Search results for: neighbor based key sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28273

Search results for: neighbor based key sharing

27763 An Agile, Intelligent and Scalable Framework for Global Software Development

Authors: Raja Asad Zaheer, Aisha Tanveer, Hafza Mehreen Fatima

Abstract:

Global Software Development (GSD) is becoming a common norm in software industry, despite of the fact that global distribution of the teams presents special issues for effective communication and coordination of the teams. Now trends are changing and project management for distributed teams is no longer in a limbo. GSD can be effectively established using agile and project managers can use different agile techniques/tools for solving the problems associated with distributed teams. Agile methodologies like scrum and XP have been successfully used with distributed teams. We have employed exploratory research method to analyze different recent studies related to challenges of GSD and their proposed solutions. In our study, we had deep insight in six commonly faced challenges: communication and coordination, temporal differences, cultural differences, knowledge sharing/group awareness, speed and communication tools. We have established that each of these challenges cannot be neglected for distributed teams of any kind. They are interlinked and as an aggregated whole can cause the failure of projects. In this paper we have focused on creating a scalable framework for detecting and overcoming these commonly faced challenges. In the proposed solution, our objective is to suggest agile techniques/tools relevant to a particular problem faced by the organizations related to the management of distributed teams. We focused mainly on scrum and XP techniques/tools because they are widely accepted and used in the industry. Our solution identifies the problem and suggests an appropriate technique/tool to help solve the problem based on globally shared knowledgebase. We can establish a cause and effect relationship using a fishbone diagram based on the inputs provided for issues commonly faced by organizations. Based on the identified cause, suitable tool is suggested, our framework suggests a suitable tool. Hence, a scalable, extensible, self-learning, intelligent framework proposed will help implement and assess GSD to achieve maximum out of it. Globally shared knowledgebase will help new organizations to easily adapt best practices set forth by the practicing organizations.

Keywords: agile project management, agile tools/techniques, distributed teams, global software development

Procedia PDF Downloads 281
27762 Design Thinking Activities: A Tool in Overcoming Student Reticence

Authors: Marinel Dayawon

Abstract:

Student participation in classroom activities is vital in the teaching- learning the process as it develops self-confidence, social relationships and good academic performance of students. It is the teacher’s empathetic manner and creativity to create solutions that encourage teamwork and mutual support while dropping the academic competition within the class that hinder every shy student to walk with courage and talk with conviction because they consider their ideas, weak, as compared to the bright students. This study aimed to explore the different design thinking strategies that will change the mindset of shy students in classroom activities, maximizing their participation in all given tasks while sharing their views through ideation and providing them a wider world through compromise agreement within the members of the group, sensitivity to one’s idea, thus, arriving at a collective decision in the development of a prototype that indicates improvement in their classroom involvement. The study used the qualitative type of research. Triangulation is done through participant observation, focus group discussion and interview, documented through photos and videos. The respondents were the second- year Bachelor of Secondary Education students of the Institute of Teacher Education at Isabela State University- Cauayan City Campus. The result of the study revealed that reticent students when involved in game activities through a slap and tap method, writing their clustered ideas, using sticky notes is excited in sharing ideas as it doesn’t use oral communication. It is also observed after three weeks of using the design thinking strategies; shy students volunteer as secretary, rapporteur or group leader in the team- building activities as it represents the ideas of the heterogeneous group, removing the individual identity of the ideas. Superior students learned to listen to the ideas of the reticent students and involved them in the prototyping process of designing a remediation program for high school students showing reticence in the classroom, making their experience as a benchmark. The strategies made a 360- degrees transformation of the shy students, producing their journal log, in their journey to being open. Thus, faculty members are now adopting the design thinking approach.

Keywords: design thinking activities, qualitative, reticent students, Isabela, Philippines

Procedia PDF Downloads 207
27761 Educational Data Mining: The Case of the Department of Mathematics and Computing in the Period 2009-2018

Authors: Mário Ernesto Sitoe, Orlando Zacarias

Abstract:

University education is influenced by several factors that range from the adoption of strategies to strengthen the whole process to the academic performance improvement of the students themselves. This work uses data mining techniques to develop a predictive model to identify students with a tendency to evasion and retention. To this end, a database of real students’ data from the Department of University Admission (DAU) and the Department of Mathematics and Informatics (DMI) was used. The data comprised 388 undergraduate students admitted in the years 2009 to 2014. The Weka tool was used for model building, using three different techniques, namely: K-nearest neighbor, random forest, and logistic regression. To allow for training on multiple train-test splits, a cross-validation approach was employed with a varying number of folds. To reduce bias variance and improve the performance of the models, ensemble methods of Bagging and Stacking were used. After comparing the results obtained by the three classifiers, Logistic Regression using Bagging with seven folds obtained the best performance, showing results above 90% in all evaluated metrics: accuracy, rate of true positives, and precision. Retention is the most common tendency.

Keywords: evasion and retention, cross-validation, bagging, stacking

Procedia PDF Downloads 64
27760 The Link between Corporate Governance and EU Competition Law Enforcement: A Conditional Logistic Regression Analysis of the Role of Diversity, Independence and Corporate Social Responsibility

Authors: Jeroen De Ceuster

Abstract:

This study is the first empirical analysis of the link between corporate governance and European Union competition law. Although competition law enforcement is often studied through the lens of competition law, we offer an alternative perspective by looking at a number of corporate governance factor at the level of the board of directors. We find that undertakings where the Chief Executive Officer is also chairman of the board are twice as likely to violate European Union competition law. No significant relationship was found between European Union competition law infringements and gender diversity of the board, the size of the board, the percentage of directors appointed after the Chief Executive Officer, the percentage of independent directors, or the presence of corporate social responsibility (CSR) committee. This contribution is based on a 1-1 matched peer study. Our sample includes all ultimate parent companies with a board that have been sanctioned by the European Commission for either anticompetitive agreements or abuse of dominance for the period from 2004 to 2018. These companies were matched to a company with headquarters in the same country, belongs to the same industry group, is active in the European Economic Area, and is the nearest neighbor to the infringing company in terms of revenue. Our final sample includes 121 pairs. As is common with matched peer studies, we use CLR to analyze the differences within these pairs. The only statistically significant independent variable after controlling for size and performance is CEO/Chair duality. The results indicate that companies whose Chief Executive Officer also functions as chairman of the board are twice as likely to infringe European Union competition law. This is in line with the monitoring theory of the board of directors, which states that its primary function is to monitor top management. Since competition law infringements are mostly organized by management and hidden from board directors, the results suggest that a Chief Executive Officer who is also chairman is more likely to be either complicit in the infringement or less critical towards his day-to-day colleagues and thus impedes proper detection by the board of competition law infringements.

Keywords: corporate governance, competition law, board of directors, board independence, ender diversity, corporate social responisbility

Procedia PDF Downloads 111
27759 Incentive-Based Motivation to Network with Coworkers: Strengthening Professional Networks via Online Social Networks

Authors: Jung Lee

Abstract:

The last decade has witnessed more people than ever before using social media and broadening their social circles. Social media users connect not only with their friends but also with professional acquaintances, primarily coworkers, and clients; personal and professional social circles are mixed within the same social media platform. Considering the positive aspect of social media in facilitating communication and mutual understanding between individuals, we infer that social media interactions with co-workers could indeed benefit one’s professional life. However, given privacy issues, sharing all personal details with one’s co-workers is not necessarily the best practice. Should one connect with coworkers via social media? Will social media connections with coworkers eventually benefit one’s long-term career? Will the benefit differ across cultures? To answer, this study examines how social media can contribute to organizational communication by tracing the foundation of user motivation based on social capital theory, leader-member exchange (LMX) theory and expectancy theory of motivation. Although social media was originally designed for personal communication, users have shown intentions to extend social media use for professional communication, especially when the proper incentive is expected. To articulate the user motivation and the mechanism of the incentive expectation scheme, this study applies those three theories and identify six antecedents and three moderators of social media use motivation including social network flaunt, shared interest, perceived social inclusion. It also hypothesizes that the moderating effects of those constructs would significantly differ based on the relationship hierarchy among the workers. To validate, this study conducted a survey of 329 active social media users with acceptable levels of job experiences. The analysis result confirms the specific roles of the three moderators in social media adoption for organizational communication. The present study contributes to the literature by developing a theoretical modeling of ambivalent employee perceptions about establishing social media connections with co-workers. This framework shows not only how both positive and negative expectations of social media connections with co-workers are formed based on expectancy theory of motivation, but also how such expectations lead to behavioral intentions using career success model. It also enhances understanding of how various relationships among employees can be influenced through social media use and such usage can potentially affect both performance and careers. Finally, it shows how cultural factors induced by social media use can influence relations among the coworkers.

Keywords: the social network, workplace, social capital, motivation

Procedia PDF Downloads 107
27758 Why Do We Need Hierachical Linear Models?

Authors: Mustafa Aydın, Ali Murat Sunbul

Abstract:

Hierarchical or nested data structures usually are seen in many research areas. Especially, in the field of education, if we examine most of the studies, we can see the nested structures. Students in classes, classes in schools, schools in cities and cities in regions are similar nested structures. In a hierarchical structure, students being in the same class, sharing the same physical conditions and similar experiences and learning from the same teachers, they demonstrate similar behaviors between them rather than the students in other classes.

Keywords: hierarchical linear modeling, nested data, hierarchical structure, data structure

Procedia PDF Downloads 639
27757 Assessment of Water Resources and Inculcation of Controlled Water Consumption System

Authors: Vakhtang Geladze, Nana Bolashvili, Tamazi Karalashvili, Nino Machavariani, Vajha Neidze, Nana Kvirkvelia, Tamar Chichinadze

Abstract:

Deficiency of fresh water is a vital global problem today. It must be taken into consideration that in the nearest future fresh water crisis will become even more acute owing to the global climate warming and fast desertification processes in the world. Georgia has signed the association agreement with Euro Union last year where the priority spheres of cooperation are the management of water resources, development of trans-boundary approach to the problem and active participation in the “Euro Union water initiative” component of “the East Europe, Caucasus and the Central Asia”. Fresh water resources are the main natural wealth of Georgia. According to the average water layer height, Georgia is behind such European countries only as Norway, Switzerland and Austria. The annual average water provision of Georgia is 4-8 times higher than in its neighbor countries Armenia and Azerbaijan. Despite abundant water resources in Georgia, there is considerable discrepancy between their volume and use in some regions because of the uneven territorial distribution. In the East Georgia, water supply of the territory and population is four times less than in the West Georgia.

Keywords: GIS, water consumption, water management, water resources

Procedia PDF Downloads 399
27756 Evaluating the ‘Assembled Educator’ of a Specialized Postgraduate Engineering Course Using Activity Theory and Genre Ecologies

Authors: Simon Winberg

Abstract:

The landscape of professional postgraduate education is changing: the focus of these programmes is moving from preparing candidates for a life in academia towards a focus of training in expert knowledge and skills to support industry. This is especially pronounced in engineering disciplines where increasingly more complex products are drawing on a depth of knowledge from multiple fields. This connects strongly with the broader notion of Industry 4.0 – where technology and society are being brought together to achieve more powerful and desirable products, but products whose inner workings also are more complex than before. The changes in what we do, and how we do it, has a profound impact on what industry would like universities to provide. One such change is the increased demand for taught doctoral and Masters programmes. These programmes aim to provide skills and training for professionals, to expand their knowledge of state-of-the-art tools and technologies. This paper investigates one such course, namely a Software Defined Radio (SDR) Master’s degree course. The teaching support for this course had to be drawn from an existing pool of academics, none of who were specialists in this field. The paper focuses on the kind of educator, a ‘hybrid academic’, assembled from available academic staff and bolstered by research. The conceptual framework for this paper combines Activity Theory and Genre Ecology. Activity Theory is used to reason about learning and interactions during the course, and Genre Ecology is used to model building and sharing of technical knowledge related to using tools and artifacts. Data were obtained from meetings with students and lecturers, logs, project reports, and course evaluations. The findings show how the course, which was initially academically-oriented, metamorphosed into a tool-dominant peer-learning structure, largely supported by the sharing of technical tool-based knowledge. While the academic staff could address gaps in the participants’ fundamental knowledge of radio systems, the participants brought with them extensive specialized knowledge and tool experience which they shared with the class. This created a complicated dynamic in the class, which centered largely on engagements with technology artifacts, such as simulators, from which knowledge was built. The course was characterized by a richness of ‘epistemic objects’, which is to say objects that had knowledge-generating qualities. A significant portion of the course curriculum had to be adapted, and the learning methods changed to accommodate the dynamic interactions that occurred during classes. This paper explains the SDR Masters course in terms of conflicts and innovations in its activity system, as well as the continually hybridizing genre ecology to show how the structuring and resource-dependence of the course transformed from its initial ‘traditional’ academic structure to a more entangled arrangement over time. It is hoped that insights from this paper would benefit other educators involved in the design and teaching of similar types of specialized professional postgraduate taught programmes.

Keywords: professional postgraduate education, taught masters, engineering education, software defined radio

Procedia PDF Downloads 70
27755 Molecular Detection and Isolation of Benzimidazole Resistant Haemonchus contortus from Pakistan

Authors: K. Ali, M. F. Qamar, M. A. Zaman, M. Younus, I. Khan, S. Ehtisham-ul-Haque, R. Tamkeen, M. I. Rashid, Q. Ali

Abstract:

This study centers on molecular identification of Haemonchus contortus and isolation of Benz-imidazoles (BZ) resistant strains. Different abattoirs’ of two geographic regions of Punjab (Pakistan) were frequently visited for the collection of worms. Out of 1500 (n=1500) samples that were morphologically confirmed as H. contortus, 30 worms were subjected to molecular procedures for isolation of resistant strains. Resistant worms (n=8) were further subjected to DNA gene sequencing. Bio edit sequence alignment editor software was used to detect the possible mutation, deletion, replacement of nucleotides. Genetic diversity was noticed and genetic variation existing in β-tubulin isotype 1 of the H. contortus population of small ruminants of different regions considered in this study. H. contortus showed three different type of genetic sequences. 75%, 37.5%, 25% and 12.5% of the studied samples showed 100% query cover and identity with isolates and clones of China, UK, Australia and other countries, respectively. Interestingly the neighbor countries such as India and Iran haven’t many similarities with the Pakistani isolates. Thus, it suggests that population density of same genetic makeup H. contortus is scattered worldwide rather than clustering in a single region.

Keywords: Haemonchus contortus, Benzimidazole resistant, β-tubulin-1 gene, abattoirs

Procedia PDF Downloads 162
27754 Cognitive Relaying in Interference Limited Spectrum Sharing Environment: Outage Probability and Outage Capacity

Authors: Md Fazlul Kader, Soo Young Shin

Abstract:

In this paper, we consider a cognitive relay network (CRN) in which the primary receiver (PR) is protected by peak transmit power $\bar{P}_{ST}$ and/or peak interference power Q constraints. In addition, the interference effect from the primary transmitter (PT) is considered to show its impact on the performance of the CRN. We investigate the outage probability (OP) and outage capacity (OC) of the CRN by deriving closed-form expressions over Rayleigh fading channel. Results show that both the OP and OC improve by increasing the cooperative relay nodes as well as when the PT is far away from the SR.

Keywords: cognitive relay, outage, interference limited, decode-and-forward (DF)

Procedia PDF Downloads 493
27753 Human Papillomavirus Type 16 E4 Gene Variation as Risk Factor for Cervical Cancer

Authors: Yudi Zhao, Ziyun Zhou, Yueting Yao, Shuying Dai, Zhiling Yan, Longyu Yang, Chuanyin Li, Li Shi, Yufeng Yao

Abstract:

HPV16 E4 gene plays an important role in viral genome amplification and release. Therefore, a variation of the E4 gene nucleic acid sequence may affect the carcinogenicity of HPV16. In order to understand the relationship between the variation of HPV16 E4 gene and cervical cancer, this study was to amplify and sequence the DNA sequences of E4 genes in 118 HPV16-positive cervical cancer patients and 151 HPV16-positive asymptomatic individuals. After obtaining E4 gene sequences, the phylogenetic trees were constructed by the Neighbor-joining method for gene variation analysis. The results showed that: 1) The distribution of HPV16 variants between the case group and the control group differed greatly (P = 0.015),and the Asian-American(AA)variant was likely to relate to the occurrence of cervical cancer. 2) DNA sequence analysis showed that there were significant differences in the distribution of 8 variants between the case group and the control group (P < 0.05). And 3) In European (EUR) variant, two variations, C3384T (L18L) and A3449G (P39P), were associated with the initiation and development of cervical cancer. The results suggested that the variation of HPV16 E4 gene may be a contributor affecting the occurrence as well as the development of cervical cancer, and different HPV16 variants may have different carcinogenic capability.

Keywords: cervical cancer, HPV16, E4 gene, variations

Procedia PDF Downloads 152
27752 Phylogenetic Analysis of the Thunnus Tuna Fish Using Cytochrome C Oxidase Subunit I Gene Sequence

Authors: Yijun Lai, Saber Khederzadeh, Lingshaung Han

Abstract:

Species in Thunnus are organized due to the similarity between them. The closeness between T. maccoyii, T. thynnus, T. Tonggol, T. atlanticus, T. albacares, T. obsesus, T. alalunga, and T. orientails are in different degrees. However, the genetic pattern of differentiation has not been presented based on individuals yet, to the author’s best knowledge. Hence, we aimed to analyze the difference in individuals level of tuna species to identify the factors that contribute to the maternal lineage variety using Cytochrome c oxidase subunit I (COXI) gene sequences. Our analyses provided evidence of sharing lineages in the Thunnus. A phylogenetic analysis revealed that these lineages are basal to the other sequences. We also showed a close connection between the T. tonggol, T. thynnus, and T. albacares populations. Also, the majority of the T. orientalis samples were clustered with the T. alalunga and, then, T. atlanticus populations. Phylogenetic trees and migration modeling revealed high proximity of T. thynnus sequences to a few T. orientalis and suggested possible gene flow with T. tonggol and T. albacares lineages, while all T. obsesus samples indicated unique clustering with each other. Our results support the presence of old maternal lineages in Thunnus, as a legacy of an ancient wave of colonization or migration.

Keywords: Thunnus Tuna, phylogeny, maternal lineage, COXI gene

Procedia PDF Downloads 268
27751 Disclosure Extension of Oil and Gas Reserve Quantum

Authors: Ali Alsawayeh, Ibrahim Eldanfour

Abstract:

This paper examines the extent of disclosure of oil and gas reserve quantum in annual reports of international oil and gas exploration and production companies, particularly companies in untested international markets, such as Canada, the UK and the US, and seeks to determine the underlying factors that affect the level of disclosure on oil reserve quantum. The study is concerned with the usefulness of disclosure of oil and gas reserves quantum to investors and other users. Given the primacy of the annual report (10-k) as a source of supplemental reserves data about the company and as the channel through which companies disseminate information about their performance, the annual reports for one year (2009) were the central focus of the study. This comparative study seeks to establish whether differences exist between the sample companies, based on new disclosure requirements by the Securities and Exchange Commission (SEC) in respect of reserves classification and definition. The extent of disclosure of reserve is provided and compared among the selected companies. Statistical analysis is performed to determine whether any differences exist in the extent of disclosure of reserve under the determinant variables. This study shows that some factors would affect the extent of disclosure of reserve quantum in the above-mentioned countries, namely: company’s size, leverage and quality of auditor. Companies that provide reserves quantum in detail appear to display higher size. The findings also show that the level of leverage has affected companies’ reserves quantum disclosure. Indeed, companies that provide detailed reserves quantum disclosure tend to employ a ‘high-quality auditor’. In addition, the study found significant independent variable such as Profit Sharing Contracts (PSC). This factor could explain variations in the level of disclosure of oil reserve quantum between the contractor and host governments. The implementation of SEC oil and gas reporting requirements do not enhance companies’ valuation because the new rules are based only on past and present reserves information (proven reserves); hence, future valuation of oil and gas companies is missing for the market.

Keywords: comparison, company characteristics, disclosure, reserve quantum, regulation

Procedia PDF Downloads 386
27750 A Preliminary Report of HBV Full Genome Sequencing Derived from Iranian Intravenous Drug Users

Authors: Maryam Vaezjalali, Koroush Rahimian, Maryam Asli, Tahmineh Kandelouei, Foad Davoodbeglou, Amir H. Kashi

Abstract:

Objectives: The present study was conducted to assess the HBV molecular profiles including genotypes, subgenotypes, subtypes & mutations in hepatitis B genes. Materials/Patients and Methods: This study was conducted on 229 intravenous drug users who referred to three Drop- in-Centers and a hospital in Tehran. HBV DNA was extracted from HBsAg positive serum samples and amplified by Nested PCR. HBV genotype, subgenotypes, subtype and genes mutation were determined by direct sequencing. Phylogenetic tree was constructed using neighbor- joining (NJ) method. Statistical analyses were carried out by SPSS 20. Results: HBV DNA was found in 3 HBsAg positive cases. Phylogenetic tree of derived HBV DNAs showed the existence of genotype D (subgenotype D1, subtype ayw2). Also immune escape mutations were determined in S gene. Conclusion: There were a few variations and genotypes and subtypes among infected intravenous drug users. This study showed the predominance of genotype D among intravenous drug users. Our study concurs with other reports from Iran, that all showing currently only genotype D is the only detectable genotype in Iran.

Keywords: drug users, genotype, HBV, phylogenetic tree

Procedia PDF Downloads 308
27749 Reverse Logistics in Clothing Recycling: A Case Study in Chengdu

Authors: Guo Yan

Abstract:

Clothing recycling bin is a traditional way to collect textile waste in many areas. In the clothing recycling business, the transportation cost normally takes over 50% of total costs. This case gives a good way to reduce transportation cost by reverse logistics system. In this reverse logistics system, there are offline strategic alliance partners, such as transport firms, convenience stores, laundries, and post office which are integrated onto the mobile APP. Offline strategic alliance partners provide the service of textile waste collection, and transportation by their vacant vehicles return journey from convenience stores, laundries and post offices to sorting centers. The results of the case study provide the strategic alliance with a valuable and light - asset business model by using the logistics of offline memberships. The company in this case just focuses on textile waste sorting, reuse, recycling etc. The research method of this paper is a case study of a clothing recycling company in Chengdu by field research and interview; the analysis is based on the theory of the reverse logistics system.

Keywords: closed-loop recycles system, clothing recycling, end-of-life clothing, sharing economy, strategic alliance, reverse logistics.

Procedia PDF Downloads 132
27748 Augmenting Classroom Reality

Authors: Kerrin Burnell

Abstract:

In a world of increasingly technology-dependent students, the English language classroom should ideally keep up with developments to keep students engaged as much as possible. Unfortunately, as is the case in Oman, funding is not always adequate to ensure students have the most up to date technology, and most institutions are still reliant on paper-based textbooks. In order to try and bridge the gap between the technology available (smartphones) and textbooks, augmented reality (AR) technology can be utilized to enhance classroom, homework, and extracurricular activities. AR involves overlaying media (videos, images etc) over the top of physical objects (posters, book pages etc) and then sharing the media. This case study involved introducing students to a freely available entry level AR app called Aurasma. Students were asked to augment their English textbooks, word walls, research project posters, and extracurricular posters. Through surveys, interviews and an analysis of time spent accessing the different media, a determination of the appropriateness of the technology for the classroom was determined. Results indicate that the use of AR has positive effects on many aspects of the English classroom. Increased student engagement, total time spent on task, interaction, and motivation were evident, along with a decrease in technology-related anxiety. As it is proving very difficult to get tablets or even laptops in classrooms in Oman, these preliminary results indicate that many positive outcomes will come from introducing students to this innovative technology.

Keywords: augmented reality, classroom technology, classroom innovation, engagement

Procedia PDF Downloads 360
27747 The Significance of Community Life in Promoting Unity in the Light of Acts 2:42

Authors: Takesure Mahohoma

Abstract:

Community life is an epitome of the African axiom 'I am because we are, since we are therefore I am.' This culminates in the Ubuntu philosophy which is summarized in the Zulu words, 'umuntu ngumuntu ngabantu' (A person is a person through other people). This relationship gives honour to all people. This is the gist of the paper. This paper seeks to demonstrate the impact of community life in promoting unity from an African perspective. Using the proto-community in Acts 2:42, it is argued that community life is a solution to many social problems that divide African society today. The aim is to encourage all Africans and other people to cultivate a sense of belonging and valuing community life in the light of Acts 2:42. Hence we shall trace this theme from Old Testament, New Testament, and Christian history. The other section touches on the essence of community life and obstacles that hinder it. We shall offer spiritual suggestions and an integrative reflection. The nature of the paper is theology in general but spiritual in particular. As a spiritual paper, it is guided by the foundational approach. Thus, it employs the dialogical and integrative reflection method. The expected result is that freedom from all the miseries experienced is brought by living a community life. This is a life that gives greater assurance of enough food, education, health, peace, employment, and increased responsibility that values human dignity. Thus people are neighbours to each other. There is no stranger among them. The basic presumption is that there can be no development in any society without community life.

Keywords: community, seged, koinonia, neighbor

Procedia PDF Downloads 269
27746 Collaborative Economy in Developing Countries: Perspectives from the Philippines

Authors: Ivy Jessen Galvan

Abstract:

Over the past decade, a phenomenon has emerged at the frontier of the digital economy: a wave of ‘disruptive’ technologies that offer digital solutions to variety of everyday problems, challenging the way traditional industries operate. Most of these disruptive technologies are applications ('apps') that rely on the Internet to connect people to people for sharing, selling, renting, or lending, creating a unique economic model wherein users provide for other users’ demand – called 'collaborative economy.' Although collaborative economy is spreading in every part of the world, there may be different ways in which this phenomenon is unfolding throughout the developing countries. In this study, the characteristics of collaborative economy in the Philippines are highlighted and compared from observations in the developed world. The paper looks at two leading collaborative economy ventures in the Philippines – Grab and Shopee – probing into how these smartphone-based platforms place technology into the 'micro-frictions' of the Philippine developing context. Using framing analysis on interviews conducted among Grab and Shopee users in Metro Manila, three frames have been identified: 1) metropolitan solution; 2) financial inclusion and; 3) formalization of labor. This research contextualizes the Fourth Industrial Revolution in ASEAN by analyzing the effect of a digital economy in everyday life.

Keywords: ASEAN Unicorns, collaborative economy, developing countries, fourth industrial revolution

Procedia PDF Downloads 94
27745 The Development of Leisure and Endowment Characteristic Villages in the Perspective of Balancing the Dwellers and Aged Visitors:A Case Study of Villages in Hangzhou Metropolitan Area

Authors: Zijiao Chai, Wangming Li

Abstract:

Under the background of increasing aging population, the situation of city endowment resources shortage gradually revealed. And many villages in the metropolitan area with the good natural ecological environment and leisure tourism base, have become one of the main destinations of urban old people for the off-site pension. This paper is based on a survey of more than ten villages which are characterized by leisure and endowment in Hangzhou metropolitan area, China. The satisfaction degree of the two main groups in the villages, dwellers, and aged visitors, is researched using the method of fuzzy comprehensive evaluation. The statistics are obtained from 535 questionnaires and qualitative interview. According to the satisfaction scores, it could be determined whether the dwellers and aged visitors have reached the equilibrium state. The equilibrium state is the development target of the villages, and it`s defined by environmentally friendly, proper for employment and pension, facilities sharing and harmonious life for each other. Furthermore, this paper comes up with some planning countermeasures in order to avoid "imbalance between dwellers and aged visitors" and obtain sustainable development while maintaining the economic benefit.

Keywords: aged visitors, balance between dwellers and aged visitors, dwellers, fuzzy comprehensive evaluation, Hangzhou metropolitan area, leisure and endowment characteristic villages

Procedia PDF Downloads 258
27744 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 244
27743 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 195
27742 Molecular Diversity of Forensically Relevant Insects from the Cadavers of Lahore

Authors: Sundus Mona, Atif Adnan, Babar Ali, Fareeha Arshad, Allah Rakha

Abstract:

Molecular diversity is the variation in the abundance of species. Forensic entomology is a neglected field in Pakistan. Insects collected from the crime scene should be handled by forensic entomologists who are currently virtually non-existent in Pakistan. Correct identification of insect specimen along with knowledge of their biodiversity can aid in solving many problems related to complicated forensic cases. Inadequate morphological identification and insufficient thermal biological studies limit the entomological utility in Forensic Medicine. Recently molecular identification of entomological evidence has gained attention globally. DNA barcoding is the latest and established method for species identification. Only proper identification can provide a precise estimation of postmortem intervals. Arthropods are known to be the first tourists scavenging on decomposing dead matter. The objective of the proposed study was to identify species by molecular techniques and analyze their phylogenetic importance with barcoded necrophagous insect species of early succession on human cadavers. Based upon this identification, the study outcomes will be the utilization of established DNA bar codes to identify carrion feeding insect species for concordant estimation of post mortem interval. A molecular identification method involving sequencing of a 658bp ‘barcode’ fragment of the mitochondrial cytochrome oxidase subunit 1 (CO1) gene from collected specimens of unknown dipteral species from cadavers of Lahore was evaluated. Nucleotide sequence divergences were calculated using MEGA 7 and Arlequin, and a neighbor-joining phylogenetic tree was generated. Three species were identified, Chrysomya megacephala, Chrysomya saffranea, and Chrysomya rufifacies with low genetic diversity. The fixation index was 0.83992 that suggests a need for further studies to identify and classify forensically relevant insects in Pakistan. There is an exigency demand for further research especially when immature forms of arthropods are recovered from the crime scene.

Keywords: molecular diversity, DNA barcoding, species identification, forensically relevant

Procedia PDF Downloads 129
27741 Implementing Service Innovation in Public Transport Sector: Drivers and Challenges

Authors: Chaoren Lu

Abstract:

Public policy is playing as one driving force that influencing service innovation implementation in public sector. However, public policy implications cannot be automatically derived from the analyses of innovation issues, and there lacks of researches about the influences of public policy onto innovation. Moreover, innovation in service system is hard to predictable and whether policy encourages or hidden innovation is still lack of study. Especially, by given the context that multiple actors are active involving within the service delivery process in public transport sector, the complex driving forces and challenges are emerged towards the service operation. This study is aim to analysis the service innovation practices within service operating organizations to understand the drivers and challenges of service operation based on policy requirements, and where the innovation idea generating from. The case studies of Changzhou Transit Group and Nanjing Jiangnan Public Transit Group will be launched. This paper reveals the ambidexterity between top-down and bottom-up demands within the public transport service operating organizations contribute to the innovation ideas. Meanwhile, it contributes to the understanding of fundamental elements of service innovation is the new relationship creation and new way of sharing knowledge. The policy contributes to the trigger of creation of such relationship. The research question is: what are the sources of service innovation practices in local public transport system in China in in facing the policy implementation?

Keywords: public value, service innovation, public transport service, China

Procedia PDF Downloads 302
27740 Intensive Intercultural English Language for Enhanced School Community Engagement: An Exploratory Study Applied to Parents from Language Backgrounds Other Than English in a Regional Australian Primary School

Authors: Ann Dashwood

Abstract:

Using standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify interactional settings for which parents who are isolated from the daily use of functional Australian cultural language learned to engage more effectively in their children’s learning at school. The outcomes measured parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures. The study used quantitative and qualitative methods. The principles of communicative task-based language learning combined with intercultural communication principles provided the theoretical base for intensive English task-based learning and engagement. The quantitative analysis examined data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively informed the study. Currently significant numbers of projects are active in community centres and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study was significant to explore the effects of conducting intensive English with parents of varied English language backgrounds by targeting language use for social interactions in the community, specific engagement in school activities, cultural interaction with teachers and responsiveness to complying with school procedures.

Keywords: engagement, intercultural communication, LBOTE, school community

Procedia PDF Downloads 94
27739 Parallel Version of Reinhard’s Color Transfer Algorithm

Authors: Abhishek Bhardwaj, Manish Kumar Bajpai

Abstract:

An image with its content and schema of colors presents an effective mode of information sharing and processing. By changing its color schema different visions and prospect are discovered by the users. This phenomenon of color transfer is being used by Social media and other channel of entertainment. Reinhard et al’s algorithm was the first one to solve this problem of color transfer. In this paper, we make this algorithm efficient by introducing domain parallelism among different processors. We also comment on the factors that affect the speedup of this problem. In the end by analyzing the experimental data we claim to propose a novel and efficient parallel Reinhard’s algorithm.

Keywords: Reinhard et al’s algorithm, color transferring, parallelism, speedup

Procedia PDF Downloads 592
27738 Patients' Perceptions of Receiving a Diagnosis of a Haematological Malignancy, following the SPIKES Protocol

Authors: Lauren Dixon, David Galvani

Abstract:

Objective: Sharing devastating news with patients is often considered the most difficult task of doctors. This study aimed to explore patients’ perceptions of receiving bad news including which features improve the experience and which areas need refining. Methods: A questionnaire was written based on the steps of the SPIKES model for breaking bad news. 20 patients receiving treatment for a haematological malignancy completed the questionnaire. Results: Overall, the results are promising as most patients praised their consultation. ‘Poor’ was more commonly rated by women and participants aged 45-64. The main differences between the ‘excellent’ and ‘poor’ consultations include the doctor’s sensitivity and checking the patients’ understanding. Only 35% of patients were asked their existing knowledge and 85% of consultations failed to discuss the impact of the diagnosis on daily life. Conclusion: This study agreed with the consensus of existing literature. The commended aspects include consultation set-up and information given. Areas patients felt needed improvement include doctors determining the patient’s existing knowledge and exploring how the diagnosis will affect the patient’s life. With a poorer prognosis, doctors should work on conveying appropriate hope. The study was limited by a small sample size and potential recall bias.

Keywords: cancer, diagnosis, haematology, patients

Procedia PDF Downloads 290
27737 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 112
27736 Predicting the Diagnosis of Alzheimer’s Disease: Development and Validation of Machine Learning Models

Authors: Jay L. Fu

Abstract:

Patients with Alzheimer's disease progressively lose their memory and thinking skills and, eventually, the ability to carry out simple daily tasks. The disease is irreversible, but early detection and treatment can slow down the disease progression. In this research, publicly available MRI data and demographic data from 373 MRI imaging sessions were utilized to build models to predict dementia. Various machine learning models, including logistic regression, k-nearest neighbor, support vector machine, random forest, and neural network, were developed. Data were divided into training and testing sets, where training sets were used to build the predictive model, and testing sets were used to assess the accuracy of prediction. Key risk factors were identified, and various models were compared to come forward with the best prediction model. Among these models, the random forest model appeared to be the best model with an accuracy of 90.34%. MMSE, nWBV, and gender were the three most important contributing factors to the detection of Alzheimer’s. Among all the models used, the percent in which at least 4 of the 5 models shared the same diagnosis for a testing input was 90.42%. These machine learning models allow early detection of Alzheimer’s with good accuracy, which ultimately leads to early treatment of these patients.

Keywords: Alzheimer's disease, clinical diagnosis, magnetic resonance imaging, machine learning prediction

Procedia PDF Downloads 125
27735 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 171
27734 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 275