Search results for: individual differencesmobile computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5127

Search results for: individual differencesmobile computing

4767 Motivational Factors on Non-Academic Staff of Higher Education

Authors: Atya Nur Aisha, Pamoedji Hardjomidjojo, Yassierli

Abstract:

Motivation is an important aspect which affects employee behavior to achieve performance. Working motivation tend to be unstable, it easily changing. This condition could be affected by individual factors, namely working ability, and organizational factors, such as working condition and incentives system. The purpose of this study was to examine the impact of individual and organizational factors on non-academic staff motivation. A questionnaire was designed and distributed to 150 non-academic staff of a university in Indonesia. Regression analysis was used to identify the relationship. Results revealed that individual working ability and incentives system had a positive impact on non-academic staff motivation (sig 0.001). This study provides information about practical implication for university authorities and theoretical implications for researchers who interested in exploring motivational and employee performance in a higher education context. It was proposed to increase productivity and work motivation of non-academic staff, university authorities should maintain equality and feasibility of incentives system and design a human resource development to improve employee ability.

Keywords: motivation, incentives, working ability, non-academic staff

Procedia PDF Downloads 395
4766 CSR and Its Internal Communication – Effects on the Employee Commitment

Authors: Silke Bustamante, Andrea Pelzeter, Andreas Deckmann, Rudi Ehlscheidt, Franziska Freudenberger

Abstract:

CSR is associated with a great number of positive effects. This also includes the positive impact of CSR on the commitment of its employees. The internal CSR communication here takes the essential function as a mediator of the CSR performance of a company to the employees. The importance of CSR communication is, therefore, essential. Employees can usually only perceive the CSR efforts of a company if it is also communicated to them. Only if the employees perceive the CSR of their employer positively, the employer-CSR can also have a positive impact on their affective commitment. Therefore, organizational and individual factors are crucial and thus need to consider. This relationship between the organizational and individual factors was investigated in a qualitative case study in six companies of the German service sector. Expert interviews and focus group interviews were conducted and questionnaire-based ratings by company representatives were raised. Among the individual factors, in terms of CSR, the expectations and relevance of its employees, as well as the perception of CSR by the staff, are included. The organizational factors include the actual CSR performance and its communication. Ultimately, the impact of CSR on the commitment is examined with this holistic approach. The results show that the individual CSR perception does not always match the corporate CSR performance and its depiction in internal communication. Furthermore, employees have given suggestions on how CSR should be communicated by their employer. Knowledge memory systems (e.g. wiki) on the on hand and media-based information, on the other hand, were highlighted. Primarily the employee-related CSR is most important for the employees, whereas ecological CSR activities hardly play a role. The findings indicate the importance of CSR communication in the CSR concept as it provides the missing link between CSR performance and appreciation by an increase in commitment. It should only be communicated, what is done. CSR communication should also be carried out in a plausible and transparent way.

Keywords: CSR, employee commitment, employer brand, internal communication

Procedia PDF Downloads 249
4765 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 233
4764 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 366
4763 Optimizing Availability of Marine Knowledge Repository with Cloud-Based Framework

Authors: Ahmad S. Mohd Noor, Emma A. Sirajudin, Nur F. Mat Zain

Abstract:

Reliability is an important property for knowledge repository system. National Marine Bioinformatics System or NABTICS is a marine knowledge repository portal aimed to provide a baseline for marine biodiversity and a tool for researchers and developers. It is intended to be a large and growing online database and also a metadata system for inputs of research analysis. The trends of present large distributed systems such as Cloud computing are the delivery of computing as a service rather than a product. The goal of this research is to make NABTICS a system of greater availability by integrating it with Cloud based Neighbor Replication and Failure Recovery (NRFR). This can be achieved by implementation of NABTICS into distributed environment. As a result, the user can experience minimum downtime while using the system should the server is having a failure. Consequently the online database application is said to be highly available.

Keywords: cloud, availability, distributed system, marine repository, database replication

Procedia PDF Downloads 454
4762 Evil Eye's Effects on Individual's Mental Health

Authors: Nikolaos Souvlakis

Abstract:

One of the prominent phenomena that have survived even in the 21st century, when science is gaining more and more space in the scientific world, is the evil eye within non-Westernized societies and more specifically in Greek culture. The presentation is based on the Christian Orthodox beliefs and folklore about the evil eye. Evil eye occupies an important role in individuals' everyday life and it is fuelled by Satanic powers. Satanic powers and the belief on them have an immense effect on individual's well-being and mental health causing spiritual suffering. The present paper examines the psychological manifestations of the belief of evil eye in individuals' mental health and the ways to protect from it according to the Greek Orthodox tradition.

Keywords: spirituality, belief, evil eye, mental health, well-being, healing

Procedia PDF Downloads 491
4761 A Parallel Algorithm for Solving the PFSP on the Grid

Authors: Samia Kouki

Abstract:

Solving NP-hard combinatorial optimization problems by exact search methods, such as Branch-and-Bound, may degenerate to complete enumeration. For that reason, exact approaches limit us to solve only small or moderate size problem instances, due to the exponential increase in CPU time when problem size increases. One of the most promising ways to reduce significantly the computational burden of sequential versions of Branch-and-Bound is to design parallel versions of these algorithms which employ several processors. This paper describes a parallel Branch-and-Bound algorithm called GALB for solving the classical permutation flowshop scheduling problem as well as its implementation on a Grid computing infrastructure. The experimental study of our distributed parallel algorithm gives promising results and shows clearly the benefit of the parallel paradigm to solve large-scale instances in moderate CPU time.

Keywords: grid computing, permutation flow shop problem, branch and bound, load balancing

Procedia PDF Downloads 270
4760 A TiO₂-Based Memristor Reliable for Neuromorphic Computing

Authors: X. S. Wu, H. Jia, P. H. Qian, Z. Zhang, H. L. Cai, F. M. Zhang

Abstract:

A bipolar resistance switching behaviour is detected for a Ti/TiO2-x/Au memristor device, which is fabricated by a masked designed magnetic sputtering. The current dependence of voltage indicates the curve changes slowly and continuously. When voltage pulses are applied to the device, the set and reset processes maintains linearity, which is used to simulate the synapses. We argue that the conduction mechanism of the device is from the oxygen vacancy channel model, and the resistance of the device change slowly due to the reaction between the titanium electrode and the intermediate layer and the existence of a large number of oxygen vacancies in the intermediate layer. Then, Hopfield neural network is constructed to simulate the behaviour of neural network in image processing, and the accuracy rate is more than 98%. This shows that titanium dioxide memristor has a broad application prospect in high performance neural network simulation.

Keywords: memristor fabrication, neuromorphic computing, bionic synaptic application, TiO₂-based

Procedia PDF Downloads 65
4759 Virtual Computing Lab for Phonics Development among Deaf Students

Authors: Ankita R. Bansal, Naren S. Burade

Abstract:

Idea is to create a cloud based virtual lab for Deaf Students, “A language acquisition program using Visual Phonics and Cued Speech” using VMware Virtual Lab. This lab will demonstrate students the sounds of letters associated with the Language, building letter blocks, making words, etc Virtual labs are used for demos, training, for the Lingual development of children in their vernacular language. The main potential benefits are reduced labour and hardware costs, faster response times to users. Virtual Computing Labs allows any of the software as a service solutions, virtualization solutions, and terminal services solutions available today to offer as a service on demand, where a single instance of the software runs on the cloud and services multiple end users. VMWare, XEN, MS Virtual Server, Virtuoso, and Citrix are typical examples.

Keywords: visual phonics, language acquisition, vernacular language, cued speech, virtual lab

Procedia PDF Downloads 585
4758 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs

Authors: Ivan Stanev, Maria Koleva

Abstract:

Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.

Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs

Procedia PDF Downloads 358
4757 Need for Cognition: An Important, Neglected Personality Variable in the Development of Spirituality Within the Context of Twelve Step Recovery from Addictive Disorders

Authors: Paul E. Priester

Abstract:

The Twelve Step approach to recovery from substance use and addictive disorders is considered an evidence-based model that assists many who recover from a chronic, progressive, fatal disease. Two key processes that contribute to the success of obtaining recovery from substance use disorders (SUD) are meeting engagement and the development of spiritual beliefs. Beyond establishing that there is a positive relationship between the development of spiritual beliefs in recovery from SUD’s, there has been a paucity of research exploring individual differences among individuals in this development of spiritual beliefs. One such personality variable that deserves exploration is that of the need for cognition. The need for cognition is a personality variable that explains the cognitive style of individuals. Individuals with a high need for cognition enjoy examining the complexities of a situation before coming to a conclusion. While individuals with a low need for cognition do not value or spend time cognitively dissecting a situation or decision. It is important to point out that a high need for cognition does not necessarily imply a high level of cognitive ability. Indeed, one could make the argument that a low need for cognition individual is not “wasting” cognitive energy in perseverating the multitude of aspects of a particular decision. This paper will present two case studies demonstrating the development of spiritual beliefs that enabled long-term recovery from SUD. The first case study presents an agnostic individual with a low need for cognition cognitive style in his development of spirituality in support of his recovery from alcoholism within the context of Alcoholics Anonymous. The second case study represents an adamant atheist with a high need for cognition cognitive style. This second individual is an intravenous cocaine addict and alcoholic who recovers through the development of spirituality within the contexts of Alcoholics Anonymous and Narcotics Anonymous. The two case studies will be contrasted with each other, noting how the individuals’ cognitive style mediated the development of spirituality that supported their long-term recovery from alcoholism and addiction.

Keywords: spirituality, twelve step recovery, need for cognition, individual differences in recovery from addictions

Procedia PDF Downloads 71
4756 A Study of Behavioral Phenomena Using an Artificial Neural Network

Authors: Yudhajit Datta

Abstract:

Will is a phenomenon that has puzzled humanity for a long time. It is a belief that Will Power of an individual affects the success achieved by an individual in life. It is thought that a person endowed with great will power can overcome even the most crippling setbacks of life while a person with a weak will cannot make the most of life even the greatest assets. Behavioral aspects of the human experience such as will are rarely subjected to quantitative study owing to the numerous uncontrollable parameters involved. This work is an attempt to subject the phenomena of will to the test of an artificial neural network. The claim being tested is that will power of an individual largely determines success achieved in life. In the study, an attempt is made to incorporate the behavioral phenomenon of will into a computational model using data pertaining to the success of individuals obtained from an experiment. A neural network is to be trained using data based upon part of the model, and subsequently used to make predictions regarding will corresponding to data points of success. If the prediction is in agreement with the model values, the model is to be retained as a candidate. Ultimately, the best-fit model from among the many different candidates is to be selected, and used for studying the correlation between success and will.

Keywords: will power, will, success, apathy factor, random factor, characteristic function, life story

Procedia PDF Downloads 369
4755 Designing a Patient Monitoring System Using Cloud and Semantic Web Technologies

Authors: Chryssa Thermolia, Ekaterini S. Bei, Stelios Sotiriadis, Kostas Stravoskoufos, Euripides G. M. Petrakis

Abstract:

Moving into a new era of healthcare, new tools and devices are developed to extend and improve health services, such as remote patient monitoring and risk prevention. In this concept, Internet of Things (IoT) and Cloud Computing present great advantages by providing remote and efficient services, as well as cooperation between patients, clinicians, researchers and other health professionals. This paper focuses on patients suffering from bipolar disorder, a brain disorder that belongs to a group of conditions called effective disorders, which is characterized by great mood swings.We exploit the advantages of Semantic Web and Cloud Technologies to develop a patient monitoring system to support clinicians. Based on intelligently filtering of evidence-knowledge and individual-specific information we aim to provide treatment notifications and recommended function tests at appropriate times or concluding into alerts for serious mood changes and patient’s non-response to treatment. We propose an architecture, as the back-end part of a cloud platform for IoT, intertwining intelligence devices with patients’ daily routine and clinicians’ support.

Keywords: bipolar disorder, intelligent systems patient monitoring, semantic web technologies, healthcare

Procedia PDF Downloads 490
4754 Consumer Perception of 3D Body Scanning While Online Shopping for Clothing

Authors: A. Grilec, S. Petrak, M. Mahnic Naglic

Abstract:

Technological development and the globalization in production and sales of clothing in the last decade have significantly influenced the changes in consumer relationship with the industrial-fashioned apparel and in the way of clothing purchasing. The Internet sale of clothing is in a constant and significant increase in the global market, but the possibilities offered by modern computing technologies in the customization segment are not yet fully involved, especially according to the individual customer requirements and body sizes. Considering the growing trend of online shopping, the main goal of this paper is to investigate the differences in customer perceptions towards online apparel shopping and particularly to discover the main differences in perceptions between customers regarding three different body sizes. In order to complete the research goal, the quantitative study on the sample of 85 Croatian consumers was conducted in 2017 in Zagreb, Croatia. Respondents were asked to indicate their level of agreement according to a five-point Likert scale ranging from strongly disagree (1) to strongly agree (5). To analyze attitudes of respondents, simple and descriptive statistics were used. The main findings highlight the differences in respondent perception of 3D body scanning, using 3D body scanning in Internet shopping, online apparel shopping habits regarding their body sizes.

Keywords: consumer behavior, Internet, 3D body scanning, body types

Procedia PDF Downloads 150
4753 Model and Algorithm for Dynamic Wireless Electric Vehicle Charging Network Design

Authors: Trung Hieu Tran, Jesse O'Hanley, Russell Fowler

Abstract:

When in-wheel wireless charging technology for electric vehicles becomes mature, a need for such integrated charging stations network development is essential. In this paper, we thus investigate the optimisation problem of in-wheel wireless electric vehicle charging network design. A mixed-integer linear programming model is formulated to solve into optimality the problem. In addition, a meta-heuristic algorithm is proposed for efficiently solving large-sized instances within a reasonable computation time. A parallel computing strategy is integrated into the algorithm to speed up its computation time. Experimental results carried out on the benchmark instances show that our model and algorithm can find the optimal solutions and their potential for practical applications.

Keywords: electric vehicle, wireless charging station, mathematical programming, meta-heuristic algorithm, parallel computing

Procedia PDF Downloads 69
4752 Understanding the Influence of Cross-National Distances on Tourist Expenditure

Authors: Wei-Ting Hung

Abstract:

Inbound tourist expenditure might not only have influenced by individual tourist characteristics but may also be affected by nationality characteristics. The cross national distance effects on tourist consumption behavior should be incorporated in the analytical framework. Additionally, the often used factor analysis, cluster analysis and regression analysis overlook the hierarchical tourist consumption data structure and may lead to misleading results. The objectives of the present study were twofold. First, we propose a multilevel model that takes individual and cross-national differences into account under a hierarchical framework. Second, we further sought to determine the types of cross-national differences affecting tourist expenditure. Thus, this study incorporates the individual tourist effects and cross national distance effects simultaneously, uses the data of 2010 Annual Survey Report on Visitors’ Expenditure and Trends in Taiwan to investigate the determinants of inbound tourist expenditure. Multilevel analysis was used to investigate the influence of individual tourist effects and cross national distance effects on inbound tourist expenditure. The empirical results show that cross national distance plays a crucial role in tourist consumption behavior. Our findings also indicate age and income have positive influence on tourism expenditure., whereas education and gender do not have significant impact. Regarding macro-level factors, geographic and cultural differences exhibited significant positive relationships on tourism expenditure, while economic differences did not. Based on the above empirical results, it is suggested that tour operators should take tourists’ individual attributes, particularly their income and age, into consideration when arranging tours. In addition, nationality holds sway over tourists’ consumption behavior, of which geographic and cultural differences are the two major factors at play. The empirical results of this study serve as practical suggestions for tourism marketing strategies and policy implications for government policies.

Keywords: cross national distance, inbound tourist, multilevel analysis, tourist expenditure

Procedia PDF Downloads 347
4751 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 99
4750 Border Between the Violation of Dental Ethics and the Occurrence of Dental Malpractice

Authors: Saimir Heta, Rialda Xhizdari, Kers Kapaj, Ilma Robo

Abstract:

Background: The interests of both individuals involved, both the dentist with his professionalism, and the patient who claims and expects the proper professional dental service, are determined in cases of dental malpractice. The latter is a phenomenon that is also wearing the "cloak" of bilateral manipulations, which in themselves require strong legal control to regulate the relations between the involved parties. The two individuals are involved both individually and even professionally and emotionally, with support in the "ultimate" interests of the two people, which in the case of conflicts or grievances, which as a result are transported to the family or society of the affected individual. Main text: The reason for malpractice is the most difficult part to find and then to interpret. It can be professional in the view of "so much I know how to do, so much done", or in the view of the impossibility of individual health conditions to achieve high professional expectations. But, the reason can also be individual with the intention of doing bad without reason or with the source of an unhealthy mind and the source of malicious thinking. The professional himself is a human being and as such may be under the effect of individual treatments or vices, therefore causing misuse, a case that must be distinguished from intentional misuse and which must be judged for the results or damages caused by the professional based on criminal law. Conclusions: Malpractice in some cases may be unavoidable, beyond the good intention of the dental intervention, which should be well understood by both parties involved in this relationship. Malpractice is not necessarily related only to difficult clinical cases, but sometimes also appears as a random deviation of a dental treatment with a welldefined professional protocol. The legal support in the interpretation of malpractice cases should be much more specific according to previous cases, this practice specifically, perhaps also according to different religious states.

Keywords: dental ethics, malpractice, professional dental service, legal support

Procedia PDF Downloads 85
4749 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 388
4748 Minimum Data of a Speech Signal as Special Indicators of Identification in Phonoscopy

Authors: Nazaket Gazieva

Abstract:

Voice biometric data associated with physiological, psychological and other factors are widely used in forensic phonoscopy. There are various methods for identifying and verifying a person by voice. This article explores the minimum speech signal data as individual parameters of a speech signal. Monozygotic twins are believed to be genetically identical. Using the minimum data of the speech signal, we came to the conclusion that the voice imprint of monozygotic twins is individual. According to the conclusion of the experiment, we can conclude that the minimum indicators of the speech signal are more stable and reliable for phonoscopic examinations.

Keywords: phonogram, speech signal, temporal characteristics, fundamental frequency, biometric fingerprints

Procedia PDF Downloads 124
4747 Communication of Sensors in Clustering for Wireless Sensor Networks

Authors: Kashish Sareen, Jatinder Singh Bal

Abstract:

The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.

Keywords: clustering, DLCC, MLCC, wireless sensor networks

Procedia PDF Downloads 465
4746 Global Healthcare Village Based on Mobile Cloud Computing

Authors: Laleh Boroumand, Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar

Abstract:

Cloud computing being the use of hardware and software that are delivered as a service over a network has its application in the area of health care. Due to the emergency cases reported in most of the medical centers, prompt for an efficient scheme to make health data available with less response time. To this end, we propose a mobile global healthcare village (MGHV) model that combines the components of three deployment model which include country, continent and global health cloud to help in solving the problem mentioned above. In the creation of continent model, two (2) data centers are created of which one is local and the other is global. The local replay the request of residence within the continent, whereas the global replay the requirements of others. With the methods adopted, there is an assurance of the availability of relevant medical data to patients, specialists, and emergency staffs regardless of locations and time. From our intensive experiment using the simulation approach, it was observed that, broker policy scheme with respect to optimized response time, yields a very good performance in terms of reduction in response time. Though, our results are comparable to others when there is an increase in the number of virtual machines (80-640 virtual machines). The proportionality in increase of response time is within 9%. The results gotten from our simulation experiments shows that utilizing MGHV leads to the reduction of health care expenditures and helps in solving the problems of unqualified medical staffs faced by both developed and developing countries.

Keywords: cloud computing (MCC), e-healthcare, availability, response time, service broker policy

Procedia PDF Downloads 365
4745 Multi-Class Text Classification Using Ensembles of Classifiers

Authors: Syed Basit Ali Shah Bukhari, Yan Qiang, Saad Abdul Rauf, Syed Saqlaina Bukhari

Abstract:

Text Classification is the methodology to classify any given text into the respective category from a given set of categories. It is highly important and vital to use proper set of pre-processing , feature selection and classification techniques to achieve this purpose. In this paper we have used different ensemble techniques along with variance in feature selection parameters to see the change in overall accuracy of the result and also on some other individual class based features which include precision value of each individual category of the text. After subjecting our data through pre-processing and feature selection techniques , different individual classifiers were tested first and after that classifiers were combined to form ensembles to increase their accuracy. Later we also studied the impact of decreasing the classification categories on over all accuracy of data. Text classification is highly used in sentiment analysis on social media sites such as twitter for realizing people’s opinions about any cause or it is also used to analyze customer’s reviews about certain products or services. Opinion mining is a vital task in data mining and text categorization is a back-bone to opinion mining.

Keywords: Natural Language Processing, Ensemble Classifier, Bagging Classifier, AdaBoost

Procedia PDF Downloads 218
4744 The Beam Expansion Method, A Simplified and Efficient Approach of Field Propagation and Resonators Modes Study

Authors: Zaia Derrar Kaddour

Abstract:

The study of a beam throughout an optical path is generally achieved by means of diffraction integral. Unfortunately, in some problems, this tool turns out to be not very friendly and hard to implement. Instead, the beam expansion method for computing field profiles appears to be an interesting alternative. The beam expansion method consists of expanding the field pattern as a series expansion in a set of orthogonal functions. Propagating each individual component through a circuit and adding up the derived elements leads easily to the result. The problem is then reduced to finding how the expansion coefficients change in a circuit. The beam expansion method requires a systematic study of each type of optical element that can be met in the considered optical path. In this work, we analyze the following fundamental elements: first order optical systems, hard apertures and waveguides. We show that the former element type is completely defined thanks to the Gouy phase shift expression we provide and the latters require a suitable mode conversion. For endorsing the usefulness and relevance of the beam expansion approach, we show here some of its applications such as the treatment of the thermal lens effect and the study of unstable resonators.

Keywords: gouy phase shift, modes, optical resonators, unstable resonators

Procedia PDF Downloads 48
4743 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 110
4742 The Most Desirable Individual Relationship

Authors: Ali Babaei

Abstract:

There is a significant relationship between Soul Faculties and human relationships. Man has at least three levels of relationship according to three levels of his Faculties: individual (with himself), dual (with another) and collective (with others). Since all human actions are organized by the type of use of their internal faculties, their "hierarchy of relations" is related to the "hierarchy of their Faculties." In the final explanation based on the ontology of Islamic wisdom, one can consider the hierarchy of human Faculties in three levels: 1. senses, 2. intellect and heart, and 3. Soul. The best relationship, in the individual one is that every human being, with healthy senses, achieves both the intellectual growth and the perfection of the heart, which we call "Clear-headed" and "Good-hearted.” The result of human evolution in this two aspects will lead to the development of a powerful personality which can be interpreted as "spiritual prosperity"; having a great soul is the result of such evolution. A smart brain without a "Good-heart"ince can lead to criminality; and mere "Good-heart"ince" without "Clear-head"ince leads to "naivety". “clear-head”ince is achieved through thoughtfulness and study, and "Good-heart"ince through love and worship. So the best way to achieve perfection in a personal relationship is to have a dependable appearance, a coherent thinking

Keywords: Ontology , good-heartince, wisdom, relationship, clear-head”ince, criminality, naivety

Procedia PDF Downloads 124
4741 Antecedents of Knowledge Sharing: Investigating the Influence of Knowledge Sharing Factors towards Postgraduate Research Supervision

Authors: Arash Khosravi, Mohamad Nazir Ahmad

Abstract:

Today’s economy is a knowledge-based economy in which knowledge is a crucial facilitator to individuals, as well as being an instigator of success. Due to the impact of globalization, universities face new challenges and opportunities. Accordingly, they ought to be more innovative and have their own competitive advantages. One of the most important goals of universities is the promotion of students as professional knowledge workers. Therefore, knowledge sharing and transferring at tertiary level between students and supervisors is vital in universities, as it decreases the budget and provides an affordable way of doing research. Knowledge-sharing impact factors can be categorized into three groups, namely: organizational, individual and technical factors. There are some individual barriers to knowledge sharing, namely: lack of time and trust, lack of communication skills and social networks. IT systems such as e-learning, blogs and portals can increase knowledge sharing capability. However, it must be stated that IT systems are only tools and not solutions. Individuals are still responsible for sharing information and knowledge. This paper proposes new research model to examine the effect of individual factors and organisational factors, namely: learning strategy, trust culture, supervisory support, as well as technological factor on knowledge sharing in a research supervision process at the University of Technology Malaysia.

Keywords: knowledge management, knowledge sharing, research supervision, knowledge transferring

Procedia PDF Downloads 426
4740 Spawning Induction and Early Larval Development of the Penshell Atrina maura (Sowerby, 1835) under Controlled Conditions in Ecuador

Authors: Jose Melena, Rosa Santander, Tanya Gonzalez, Richard Duque, Juan Illanes

Abstract:

Ecuador is one of the countries with the greatest aquatic biodiversity worldwide. In particular, there are at least a dozen native marine species with great aquaculture potential locally. This research concerns one of those species. It has proposed to implement experimental protocols in order to induce spawning and to generate the early larval development of the penshell Atrina maura under controlled conditions. Bioassays were carried out with one adult batch (n= 26) with an average valvar length of 307,6 ± 9,4 mm, which were collected in the Puerto El Morro Mangrove (2° 42' 33'' S, 80° 14' 28'' W), Guayas Province. During a short acclimation stage, five adults of penshell A. maura were sacrificed in order to determine their sexual maturity degree and to estimate their sex ratio. Dissection showed that three were ripe females (60%) and two were ripe males (40%). Later, three groups (n= 7 by each) were tested with two treatments in order to induce the broodstock spawning: thermal stress, osmotic shock, and one control. Spawning induction was achieved by the immersion in water to 0 g L⁻¹ per 1 h and immersion in sea water to 34 g L⁻¹ per 1 h. After the delivery of gametes, it was achieved 1,35 × 10⁶ viable zygotes. As results, fertilized eggs had 60 µm diameter; while first and second cell divisions were observed to 1 h post-fertilization, with individual average length of 65 ± 4 µm and polar body. Latter cell divisions, including gastrula stage, appeared at 9 h post-fertilization, with individual average length of 71 ± 4 µm; and trochophore stage at 16 h post-fertilization with individual average length of 75 ± 5 µm. In addition, veliger stage was registered at 20 h post-fertilization with individual average length of 81 ± 5 µm. Umboned larvae appeared at day 8 post-fertilization, with individual average length of 145 ± 6 µm. These pioneering results in Ecuador can strengthen the local conservation process of the overexploited A. maura and to encourage its production for commercial purposes.

Keywords: Atrina maura, Ecuador, larval development, spawning induction

Procedia PDF Downloads 152
4739 The Impact of Behavioral Factors on the Decision Making of Real Estate Investor of Pakistan

Authors: Khalid Bashir, Hammad Zahid

Abstract:

Most of the investors consider that economic and financial information is the most important at the time of making investment decisions. But it is not true, as in the past two decades, the Behavioral aspects and the behavioral biases have gained an important place in the decision-making process of an investor. This study is basically conducted on this fact. The purpose of this study is to examine the impact of behavioral factors on the decision-making of the individual real estate investor in Pakistan. Some important behavioral factors like overconfidence, anchoring, gambler’s fallacy, home bias, loss aversion, regret aversion, mental accounting, herding and representativeness are used in this study to find their impact on the psychology of individual investors. The targeted population is the real estate investor of Pakistan, and a sample of 650 investors is selected on the basis of convenience sampling technique. The data is collected through the questionnaire with a response rate of 46.15 %. Descriptive statistical techniques and SEM are used to analyze the data by using statistical software. The results revealed the fact that some behavioral factors have a significant impact on the decision-making of investors. Among all the behavioral biases, overconfidence, anchoring, gambler’s fallacy, loss aversion and representativeness have a significant positive impact on the decision-making of the individual investor, while the rest of biases like home bias, regret aversion, mental accounting, herding have less impact on the decision-making process of an individual.

Keywords: behavioral finance, anchoring, gambler’s fallacy, loss aversion

Procedia PDF Downloads 55
4738 Decision-Making Strategies on Smart Dairy Farms: A Review

Authors: L. Krpalkova, N. O' Mahony, A. Carvalho, S. Campbell, G. Corkery, E. Broderick, J. Walsh

Abstract:

Farm management and operations will drastically change due to access to real-time data, real-time forecasting, and tracking of physical items in combination with Internet of Things developments to further automate farm operations. Dairy farms have embraced technological innovations and procured vast amounts of permanent data streams during the past decade; however, the integration of this information to improve the whole farm-based management and decision-making does not exist. It is now imperative to develop a system that can collect, integrate, manage, and analyse on-farm and off-farm data in real-time for practical and relevant environmental and economic actions. The developed systems, based on machine learning and artificial intelligence, need to be connected for useful output, a better understanding of the whole farming issue, and environmental impact. Evolutionary computing can be very effective in finding the optimal combination of sets of some objects and, finally, in strategy determination. The system of the future should be able to manage the dairy farm as well as an experienced dairy farm manager with a team of the best agricultural advisors. All these changes should bring resilience and sustainability to dairy farming as well as improving and maintaining good animal welfare and the quality of dairy products. This review aims to provide an insight into the state-of-the-art of big data applications and evolutionary computing in relation to smart dairy farming and identify the most important research and development challenges to be addressed in the future. Smart dairy farming influences every area of management, and its uptake has become a continuing trend.

Keywords: big data, evolutionary computing, cloud, precision technologies

Procedia PDF Downloads 178