sectional and involved 419 mothers selected by systematic sampling technique. Information was obtained using a valid interviewer-questionnaire. Knowledge, perception, and practice was measured using a 10-point scale for each variable, respectively. Scores of 0-4, >4-6, and >6 were categorised as poor, average/fair, and good, respectively, at p<0.05 level of significance. Respondents age was 30.3±9.2 years; 46.5% were into trading, 26.7% were unemployed, 9.3% were skilled labour, and 7.4% were farmers. On literacy, secondary school (25.5%) while 9.1% above secondary school. Many (51.1%) had 2-3 children, while 42.2% had 5 or more children. Most of the respondents (96.2%) had good knowledge of deworming, and 3.8% had fair knowledge. Using multivariate model, Mothers between the ages of 25-34 years were 20 times likely to be more knowledgeable, given they have access to health information (O.R 2.39 -164.31). Most (62.3%) had good perception scores, 33.2% had fair scores, while 4.5% had poor perception scores. Majority (66.4%) had a good deworming practice of deworming, 66.4% had good, 28.4% had fair, and 5.3% had poor practice. The test of association between Parent's literacy level, religion, and age were significantly associated with the level of knowledge of deworming. Knowledge of deworming was above average; perception and practice was good. Women of ages 25-34 years could be trained as community volunteers to propagate the right information about deworming in rural communities, especially among young women of ages 13-19 years. Preferred channels to obtaining health information identified in the study should be explored.Keywords: deworming, mothers of under-five, intestinal worms, rural communities
Procedia PDF Downloads 16411176 Meaningful Habit for EFL Learners
Authors: Ana Maghfiroh
Abstract:
Learning a foreign language needs a big effort from the learner itself to make their language ability grows better day by day. Among those, they also need a support from all around them including teacher, friends, as well as activities which support them to speak the language. When those activities developed well as a habit which are done regularly, it will help improving the students’ language competence. It was a qualitative research which aimed to find out and describe some activities implemented in Pesantren Al Mawaddah, Ponorogo, in order to teach the students a foreign language. In collecting the data, the researcher used interview, questionnaire, and documentation. From the study, it was found that Pesantren Al Mawaddah had successfully built the language habit on the students to speak the target language. More than 15 hours a day students were compelled to speak foreign language, Arabic or English, in turn. It aimed to habituate the students to keep in touch with the target language. The habit was developed through daily language activities, such as dawn vocabs giving, dictionary handling, daily language use, speech training and language intensive course, daily language input, and night vocabs memorizing. That habit then developed the students awareness towards the language learned as well as promoted their language mastery.Keywords: habit, communicative competence, daily language activities, Pesantren
Procedia PDF Downloads 53911175 Fused Structure and Texture (FST) Features for Improved Pedestrian Detection
Authors: Hussin K. Ragb, Vijayan K. Asari
Abstract:
In this paper, we present a pedestrian detection descriptor called Fused Structure and Texture (FST) features based on the combination of the local phase information with the texture features. Since the phase of the signal conveys more structural information than the magnitude, the phase congruency concept is used to capture the structural features. On the other hand, the Center-Symmetric Local Binary Pattern (CSLBP) approach is used to capture the texture information of the image. The dimension less quantity of the phase congruency and the robustness of the CSLBP operator on the flat images, as well as the blur and illumination changes, lead the proposed descriptor to be more robust and less sensitive to the light variations. The proposed descriptor can be formed by extracting the phase congruency and the CSLBP values of each pixel of the image with respect to its neighborhood. The histogram of the oriented phase and the histogram of the CSLBP values for the local regions in the image are computed and concatenated to construct the FST descriptor. Several experiments were conducted on INRIA and the low resolution DaimlerChrysler datasets to evaluate the detection performance of the pedestrian detection system that is based on the FST descriptor. A linear Support Vector Machine (SVM) is used to train the pedestrian classifier. These experiments showed that the proposed FST descriptor has better detection performance over a set of state of the art feature extraction methodologies.Keywords: pedestrian detection, phase congruency, local phase, LBP features, CSLBP features, FST descriptor
Procedia PDF Downloads 48811174 Social Implementation of Information Sharing Road Safety Measure in South-East Asia
Authors: Hiroki Kikuchi, Atsushi Fukuda, Hirokazu Akahane, Satoru Kobayakawa, Tuenjai Fukuda, Takeru Miyokawa
Abstract:
According to WHO reports, fatalities by road traffic accidents in many countries of South-East Asia region especially Thailand and Malaysia are increasing year by year. In order to overcome these serious problems, both governments are focusing on road safety measures. In response, the Ministry of Land, Infrastructure, Transport and Tourism (MLIT) of Japan and Japan International Cooperation Agency (JICA) have begun active support based on the experiences to reduce the number of fatalities in road accidents in Japan in the past. However, even if the successful road safety measures in Japan is adopted in South-East Asian countries, it is not sure whether it will work well or not. So, it is necessary to clarify the issues and systematize the process for the implementation of road safety measures in South-East Asia. On the basis of the above, this study examined the applicability of "information sharing traffic safety measure" which is one of the successful road safety measures in Japan to the social implementation of road safety measures in South-East Asian countries. The "Information sharing traffic safety measure" is carried out traffic safety measures by stakeholders such as residents, administration, and experts jointly. In this study, we extracted the issues of implementation of road safety measures under local context firstly. This is clarifying the particular issues with its implementation in South-East Asian cities. Secondly, we considered how to implement road safety measures for solving particular issues based on the method of "information sharing traffic safety measure". In the implementation method, the location of the occurrence of a dangerous event was extracted based on the “HIYARI-HATTO” data which were obtained from the residents. This is because it is considered that the implementation of the information sharing traffic safety measure focusing on the location where the dangerous event occurs leads to the reduction of traffic accidents. Also, the target locations for the implementation of measures differ for each city. In Penang, we targeted the intersections in the downtown, while in Suphan Buri, we targeted mainly traffic control on the intercity highway. Finally, we proposed a method for implementing traffic safety measures. For Penang, we proposed a measure to improve the signal phase and showed the effect of the measure on the micro traffic simulation. For Suphan Buri, we proposed the suitable measures for the danger points extracted by collecting the “HIYARI-HATTO” data of residents to the administration. In conclusion, in order to successfully implement the road safety measure based on the "information sharing traffic safety measure", the process for social implementation of the road safety measures should be consistent and carried out repeatedly. In particular, by clarifying specific issues based on local context in South-East Asian countries, the stakeholders, not only such as government sectors but also local citizens can share information regarding road safety and select appropriate countermeasures. Finally, we could propose this approach to the administration that had the authority.Keywords: information sharing road safety measure, social implementation, South-East Asia, HIYARI-HATTO
Procedia PDF Downloads 14911173 Automatic Aggregation and Embedding of Microservices for Optimized Deployments
Authors: Pablo Chico De Guzman, Cesar Sanchez
Abstract:
Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.Keywords: aggregation, deployment, embedding, resource allocation
Procedia PDF Downloads 20311172 Clinicians' and Nurses' Documentation Practices in Palliative and Hospice Care: A Mixed Methods Study Providing Evidence for Quality Improvement at Mobile Hospice Mbarara, Uganda
Authors: G. Natuhwera, M. Rabwoni, P. Ellis, A. Merriman
Abstract:
Aims: Health workers are likely to document patients’ care inaccurately, especially when using new and revised case tools, and this could negatively impact patient care. This study set out to; (1) assess nurses’ and clinicians’ documentation practices when using a new patients’ continuation case sheet (PCCS) and (2) explore nurses’ and clinicians’ experiences regarding documentation of patients’ information in the new PCCS. The purpose of introducing the PCCS was to improve continuity of care for patients attending clinics at which they were unlikely to see the same clinician or nurse consistently. Methods: This was a mixed methods study. The cross-sectional inquiry retrospectively reviewed 100 case notes of active patients on hospice and palliative care program. Data was collected using a structured questionnaire with constructs formulated from the new PCCS under study. The qualitative element was face-to-face audio-recorded, open-ended interviews with a purposive sample of one palliative care clinician, and four palliative care nurse specialists. Thematic analysis was used. Results: Missing patients’ biogeographic information was prevalent at 5-10%. Spiritual and psychosocial issues were not documented in 42.6%, and vital signs in 49.2%. Poorest documentation practices were observed in past medical history part of the PCCS at 40-63%. Four themes emerged from interviews with clinicians and nurses-; (1) what remains unclear and challenges, (2) comparing the past with the present, (3) experiential thoughts, and (4) transition and adapting to change. Conclusions: The PCCS seems to be a comprehensive and simple tool to be used to document patients’ information at subsequent visits. The comprehensiveness and utility of the PCCS does paper to be limited by the failure to train staff in its use prior to introducing. The authors find the PCCS comprehensive and suitable to capture patients’ information and recommend it can be adopted and used in other palliative and hospice care settings, if suitable introductory training accompanies its introduction. Otherwise, the reliability and validity of patients’ information collected by this PCCS can be significantly reduced if some sections therein are unclear to the clinicians/nurses. The study identified clinicians- and nurses-related pitfalls in documentation of patients’ care. Clinicians and nurses need to prioritize accurate and complete documentation of patient care in the PCCS for quality care provision. This study should be extended to other sites using similar tools to ensure representative and generalizable findings.Keywords: documentation, information case sheet, palliative care, quality improvement
Procedia PDF Downloads 15111171 The Role and Tasks of a Social Worker in the Care of a Terminally Ill Child with Regard to the Malopolska Hospice for Children
Authors: Ewelina Zdebska
Abstract:
A social worker is an integral part of an interdisciplinary team working with the child and his family in a terminal state. Social support is an integral part of the medical procedure in the care of hospice. This is the basis and prerequisite of full treatment and good care of the child - patient, whose illness often finds at least the expected period of his life when his personal and legal issues are not regulated, and the family burdened with the problem requires care and support specialists - professionals. Hospice for Children in Krakow: a palliative care team operating in the province of Krakow and Malopolska, conducts specialized care for terminally ill children in place of their residence from the time when parents and doctors decided to end of treatment in hospital, allows parents to carry out medical care at home, provides parents social and legal assistance and provides care, psychological support and friendship to families throughout the life of the child's illness and after his death, as long as it is needed. The social worker in a hospice does not bear the burden of solving social problems, which is the responsibility of other authorities, but provides support possible and necessary at the moment. The most common form of assistance is to provide information on benefits, which for the child and his family may be subject to any treatment and fight for the life and health of a child. Employee assists in the preparation and completion of documents, requests to increase the degree of disability because of progressive disease or Allowance care because of the inability to live independently. It works in settling all the issues with the Department of Social Security, as well as with the Municipal and District Team Affairs of disability. Seeking help and support using multi-faceted childcare. With the Centres for Social Welfare contacts are also often on the organization of additional respite care for the sick at home (care), especially in the work of the other members of the family or if the family can not cope with the care and needs extra help. Hospice for Children in Cracow completing construction of Poland's first Respite Care Centre for chronically and terminally ill children, will be an open house where children suffering from chronic and incurable diseases and their families can get professional help, whenever - when they need it. The social worker has to pick up a very important role in caring for a terminally ill child. His presence gives a little patient and family the opportunity to be at this difficult time together while organizing assistance and support.Keywords: social worker, care, terminal care, hospice
Procedia PDF Downloads 248