Search results for: information system success model
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 36837

Search results for: information system success model

36327 Association between Severe Acidemia before Endotracheal Intubation and the Lower First Attempt Intubation Success Rate

Authors: Keiko Naito, Y. Nakashima, S. Yamauchi, Y. Kunitani, Y. Ishigami, K. Numata, M. Mizobe, Y. Homma, J. Takahashi, T. Inoue, T. Shiga, H. Funakoshi

Abstract:

Background: A presence of severe acidemia, defined as pH < 7.2, is common during endotracheal intubation for critically ill patients in the emergency department (ED). Severe acidemia is widely recognized as a predisposing factor for intubation failure. However, it is unclear that acidemic condition itself actually makes endotracheal intubation more difficult. We aimed to evaluate if a presence of severe acidemia before intubation is associated with the lower first attempt intubation success rate in the ED. Methods: This is a retrospective observational cohort study in the ED of an urban hospital in Japan. The collected data included patient demographics, such as age, sex, and body mass index, presence of one or more factors of modified LEMON criteria for predicting difficult intubation, reasons for intubation, blood gas levels, airway equipment, intubation by emergency physician or not, and the use of the rapid sequence intubation technique. Those with any of the following were excluded from the analysis: (1) no blood gas drawn before intubation, (2) cardiopulmonary arrest, and (3) under 18 years of age. The primary outcome was the first attempt intubation success rates between a severe acidemic patients (SA) group and a non-severe acidemic patients (NA) group. Logistic regression analysis was used to test the first attempt success rates for intubations between those two groups. Results: Over 5 years, a total of 486 intubations were performed; 105 in the SA group and 381 in the NA group. The univariate analysis showed that the first attempt intubation success rate was lower in the SA group than in the NA group (71.4% vs 83.5%, p < 0.01). The multivariate logistic regression analysis identified that severe acidemia was significantly associated with the first attempt intubation failure (OR 1.9, 95% CI 1.03-3.68, p = 0.04). Conclusions: A presence of severe acidemia before endotracheal intubation lowers the first attempt intubation success rate in the ED.

Keywords: acidemia, airway management, endotracheal intubation, first-attempt intubation success rate

Procedia PDF Downloads 239
36326 Success Measurement in Corporate Venturing: Integrating Three Decades of Research

Authors: Maurice Steinhoff, Lucas Costantino, Dominik Kanbach

Abstract:

Measurement approaches to corporate venturing (CV) success are highly diverse in the extant literature. Furthermore, these approaches rarely build on each other, making it difficult to derive comparable conclusions about CV outcomes. Employing a systematic literature review of three decades of research, the objective of this study is to provide transparency and structure in the broad field of CV research. Subsequently, the paper examines 28 studies in detail, resulting in two main contributions to the research field. First, three structural dimensions of measurement approaches are derived from the studies in the sample, namely, “level of analysis” (parent, program, and venture levels), “measurement perspective” (objective, subjective, and mixed measurement), and “locus of opportunity” (internal, external, and general CV activities). Second, an integrated overview of nine unique clusters structures the different measurement approaches. These clusters allow to encapsulate measurement approaches, but also make visible the approaches’ heterogeneity, as well as specific measurement items. Thereby, the study contributes to CV research by revealing and reconciling the variety of CV success-measurement approaches. The study also provides relevant insights for practitioners, by making transparent the various approaches to measuring the success of CV activities and presenting a list of 114 concrete and distinct measurement items.

Keywords: corporate venturing, measurement items, success measurement, structured literature review

Procedia PDF Downloads 168
36325 Social Construction of Merantau in Minangkabau Society in Capital City of Indonesia, Jakarta

Authors: Arfan Fadli, Marini Kristina Situmeang, Mukhammad Fatkhullah, Siti Hazar Sitorus

Abstract:

Merantau is one of the traditions that has been done by the Minangkabau tribe since the 15th century where it is based on socio-economic factors. In fact, that is not only limited to economic factors alone but more how to develop themselves through the experience to get the skills or education. The lack of jobs opportunity in the hometown causes the community, especially for young men to seek livelihoods in other areas. Unemployment impacts on the economy of the community that led to change in the pattern of employment from farmers to traders or new businesses in areas outside of their homeland. This is also worsened because many young people are not interested in becoming a farmer and working on the land in their village. In this context, merantau is considered to be an alternative to fulfilling livelihoods, and therefore this study examines how the merantau tradition constructed by the Minangkabau community, West Sumatera Province. The research method is done by literature review by collecting information related to the social construction of merantau tradition from various scientific publications. The results show how merantau becomes a solution of economic problems for Minangkabau society. Merantau which has now become an institutionalized tradition for the Minangkabau community where the culture of merantau occurred like a chain that can raise the people from the condition of poverty. When there are people who have successfully in merantau, they tend to bring other relatives who have not found a job to be able to trade with them. In the place of merantau, they will be disciplined to learn how to trade. Eventually, they will have new skills to trade and even make their own business. The tradition of bringing relatives to the rantau to be empowered is a unique side of merantau because it is influenced by the Matrilinear kinship system. The matrilineal kinship system in Minangkabau is the largest in the world where helping relatives are considered to be of the highest value. This system also places men as high positions where men should be encouraged to go abroad for financial success and to help their relatives in their hometown. The success of this tradition (to uplift and resolve the poverty and manpower issues) is demonstrated by the tradition of Minangkabau communities that have been successful in the area of Rantau that send money to their relatives in their homes (remittance). Merantau tradition can also be an alternative in reducing unemployment especially for young people where it is demonstrated by the culture of helping relatives to get work outside of their homeland.

Keywords: matrilineal kinship system, merantau, minangkabau community, reducing unemployment

Procedia PDF Downloads 191
36324 Wolof Voice Response Recognition System: A Deep Learning Model for Wolof Audio Classification

Authors: Krishna Mohan Bathula, Fatou Bintou Loucoubar, FNU Kaleemunnisa, Christelle Scharff, Mark Anthony De Castro

Abstract:

Voice recognition algorithms such as automatic speech recognition and text-to-speech systems with African languages can play an important role in bridging the digital divide of Artificial Intelligence in Africa, contributing to the establishment of a fully inclusive information society. This paper proposes a Deep Learning model that can classify the user responses as inputs for an interactive voice response system. A dataset with Wolof language words ‘yes’ and ‘no’ is collected as audio recordings. A two stage Data Augmentation approach is adopted for enhancing the dataset size required by the deep neural network. Data preprocessing and feature engineering with Mel-Frequency Cepstral Coefficients are implemented. Convolutional Neural Networks (CNNs) have proven to be very powerful in image classification and are promising for audio processing when sounds are transformed into spectra. For performing voice response classification, the recordings are transformed into sound frequency feature spectra and then applied image classification methodology using a deep CNN model. The inference model of this trained and reusable Wolof voice response recognition system can be integrated with many applications associated with both web and mobile platforms.

Keywords: automatic speech recognition, interactive voice response, voice response recognition, wolof word classification

Procedia PDF Downloads 104
36323 A Case-Based Reasoning-Decision Tree Hybrid System for Stock Selection

Authors: Yaojun Wang, Yaoqing Wang

Abstract:

Stock selection is an important decision-making problem. Many machine learning and data mining technologies are employed to build automatic stock-selection system. A profitable stock-selection system should consider the stock’s investment value and the market timing. In this paper, we present a hybrid system including both engage for stock selection. This system uses a case-based reasoning (CBR) model to execute the stock classification, uses a decision-tree model to help with market timing and stock selection. The experiments show that the performance of this hybrid system is better than that of other techniques regarding to the classification accuracy, the average return and the Sharpe ratio.

Keywords: case-based reasoning, decision tree, stock selection, machine learning

Procedia PDF Downloads 410
36322 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework

Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe

Abstract:

This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.

Keywords: IoT, fog, cloud, data analysis, data privacy

Procedia PDF Downloads 89
36321 Information Communication Technology (ICT) Using Management in Nursing College under the Praboromarajchanok Institute

Authors: Suphaphon Udomluck, Pannathorn Chachvarat

Abstract:

Information Communication Technology (ICT) using management is essential for effective decision making in organization. The Concerns Based Adoption Model (CBAM) was employed as the conceptual framework. The purposes of the study were to assess the situation of Information Communication Technology (ICT) using management in College of Nursing under the Praboromarajchanok Institute. The samples were multi – stage sampling of 10 colleges of nursing that participated include directors, vice directors, head of learning groups, teachers, system administrator and responsible for ICT. The total participants were 280; the instrument used were questionnaires that include 4 parts, general information, Information Communication Technology (ICT) using management, the Stage of concern Questionnaires (SoC), and the Levels of Use (LoU) ICT Questionnaires respectively. Reliability coefficients were tested; alpha coefficients were 0.967for Information Communication Technology (ICT) using management, 0.884 for SoC and 0.945 for LoU. The data were analyzed by frequency, percentage, mean, standard deviation, Pearson Product Moment Correlation and Multiple Regression. They were founded as follows: The high level overall score of Information Communication Technology (ICT) using management and issue were administration, hardware, software, and people. The overall score of the Stage of concern (SoC)ICTis at high level and the overall score of the Levels of Use (LoU) ICTis at moderate. The Information Communication Technology (ICT) using management had the positive relationship with the Stage of concern (SoC)ICTand the Levels of Use (LoU) ICT(p < .01). The results of Multiple Regression revealed that administration hardwear, software and people ware could predict SoC of ICT (18.5%) and LoU of ICT (20.8%).The factors that were significantly influenced by SoCs were people ware. The factors that were significantly influenced by LoU of ICT were administration hardware and people ware.

Keywords: information communication technology (ICT), management, the concerns-based adoption model (CBAM), stage of concern(SoC), the levels of use(LoU)

Procedia PDF Downloads 302
36320 Optimizing a Hybrid Inventory System with Random Demand and Lead Time

Authors: Benga Ebouele, Thomas Tengen

Abstract:

Implementing either periodic or continuous inventory review model within most manufacturing-companies-supply chains as a management tool may incur higher costs. These high costs affect the system flexibility which in turn affects the level of service required to satisfy customers. However, these effects are not clearly understood because the parameters of both inventory review policies (protection demand interval, order quantity, etc.) are not designed to be fully utilized under different and uncertain conditions such as poor manufacturing, supplies and delivery performance. Coming up with a hybrid model which may combine in some sense the feature of both continuous and a periodic inventory review models should be useful. Therefore, there is a need to build and evaluate such hybrid model on the annual total cost, stock out probability and system’s flexibility in order to search for the most cost effective inventory review model. This work also seeks to find the optimal sets of parameters of inventory management under stochastic condition so as to optimise each policy independently. The results reveal that a continuous inventory system always incurs lesser cost than a periodic (R, S) inventory system, but this difference tends to decrease as time goes by. Although the hybrid inventory is the only one that can yield lesser cost over time, it is not always desirable but also natural to use it in order to help the system to meet high performance specification.

Keywords: demand and lead time randomness, hybrid Inventory model, optimization, supply chain

Procedia PDF Downloads 305
36319 Virtual Team Performance: A Transactive Memory System Perspective

Authors: Belbaly Nassim

Abstract:

Virtual teams (VT) initiatives, in which teams are geographically dispersed and communicate via modern computer-driven technologies, have attracted increasing attention from researchers and professionals. The growing need to examine how to balance and optimize VT is particularly important given the exposure experienced by companies when their employees encounter globalization and decentralization pressures to monitor VT performance. Hence, organization is regularly limited due to misalignment between the behavioral capabilities of the team’s dispersed competences and knowledge capabilities and how trust issues interplay and influence these VT dimensions and the effects of such exchanges. In fact, the future success of business depends on the extent to which VTs are managing efficiently their dispersed expertise, skills and knowledge to stimulate VT creativity. Transactive memory system (TMS) may enhance VT creativity using its three dimensons: knowledge specialization, credibility and knowledge coordination. TMS can be understood as a composition of both a structural component residing of individual knowledge and a set of communication processes among individuals. The individual knowledge is shared while being retrieved, applied and the learning is coordinated. TMS is driven by the central concept that the system is built on the distinction between internal and external memory encoding. A VT learns something new and catalogs it in memory for future retrieval and use. TMS uses the role of information technology to explain VT behaviors by offering VT members the possibility to encode, store, and retrieve information. TMS considers the members of a team as a processing system in which the location of expertise both enhances knowledge coordination and builds trust among members over time. We build on TMS dimensions to hypothesize the effects of specialization, coordination, and credibility on VT creativity. In fact, VTs consist of dispersed expertise, skills and knowledge that can positively enhance coordination and collaboration. Ultimately, this team composition may lead to recognition of both who has expertise and where that expertise is located; over time, the team composition may also build trust among VT members over time developing the ability to coordinate their knowledge which can stimulate creativity. We also assess the reciprocal relationship between TMS dimensions and VT creativity. We wish to use TMS to provide researchers with a theoretically driven model that is empirically validated through survey evidence. We propose that TMS provides a new way to enhance and balance VT creativity. This study also provides researchers insight into the use of TMS to influence positively VT creativity. In addition to our research contributions, we provide several managerial insights into how TMS components can be used to increase performance within dispersed VTs.

Keywords: virtual team creativity, transactive memory systems, specialization, credibility, coordination

Procedia PDF Downloads 156
36318 Improve Student Performance Prediction Using Majority Vote Ensemble Model for Higher Education

Authors: Wade Ghribi, Abdelmoty M. Ahmed, Ahmed Said Badawy, Belgacem Bouallegue

Abstract:

In higher education institutions, the most pressing priority is to improve student performance and retention. Large volumes of student data are used in Educational Data Mining techniques to find new hidden information from students' learning behavior, particularly to uncover the early symptom of at-risk pupils. On the other hand, data with noise, outliers, and irrelevant information may provide incorrect conclusions. By identifying features of students' data that have the potential to improve performance prediction results, comparing and identifying the most appropriate ensemble learning technique after preprocessing the data, and optimizing the hyperparameters, this paper aims to develop a reliable students' performance prediction model for Higher Education Institutions. Data was gathered from two different systems: a student information system and an e-learning system for undergraduate students in the College of Computer Science of a Saudi Arabian State University. The cases of 4413 students were used in this article. The process includes data collection, data integration, data preprocessing (such as cleaning, normalization, and transformation), feature selection, pattern extraction, and, finally, model optimization and assessment. Random Forest, Bagging, Stacking, Majority Vote, and two types of Boosting techniques, AdaBoost and XGBoost, are ensemble learning approaches, whereas Decision Tree, Support Vector Machine, and Artificial Neural Network are supervised learning techniques. Hyperparameters for ensemble learning systems will be fine-tuned to provide enhanced performance and optimal output. The findings imply that combining features of students' behavior from e-learning and students' information systems using Majority Vote produced better outcomes than the other ensemble techniques.

Keywords: educational data mining, student performance prediction, e-learning, classification, ensemble learning, higher education

Procedia PDF Downloads 97
36317 Introducing a Practical Model for Instructional System Design Based on Determining of the knowledge Level of the Organization: Case Study of Isfahan Public Transportation Co.

Authors: Mojtaba Aghajari, Alireza Aghasi

Abstract:

The first challenge which the current research faced has been the identification or determination of the level of knowledge in Isfahan public transportation corporation, and the second challenge has been the recognition and choice of a proper approach for the instructional system design. Responding these two challenges will present an appropriate model of instructional system design. In order to respond the first challenge or question, Nonaka and Takeuchi KM model has been utilized due to its universality among the 26 models proposed so far. The statistical population of this research included 2200 people, among which 200 persons were chosen as the sample of the research by the use of Morgan’s method. The data gathering has been carried out by the means of a questionnaire based on Nonaka and Takeuchi KM model, analysis of which has been done by SPSS program. The output of this questionnaire, yielding the point of 1.96 (out of 5 points), revealed that the general condition of Isfahan public transportation corporation is weak concerning its being knowledge-centered. After placing this output on Jonassen’s continuum, it was revealed that the appropriate approach for instructional system design is the system (or behavioral) approach. Accordingly, different steps of the general model of ADDIE, which covers all of the ISO10015 standards, were adopted in the act of designing. Such process in Isfahan public transportation corporation was designed and divided into three main steps, including: instructional designing and planning, instructional course planning, determination of the evaluation and the effectiveness of the instructional courses.

Keywords: instructional system design, system approach, knowledge management, employees

Procedia PDF Downloads 311
36316 Probing Language Models for Multiple Linguistic Information

Authors: Bowen Ding, Yihao Kuang

Abstract:

In recent years, large-scale pre-trained language models have achieved state-of-the-art performance on a variety of natural language processing tasks. The word vectors produced by these language models can be viewed as dense encoded presentations of natural language that in text form. However, it is unknown how much linguistic information is encoded and how. In this paper, we construct several corresponding probing tasks for multiple linguistic information to clarify the encoding capabilities of different language models and performed a visual display. We firstly obtain word presentations in vector form from different language models, including BERT, ELMo, RoBERTa and GPT. Classifiers with a small scale of parameters and unsupervised tasks are then applied on these word vectors to discriminate their capability to encode corresponding linguistic information. The constructed probe tasks contain both semantic and syntactic aspects. The semantic aspect includes the ability of the model to understand semantic entities such as numbers, time, and characters, and the grammatical aspect includes the ability of the language model to understand grammatical structures such as dependency relationships and reference relationships. We also compare encoding capabilities of different layers in the same language model to infer how linguistic information is encoded in the model.

Keywords: language models, probing task, text presentation, linguistic information

Procedia PDF Downloads 99
36315 TRACE/FRAPTRAN Analysis of Kuosheng Nuclear Power Plant Dry-Storage System

Authors: J. R. Wang, Y. Chiang, W. Y. Li, H. T. Lin, H. C. Chen, C. Shih, S. W. Chen

Abstract:

The dry-storage systems of nuclear power plants (NPPs) in Taiwan have become one of the major safety concerns. There are two steps considered in this study. The first step is the verification of the TRACE by using VSC-17 experimental data. The results of TRACE were similar to the VSC-17 data. It indicates that TRACE has the respectable accuracy in the simulation and analysis of the dry-storage systems. The next step is the application of TRACE in the dry-storage system of Kuosheng NPP (BWR/6). Kuosheng NPP is the second BWR NPP of Taiwan Power Company. In order to solve the storage of the spent fuels, Taiwan Power Company developed the new dry-storage system for Kuosheng NPP. In this step, the dry-storage system model of Kuosheng NPP was established by TRACE. Then, the steady state simulation of this model was performed and the results of TRACE were compared with the Kuosheng NPP data. Finally, this model was used to perform the safety analysis of Kuosheng NPP dry-storage system. Besides, FRAPTRAN was used tocalculate the transient performance of fuel rods.

Keywords: BWR, TRACE, FRAPTRAN, dry-storage

Procedia PDF Downloads 508
36314 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 456
36313 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 62
36312 Using AI to Advance Factory Planning: A Case Study to Identify Success Factors of Implementing an AI-Based Demand Planning Solution

Authors: Ulrike Dowie, Ralph Grothmann

Abstract:

Rational planning decisions are based upon forecasts. Precise forecasting has, therefore, a central role in business. The prediction of customer demand is a prime example. This paper introduces recurrent neural networks to model customer demand and combines the forecast with uncertainty measures to derive decision support of the demand planning department. It identifies and describes the keys to the successful implementation of an AI-based solution: bringing together data with business knowledge, AI methods, and user experience, and applying agile software development practices.

Keywords: agile software development, AI project success factors, deep learning, demand forecasting, forecast uncertainty, neural networks, supply chain management

Procedia PDF Downloads 173
36311 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience

Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha

Abstract:

Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.

Keywords: digital images, medical information system, second opinion consultations, electronic medical record

Procedia PDF Downloads 441
36310 Diffusion Dynamics of Leech-Heart Inter-Neuron Model

Authors: Arnab Mondal, Sanjeev Kumar Sharma, Ranjit Kumar Upadhyay

Abstract:

We study the spatiotemporal dynamics of a neuronal cable. The processes of one- dimensional (1D) and 2D diffusion are considered for a single variable, which is the membrane voltage, i.e., membrane voltage diffusively interacts for spatiotemporal pattern formalism. The recovery and other variables interact through the membrane voltage. A 3D Leech-Heart (LH) model is introduced to investigate the nonlinear responses of an excitable neuronal cable. The deterministic LH model shows different types of firing properties. We explore the parameter space of the uncoupled LH model and based on the bifurcation diagram, considering v_k2_ashift as a bifurcation parameter, we analyze the 1D diffusion dynamics in three regimes: bursting, regular spiking, and a quiescent state. Depending on parameters, it is shown that the diffusive system may generate regular and irregular bursting or spiking behavior. Further, it is explored a 2D diffusion acting on the membrane voltage, where different types of patterns can be observed. The results show that the LH neurons with different firing characteristics depending on the control parameters participate in a collective behavior of an information processing system that depends on the overall network.

Keywords: bifurcation, pattern formation, spatio-temporal dynamics, stability analysis

Procedia PDF Downloads 211
36309 Persistent Bacteremia in Cases of Endodontic Re-Treatments

Authors: Ilma Robo, Manola Kelmendi, Kleves Elezi, Nevila Alliu

Abstract:

The most important stage in deciding whether to re-treat or not endodontically is to find the reason for the clinical in-success. Therefore, endodontic re-treatment aims to eliminate the etiology of the pathology, where the main ones are the bacteria remaining in the inter-radicular spaces or the presence of other irritants that can be not only bacterial toxins but also the elements that keep the batteries fixed or extra-canal toxins such as extraction outside the apex of the canal filling. Shortcomings of endodontic treatment can be corrected, if possible, only with endodontic re-treatment that is initially attempted orthograde, and if clinical endodontic success is not achieved again, it can be performed retrograde or surgically. The elements that do not help in this direction are the anatomical deformations in the canal network of the tooth roots, in the presence of the delta at the apex of the tooth root, in the isthmuses present, all of which can be explained by the endodontic canal anatomical morphology. Actually, even if the causative endodontic bacteria remains isolated and without an exit in the healthy periodontal tissues, then this can also be a clinical endodontic success, regardless of the fact that the endodontic isolation occurred only in the exits such as the apex or the accessory canals. Clinical endodontic in-success occurs only when bacterial residues emerge or provide an exit in the healthy periradicular tissues or along the entire length of the canal where the accessory canals exit.

Keywords: endodontic success, E. foecalis, nanoparticles, laser diode, antibacterial, antiseptic

Procedia PDF Downloads 24
36308 Decoding Socio-Cultural Trends in Indian Urban Youth Using Ogilvy 3E Model

Authors: Falguni Vasavada, Pradyumna Malladi

Abstract:

The research focuses on studying the ecosystem of the youth using Ogilvy's 3E model, Ethnography and Thematic Analysis. It has been found that urban Indian youth today is an honest generation, hungry for success, living life by the moment, fiercely independent, are open about sex, sexuality and embrace individual differences. Technology and social media dominate their life. However, they are also phobic about commitments, often drifting along life and engage in unsubstantiated brave-talk.

Keywords: ethnography, youth, culture, track, buyer behavior

Procedia PDF Downloads 349
36307 Elaboration Development Strategy and the Analysis of Trends Shaping the Information Economy in Azerbaijan on the Basis of the Experience of Foreign Countries

Authors: Rasim M. Alguliyev, Alovsat G. Aliyev

Abstract:

In the paper information on economic development trends in developed countries are analyzed. The current status of information society and economy of the country is reviewed and some recommendations are given for future development. The problems of Information Society and establishment of its innovative economy are studied. In this turn, development trends information economy in developed countries are analyzed.

Keywords: information economy, ICT sector, ICT infrastructure, innovation, innovation system hi-tech products, antimonopoly policy

Procedia PDF Downloads 329
36306 The Motivation System Development: Case-Study of the Trade Metal Company in Russian Federation

Authors: Elena V. Lysenko

Abstract:

Motivating as the leading function of a modern Human Resources Management involves issues of increasing the effectiveness of the organization in a broader context. During the formation of motivational systems, the top-management of organization should pay equal attention to both external motivation (incentive system) and internal (self-motivation). The balance of internal and external motivation harmonizes the relations between employers and employees, increases the level of job satisfaction by the organization staff, which in turn leads the organization to success and ensures the organization`s profitability and competitiveness in the market environment. The article is devoted to the study of personnel motivation system in the small metal trade company, which is located in Yekaterinburg, Russian Federation. The study took place during November-December, 2016 ordered by the Company Director to analyze the motivational potential of work (managerial aspect of motivation) and motivation of personnel (personnel aspect of motivation) with the purpose to construct a system of employees’ motivation. The research tools included 6 specially selected tests of motivation, which are: “Motivation profile of your job”, “Constructive motivational attitudes”, Tests about Motivation of achievements (1st variant: Test by А.Mehrabian by the theory of D.С.McClelland and 2nd variant: Test about leading needs according with the theory of D.С.MacClelland), Tests by T.Elers (1st variant: “Determination of the motivation towards success or to avoid failure” and 2nd variant: “Trends to achieve results or to avoid failure”). The results of the study showed only one, but fundamental problem of the whole organization: high level of both motivational potential in work and self-motivation, especially in terms of achievement motivation, but serious lack of productivity. According the results which study showed this problem is derived from insufficient staff competence. The research suggests basic guidelines in order to build the new personnel motivation system for this Company, which is planned to be developed in the nearest future.

Keywords: incentive system, motivation of achievements, motivation system, self-motivation

Procedia PDF Downloads 305
36305 Propellant Less Propulsion System Using Microwave Thrusters

Authors: D. Pradeep Mitra, Prafulla

Abstract:

Looking to the word propellant-less system it makes us to believe that it is an impossible one, but this paper demonstrates the use of microwaves to create a system which makes impossible to be possible, it means a propellant-less propulsion system using microwaves. In these thrusters, microwaves are radiated into a sealed parabolic cavity through a waveguide, which act on the surface of the cavity and follow the axis of the thrusters to produce thrust. The advantages of these thrusters are: (1) Producing thrust without propellant; without erosion, wear, and thermal stress from the hot exhaust gas; and at the same time increasing quality. (2) If the microwave output power is stable, the performance of thrusters is not affected by its working environment. This paper is demonstrated from general maxwell equations. These equations are used to create the mathematical model of the thrusters. These mathematical model helps us to calculate the Q factor and calculate the approximate thrust which would be generated in the system.

Keywords: propellant less, microwaves, parabolic wave guide, propulsion system

Procedia PDF Downloads 375
36304 A Robust Model Predictive Control for a Photovoltaic Pumping System Subject to Actuator Saturation Nonlinearity and Parameter Uncertainties: A Linear Matrix Inequality Approach

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In this paper, a robust model predictive controller (RMPC) for uncertain nonlinear system under actuator saturation is designed to control a DC-DC buck converter in PV pumping application, where this system is subject to actuator saturation and parameter uncertainties. The considered nonlinear system contains a linear constant part perturbed by an additive state-dependent nonlinear term. Based on the saturating actuator property, an appropriate linear feedback control law is constructed and used to minimize an infinite horizon cost function within the framework of linear matrix inequalities. The proposed approach has successfully provided a solution to the optimization problem that can stabilize the nonlinear plants. Furthermore, sufficient conditions for the existence of the proposed controller guarantee the robust stability of the system in the presence of polytypic uncertainties. In addition, the simulation results have demonstrated the efficiency of the proposed control scheme.

Keywords: PV pumping system, DC-DC buck converter, robust model predictive controller, nonlinear system, actuator saturation, linear matrix inequality

Procedia PDF Downloads 170
36303 DocPro: A Framework for Processing Semantic and Layout Information in Business Documents

Authors: Ming-Jen Huang, Chun-Fang Huang, Chiching Wei

Abstract:

With the recent advance of the deep neural network, we observe new applications of NLP (natural language processing) and CV (computer vision) powered by deep neural networks for processing business documents. However, creating a real-world document processing system needs to integrate several NLP and CV tasks, rather than treating them separately. There is a need to have a unified approach for processing documents containing textual and graphical elements with rich formats, diverse layout arrangement, and distinct semantics. In this paper, a framework that fulfills this unified approach is presented. The framework includes a representation model definition for holding the information generated by various tasks and specifications defining the coordination between these tasks. The framework is a blueprint for building a system that can process documents with rich formats, styles, and multiple types of elements. The flexible and lightweight design of the framework can help build a system for diverse business scenarios, such as contract monitoring and reviewing.

Keywords: document processing, framework, formal definition, machine learning

Procedia PDF Downloads 205
36302 Examination of Forged Signatures Printed by Means of Fabrication in Terms of Their Relation to the Perpetrator

Authors: Salim Yaren, Nergis Canturk

Abstract:

Signatures are signs that are handwritten by person in order to confirm values such as information, amount, meaning, time and undertaking that bear on a document. It is understood that the signature of a document and the accuracy of the information on the signature is accepted and approved. Forged signatures are formed by forger without knowing and seeing original signature of person that forger will imitate and as a result of his/her effort for hiding typical characteristics of his/her own signatures. Forged signatures are often signed by starting with the initials of the first and last name or persons of the persons whose fake signature will be signed. The similarities in the signatures are completely random. Within the scope of the study, forged signatures are collected from 100 people both their original signatures and forged signatures signed referring to 5 imaginary people. These signatures are compared for 14 signature analyzing criteria by 2 signature analyzing experts except the researcher. 1 numbered analyzing expert who is 9 year experience in his/her field evaluated signatures of 39 (39%) people right and of 25 (25%) people wrong and he /she made any evaluations for signatures of 36 (36%) people. 2 numbered analyzing expert who is 16 year experienced in his/her field evaluated signatures of 49 (49%) people right and 28 (28%) people wrong and he /she made any evaluations for signatures of 23 (23%) people. Forged signatures that are signed by 24 (24%) people are matched by two analyzing experts properly, forged signatures that are signed by 8 (8%) people are matched wrongfully and made up signatures that are signed by 12 (12%) people couldn't be decided by both analyzing experts. Signatures analyzing is a subjective topic so that analyzing and comparisons take form according to education, knowledge and experience of the expert. Consequently, due to the fact that 39% success is achieved by analyzing expert who has 9 year professional experience and 49% success is achieved by analyzing expert who has 16 year professional experience, it is seen that success rate is directly proportionate to knowledge and experience of the expert.

Keywords: forensic signature, forensic signature analysis, signature analysis criteria, forged signature

Procedia PDF Downloads 118
36301 Knowledge Creation Environment in the Iranian Universities: A Case Study

Authors: Mahdi Shaghaghi, Amir Ghaebi, Fariba Ahmadi

Abstract:

Purpose: The main purpose of the present research is to analyze the knowledge creation environment at a Iranian University (Alzahra University) as a typical University in Iran, using a combination of the i-System and Ba models. This study is necessary for understanding the determinants of knowledge creation at Alzahra University as a typical University in Iran. Methodology: To carry out the present research, which is an applied study in terms of purpose, a descriptive survey method was used. In this study, a combination of the i-System and Ba models has been used to analyze the knowledge creation environment at Alzahra University. i-System consists of 5 constructs including intervention (input), intelligence (process), involvement (process), imagination (process), and integration (output). The Ba environment has three pillars, namely the infrastructure, the agent, and the information. The integration of these two models resulted in 11 constructs which were as follows: intervention (input), infrastructure-intelligence, agent-intelligence, information-intelligence (process); infrastructure-involvement, agent-involvement, information-involvement (process); infrastructure-imagination, agent-imagination, information-imagination (process); and integration (output). These 11 constructs were incorporated into a 52-statement questionnaire and the validity and reliability of the questionnaire were examined and confirmed. The statistical population included the faculty members of Alzahra University (344 people). A total of 181 participants were selected through the stratified random sampling technique. The descriptive statistics, binomial test, regression analysis, and structural equation modeling (SEM) methods were also utilized to analyze the data. Findings: The research findings indicated that among the 11 research constructs, the levels of intervention, information-intelligence, infrastructure-involvement, and agent-imagination constructs were average and not acceptable. The levels of infrastructure-intelligence and information-imagination constructs ranged from average to low. The levels of agent-intelligence and information-involvement constructs were also completely average. The level of infrastructure-imagination construct was average to high and thus was considered acceptable. The levels of agent-involvement and integration constructs were above average and were in a highly acceptable condition. Furthermore, the regression analysis results indicated that only two constructs, viz. the information-imagination and agent-involvement constructs, positively and significantly correlate with the integration construct. The results of the structural equation modeling also revealed that the intervention, intelligence, and involvement constructs are related to the integration construct with the complete mediation of imagination. Discussion and conclusion: The present research suggests that knowledge creation at Alzahra University relatively complies with the combination of the i-System and Ba models. Unlike this model, the intervention, intelligence, and involvement constructs are not directly related to the integration construct and this seems to have three implications: 1) the information sources are not frequently used to assess and identify the research biases; 2) problem finding is probably of less concern at the end of studies and at the time of assessment and validation; 3) the involvement of others has a smaller role in the summarization, assessment, and validation of the research.

Keywords: i-System, Ba model , knowledge creation , knowledge management, knowledge creation environment, Iranian Universities

Procedia PDF Downloads 94
36300 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 155
36299 A Qualitative Study for Establishing Critical Success Factors for PPPs in Research Reactors

Authors: Khalid Almarri

Abstract:

The UAE is currently developing a peaceful nuclear energy program as part of its low Carbon energy strategy to meet future energy demands. Research of nuclear energy technologies is required to support nuclear energy generation projects and maximize their performance. Research of this type will require building an operating a research reactor (RR), a costly undertaking in most circumstances. Collaboration between government and private parties through public, private partnerships (PPP) can maximize the benefits expected from the adoption of an RR project. The aim of this research is to establish the critical success factors (CSF) for developing an RR project for newcomer countries, with the UAE taken as a case study, through the utilization of public, private partnerships (PPP). The results of this study were arrived at through the use of semi-structured interviews conducted with ten experts in the field of research reactors, using grounded theory method. Underutilization was identified as the main stumbling block that impairs the success of research reactors.

Keywords: public private partnerships, research reactors, grounded theory, critical success factors

Procedia PDF Downloads 272
36298 Systematic and Simple Guidance for Feed Forward Design in Model Predictive Control

Authors: Shukri Dughman, Anthony Rossiter

Abstract:

This paper builds on earlier work which demonstrated that Model Predictive Control (MPC) may give a poor choice of default feed forward compensator. By first demonstrating the impact of future information of target changes on the performance, this paper proposes a pragmatic method for identifying the amount of future information on the target that can be utilised effectively in both finite and infinite horizon algorithms. Numerical illustrations in MATLAB give evidence of the efficacy of the proposal.

Keywords: model predictive control, tracking control, advance knowledge, feed forward

Procedia PDF Downloads 528