Search results for: information distinction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10870

Search results for: information distinction

10360 Converse to the Sherman Inequality with Applications in Information Theory

Authors: Ana Barbir, S. Ivelic Bradanovic, D. Pecaric, J. Pecaric

Abstract:

We proved a converse to Sherman's inequality. Using the concept of f-divergence we obtained some inequalities for the well-known entropies, such as Shannon entropies that have many applications in many applied sciences, for example, in information theory, biology and economics Zipf-Mandelbrot law gave improvement in account for the low-rankwords in corpus. Applications of Zipf-Mandelbrot law can be found in linguistics, information sciences and also mostly applicable in ecological eld studies. We also introduced an entropy by applying the Zipf-Mandelbrot law and derived some related inequalities.

Keywords: f-divergence, majorization inequality, Sherman inequality, Zipf-Mandelbrot entropy

Procedia PDF Downloads 166
10359 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 166
10358 A Framework for Building Information Modelling Execution Plan in the Construction Industry, Lagos State, Nigeria

Authors: Tosin Deborah Akanbi

Abstract:

The Building Information Modeling Execution Plan (BEP) is a document that manifests the specifications for the adoption and execution of building information modeling in the construction sector in an organized manner so as to attain the listed goals. In this regard, the study examined the barriers to the adoption of building information modeling, evaluated the effect of building information modeling adoption characteristics on the key elements of a building information modeling execution plan and developed a strategic framework for a BEP in the Lagos State construction industry. Data were gathered through a questionnaire survey with 332 construction professionals in the study area. Three online structured interviews were conducted to support and validate the findings of the quantitative analysis. The results showed the significant relationships and connections between the variables in the framework: BIM usage and model quality control (aBIMskill -> dMQ, Beta = 0.121, T statistics = 1.829), BIM adoption characteristics and information exchange (bBIM_CH -> dIE, Beta = 0.128, T statistics = 1.727), BIM adoption characteristics and process design (bBIM_CH -> dPD, Beta = 0.170, T statistics = 2.754), BIM adoption characteristics and roles and responsibilities (bBIM_CH -> dRR, Beta = 0.131, T statistics = 2.181), interest BIM barriers and BIM adoption characteristics (cBBIM_INT -> bBIM_CH, Beta = 0.137, T statistics = 2.309), legal BIM barriers and BIM adoption characteristics (cBBIM_LEG -> bBIM_CH, Beta = 0.168, T statistics = 2.818), professional BIM barriers and BIM adoption characteristics (cBBIM_PRO -> bBIM_CH, Beta = 0.152, T statistics = 2.645). The results also revealed that seven final themes were generated, namely: model structure and process design, BIM information exchange and collaboration procedures, project goals and deliverables, project model quality control, roles and responsibilities, reflect Lagos state construction industry and validity of the BEP framework. Thus, there is a need for the policy makers to direct interventions to promote, encourage and support the understanding and adoption of BIM by emphasizing the various benefits of using the technology in the Lagos state construction industry.

Keywords: building information modelling execution plan, BIM adoption characteristics, BEP framework, construction industry

Procedia PDF Downloads 11
10357 Genomic Surveillance of Bacillus Anthracis in South Africa Revealed a Unique Genetic Cluster of B- Clade Strains

Authors: Kgaugelo Lekota, Ayesha Hassim, Henriette Van Heerden

Abstract:

Bacillus anthracis is the causative agent of anthrax that is composed of three genetic groups, namely A, B, and C. Clade-A is distributed world-wide, while sub-clades B has been identified in Kruger National Park (KNP), South Africa. KNP is one of the endemic anthrax regions in South Africa with distinctive genetic diversity. Genomic surveillance of KNP B. anthracis strains was employed on the historical culture collection isolates (n=67) dated from the 1990’s to 2015 using a whole genome sequencing approach. Whole genome single nucleotide polymorphism (SNPs) and pan-genomics analysis were used to define the B. anthracis genetic population structure. This study showed that KNP has heterologous B. anthracis strains grouping in the A-clade with more prominent ABr.005/006 (Ancient A) SNP lineage. The 2012 and 2015 anthrax isolates are dispersed amongst minor sub-clades that prevail in non-stabilized genetic evolution strains. This was augmented with non-parsimony informative SNPs of the B. anthracis strains across minor sub-clades of the Ancient A clade. Pan-genomics of B. anthracis showed a clear distinction between A and B-clade genomes with 11 374 predicted clusters of protein coding genes. Unique accessory genes of B-clade genomes that included biosynthetic cell wall genes and multidrug resistant of Fosfomycin. South Africa consists of diverse B. anthracis strains with unique defined SNPs. The sequenced B. anthracis strains in this study will serve as a means to further trace the dissemination of B. anthracis outbreaks globally and especially in South Africa.

Keywords: bacillus anthracis, whole genome single nucleotide polymorphisms, pangenomics, kruger national park

Procedia PDF Downloads 144
10356 Appraisal of Parents' Views and Supervision of Their Children's Use of Information Communication Technology

Authors: Olabisi Adedigba

Abstract:

It is a fundamental truth that Information Communication Technology (ICT) lies at the very heart of our today’s society and determines its development. The use of ICT has given a boost to the educational and mental development of an average pupil of this age far above their counterparts who lived centuries ago. Nevertheless, the present age children stand the risk of the scourge of this technology if proactive measures are not taken urgently to arrest the damages of its negative use on them. One of the measures that can be taken is supervision of children’s use of ICT. This research therefore investigated parents’ views and supervision of their children’s use of Information Communication Technology. Descriptive design was adopted for this study. 300 parents were randomly selected. “Parents’ Views and Supervision of Children’s Use of ICT” was used to collect data for the study. Data collected were analyzed using percentage, mean, standard deviation and t-test. The result revealed that parents’ view of their children’s use of ICT is negative while supervision of their children’s use of ICT is low. Recommendations were thus offered that schools and other stakeholders should educate parents on children’s proper utilization of ICT and parents are urged to maintain adequate supervision on their children use of ICT.

Keywords: appraisal of parents’ views and supervision, children’s use, information communication technology, t-test

Procedia PDF Downloads 507
10355 Succinct Perspective on the Implications of Intellectual Property Rights and 3rd Generation Partnership Project in the Rapidly Evolving Telecommunication Industry

Authors: Arnesh Vijay

Abstract:

Ever since its early introduction in the late 1980s, the mobile industry has been rapidly evolving with each passing year. The development witnessed is not just in its ability to support diverse applications, but also its extension into diverse technological means to access and offer various services to users. Amongst the various technologies present, radio systems have clearly emerged as a strong contender, due to its fine attributes of accessibility, reachability, interactiveness, and cost efficiency. These advancements have no doubt guaranteed unprecedented ease, utility and sophistication to the cell phone users, but caused uncertainty due to the interdependence of various systems, making it extremely complicated to exactly map concepts on to 3GPP (3rd Generation Partnership Project) standards. Although the close interrelation and interdependence of intellectual property rights and mobile standard specifications have been widely acknowledged by the technical and legal community; there, however, is a requirement for clear distinction between the scope and future-proof of inventions to influence standards and its market place adoptability. For this, collaborative work is required between intellectual property professionals, researchers, standardization specialists and country specific legal experts. With the evolution into next generation mobile technology, i.e., to 5G systems, there is a need for further work to be done in this field, which has been felt now more than ever before. Based on these lines, this poster will briefly describe the importance of intellectual property rights in the European market. More specifically, will analyse the role played by intellectual property in various standardization institutes, such as 3GPP (3rd generation partnership project) and ITU (International Telecommunications Union). The main intention: to ensure the scope and purpose is well defined, and concerned parties on all four sides are well informed on the clear significance of good proposals which not only bring economic revenue to the company but those that are capable of improving the technology and offer better services to mankind. The poster will comprise different sections. The first segment begins with a background on the rapidly evolving mobile technology, with a brief insight on the industrial impact of standards and its relation to intellectual property rights. Next, section two will succinctly outline the interplay between patents and standards; explicitly discussing the ever changing and rapidly evolving relationship between the two sectors. Then the remaining sections will examine ITU and its role played in international standards development, touching upon the various standardization process and the common patent policies and related guidelines. Finally, it proposes ways to improve the collaboration amongst various sectors for a more evolved and sophisticated next generation mobile telecommunication system. The sole purpose here is to discuss methods to reduce the gap and enhance the exchange of information between the two sectors to offer advanced technologies and services to mankind.

Keywords: mobile technology, mobile standards, intellectual property rights, 3GPP

Procedia PDF Downloads 124
10354 Enhancing Knowledge Graph Convolutional Networks with Structural Adaptive Receptive Fields for Improved Node Representation and Information Aggregation

Authors: Zheng Zhihao

Abstract:

Recently, Knowledge Graph Framework Network (KGCN) has developed powerful capabilities in knowledge representation and reasoning tasks. However, traditional KGCN often uses a fixed weight mechanism when aggregating information, failing to make full use of rich structural information, resulting in a certain expression ability of node representation, and easily causing over-smoothing problems. In order to solve these challenges, the paper proposes an new graph neural network model called KGCN-STAR (Knowledge Graph Convolutional Network with Structural Adaptive Receptive Fields). This model dynamically adjusts the perception of each node by introducing a structural adaptive receptive field. wild range, and a subgraph aggregator is designed to capture local structural information more effectively. Experimental results show that KGCN-STAR shows significant performance improvement on multiple knowledge graph data sets, especially showing considerable capabilities in the task of representation learning of complex structures.

Keywords: knowledge graph, graph neural networks, structural adaptive receptive fields, information aggregation

Procedia PDF Downloads 18
10353 Implementing a Structured, yet Flexible Tool for Critical Information Handover

Authors: Racheli Magnezi, Inbal Gazit, Michal Rassin, Joseph Barr, Orna Tal

Abstract:

An effective process for transmitting patient critical information is essential for patient safety and for improving communication among healthcare staff. Previous studies have discussed handover tools such as SBAR (Situation, Background, Assessment, Recommendation) or SOFI (Short Observational Framework for Inspection). Yet, these formats lack flexibility, and require special training. In addition, nurses and physicians have different procedures for handing over information. The objectives of this study were to establish a universal, structured tool for handover, for both physicians and nurses, based on parameters that were defined as ‘important’ and ‘appropriate’ by the medical team, and to implement this tool in various hospital departments, with flexibility for each ward. A questionnaire, based on established procedures and on the literature, was developed to assess attitudes towards the most important information for effective handover between shifts (Cronbach's alpha 0.78). It was distributed to 150 senior physicians and nurses in 62 departments. Among senior medical staff, 12 physicians and 66 nurses responded to the questionnaire (52% response rate). Based on the responses, a handover form suitable for all hospital departments was designed and implemented. Important information for all staff included: Patient demographics (full name and age); Health information (diagnosis or patient complaint, changes in hemodynamic status, new medical treatment or equipment required); and Social Information (suspicion of violence, mental or behavioral changes, and guardianship). Additional information relevant to each unit included treatment provided, laboratory or imaging required, and change in scheduled surgery in surgical departments. ICU required information on background illnesses, Pediatrics required information on diet and food provided and Obstetrics required the number of days after cesarean section. Based on the model described, a flexible tool was developed that enables handover of both common and unique information. In addition, it includes general logistic information that must be transmitted to the next shift, such as planned disruptions in service or operations, staff training, etc. Development of a simple, clear, comprehensive, universal, yet flexible tool designed for all medical staff for transmitting critical information between shifts was challenging. Physicians and nurses found it useful and it was widely implemented. Ongoing research is needed to examine the efficiency of this tool, and whether the enthusiasm that accompanied its initial use is maintained.

Keywords: handover, nurses, hospital, critical information

Procedia PDF Downloads 244
10352 Visual Servoing for Quadrotor UAV Target Tracking: Effects of Target Information Sharing

Authors: Jason R. King, Hugh H. T. Liu

Abstract:

This research presents simulation and experimental work in the visual servoing of a quadrotor Unmanned Aerial Vehicle (UAV) to stabilize overtop of a moving target. Most previous work in the field assumes static or slow-moving, unpredictable targets. In this experiment, the target is assumed to be a friendly ground robot moving freely on a horizontal plane, which shares information with the UAV. This information includes velocity and acceleration information of the ground target to aid the quadrotor in its tracking task. The quadrotor is assumed to have a downward-facing camera which is fixed to the frame of the quadrotor. Only onboard sensing for the quadrotor is utilized for the experiment, with a VICON motion capture system in place used only to measure ground truth and evaluate the performance of the controller. The experimental platform consists of an ArDrone 2.0 and a Create Roomba, communicating using Robot Operating System (ROS). The addition of the target’s information is demonstrated to help the quadrotor in its tracking task using simulations of the dynamic model of a quadrotor in Matlab Simulink. A nested PID control loop is utilized for inner-loop control the quadrotor, similar to previous works at the Flight Systems and Controls Laboratory (FSC) at the University of Toronto Institute for Aerospace Studies (UTIAS). Experiments are performed with ground truth provided by an indoor motion capture system, and the results are analyzed. It is demonstrated that a velocity controller which incorporates the additional information is able to perform better than the controllers which do not have access to the target’s information.

Keywords: quadrotor, target tracking, unmanned aerial vehicle, UAV, UAS, visual servoing

Procedia PDF Downloads 338
10351 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience

Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha

Abstract:

Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.

Keywords: digital images, medical information system, second opinion consultations, electronic medical record

Procedia PDF Downloads 444
10350 Logistics Information Systems in the Distribution of Flour in Nigeria

Authors: Cornelius Femi Popoola

Abstract:

This study investigated logistics information systems in the distribution of flour in Nigeria. A case study design was used and 50 staff of Honeywell Flour Mill was sampled for the study. Data generated through a questionnaire were analysed using correlation and regression analysis. The findings of the study revealed that logistic information systems such as e-commerce, interactive telephone systems and electronic data interchange positively correlated with the distribution of flour in Honeywell Flour Mill. Finding also deduced that e-commerce, interactive telephone systems and electronic data interchange jointly and positively contribute to the distribution of flour in Honeywell Flour Mill in Nigeria (R = .935; Adj. R2 = .642; F (3,47) = 14.739; p < .05). The study therefore recommended that Honeywell Flour Mill should upgrade their logistic information systems to computer-to-computer communication of business transactions and documents, as well adopt new technology such as, tracking-and-tracing systems (barcode scanning for packages and palettes), tracking vehicles with Global Positioning System (GPS), measuring vehicle performance with ‘black boxes’ (containing logistic data), and Automatic Equipment Identification (AEI) into their systems.

Keywords: e-commerce, electronic data interchange, flour distribution, information system, interactive telephone systems

Procedia PDF Downloads 547
10349 The Impact of Voluntary Disclosure Level on the Cost of Equity Capital in Tunisian's Listed Firms

Authors: Nouha Ben Salah, Mohamed Ali Omri

Abstract:

This paper treats the association between disclosure level and the cost of equity capital in Tunisian’slisted firms. This relation is tested by using two models. The first is used for testing this relation directly by regressing firm specific estimates of cost of equity capital on market beta, firm size and a measure of disclosure level. The second model is used for testing this relation by introducing information asymmetry as mediator variable. This model is suggested by Baron and Kenny (1986) to demonstrate the role of mediator variable in general. Based on a sample of 21 non-financial Tunisian’s listed firms over a period from 2000 to 2004, the results prove that greater disclosure is associated with a lower cost of equity capital. However, the results of indirect relationship indicate a significant positive association between the level of voluntary disclosure and information asymmetry and a significant negative association between information asymmetry and cost of equity capital in contradiction with our previsions. Perhaps this result is due to the biases of measure of information asymmetry.

Keywords: cost of equity capital, voluntary disclosure, information asymmetry, and Tunisian’s listed non-financial firms

Procedia PDF Downloads 511
10348 Exploring the Landscape of Information Visualization through a Mark Lombardi Lens

Authors: Alon Friedman, Antonio Sanchez Chinchon

Abstract:

This bibliometric study takes an artistic and storytelling approach to explore the term ”information visualization.” Analyzing over 1008 titles collected from databases that specialize in data visualization research, we examine the titles of these publications to report on the characteristics and development trends in the field. Employing a qualitative methodology, we delve into the titles of these publications, extracting leading terms and exploring the cooccurrence of these terms to gain deeper insights. By systematically analyzing the leading terms and their relationships within the titles, we shed light on the prevailing themes that shape the landscape of ”information visualization” by employing the artist Mark Lombardi’s techniques to visualize our findings. By doing so, this study provides valuable insights into bibliometrics visualization while also opening new avenues for leveraging art and storytelling to enhance data representation.

Keywords: bibliometrics analysis, Mark Lombardi design, information visualization, qualitative methodology

Procedia PDF Downloads 80
10347 Biophysical Features of Glioma-Derived Extracellular Vesicles as Potential Diagnostic Markers

Authors: Abhimanyu Thakur, Youngjin Lee

Abstract:

Glioma is a lethal brain cancer whose early diagnosis and prognosis are limited due to the dearth of a suitable technique for its early detection. Current approaches, including magnetic resonance imaging (MRI), computed tomography (CT), and invasive biopsy for the diagnosis of this lethal disease, hold several limitations, demanding an alternative method. Recently, extracellular vesicles (EVs) have been used in numerous biomarker studies, majorly exosomes and microvesicles (MVs), which are found in most of the cells and biofluids, including blood, cerebrospinal fluid (CSF), and urine. Remarkably, glioma cells (GMs) release a high number of EVs, which are found to cross the blood-brain-barrier (BBB) and impersonate the constituents of parent GMs including protein, and lncRNA; however, biophysical properties of EVs have not been explored yet as a biomarker for glioma. We isolated EVs from cell culture conditioned medium of GMs and regular primary culture, blood, and urine of wild-type (WT)- and glioma mouse models, and characterized by nano tracking analyzer, transmission electron microscopy, immunogold-EM, and differential light scanning. Next, we measured the biophysical parameters of GMs-EVs by using atomic force microscopy. Further, the functional constituents of EVs were examined by FTIR and Raman spectroscopy. Exosomes and MVs-derived from GMs, blood, and urine showed distinction biophysical parameters (roughness, adhesion force, and stiffness) and different from that of regular primary glial cells, WT-blood, and -urine, which can be attributed to the characteristic functional constituents. Therefore, biophysical features can be potential diagnostic biomarkers for glioma.

Keywords: glioma, extracellular vesicles, exosomes, microvesicles, biophysical properties

Procedia PDF Downloads 137
10346 Knowledge Development: How New Information System Technologies Affect Knowledge Development

Authors: Yener Ekiz

Abstract:

Knowledge development is a proactive process that covers collection, analysis, storage and distribution of information that helps to contribute the understanding of the environment. To transfer knowledge correctly and fastly, you have to use new emerging information system technologies. Actionable knowledge is only of value if it is understandable and usable by target users. The purpose of the paper is to enlighten how technology eases and affects the process of knowledge development. While preparing the paper, literature review, survey and interview methodology will be used. The hypothesis is that the technology and knowledge development are inseparable and the technology will formalize the DIKW hierarchy again. As a result, today there is huge data. This data must be classified sharply and quickly.

Keywords: DIKW hierarchy, knowledge development, technology

Procedia PDF Downloads 434
10345 Computed Tomography Differential Diagnose of Intraventicular Masses in the Emergency Departemen

Authors: Angelis P. Barlampas

Abstract:

Purpose: A 29 years old woman presented in the emergency department with psychiatric symptoms. The psychiatrist ordered a computed tomography scan as part of a general examination. Material and methods: The CT showed bilateral enlarged choroid plexus structures mimicking papillomata and situated in the trigones of the lateral ventricles. The left choroid plexus was heavily calcified, but the right one has no any obvious calcifications. Results: It is well kown that any brain mass can present with behavioral changes and even psychiatric symptomatology. Papillomata of the ventricular system have been described to cause psychotic episodes. According to literature, choroid plexus papillomas are seldom neuroepithelial intraventricular tumors, which are benign and categorized as WHO grade 1 tumors. They are more common in the pediatric population, but they can occur in the adults, too1. In addition, the distinction between choroid plexus papilloma and carcinoma is very difficult and impossible by imagine alone. It can only be implied with more advanced imaging, such as arterial spin labeling and MRI. The final diagnosis is, of course, after surgical excision. The usual location in adults is the fourth ventricle, but in children, it is the lateral ventricles. Their imaging appearance is that of a solid vascular tumor, which enhances intensely after the intravenous administration of contrast material. One out of fourth tumors presents speckled calcifications1. In our case, there are symmetrically sized masses at the trigones, and there are no calcifications in one of them, whereas the other one is grossly calcified. Also, there is no obvious hydrocephalus or any other evidence of increased intracranial pressure. General conclusions: When there is a new psychiatric patient, someone must undergo any possible examination, and of course, a brain CT study should be done to exclude any rare organic causes that may be responsible for the disease.

Keywords: phycosis, intraventricular masses, CT, brain calcifications

Procedia PDF Downloads 55
10344 Evaluation of the Relations between Childhood Trauma and Dissociative Experiences, Self-Perception, and Early Maladaptive Schemes in Sexual Assault Convicts

Authors: Safak Akdemir

Abstract:

The main purpose of this research is to evaluate the relationships between childhood traumas and dissociative experiences, self-perceptions and early maladaptive schemas in male convicts convicted of sexual assault crimes in prison. In our study, male convicts in prison for the crime of sexual assault constitute the experimental group, and the participants matched with this experimental group in terms of education, age and gender constitute the control group. The experimental group of the research consists of 189 male individuals who are convicted in the Ministry of Justice, General Directorate of Prisons, Istanbul/Maltepe L Type Closed Prison. The control group of this study consists of 147 adult males matched with the experimental group in terms of age, gender and education parameters. A total of 336 adult male individuals are included in the sample of this study. 46% of the experimental group were convicted of only sexual assault, 54% of them were convicted of both sexual assault and murder, injury and drug crimes. Total of five data collection tools, namely the Personal Information Form created by S. A. & E. O., Childhood Trauma Questionnaire (CTQ), the Dissociative Experiences Scale (DES), the Rosenberg Self-Esteem Scale (RSES), and the Young Schema Questionnaire-Short Form (YSQ-SF3), were completed. DES cut-off score of 99 (52.39%) of 189 convicts in the experimental group and 12 (8.17%) of 147 people in the control group was found to be 30 and above, and this result indicates the presence of pathological dissociative experiences. 180 (95.23%) of the sexual assault convicts in the experimental group had at least one childhood trauma, 154 (81.48%) were emotional neglect, 140 (74.07%) were emotional abuse, 121 (64.02%) were physical neglect, 91 (4814%) physical abuse and 70 (37.03%) sexual abuse. 168 (88.88%) of the experimental group reported multiple type of trauma and 12 (6.34%) reported single type of trauma. While the childhood traumas, isolation, abandonment and emotional deprivation schema levels of the convicts with a DES cut-off score of 30 and above are higher than the convicts with a DES cut-off score of 30 and above, their self-esteem is lower than this group. Experimental group while childhood traumas, dissociative experiences and early maladaptive schemas are higher than the control group, their self-esteem levels are lower. Dissociative experiences, abandonment and emotional deprivation early maladaptive schemas are more common in convicts aged between 18-30 years compared to convicts aged 31 and over. In addition, dissociative experiences and early maladaptive schemas of male convicts who reported physical and sexual abuse were higher than those who did not report physical and sexual abuse, while their self-esteem was at a lower level. As a result, in terms of psychotraumatology and clinical forensic psychology, dissociative disorders developed under the influence of chronic childhood traumas, with clinical interviews and psychometric measurements to be made in terms of forensic psychiatry; it is of fundamental importance to evaluate it in terms of neurosis-psychosis distinction, disability retirement, custody, malpractice, criminal and legal capacity criteria.

Keywords: crime, sexual assault, criminology, rape crimes, dissocitative disorders, maladative schemas

Procedia PDF Downloads 66
10343 Administrators' Information Management Capacity and Decision-Making Effectiveness on Staff Promotion in the Teaching Service Commissions in South – West, Nigeria

Authors: Olatunji Sabitu Alimi

Abstract:

This study investigated the extent to which administrators’ information storage, retrieval and processing capacities influence decisions on staff promotion in the Teaching Service Commissions (TESCOMs) in The South-West, Nigeria. One research question and two research hypotheses were formulated and tested respectively at 0.05 level of significance. The study used the descriptive research of the survey type. One hundred (100) staff on salary grade level 09 constituted the sample. Multi- stage, stratified and simple random sampling techniques were used to select 100 staff from the TESCOMs in The South-West, Nigeria. Two questionnaires titled Administrators’ Information Storage, Retrieval and Processing Capacities (AISRPC), and Staff Promotion Effectiveness (SPE) were used for data collection. The inventory was validated and subjected to test-re-test and reliability coefficient of r = 0.79 was obtained. The data were collected and analyzed using Pearson Product Moment Correlation coefficient and simple percentage. The study found that Administrators at TESCOM stored their information in files, hard copies, soft copies, open registry and departmentally in varying degrees while they also processed information manually and through electronics for decision making. In addition, there is a significant relationship between administrators’ information storage and retrieval capacities in the TESCOMs in South – West, Nigeria, (r cal = 0.598 > r table = 0.195). Furthermore, administrators’ information processing capacity and staff promotion effectiveness were found to be significantly related (r cal = 0.209 > r table = 0.195 at 0.05 level of significance). The study recommended that training, seminars, workshops should be organized for administrators on information management, while educational organizations should provide Information Management Technology (ICT) equipment for the administrators in the TESCOMs. The staff of TESCOM should be promoted having satisfied the promotion criteria such as spending required number of years on a grade level, a clean record of service and vacancy.

Keywords: information processing capacity, staff promotion effectiveness, teaching service commission, Nigeria

Procedia PDF Downloads 530
10342 Estimating Lost Digital Video Frames Using Unidirectional and Bidirectional Estimation Based on Autoregressive Time Model

Authors: Navid Daryasafar, Nima Farshidfar

Abstract:

In this article, we make attempt to hide error in video with an emphasis on the time-wise use of autoregressive (AR) models. To resolve this problem, we assume that all information in one or more video frames is lost. Then, lost frames are estimated using analogous Pixels time information in successive frames. Accordingly, after presenting autoregressive models and how they are applied to estimate lost frames, two general methods are presented for using these models. The first method which is the same standard method of autoregressive models estimates lost frame in unidirectional form. Usually, in such condition, previous frames information is used for estimating lost frame. Yet, in the second method, information from the previous and next frames is used for estimating the lost frame. As a result, this method is known as bidirectional estimation. Then, carrying out a series of tests, performance of each method is assessed in different modes. And, results are compared.

Keywords: error steganography, unidirectional estimation, bidirectional estimation, AR linear estimation

Procedia PDF Downloads 527
10341 In-Fun-Mation: Putting the Fun in Information Retrieval at the Linnaeus University, Sweden

Authors: Aagesson, Ekstrand, Persson, Sallander

Abstract:

A description of how a team of librarians at Linnaeus University Library in Sweden utilizes a pedagogical approach to deliver engaging digital workshops on information retrieval. The team consists of four librarians supporting three different faculties. The paper discusses the challenges faced in engaging students who may perceive information retrieval as a boring and difficult subject. The paper emphasizes the importance of motivation, inclusivity, constructive feedback, and collaborative learning in enhancing student engagement. By employing a two-librarian teaching model, maintaining a lighthearted approach, and relating information retrieval to everyday experiences, the team aimed to create an enjoyable and meaningful learning experience. The authors describe their approach to increase student engagement and learning outcomes through a three-phase workshop structure: before, during, and after the workshops. The "flipped classroom" method was used, where students were provided with pre-workshop materials, including a short film on information search and encouraged to reflect on the topic using a digital collaboration tool. During the workshops, interactive elements such as quizzes, live demonstrations, and practical training were incorporated, along with opportunities for students to ask questions and provide feedback. The paper concludes by highlighting the benefits of the flipped classroom approach and the extended learning opportunities provided by the before and after workshop phases. The authors believe that their approach offers a sustainable alternative for enhancing information retrieval knowledge among students at Linnaeus University.

Keywords: digital workshop, flipped classroom, information retrieval, interactivity, LIS practitioner, student engagement

Procedia PDF Downloads 62
10340 Disaster and Crisis Management Using Geographical Information System (GIS) during the Operation and Maintenance Stages of the Hyderabad Metro Rail in India

Authors: Sai Rajeev Reddy, Ishita Roy, M. Anji Reddy

Abstract:

The paper describes the importance of preventive measures and immediate Emergency logistics during accidents and unfortunate Disasters for the Hyderabad Metro Rails in their various stages of construction. This is the need of the modern generation where accidents, explosions, attacks and sudden crisis are frequent casualties which take huge tolls of life in the present world. The paper utilizes the workflow and application of Geographical information System (GIS) to provide information about problems and crisis structures for efficient Metro Transportation in the city. The study analyzes the difficulties and problems which cause accidents during operation and maintenance stages of the Metro Rail. The paper focuses upon the intermediate and firsthand information of Crisis with the help of GIS technology to share Disaster data for effective measures by the Cyber Police stations, Emergency Responders, Hospitals and First Aid Centre to act immediately and save lives. The results and conclusions have nevertheless proved very informative and useful for the safety board authorities of the Hyderabad Metro Rail. The operation and Maintenance are integral stages in the development of any Multipurpose transportation Projects and are usually prone to various Disasters and tragedies. Hence, the GIS technologies help in distribution of information among the masses with the web Technologies and advanced software developed to prevent and manage crisis widely and in a cost-benefits manner.

Keywords: Geographical Information System, emergency assessment, accident zones, surveillance

Procedia PDF Downloads 562
10339 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 147
10338 Prioritizing The Evaluation factors of Hospital Information System with The Analytical Hierarchy Process

Authors: F.Sadoughi, A. Sarsarshahi, L, Eerfannia, S.M.A. Khatami

Abstract:

Hospital information systems with lots of ability would lead to health care quality improvement. Evaluation of this system has done according different method and criteria. The main goal of present study is to prioritize the most important factors which are influence these systems evaluation. At the first step, according relevant literature, three main factor and 29 subfactors extracted. Then, study framework was designed. Based on analytical hierarchical process (AHP), 28 paired comparisons with Saaty range, in a questionnaire format obtained. Questionnaires were filled by 10 experts in health information management and medical informatics field. Human factors with weight of 0.55 were ranked as the most important. Organization (0.25) and technology (0.14) were in next place. It seems MADM methods such as AHP have enough potential to use in health research and provide positive opportunities for health domain decision makers.

Keywords: Analytical hierarchy process, Multiple criteria decision-making (MCDM), Hospital information system, Evaluation factors

Procedia PDF Downloads 448
10337 Fashion Appropriation: A Study in Awareness of Crossing Cultural Boundaries in Design

Authors: Anahita Suri

Abstract:

Myriad cultures form the warp and weft of the fabric of this world. The last century saw mass migration of people across geographical boundaries, owing to industrialization and globalization. These people took with them their cultures, costumes, traditions, and folklore, which mingled with the local cultures to create something new and place it in a different context to make it contemporary. With the surge in population and growth of the fashion industry, there has been an increasing demand for innovative and individual fashion, from street markets to luxury brands. Exhausted by local influences, designers take inspiration from the so called ‘low’ culture and create artistic products, place it in a different context, and the end-product is categorized as ‘high’ culture. It is challenging as to why a design/culture is ‘high’ or ‘low’. Who decides which works, practices, activities, etc., are ‘high’ and which are ‘low’? The justification for this distinction is often found not in the design itself but the context attached to it. Also, the concept of high/ low is relative to time- what is ‘high’ today can be ‘low’ tomorrow and ‘high’ again the day after. This raises certain concerns. Firstly, it is sad that a culture which offers inspiration is looked down upon as ‘low’ culture. Secondly, it is ironic because the so designated ‘high’ culture is a manipulation of the truth from the authentic ‘low’ culture, which is capable of true expression. When you borrow from a different culture, you pretend to be authentic because you actually are not. Finally, it is important to be aware of crossing cultural boundaries and the context attached to a design/product so as to use it a responsible way that communicates the design without offending anyone. Is it ok for a person’s cultural identity to become another person’s fashion accessory? This essay explores the complex, multi-layered subject of fashion appropriation and aims to provoke debate over cultural ‘borrowing’ and create awareness that commodification of cultural symbols and iconography in fashion is inappropriate and offensive and not the same as ‘celebrating cultural differences’.

Keywords: context, culture, fashion appropriation, inoffensive, responsible

Procedia PDF Downloads 121
10336 Implementation of Modern Information Technologies in Business to Customer Marketing Activity and the Implementation of Pro-Environmental Goals of Enterprises

Authors: M. Łęgowik-Małolepsza

Abstract:

The article discusses the problem related to the use of modern information technologies to achieve pro-environmental marketing goals in business-to-customer (B2C) relationships. The topic is important and topical due to the strong social need to implement the concept of sustainable development. The aim of the article is to understand and evaluate the possibilities of implementing modern information technologies, such as Customer Relationship Management platforms (CRM), in the area of implementing marketing activities of companies operating in the Business to Customer model. In B2C relations, marketing departments struggle with problems resulting from the need for quick customer segmentation and the fragmentation of data existing in many systems, which significantly hinders the achievement of the assumed marketing goals. Therefore, the article proposes the use of modern information technology solutions in the area of marketing activities of enterprises, taking into account their pro-environmental goals. The most important results of the research carried out include an in-depth understanding of the possibilities of implementing modern information technologies to achieve marketing goals in B2C relationships. Moreover, a better understanding of the coexistence of opportunities and threats related to the implementation of marketing activities, taking into account pro-environmental goals and modern technologies, allows for more effective implementation of sustainable development management in enterprises. The methods used to achieve the goal are literature studies, descriptive analysis, and case studies. The study contributes to the discussion on the scope of application of modern information technologies in the area of B2C marketing activity, taking into account the implementation of pro-environmental goals of enterprises.

Keywords: B2C marketing activity, implementation of technologies, modern information technologies, pro-environmental activities

Procedia PDF Downloads 102
10335 The Role Of Data Gathering In NGOs

Authors: Hussaini Garba Mohammed

Abstract:

Background/Significance: The lack of data gathering is affecting NGOs world-wide in general to have good data information about educational and health related issues among communities in any country and around the world. For example, HIV/AIDS smoking (Tuberculosis diseases) and COVID-19 virus carriers is becoming a serious public health problem, especially among old men and women. But there is no full details data survey assessment from communities, villages, and rural area in some countries to show the percentage of victims and patients, especial with this world COVID-19 virus among the people. These data are essential to inform programming targets, strategies, and priorities in getting good information about data gathering in any society.

Keywords: reliable information, data assessment, data mining, data communication

Procedia PDF Downloads 176
10334 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 203
10333 Democratic Information Behavior of Social Scientists and Policy Makers in India

Authors: Mallikarjun Vaddenkeri, Suresh Jange

Abstract:

This research study reports results of information behaviour by members of faculty and research scholars of various departments of social sciences working at universities with a sample of 300 and Members of Legislative Assembly and Council with 216 samples in Karnataka State, India. The results reveal that 29.3% and 20.3% of Social Scientists indicated medium and high level of awareness of primary sources - Primary Journals are found to be at scale level 5 and 9. The usage of primary journals by social scientists is found to be 28% at level 4, 24% of the respondent’s opined use of primary Conference Proceedings at level 5 as medium level of use. Similarly, the use of Secondary Information Sources at scale 8 and 9 particularly in case of Dictionaries (31.0% and 5.0%), Encyclopaedias (22.3% and 6.3%), Indexing Periodicals (7.0% and 15.3%) and Abstracting Periodicals (5.7% and 20.7%). For searching information from Journals Literature available in CD-ROM version, Keywords (43.7%) followed by Keywords with logical operators (39.7%) have been used for finding the required information. Statistical inference reveals rejection of null hypothesis `there is no association between designation of the respondents and awareness of primary information resources’. On the other hand, educational qualification possessed by Legislative members, more than half of them possess graduate degree as their academic qualification (57.4%) and just 16.7% of the respondents possess graduate degree while only 26.8% of the respondents possess degree in law and just 1.8% possess post-graduate degree in law. About 42.6% indicated the importance of information required to discharge their duties and responsibilities as a Policy Maker in the scale 8, as a Scholar (27.8%) on a scale 6, as a politician (64.8%) on a scale 10 and as a Councillor (51.9%) on a scale 8. The most preferred information agencies/sources very often contacted for obtaining useful information are by means of contacting the people of Karnataka State Legislative Library, listening Radio programmes, viewing Television programmes and reading the newspapers. The methods adopted for obtaining needed information quite often by means of sending their assistants to libraries to gather information (35.2%) and personally visiting the information source (64.8%). The null hypotheses `There is no association between Members of Legislature and Opinion on the usefulness of the resources of the Karnataka State Legislature Library’ is accepted using F ANOVA test. The studies conclude with a note revamp the existing library system in its structure and adopt latest technologies and educate and train social scientists and Legislators in using these resources in the interest of academic, government policies and decision making of the country.

Keywords: information use behaviour, government information, searching behaviour, policy makers

Procedia PDF Downloads 135
10332 Data Integration in a GIS Geographic Information System Mapping of Agriculture in Semi-Arid Region of Setif, Algeria

Authors: W. Riahi, M. L. Mansour

Abstract:

Using tools of data processing such as geographic information system (GIS) for the contribution of the space management becomes more and more frequent. It allows collecting and analyzing diverse natural information relative to the same territory. Space technologies play crucial role in agricultural phenomenon analysis. For this, satellite images treatment were used to classify vegetation density and particularly agricultural areas in Setif province by making recourse to the Normalized Difference Vegetation Index (NDVI). This step was completed by mapping agricultural activities of the province by using ArcGIS.10 software in order to display an overall view and to realize spatial analysis of various themes combined between them which are chosen according to their strategic importance in different thematic maps. The synthesis map elaborately showed that geographic information system can contribute significantly to agricultural management by describing potentialities and development opportunities of production systems and agricultural sectors.

Keywords: GIS, satellite image, agriculture, NDVI, thematic map

Procedia PDF Downloads 420
10331 Message Framework for Disaster Management: An Application Model for Mines

Authors: A. Baloglu, A. Çınar

Abstract:

Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.

Keywords: crisis response and management, XML messaging, web services, XML compression, mining

Procedia PDF Downloads 335