Search results for: access to resources and information
16536 MMSE-Based Beamforming for Chip Interleaved CDMA in Aeronautical Mobile Radio Channel
Authors: Sherif K. El Dyasti, Esam A. Hagras, Adel E. El-Hennawy
Abstract:
This paper addresses the performance of antenna array beam-forming on Chip-Interleaved Code Division Multiple Access (CI_CDMA) system based on Minimum Mean Square Error (MMSE) detector in aeronautical mobile radio channel. Multipath fading, Doppler shifts caused by the speed of the aircraft, and Multiple Access Interference (MAI) are the most important reasons that affect and reduce the performance of aeronautical system. In this paper, we suggested the CI-CDMA with antenna array to combat this fading and improve the bit error rate (BER) performance. We further evaluate the performance of the proposed system in the four standard scenarios in aeronautical mobile radio channel.Keywords: aeronautical channel, CI-CDMA, beamforming, communication, information
Procedia PDF Downloads 41816535 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 4516534 Comparison of the Amount of Resources and Expansion Support Policy of Photovoltaic Power Generation: A Case on Hokkaido and Aichi Prefecture, Japan
Authors: Hiroaki Sumi, Kiichiro Hayashi
Abstract:
Now, the use of renewable energy power generation has been advanced. In this paper, we compared the expansion support policy of photovoltaic power generation which was researched using The internet and the amount of resource for photovoltaic power generation which was estimated using the NEDO formula in the municipality level in Hokkaido and Aichi Prefecture, Japan. This paper will contribute to grasp the current situation especially about the policy. As a result, there were municipalities which seemed to be no consideration of the amount of resources. We think it would need to consider the suitability between the policies and resources.Keywords: photovoltaic power generation, dissemination and support policy, amount of resources, Japan
Procedia PDF Downloads 56516533 Foreign Direct Investment and its Role in Globalisation
Authors: Gupta Indu
Abstract:
This paper aims to examine the relationship between foreign direct investment and globalization. Foreign direct investment plays an important role in globalization. It is dramatically increasing in the age of globalization. It has played an important role for economic growth in this global process. It can provide new markets and marketing channels, cheaper production facilities, access to new technology, products to a firm. FDI has come to play a major role in the internationalization of business. FDI has become even more important than trade. Growing liberalization of the national regulatory framework governing investment in enterprises and changes in capital markets profound changes have occurred in the size, scope and methods of FDI. New information technology systems, decline in global communication costs have made management of foreign investments far easier than in the past. FDI provide opportunities to host countries to enhance their economic development and opens new opportunities to home countries to optimize their earnings by employing their ideal resources. Smaller and weaker economies can drive out much local competition. For small and medium sized companies, FDI represents an opportunity to become more actively involved in international business activities. In the past decade, foreign direct investment has expanded its role by change in trade policy, investment policy, tariff liberalization, easing of restrictions on foreign investment and acquisition in many nations, and the deregulation and privatization of many industries. In present competitive scenario, FDI has become a prominent external source of finance for developing countries.Keywords: foreign direct investment, globalization, economic development, information technology systems new opportunities
Procedia PDF Downloads 23016532 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs
Authors: Aldona Guzik
Abstract:
Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.Keywords: experts, media, public discours, symbolic elites
Procedia PDF Downloads 12916531 Understanding the Thermal Transformation of Random Access Memory Cards: A Pathway to Their Efficient Recycling
Authors: Khushalini N. Ulman, Samane Maroufi, Veena H. Sahajwalla
Abstract:
Globally, electronic waste (e-waste) continues to grow at an alarming rate. Several technologies have been developed to recover valuable materials from e-waste, however, their efficiency can be increased with a better knowledge of the e-waste components. Random access memory cards (RAMs) are considered as high value scrap for the e-waste recyclers. Despite their high precious metal content, RAMs are still recycled in a conventional manner resulting in huge loss of resources. Our research work highlights the precious metal rich components of a RAM. Inductively coupled plasma (ICP) analysis of RAMs of six different generations have been carried out and the trends in their metal content have been investigated. Over the past decade, the copper content of RAMs has halved and their tin content has increased by 70 %. The stricter environmental laws have facilitated ~96 % drop in the lead content of RAMs. To comprehend the fundamentals of thermal transformation of RAMs, our research provides their detailed kinetic study. This can assist the e-waste recyclers in optimising their metal recovery processes. Thus, understanding the chemical and thermal behaviour of RAMs can open new avenues for efficient e-waste recycling.Keywords: electronic waste, kinetic study, recycling, thermal transformation
Procedia PDF Downloads 14516530 Study of Information Technology Support to Knowledge Sharing in Social Enterprises
Authors: Maria Granados
Abstract:
Information technology (IT) facilitates the management of knowledge in organisations through the effective leverage of collective experience and knowledge of employees. This supports information processing needs, as well as enables and facilitates sense-making activities of knowledge workers. The study of IT support for knowledge management (KM) has been carried out mainly in larger organisations where resources and competitive conditions can trigger the use of KM. However, there is still a lack of understanding on how IT can support the management of knowledge under different organisational settings influenced by: constant tensions between social and economic objectives, more focus on sustainability than competiveness, limited resources, and high levels of democratic participation and intrinsic motivations among employees. All these conditions are presented in Social Enterprises (SEs), which are normally micro and small businesses that trade to tackle social problems, improve communities, people’s life chances, and the environment. Thus, their importance to society and economies is increasing. However, there is still a need for more understanding of how these organisations operate, perform, innovate and scale-up. This knowledge is crucial to design and provide accurate strategies to enhance the sector and increase its impact and coverage. To obtain a conceptual and empirical understanding of how IT can facilitate KM in the particular organisational conditions of SEs, a quantitative study was conducted with 432 owners and senior members of SEs in UK, underpinned by 21 interviews. The findings demonstrated how IT was supporting more the recovery and storage of necessary information in SEs, and less the collaborative work and communication among enterprise members. However, it was established that SEs were using cloud solutions, web 2.0 tools, Skype and centralised shared servers to manage informally their knowledge. The possible impediments for SEs to support themselves more on IT solutions can be linked mainly to economic and human constraints. These findings elucidate new perspectives that can contribute not only to SEs and SE supporters, but also to other businesses.Keywords: social enterprises, knowledge management, information technology, collaboration, small firms
Procedia PDF Downloads 26816529 A Comparative Study of Approaches in User-Centred Health Information Retrieval
Authors: Harsh Thakkar, Ganesh Iyer
Abstract:
In this paper, we survey various user-centered or context-based biomedical health information retrieval systems. We present and discuss the performance of systems submitted in CLEF eHealth 2014 Task 3 for this purpose. We classify and focus on comparing the two most prevalent retrieval models in biomedical information retrieval namely: Language Model (LM) and Vector Space Model (VSM). We also report on the effectiveness of using external medical resources and ontologies like MeSH, Metamap, UMLS, etc. We observed that the LM based retrieval systems outperform VSM based systems on various fronts. From the results we conclude that the state-of-art system scores for MAP was 0.4146, P@10 was 0.7560 and NDCG@10 was 0.7445, respectively. All of these score were reported by systems built on language modeling approaches.Keywords: clinical document retrieval, concept-based information retrieval, query expansion, language models, vector space models
Procedia PDF Downloads 32016528 Biodiversity Conservation Practices and Extent of Environmental Stewardship Among Indigenous Peoples in Caraga Region, Mindanao, Philippines
Authors: Milagros S. Salibad, Levita B. Grana
Abstract:
The presence and role of Indigenous Peoples (IPs) residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga region, Mindanao, Philippines, hold immense significance. Recognizing their importance and rights, this study aimed to determine the level of biodiversity conservation practices and extent of environmental stewardship among the Mamanwas, Manobos, and Higaonons, assess potential differences in these practices, and identify factors that facilitate or hinder them. Employing an explanatory sequential mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Additional data were collected through focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources. The results revealed a high level of biodiversity conservation practices across the three IP groups, with variations influenced by their cultural and traditional practices, awareness, and access to resources and information. Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, and customary knowledge. They have a strong sense of ownership and responsibility towards their ancestral lands and territories and adopt traditional knowledge and practices that promote sustainable resource management and biodiversity conservation. These practices align with the Indigenous Peoples Rights Act (IPRA), also known as Republic Act No. 8371. Various facilitating and hindering factors influenced their conservation efforts. To uphold the region's biodiversity resources, it is recommended that government agencies continue to evaluate and monitor the sustainability of IPs' local biodiversity conservation practices. Additionally, efforts should be made to involve IP communities as essential contributors and stakeholders in these conservation endeavors.Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge, environmental stewardship
Procedia PDF Downloads 7416527 The Importance of Optimization of Halal Tourism: A Study of the Development of Halal Tourism in Indonesia
Authors: Rizqi W. Romadhon, Nur Arifan
Abstract:
Halal Tourism is a part of tourism industry which is based on Islamic Principle and addressed to the Muslim tourist. The potency of halal tourism is very broad to be developed, because the growth of Muslim populations is rapidly increasing. Indonesia is one of the biggest countries with Majority of its population is Muslim, therefore human resources and natural resources have very good potential to be part of the Halal tourism industry. But the fact is Indonesia can not optimize the potential of human resources and natural resources as well as neighboring countries carried out. This paper will discuss the reasons of the importance of developing Halal tourism, and the factors influencing the success of developing halal tourism in Indonesia, and also the optimization strategies which can be adopted by the government so that the Halal tourism industry in Indonesia has a sustainable competitive advantage. The existence of this research is expected to government, tourism agents and others can optimize the potency of Indonesia’s Human resources and natural resources for developing Halal tourism industry in Indonesia.Keywords: halal tourism, Islamic principle, optimization, sustainable competitive advantage
Procedia PDF Downloads 38416526 Multicenter Evaluation of the ACCESS HBsAg and ACCESS HBsAg Confirmatory Assays on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis B Surface Antigen
Authors: Vanessa Roulet, Marc Turini, Juliane Hey, Stéphanie Bord-Romeu, Emilie Bonzom, Mahmoud Badawi, Mohammed-Amine Chakir, Valérie Simon, Vanessa Viotti, Jérémie Gautier, Françoise Le Boulaire, Catherine Coignard, Claire Vincent, Sandrine Greaume, Isabelle Voisin
Abstract:
Background: Beckman Coulter, Inc. has recently developed fully automated assays for the detection of HBsAg on a new immunoassay platform. The objective of this European multicenter study was to evaluate the performance of the ACCESS HBsAg and ACCESS HBsAg Confirmatory assays† on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer. Methods: The clinical specificity of the ACCESS HBsAg and HBsAg Confirmatory assays was determined using HBsAg-negative samples from blood donors and hospitalized patients. The clinical sensitivity was determined using presumed HBsAg-positive samples. Sample HBsAg status was determined using a CE-marked HBsAg assay (Abbott ARCHITECT HBsAg Qualitative II, Roche Elecsys HBsAg II, or Abbott PRISM HBsAg assay) and a CE-marked HBsAg confirmatory assay (Abbott ARCHITECT HBsAg Qualitative II Confirmatory or Abbott PRISM HBsAg Confirmatory assay) according to manufacturer package inserts and pre-determined testing algorithms. False initial reactive rate was determined on fresh hospitalized patient samples. The sensitivity for the early detection of HBV infection was assessed internally on thirty (30) seroconversion panels. Results: Clinical specificity was 99.95% (95% CI, 99.86 – 99.99%) on 6047 blood donors and 99.71% (95%CI, 99.15 – 99.94%) on 1023 hospitalized patient samples. A total of six (6) samples were found false positive with the ACCESS HBsAg assay. None were confirmed for the presence of HBsAg with the ACCESS HBsAg Confirmatory assay. Clinical sensitivity on 455 HBsAg-positive samples was 100.00% (95% CI, 99.19 – 100.00%) for the ACCESS HBsAg assay alone and for the ACCESS HBsAg Confirmatory assay. The false initial reactive rate on 821 fresh hospitalized patient samples was 0.24% (95% CI, 0.03 – 0.87%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS HBsAg assay had equivalent sensitivity performances compared to the Abbott ARCHITECT HBsAg Qualitative II assay with an average bleed difference since first reactive bleed of 0.13. All bleeds found reactive in ACCESS HBsAg assay were confirmed in ACCESS HBsAg Confirmatory assay. Conclusion: The newly developed ACCESS HBsAg and ACCESS HBsAg Confirmatory assays from Beckman Coulter have demonstrated high clinical sensitivity and specificity, equivalent to currently marketed HBsAg assays, as well as a low false initial reactive rate. †Pending achievement of CE compliance; not yet available for in vitro diagnostic use. 2023-11317 Beckman Coulter and the Beckman Coulter product and service marks mentioned herein are trademarks or registered trademarks of Beckman Coulter, Inc. in the United States and other countries. All other trademarks are the property of their respective owners.Keywords: dxi 9000 access immunoassay analyzer, hbsag, hbv, hepatitis b surface antigen, hepatitis b virus, immunoassay
Procedia PDF Downloads 9016525 Incident Management System: An Essential Tool for Oil Spill Response
Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming
Abstract:
An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.Keywords: command and control, incident management system, oil spill response, response organisation
Procedia PDF Downloads 15616524 Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa
Authors: O. E. Eberechi, G. P. Stevens
Abstract:
Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims.Keywords: access to justice, underpinning legal theory, refugee, sexual violence
Procedia PDF Downloads 42916523 Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives
Authors: Kareem Adedokun
Abstract:
Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order.Keywords: confidentiality, information, official secrecy, tax administration
Procedia PDF Downloads 34116522 A Study on Sentiment Analysis Using Various ML/NLP Models on Historical Data of Indian Leaders
Authors: Sarthak Deshpande, Akshay Patil, Pradip Pandhare, Nikhil Wankhede, Rushali Deshmukh
Abstract:
Among the highly significant duties for any language most effective is the sentiment analysis, which is also a key area of NLP, that recently made impressive strides. There are several models and datasets available for those tasks in popular and commonly used languages like English, Russian, and Spanish. While sentiment analysis research is performed extensively, however it is lagging behind for the regional languages having few resources such as Hindi, Marathi. Marathi is one of the languages that included in the Indian Constitution’s 8th schedule and is the third most widely spoken language in the country and primarily spoken in the Deccan region, which encompasses Maharashtra and Goa. There isn’t sufficient study on sentiment analysis methods based on Marathi text due to lack of available resources, information. Therefore, this project proposes the use of different ML/NLP models for the analysis of Marathi data from the comments below YouTube content, tweets or Instagram posts. We aim to achieve a short and precise analysis and summary of the related data using our dataset (Dates, names, root words) and lexicons to locate exact information.Keywords: multilingual sentiment analysis, Marathi, natural language processing, text summarization, lexicon-based approaches
Procedia PDF Downloads 7416521 Blockchain Technology Security Evaluation: Voting System Based on Blockchain
Authors: Omid Amini
Abstract:
Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.Keywords: blockchain, technology, security, information, voting system, transparency
Procedia PDF Downloads 13216520 Implementation of a Distant Learning Physician Assistant Program in Northern Michigan to Address Health Care Provider Shortage: Importance of Evaluation
Authors: Theresa Bacon-Baguley, Martina Reinhold
Abstract:
Introduction: The purpose of this paper is to discuss the importance of both formative and summative evaluation of a Physician Assistant (PA) program with a distant campus delivered through Interactive Television (ITV) to assure equity of educational experiences. Methodology: A needs assessment utilizing a case-control design determined the need and interest in expanding the existing PA program to northern Michigan. A federal grant was written and funded, which supported the hiring of two full-time faculty members and support staff at the distant site. The strengths and weaknesses of delivering a program through ITV were evaluated using weekly formative evaluation, and bi-semester summative evaluation. Formative evaluation involved discussion of lecture content to be delivered, special ITV needs, orientation of new lecturers to the system, student concerns, support staff updates, and scheduling of student/faculty traveling between the two campuses. The summative evaluation, designed from a literature review of barriers to ITV, included 19 statements designed to evaluate the following items: quality of technology (audio, video, etc.), confidence in the ITV system, quality of instruction and instructor interaction between the two locations, and availability of resources at each location. In addition, students were given the opportunity to write qualitative remarks for each course delivered between the two locations. This summative evaluation was given to all students at mid-semester and at the end of the semester. The goal of the summative evaluation was to have 80% or greater of the students respond favorably (‘Very Good’ or ‘Good’) to each of the 19 statements. Results: Prior to the start of the first cohort at the distant campus, the technology was tested. During this time period, the formative evaluations identified key components needing modification, which were rapidly addressed: ability to record lectures, lighting, sound, and content delivery. When the mid-semester summative survey was given to the first cohort of students, 18 of the 19 statements in the summative evaluation met the goal of 80% or greater in the favorable category. When the summative evaluation statements were stratified by the two cohorts, the summative evaluation identified that students at the home location responded that they did not have adequate access to printers, and students at the expansion location responded that they did not have adequate access to library resources. These results allowed the program to address the deficiencies through contacting informational technology for additional printers, and to provide students with knowledge on how to access library resources. Conclusion: Successful expansion of programs to a distant site utilizing ITV technology requires extensive monitoring using both formative and summative evaluation. The formative evaluation allowed for quick identification of issues that could immediately be addressed, both at the planning and developing stage, as well as during implementation. Through use of the summative evaluation the program is able to monitor the success/ effectiveness of the expansion and identify specific needs of students at each location.Keywords: assessment, distance learning, formative feedback, interactive television (ITV), student experience, summative feedback, support
Procedia PDF Downloads 24616519 Performance Evaluation of Packet Scheduling with Channel Conditioning Aware Based on Wimax Networks
Authors: Elmabruk Laias, Abdalla M. Hanashi, Mohammed Alnas
Abstract:
Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non-real time traffic in congested networks by considering channel status.Keywords: WiMAX, Quality of Services (QoS), OPNE, Diff-Serv (DS).
Procedia PDF Downloads 28616518 Breaking through Barricades to Enhance the University Library Infrastructure to Aid the Visually Challenged - Contemplated Based within the Sri Lankan Context
Authors: Wilfred Jeyatheese Jeyaraj
Abstract:
The Sri Lankan legislative acts dictate several recommendations to improve accessibility of services for the visually challenged. But the main consideration here is the feasibility and extent to which these endorsements have been implemented in actuality within Sri Lankan academic libraries. This paper tends to assess the existent issues that impediment the implementation of accessibility features for the visually challenged in Sri Lankan academic libraries. Visually challenged students continually walk through immense challenges to step forth into their university life. Reaching their undergrad stage of their academic phase, they should be entitled to access information resources with ease and with equality in comparison to the sighted users of a university library. The current university libraries in Sri Lanka, have well improved services that they render to their users. But, what lacks in this scenario is the consideration as to whether these features offered by libraries are user-friendly and easily accessible by the visually challenged users as well. Hence, this paper tends to analyze the inhibitions in delivering services oriented towards the visually challenged and the sighted, and propose feasible alternatives to create a neutral high-end university library environment.Keywords: accessibility, university library, Sri Lanka, visually-challenged
Procedia PDF Downloads 28916517 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System
Authors: Leo Latasch, Mario Di Gennaro
Abstract:
Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.Keywords: coordination, disaster, resilience, volunteers
Procedia PDF Downloads 14216516 Procedure for Recommendation of Archival Documents
Authors: Marlon J. Remedios, Maria T. Morell, Jesse D. Cano
Abstract:
Diffusion and accessibility of historical collections is one of the main objectives of the institutions that aim to safeguard archival documents (General Archives). Several countries have Web applications that try to make accessible and public the large number of documents that they guard. Each of these sites has a set of features in order to facilitate access, navigability, and search for information. Different sources of information include Recommender Systems as a way of customizing content. This paper aims at describing a process for the production of archival documents relevant to the user. To comply with this, the characteristics ruling archival description, elements and main techniques that establishes the design of Recommender Systems, a set of rules to follow, and how these rules operate and the way in which take advantage of the domain knowledge are discussed. Finally, relevant issues are discussed in the design of the proposed tests and the results obtained are shown.Keywords: archival document, recommender system, procedure, information management
Procedia PDF Downloads 51416515 Comparative Analysis of Yield before and after Access to Extension Services among Crop Farmers in Bauchi Local Government Area of Bauchi State, Nigeria
Authors: U. S. Babuga, A. H. Danwanka, A. Garba
Abstract:
The research was carried out to compare the yield of respondents before and after access to extension services on crop production technologies in the study area. Data were collected from the study area through questionnaires administered to seventy-five randomly selected respondents. Data were analyzed using descriptive statistics, t-test and regression models. The result disclosed that majority (97%) of the respondent attended one form of school or the other. The majority (78.67%) of the respondents had farm size ranging between 1-3 hectares. The majority of the respondent adopt improved variety of crops, plant spacing, herbicide, fertilizer application, land preparation, crop protection, crop processing and storage of farm produce. The result of the t-test between the yield of respondents before and after access to extension services shows that there was a significant (p<0.001) difference in yield before and after access to extension. It also indicated that farm size was significant (p<0.001) while household size, years of farming experience and extension contact were significant at (p<0.005). The major constraint to adoption of crop production technologies were shortage of extension agents, high cost of technology and lack of access to credit facility. The major pre-requisite for the improvement of extension service are employment of more extension agents or workers and adequate training. Adequate agricultural credit to farmers at low interest rates will enhance their adoption of crop production technologies.Keywords: comparative, analysis, yield, access, extension
Procedia PDF Downloads 36416514 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 26616513 Ideas for Musical Activities and Games in the Early Year (IMAGINE-Autism): A Case Study Approach
Authors: Tania Lisboa, Angela Voyajolu, Adam Ockelford
Abstract:
The positive impact of music on the development of children with autism is widely acknowledged: music offers a unique channel for communication, wellbeing and self-regulation, as well as access to culture and a means of creative engagement. Yet, no coherent program exists for parents, carers and teachers to follow with their children in the early years, when the need for interventions is often most acute. Hence, research and the development of resources is urgently required. Autism is a project with children on the autism spectrum. The project aims at promoting the participants’ engagement with music through involvement in specially-designed musical activities with parents and carers. The main goal of the research is to verify the effectiveness of newly designed resources and strategies, which are based on the Sounds of Intent in the Early Years (SoI-EY) framework of musical development. This is a pilot study, comprising case studies of five children with autism in the early years. The data comprises semi-structured interviews, observations of videos, and feedback from parents on resources. Interpretative Phenomenological Analysis was chosen to analyze the interviews. The video data was coded in relation to the SoI-EY framework. The feedback from parents was used to evaluate the resources (i.e. musical activity cards). The participants’ wider development was also assessed through selected elements of the Early Years Foundation Stage (EYFS), a national assessment framework used in England: specifically, communication, language and social-emotional development. Five families of children on the autism spectrum (aged between 4-8 years) participated in the pilot. The research team visited each family 4 times over a 3-month period, during which the children were observed, and musical activities were suggested based on the child’s assessed level of musical development. Parents then trialed the activities, providing feedback and gathering further video observations of their child’s musical engagement between visits. The results of one case study will be featured in this paper, in which the evidence suggests that specifically tailored musical activity may promote communication and social engagement for a child with language difficulties on the autism spectrum. The resources were appropriate for the children’s involvement in musical activities. Findings suggest that non-specialist musical engagement with family and carers can be a powerful means to foster communication. The case study featured in this paper illustrates this with a child of limited verbal ability. There is a need for further research and development of resources that can be made available to all those working with children on the autism spectrum.Keywords: autism, development, music education, resources
Procedia PDF Downloads 10316512 Evaluation of Access to Finance for Local Oil Fields Companies in Ghana
Authors: Gordon Newlove Asamoah, Wendy Ama Oti
Abstract:
This study focused on evaluating access to finance for local oil field companies in Ghana. The study adopted a census survey design in evaluating access to finance for local oil field companies in Ghana. The respondents of this study were 30 management members of three oil field companies in Ghana. The data collected was analysed using Statistical Package for Social Scientists (SPSS) to generate tables and graphs for interpretation. The results show that most companies use equity financing in combination with other forms of financing to finance their business activities. This research has shown the various challenges bordering on the financing of local oil and gas projects, with emphasis on the challenges of raising funds by indigenous oil companies. Financing of the projects by indigenous oil field companies in Ghana is preferably achieved through equity finance mainly because it is the easiest to get compared to all the other forms of financing available. Other sources of financing available are debt financing, joint venture, and retained earnings from the profits generated from their operations. The study made recommendations to local oil field companies as to how they can make good use of the capital market to raise financing.Keywords: access, financing, oil fields, Ghana
Procedia PDF Downloads 10816511 Green Computing: Awareness and Practice in a University Information Technology Department
Authors: Samson Temitope Obafemi
Abstract:
The fact that ICTs is pervasive in today’s society paradoxically also calls for the need for green computing. Green computing generally encompasses the study and practice of using Information and Communication Technology (ICT) resources effectively and efficiently without negatively affecting the environment. Since the emergence of this innovation, manufacturers and governmental bodies such as Energy Star and the United State of America’s government have obviously invested many resources in ensuring the reality of green design, manufacture, and disposal of ICTs. However, the level of adherence to green use of ICTs among users have been less accounted for especially in developing ICT consuming nations. This paper, therefore, focuses on examining the awareness and practice of green computing among academics and students of the Information Technology Department of Durban University of Technology, Durban South Africa, in the context of green use of ICTs. This was achieved through a survey that involved the use of a questionnaire with four sections: (a) demography of respondents, (b) Awareness of green computing, (c) practices of green computing, and (d) attitude towards greener computing. One hundred and fifty (150) questionnaires were distributed, one hundred and twenty (125) were completed and collected for data analysis. Out of the one hundred and twenty-five (125) respondents, twenty-five percent (25%) were academics while the remaining seventy-five percent (75%) were students. The result showed a higher level of awareness of green computing among academics when compared to the students. Green computing practices are also shown to be highly adhered to among academics only. However, interestingly, the students were found to be more enthusiastic towards greener computing in the future. The study, therefore, suggests that the awareness of green computing should be further strengthened among students from the curriculum point of view in order to improve on the greener use of ICTs in universities especially in developing countries.Keywords: awareness, green computing, green use, information technology
Procedia PDF Downloads 19416510 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains
Authors: Jing Jin
Abstract:
The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry
Procedia PDF Downloads 6416509 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 25916508 Using Photogrammetry to Survey the Côa Valley Iron Age Rock Art Motifs: Vermelhosa Panel 3 Case Study
Authors: Natália Botica, Luís Luís, Paulo Bernardes
Abstract:
The Côa Valley, listed World Heritage since 1998, presents more than 1300 open-air engraved rock panels. The Archaeological Park of the Côa Valley recorded the rock art motifs, testing various techniques based on direct tracing processes on the rock, using natural and artificial lighting. In this work, integrated in the "Open Access Rock Art Repository" (RARAA) project, we present the methodology adopted for the vectorial drawing of the rock art motifs based on orthophotos taken from the photogrammetric survey and 3D models of the rocks. We also present the information system designed to integrate the vector drawing and the characterization data of the motifs, as well as the open access sharing, in order to promote their reuse in multiple areas. The 3D models themselves constitute a very detailed record, ensuring the digital preservation of the rock and iconography. Thus, even if a rock or motif disappears, it can continue to be studied and even recreated.Keywords: rock art, archaeology, iron age, 3D models
Procedia PDF Downloads 8316507 Local Culture and Ability to Access Funding on Beef Cattle Farmer
Authors: Aslina Asnawi, A. Amidah Amrawaty, Nirwana
Abstract:
This article examines the relationship of local culture on the ability to access finance on beef cattle farmer. The local culture in this study associated with the values held by the farmer community so far and affect the character of farmers both in his personal life and his relationship with the surrounding environment. The data was collected by using interview and questionnaire instrument. Data were analyzed using descriptive analysis and correlation analysis. The result show that local culture identified in this study include: honesty, cleverness, decency, firmness, hard work, and shame. It’s important result that local culture has been associated with the ability to access financing for beef cattle farmers. The higher values are adopted and maintained by farmers will increase their ability to obtain loans from both informal and formal institutions. Strengthening the local culture is important because it affects the character of farmers who became one of the considerations for lenders other than collateral, capacity and capital is precisely the financing constraints for them.Keywords: access funding, beef cattle farmers, character, local culture
Procedia PDF Downloads 329