Search results for: critical information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15303

Search results for: critical information

14853 On Exploring Search Heuristics for improving the efficiency in Web Information Extraction

Authors: Patricia Jiménez, Rafael Corchuelo

Abstract:

Nowadays the World Wide Web is the most popular source of information that relies on billions of on-line documents. Web mining is used to crawl through these documents, collect the information of interest and process it by applying data mining tools in order to use the gathered information in the best interest of a business, what enables companies to promote theirs. Unfortunately, it is not easy to extract the information a web site provides automatically when it lacks an API that allows to transform the user-friendly data provided in web documents into a structured format that is machine-readable. Rule-based information extractors are the tools intended to extract the information of interest automatically and offer it in a structured format that allow mining tools to process it. However, the performance of an information extractor strongly depends on the search heuristic employed since bad choices regarding how to learn a rule may easily result in loss of effectiveness and/or efficiency. Improving search heuristics regarding efficiency is of uttermost importance in the field of Web Information Extraction since typical datasets are very large. In this paper, we employ an information extractor based on a classical top-down algorithm that uses the so-called Information Gain heuristic introduced by Quinlan and Cameron-Jones. Unfortunately, the Information Gain relies on some well-known problems so we analyse an intuitive alternative, Termini, that is clearly more efficient; we also analyse other proposals in the literature and conclude that none of them outperforms the previous alternative.

Keywords: information extraction, search heuristics, semi-structured documents, web mining.

Procedia PDF Downloads 335
14852 Simulation: A Tool for Stabilization of Welding Processes in Lean Production Concepts

Authors: Ola Jon Mork, Lars Andre Giske, Emil Bjørlykhaug

Abstract:

Stabilization of critical processes in order to have the right quality of the products, more efficient production and smoother flow is a key issue in lean production. This paper presents how simulation of key welding processes can stabilize complicated welding processes in small scale production, and how simulation can impact the entire production concept seen from the perspective of lean production. First, a field study was made to learn the production processes in the factory, and subsequently the field study was transformed into a value stream map to get insight into each operation, the quality issues, operation times, lead times and flow of materials. Valuable practical knowledge of how the welding operations were done by operators, appropriate tools and jigs, and type of robots that could be used, was collected. All available information was then implemented into a simulation environment for further elaboration and development. Three researchers, the management of the company and skilled operators at the work floor where working on the project over a period of eight months, and a detailed description of the process was made by the researchers. The simulation showed that simulation could solve a number of technical challenges, the robot program can be tuned in off line mode, and the design and testing of the robot cell could be made in the simulator. Further on the design of the product could be optimized for robot welding and the jigs could be designed and tested in simulation environment. This means that a key issue of lean production can be solved; the welding operation will work with almost 100% performance when it is put into real production. Stabilizing of one key process is critical to gain control of the entire value chain, then a Takt Time can be established and the focus can be directed towards the next process in the production which should be stabilized. Results show that industrial parameters like welding time, welding cost and welding quality can be defined on the simulation stage. Further on, this gives valuable information for calculation of the factories business performance, like manufacturing volume and manufacturing efficiency. Industrial impact from simulation is more efficient implementation of lean manufacturing, since the welding process can be stabilized. More research should be done to gain more knowledge about simulation as a tool for implementation of lean, especially where there complex processes.

Keywords: simulation, lean, stabilization, welding process

Procedia PDF Downloads 321
14851 Combining Corpus Linguistics and Critical Discourse Analysis to Study Power Relations in Hindi Newspapers

Authors: Vandana Mishra, Niladri Sekhar Dash, Jayshree Charkraborty

Abstract:

This present paper focuses on the application of corpus linguistics techniques for critical discourse analysis (CDA) of Hindi newspapers. While Corpus linguistics is the study of language as expressed in corpora (samples) of 'real world' text, CDA is an interdisciplinary approach to the study of discourse that views language as a form of social practice. CDA has mainly been studied from a qualitative perspective. However, we can say that recent studies have begun combining corpus linguistics with CDA in analyzing large volumes of text for the study of existing power relations in society. The corpus under our study is also of a sizable amount (1 million words of Hindi newspaper texts) and its analysis requires an alternative analytical procedure. So, we have combined both the quantitative approach i.e. the use of corpus techniques with CDA’s traditional qualitative analysis. In this context, we have focused on the Keyword Analysis Sorting Concordance Lines of the selected Keywords and calculating collocates of the keywords. We have made use of the Wordsmith Tool for all these analysis. The analysis starts with identifying the keywords in the political news corpus when compared with the main news corpus. The keywords are extracted from the corpus based on their keyness calculated through statistical tests like chi-squared test and log-likelihood test on the frequent words of the corpus. Some of the top occurring keywords are मोदी (Modi), भाजपा (BJP), कांग्रेस (Congress), सरकार (Government) and पार्टी (Political party). This is followed by the concordance analysis of these keywords which generates thousands of lines but we have to select few lines and examine them based on our objective. We have also calculated the collocates of the keywords based on their Mutual Information (MI) score. Both concordance and collocation help to identify lexical patterns in the political texts. Finally, all these quantitative results derived from the corpus techniques will be subjectively interpreted in accordance to the CDA’s theory to examine the ways in which political news discourse produces social and political inequality, power abuse or domination.

Keywords: critical discourse analysis, corpus linguistics, Hindi newspapers, power relations

Procedia PDF Downloads 224
14850 Design of Incident Information System in IoT Virtualization Platform

Authors: Amon Olimov, Umarov Jamshid, Dae-Ho Kim, Chol-U Lee, Ryum-Duck Oh

Abstract:

This paper proposes IoT virtualization platform based incident information system. IoT information based environment is the platform that was developed for the purpose of collecting a variety of data by managing regionally scattered IoT devices easily and conveniently in addition to analyzing data collected from roads. Moreover, this paper configured the platform for the purpose of providing incident information based on sensed data. It also provides the same input/output interface as UNIX and Linux by means of matching IoT devices with the directory of file system and also the files. In addition, it has a variety of approaches as to the devices. Thus, it can be applied to not only incident information but also other platforms. This paper proposes the incident information system that identifies and provides various data in real time as to urgent matters on roads based on the existing USN/M2M and IoT visualization platform.

Keywords: incident information system, IoT, virtualization platform, USN, M2M

Procedia PDF Downloads 351
14849 The Agency of Black Women Professors in Higher Education: A Critical Consciousness Perspective

Authors: Ncamisile T. Zulu, Nicholas Munro

Abstract:

Black women academics in higher education institutions are predominantly portrayed by literature as individuals who usually lack a sense of belonging, progression, and workload management. The oversaturation of this literature can (overtime) perpetuate a stereotypical idea that Black women academics are incapable of coping and succeeding in higher education institutions. The current article explores the agency, motivated by critical consciousness that Black women professors have and utilise in higher education institutions. In order to provide an understanding of how Black women academics can progress, manage their workloads and succeed in higher education institutions, the article considers how these women can take responsibility for their self-development, adaptation, and self-renewal in academic endeavours. As a result, the article presents a line of thought which could help in challenging the stereotype about Black women academics. The study was conducted at two higher education institutions involving Black women professors from different disciplines. A combination of purposive and snowballing sampling was used to recruit nine women participants, while data were collected through interviews. A critical consciousness perspective was adopted to formulate an understanding of the agency of Black women professors in higher education institutions, while thematic analysis was used to analyse the data. The results challenge the widely disseminated view that portrays Black women academics as incapable of coping and succeeding in higher education institutions. The findings highlight Black women professors as proactive, flexible, and self-regulating in their academic endeavours. These findings contribute to the literature by adding a more constructive narrative of Black women academics in higher education.

Keywords: agency, Black women academics, critical consciousness, higher education institutions

Procedia PDF Downloads 156
14848 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 372
14847 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 317
14846 Exploration of Critical Success Factors in Business and Management in Artificial Intelligence Era

Authors: Najah Kalifah Almazmomi

Abstract:

In the time of artificial intelligence (AI), there is a need to know the determinants of success in business management, which are taking on a new dimension. This research purports to scrutinize the Critical Success Factors (CSFs) that drive and ignite the fire of success to help uncover the subtle and profound dynamics that might be operative in organizations. By means of a systematic literature review and a number of empirical methods, the paper is aimed at determining and assessing the key aspects of CSFs, putting emphasis on their role and meaning in the context of AI technology adoption. Some central features such as leadership ways, innovation models, strategic thinking methodologies, organizational culture transformations, and human resource management approaches are compared and contrasted with the AI-driven revolution. Additionally, this research will explore the interactive effects of these factors and their joint impact on the success, survival, and flexibility of a business in the current environment, which is changing due to AI development. Through the use of different qualitative and quantitative methodologies, the research concludes that the findings are significant in understanding the relative roles of individual CSFs and in studying the interactions between them in such an AI-enabled business environment.

Keywords: critical success factors, business and management, artificial intelligence, leadership strategies

Procedia PDF Downloads 37
14845 Comparative Study of Sub-Critical and Supercritical ORC Applications for Exhaust Waste Heat Recovery

Authors: Buket Boz, Alvaro Diez

Abstract:

Waste heat recovery by means of Organic Rankine Cycle is a promising technology for the recovery of engine exhaust heat. However, it is complex to find out the optimum cycle conditions with appropriate working fluids to match exhaust gas waste heat due to its high temperature. Hence, this paper focuses on comparing sub-critical and supercritical ORC conditions with eight working fluids on a combined diesel engine-ORC system. The model employs two ORC designs, Regenerative-ORC and Pre-Heating-Regenerative-ORC respectively. The thermodynamic calculations rely on the first and second law of thermodynamics, thermal efficiency and exergy destruction factors are the fundamental parameters evaluated. Additionally, in this study, environmental and safety, GWP (Global Warming Potential) and ODP (Ozone Depletion Potential), characteristic of the refrigerants are taken into consideration as evaluation criteria to define the optimal ORC configuration and conditions. Consequently, the studys outcomes reveal that supercritical ORCs with alkane and siloxane are more suitable for high temperature exhaust waste heat recovery in contrast to sub-critical conditions.

Keywords: internal combustion engine, organic Rankine cycle, waste heat recovery, working fluids

Procedia PDF Downloads 204
14844 Optimization of Tolerance Grades of a Bearing and Shaft Assembly in a Washing Machine with Regard to Fatigue Life

Authors: M. Cangi, T. Dolar, C. Ersoy, Y. E. Aydogdu, A. I. Aydeniz, A. Mugan

Abstract:

The drum is one of the critical parts in a washing machine in which the clothes are washed and spin by the rotational movement. It is activated by the drum shaft which is attached to an electric motor and subjected to dynamic loading. Being one of the critical components, failures of the drum require costly repairs of dynamic components. In this study, tolerance bands between the drum shaft and its two bearings were examined to develop a relationship between the fatigue life of the shaft and the interaction tolerances. Optimization of tolerance bands was completed in consideration of the fatigue life of the shaft as the cost function. The following methodology is followed: multibody dynamic model of a washing machine was constructed and used to calculate dynamic loading on the components. Then, these forces were used in finite element analyses to calculate the stress field in critical components which was used for fatigue life predictions. The factors affecting the fatigue life were examined to find optimum tolerance grade for a given test condition. Numerical results were verified by experimental observations.

Keywords: fatigue life, finite element analysis, tolerance analysis, optimization

Procedia PDF Downloads 157
14843 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 192
14842 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 150
14841 Mixed Micellization Study of Adiphenine Hydrochloride with 1-Decyl-3-Methylimidazolium Chloride

Authors: Abbul B. Khan, Neeraj Dohare, Rajan Patel

Abstract:

The mixed micellization of adiphenine hydrochloride (ADP) with 1-decyl-3-methylimidazolium chloride (C10mim.Cl), was investigated at different mole fractions and temperatures by surface tension measurements. The synergistic behavior (i.e., non-ideal behavior) for binary mixtures was explained by the deviation of critical micelle concentration (cmc) from ideal critical micelle concentration (cmc*), micellar mole fraction (Xim) from ideal micellar mole fraction (Xiideal), the values of interaction parameter (β) and activity coefficients (fi) (for both mixed micelles and mixed monolayer). The excess free energy (∆Gex) for the ADP- C10mim.Cl binary mixtures explain the stability of mixed micelles in comparison to micelles of pure ADP and C10mim.Cl. Interfacial parameters, i.e., Gibbs surface excess (Гmax), minimum head group area at air/ water interface (Amin), and free energy of micellization (ΔG0m) were also evaluated for the systems.

Keywords: adiphenine hydrochloride, critical micelle concentration, interaction parameter, activity coefficient

Procedia PDF Downloads 269
14840 Bridge Health Monitoring: A Review

Authors: Mohammad Bakhshandeh

Abstract:

Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.

Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis

Procedia PDF Downloads 90
14839 Educational Related Information Technology Department Transformation: A Case Study

Authors: P. Joongsiri, K. Pattanapisuth, P. Siwatintuko, S. Vasupongayya

Abstract:

This paper presents a case study of developing a four-year plan for the information technology department at the Faculty of Engineering, Prince of Songkla University, Thailand. This work can be used as a case study for other in-house information technology department in a higher educational environment. The result of this paper is the guideline of the four year plan creation process which is generated by analyzing the related theories and several best practices.

Keywords: strategic plan, management information system, information technology department governance, best practices, organization transformation

Procedia PDF Downloads 458
14838 Estimating Pile Toe Levels for Capacity Assessment of Piers and Wharves in the Philippines

Authors: Ailvy Faith Zamora, Serj Donn David, Michael Anderson

Abstract:

There are a number of decades-old piers and wharves in Manila, Philippines, that are currently being used for container and bulk cargo handling port operations. These structures fulfill a very important role in the economy and hence have undergone rehabilitation and assessment of capacity to accommodate current and future operational requirements. The capacity assessment would include structural and pile geotechnical evaluation. Unfortunately, old marine structures in the Philippines may not have a complete set of as-built information. In certain instances, critical information, such as pile toe levels, is missing in the documentation. A combination of direct tests, geophysical tests, and numerical analysis/modelling has been performed to estimate existing pile toe levels of open-type piers and anchored quay wall wharves in Manila. These techniques were applied to both concrete and steel piles. This paper presents the tools utilized, testing setup, and techniques used for estimating toe levels of existing piles for certain structures, including the challenges encountered and applied solutions.

Keywords: geophysical testing, pile toe level, structural assessment, piers, wharves

Procedia PDF Downloads 129
14837 Linear Stability of Convection in an Inclined Channel with Nanofluid Saturated Porous Medium

Authors: D. Srinivasacharya, Nidhi Humnekar

Abstract:

The goal of this research is to numerically investigate the convection of nanofluid flow in an inclined porous channel. Brownian motion and thermophoresis effects are accounted for by nanofluid. In addition, the flow in the porous region governs Brinkman’s equation. The perturbed state of the generalized eigenvalue problem is obtained using normal mode analysis, and Chebyshev spectral collocation was used to solve this problem. For various values of the governing parameters, the critical wavenumber and critical Rayleigh number are calculated, and preferred modes are identified.

Keywords: Brinkman model, inclined channel, nanofluid, linear stability, porous media

Procedia PDF Downloads 112
14836 Critical Pedagogy and Ecoliteracy in the Teaching of Foreign Languages

Authors: Anita De Melo

Abstract:

Today we live in a crucial time of ecological crisis, of environmental catastrophes worldwide, and this scenario is, arrogantly, overlooked by powerful economic forces and their politics. Thus, a critical pedagogy that leads to action and that fosters ecoliteracy, environment education, is now inevitable, and it must become an integral part of the school curriculum across the disciplines, including the social sciences and the humanities. One of the most important contemporary and emerging movement of today is ecopedagogy, a movement that blends theory and ethics towards a curriculum that focus on an environmental education that will promote ecological justice, respect, and care by educating students to become planetary citizens. This paper aims, first, to emphasize the need for discussions and investigations regarding ecoliteracy within our field of teaching foreign languages, which will consider, among others, the of role language in stimulating sustainability, and the role of second language proficiency in fostering positive transnational dialogues conducive to fighting our current planetary crisis. Second, this paper suggests and discusses some critical ecopedagogical practices -- in the form of project-based learning, service-learning and environmental-oriented study abroad programs – apropos to ecoliteracy. These interdisciplinary projects can and should bring students in contact with communities speaking the target language, and such encounter would facilitate cultural exchanges and promote positive language proficiency whilst it would also give students the opportunity to work with finding ideas/projects to fight our current ecological catastrophe.

Keywords: critical pedagogy, ecoliteracy, ecopedagogy, planetary crisis

Procedia PDF Downloads 250
14835 Between AACR2 and RDA What Changes Occurs in Them

Authors: Ibrahim Abdullahi Mohammad

Abstract:

A library catalogue exists not only as an inventory of the collections of the particular library, but also as a retrieval device. It is provided to assist the library user in finding whatever information or information resources they may be looking for. The paper proposes that this location objective of the library catalogue can only be fulfilled, if the library catalogue is constructed, bearing in mind the information needs and searching behavior of the library user. Comparing AACR2 and RDA viz-a-viz the changes RDA has introduced into bibliographic standards, the paper tries to establish the level of viability of RDA in relation to AACR2.

Keywords: library catalogue, information retrieval, AACR2, RDA

Procedia PDF Downloads 54
14834 A Proposal for U-City (Smart City) Service Method Using Real-Time Digital Map

Authors: SangWon Han, MuWook Pyeon, Sujung Moon, DaeKyo Seo

Abstract:

Recently, technologies based on three-dimensional (3D) space information are being developed and quality of life is improving as a result. Research on real-time digital map (RDM) is being conducted now to provide 3D space information. RDM is a service that creates and supplies 3D space information in real time based on location/shape detection. Research subjects on RDM include the construction of 3D space information with matching image data, complementing the weaknesses of image acquisition using multi-source data, and data collection methods using big data. Using RDM will be effective for space analysis using 3D space information in a U-City and for other space information utilization technologies.

Keywords: RDM, multi-source data, big data, U-City

Procedia PDF Downloads 433
14833 Adversarial Disentanglement Using Latent Classifier for Pose-Independent Representation

Authors: Hamed Alqahtani, Manolya Kavakli-Thorne

Abstract:

The large pose discrepancy is one of the critical challenges in face recognition during video surveillance. Due to the entanglement of pose attributes with identity information, the conventional approaches for pose-independent representation lack in providing quality results in recognizing largely posed faces. In this paper, we propose a practical approach to disentangle the pose attribute from the identity information followed by synthesis of a face using a classifier network in latent space. The proposed approach employs a modified generative adversarial network framework consisting of an encoder-decoder structure embedded with a classifier in manifold space for carrying out factorization on the latent encoding. It can be further generalized to other face and non-face attributes for real-life video frames containing faces with significant attribute variations. Experimental results and comparison with state of the art in the field prove that the learned representation of the proposed approach synthesizes more compelling perceptual images through a combination of adversarial and classification losses.

Keywords: disentanglement, face detection, generative adversarial networks, video surveillance

Procedia PDF Downloads 129
14832 How Validated Nursing Workload and Patient Acuity Data Can Promote Sustained Change and Improvements within District Health Boards. the New Zealand Experience

Authors: Rebecca Oakes

Abstract:

In the New Zealand public health system, work has been taking place to use electronic systems to convey data from the ‘floor to the board’ that makes patient needs, and therefore nursing work, visible. For nurses, these developments in health information technology puts us in a very new and exciting position of being able to articulate the work of nursing through a language understood at all levels of an organisation, the language of acuity. Nurses increasingly have a considerable stake-hold in patient acuity data. Patient acuity systems, when used well, can assist greatly in demonstrating how much work is required, the type of work, and when it will be required. The New Zealand Safe Staffing Unit is supporting New Zealand nurses to create a culture of shared governance, where nursing data is informing policies, staffing methodologies and forecasting within their organisations. Assisting organisations to understand their acuity data, strengthening user confidence in using electronic patient acuity systems, and ensuring nursing and midwifery workload is accurately reflected is critical to the success of the safe staffing programme. Nurses and midwives have the capacity via an acuity tool to become key informers of organisational planning. Quality patient care, best use of health resources and a quality work environment are essential components of a safe, resilient and well resourced organisation. Nurses are the key informers of this information. In New Zealand a national level approach is paving the way for significant changes to the understanding and use of patient acuity and nursing workload information.

Keywords: nursing workload, patient acuity, safe staffing, New Zealand

Procedia PDF Downloads 382
14831 Designing a Method to Control and Determine the Financial Performance of the Real Cost Sub-System in the Information Management System of Construction Projects

Authors: Alireza Ghaffari, Hassan Saghi

Abstract:

Project management is more complex than managing the day-to-day affairs of an organization. When the project dimensions are broad and multiple projects have to be monitored in different locations, the integrated management becomes even more complicated. One of the main concerns of project managers is the integrated project management, which is mainly rooted in the lack of accurate and accessible information from different projects in various locations. The collection of dispersed information from various parts of the network, their integration and finally the selective reporting of this information is among the goals of integrated information systems. It can help resolve the main problem, which is bridging the information gap between executives and senior managers in the organization. Therefore, the main objective of this study is to design and implement an important subset of a project management information system in order to successfully control the cost of construction projects so that its results can be used to design raw software forms and proposed relationships between different project units for the collection of necessary information.

Keywords: financial performance, cost subsystem, PMIS, project management

Procedia PDF Downloads 109
14830 Developing a Model for Information Giving Behavior in Virtual Communities

Authors: Pui-Lai To, Chechen Liao, Tzu-Ling Lin

Abstract:

Virtual communities have created a range of new social spaces in which to meet and interact with one another. Both as a stand-alone model or as a supplement to sustain competitive advantage for normal business models, building virtual communities has been hailed as one of the major strategic innovations of the new economy. However for a virtual community to evolve, the biggest challenge is how to make members actively give information or provide advice. Even in busy virtual communities, usually, only a small fraction of members post information actively. In order to investigate the determinants of information giving willingness of those contributors who usually actively provide their opinions, we proposed a model to understand the reasons for contribution in communities. The study will definitely serve as a basis for the future growth of information giving in virtual communities.

Keywords: information giving, social identity, trust, virtual community

Procedia PDF Downloads 322
14829 Developing and Enacting a Model for Institutional Implementation of the Humanizing Pedagogy: Case Study of Nelson Mandela University

Authors: Mukhtar Raban

Abstract:

As part of Nelson Mandela University’s journey of repositioning its learning and teaching agenda, the university adopted and foregrounded a humanizing pedagogy-aligning with institutional goals of critically transforming the academic project. The university established the Humanizing Pedagogy Praxis and Research Niche (HPPRN) as a centralized hub for coordinating institutional work exploring and advancing humanizing pedagogies and tasked the unit with developing and enacting a model for humanizing pedagogy exploration. This investigation endeavored to report on the development and enactment of a model that sought to institutionalize a humanizing pedagogy at a South African university. Having followed a qualitative approach, the investigation presents the case study of Nelson Mandela University’s HPPRN and the model it subsequently established and enacted for the advancement towards a more common institutional understanding, interpretation and application of the humanizing pedagogy. The study adopted an interpretive lens for analysis, complementing the qualitative approach of the investigation. The primary challenge that confronted the HPPRN was the development of a ‘living model’ that had to complement existing institutional initiatives while accommodating a renewed spirit of critical reflection, innovation and research of continued and new humanizing pedagogical exploration and applications. The study found that the explicit consideration of tenets of humanizing and critical pedagogies in underpinning and framing the HPPRN Model contributed to the sense of ‘lived’ humanizing pedagogy experiences during enactment. The multi-leveled inclusion of critical reflection in the development and enactment stages was found to further the processes of praxis employed at the university, which is integral to the advancement of humanizing and critical pedagogies. The development and implementation of a model that seeks to institutionalize the humanizing pedagogy at a university rely not only on sound theoretical conceptualization but also on the ‘richness of becoming more human’ explicitly expressed and encountered in praxes and application.

Keywords: humanizing pedagogy, critical pedagogy, institutional implementation, praxis

Procedia PDF Downloads 167
14828 Critical Analysis of Different Actuation Techniques for a Micro Cantilever

Authors: B. G. Sheeparamatti, Prashant Hanasi, Vanita Abbigeri

Abstract:

The objective of this work is to carry out a critical comparison of different actuation mechanisms like electrostatic, thermal, piezoelectric, and magnetic with reference to a microcantilever. The relevant parameters like force generated, displacement are compared in actuation methods. With these results, they help in choosing the best actuation method for a particular application. In this study, Comsol/Multiphysics software is used. Modeling and simulation are done by considering the microcantilever of same dimensions as an actuator using all the above-mentioned actuation techniques. In addition to their small size, micro actuators consume very little power and are capable of accurate results. In this work, a comparison of actuation mechanisms is done to decide the efficient system in the micro domain.

Keywords: actuation techniques, microswitch, micro actuator, microsystems

Procedia PDF Downloads 409
14827 Global Emission Inventories of Air Pollutants from Combustion Sources

Authors: Shu Tao

Abstract:

Based on a global fuel consumption data product (PKU-FUEL-2007) compiled recently and a series of databases for emission factors of various sources, global emission inventories of a number of greenhouse gases and air pollutants, including CO2, CO, SO2, NOx, primary particulate matter (total, PM 10, and PM 2.5), black carbon, organic carbon, mercury, volatile organic carbons, and polycyclic aromatic hydrocarbons, from combustion sources have been developed. The inventories feather high spatial and sectorial resolutions. The spatial resolution of the inventories are 0.1 by 0.1 degree, based on a sub-national disaggregation approach to reduce spatial bias due to uneven distribution of per person fuel consumption within countries. The finely resolved inventories provide critical information for chemical transport modeling and exposure modeling. Emissions from more than 60 sources in energy, industry, agriculture, residential, transportation, and wildfire sectors were quantified in this study. With the detailed sectorial information, the inventories become an important tool for policy makers. For residential sector, a set of models were developed to simulate temporal variation of fuel consumption, consequently pollutant emissions. The models can be used to characterize seasonal as well as inter-annual variations in the emissions in history and to predict future changes. The models can even be used to quantify net change of fuel consumption and pollutant emissions due to climate change. The inventories has been used for model ambient air quality, population exposure, and even health effects. A few examples of the applications are discussed.

Keywords: air pollutants, combustion, emission inventory, sectorial information

Procedia PDF Downloads 369
14826 A Critical Analysis of the Financial Reporting Practices of Islamic Financial Institutions (IFI)

Authors: Riaz Dhai

Abstract:

The inherent differences between Islamic and conventional finance have given rise to a debate on whether conventional accounting standards provide sufficient disclosure in the annual financial statements of Islamic financial institutions (IFI). This issue has become more pronounced due to the rapid growth of IFIs over the last decade. This paper seeks to collate the literature surrounding this debate as well as summarise the key macro and micro level financial reporting differences between conventional and Islamic accounting. Based on these findings we propose some important areas of future research in this emerging field.

Keywords: Islamic financial institutions, financial reporting, critical analysis, conventional accounting standards

Procedia PDF Downloads 446
14825 The Role of Libraries in the Context of Indian Knowledge Based Society

Authors: Sanjeev Sharma

Abstract:

We are living in the information age. Information is not only important to an individual but also to researchers, scientists, academicians and all others who are doing work in their respective fields. The 21st century which is also known as the electronic era has brought several changes in the mechanism of the libraries in their working environment. In the present scenario, acquisition of information resources and implementation of new strategies have brought a revolution in the library’s structures and their principles. In the digital era, the role of the library has become important as new information is coming at every minute. The knowledge society wants to seek information at their desk. The libraries are managing electronic services and web-based information sources constantly in a democratic way. The basic objective of every library is to save the time of user which is based on the quality and user-orientation of services. With the advancement of information communication and technology, the libraries should pay more devotion to the development trends of the information society that would help to adjust their development strategies and information needs of the knowledge society. The knowledge-based society demands to re-define the position and objectives of all the institutions which work with information, knowledge, and culture. The situation is the era of digital India is changing at a fast speed. Everyone wants information 24x7 and libraries have been recognized as one of the key elements for open access to information, which is crucial not only to individual but also to democratic knowledge-based information society. Libraries are especially important now a day the whole concept of education is focusing more and more independent e-learning and their acting. The citizens of India must be able to find and use the relevant information. Here we can see libraries enter the stage: The essential features of libraries are to acquire, organize, store and retrieve for use and preserve publicly available material irrespective of the print as well as non-print form in which it is packaged in such a way that, when it is needed, it can be found and put to use.

Keywords: knowledge, society, libraries, culture

Procedia PDF Downloads 140
14824 A Pedagogical Study of Computational Design in a Simulated Building Information Modeling-Cloud Environment

Authors: Jaehwan Jung, Sung-Ah Kim

Abstract:

Building Information Modeling (BIM) provides project stakeholders with various information about property and geometry of entire component as a 3D object-based parametric building model. BIM represents a set of Information and solutions that are expected to improve collaborative work process and quality of the building design. To improve collaboration among project participants, the BIM model should provide the necessary information to remote participants in real time and manage the information in the process. The purpose of this paper is to propose a process model that can apply effective architectural design collaborative work process in architectural design education in BIM-Cloud environment.

Keywords: BIM, cloud computing, collaborative design, digital design education

Procedia PDF Downloads 434