Search results for: information share
11312 Performance Evaluation of Content Based Image Retrieval Using Indexed Views
Authors: Tahir Iqbal, Mumtaz Ali, Syed Wajahat Kareem, Muhammad Harris
Abstract:
Digital information is expanding in exponential order in our life. Information that is residing online and offline are stored in huge repositories relating to every aspect of our lives. Getting the required information is a task of retrieval systems. Content based image retrieval (CBIR) is a retrieval system that retrieves the required information from repositories on the basis of the contents of the image. Time is a critical factor in retrieval system and using indexed views with CBIR system improves the time efficiency of retrieved results.Keywords: content based image retrieval (CBIR), indexed view, color, image retrieval, cross correlation
Procedia PDF Downloads 47411311 E-Business Role in the Development of the Economy of Sultanate of Oman
Authors: Mairaj Salim, Asma Zaheer
Abstract:
Oman has accomplished as much or more than its fellow Gulf monarchies, despite starting from scratch considerably later, having less oil income to utilize, dealing with a larger and more rugged geography, and resolving a bitter civil war along the way. Of course, Oman's progress in the past 30-plus years has not been without problems and missteps, but the balance is squarely on the positive side of the ledger. Oil has been the driving force of the Omani economy since Oman began commercial production in 1967. The oil industry supports the country’s high standard of living and is primarily responsible for its modern and expansive infrastructure, including electrical utilities, telephone services, roads, public education and medical services. In addition to extensive oil reserves, Oman also has substantial natural gas reserves, which are expected to play a leading role in the Omani economy in the Twenty-first Century. To reduce the country’s dependence on oil revenues, the government is restructuring the economy by directing investment to non-oil activities. Since the 21st century IT has changed the performing tasks. To manage the affairs for the benefits of organizations and economy, the Omani government has adopted E-Business technologies for the development. E-Business is important because it allows • Transformation of old economy relationships (vertical/linear relationships) to new economy relationships characterized by end-to-end relationship management solutions (integrated or extended relationships) • Facilitation and organization of networks, small firms depend on ‘partner’ firms for supplies and product distribution to meet customer demands • SMEs to outsource back-end process or cost centers enabling the SME to focus on their core competence • ICT to connect, manage and integrate processes internally and externally • SMEs to join networks and enter new markets, through shortened supply chains to increase market share, customers and suppliers • SMEs to take up the benefits of e-business to reduce costs, increase customer satisfaction, improve client referral and attract quality partners • New business models of collaboration for SMEs to increase their skill base • SMEs to enter virtual trading arena and increase their market reach A national strategy for the advancement of information and communication technology (ICT) has been worked out, mainly to introduce e-government, e-commerce, and a digital society. An information technology complex KOM (Knowledge Oasis Muscat) had been established, consisting of section for information technology, incubator services, a shopping center of technology software and hardware, ICT colleges, E-Government services and other relevant services. So, all these efforts play a vital role in the development of Oman economy.Keywords: ICT, ITA, CRM, SCM, ERP, KOM, SMEs, e-commerce and e-business
Procedia PDF Downloads 25211310 Social Data Aggregator and Locator of Knowledge (STALK)
Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat
Abstract:
Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.Keywords: social network, analysis, Facebook, Linkedin, git, big data
Procedia PDF Downloads 44611309 Awareness of Genetically Modified Products Among Malaysian Consumers
Authors: Muhamad Afiq Faisal, Yahaya, Mohd Faizal, Hamzah
Abstract:
Genetic modification technology allows scientists to alter the genetic information of a particular organism. The technology allows the production of genetically modified organism (GMO) that has the enhanced property compared to the unmodified organism. The application of such technology is not only in agriculture industry, it is now has been applied extensively in biopharmaceutical industry such as transgenic vaccines. In Malaysia, Biosafety Act 2007 has been enacted in which all GMO-based products must be labeled with adequate information before being marketed. This paper aims to determine the awareness level amongst Malaysian consumers on the GM products available in the market and the efficiency of information supplied in the GM product labeling. The result of the survey will serve as a guideline for Malaysia government agency bodies to provide comprehensive yet efficient information to consumers for the purpose of GM product labeling in the near future. In conclusion, the efficiency of information delivery plays a vital role in ensuring that the information is being conveyed clearly to Malaysian consumers during the selection process of GM products available in the market.Keywords: genetic modification technology, genetically modified organisms, genetically modified organism products labeling, Biosafety Act 2007
Procedia PDF Downloads 36511308 On q-Non-extensive Statistics with Non-Tsallisian Entropy
Authors: Petr Jizba, Jan Korbel
Abstract:
We combine an axiomatics of Rényi with the q-deformed version of Khinchin axioms to obtain a measure of information (i.e., entropy) which accounts both for systems with embedded self-similarity and non-extensivity. We show that the entropy thus obtained is uniquely solved in terms of a one-parameter family of information measures. The ensuing maximal-entropy distribution is phrased in terms of a special function known as the Lambert W-function. We analyze the corresponding ‘high’ and ‘low-temperature’ asymptotics and reveal a non-trivial structure of the parameter space.Keywords: multifractals, Rényi information entropy, THC entropy, MaxEnt, heavy-tailed distributions
Procedia PDF Downloads 44611307 Information Needs and Seeking Behaviour of Postgraduate Students of Kohat University of Science and Technology, Khyber Pakhtunkhwa, Pakistan
Authors: Saeed Ullah Jan, Muhammad Ali, Misbah Ullah Awan
Abstract:
Purpose: This study investigated the information needs and seeking behaviour, and hurdles to information seeking of Post Graduate students of Kohat University of Science and Technology (KUST), Khyber Pakhtunkhwa. It focused on the information requirements of the post-graduate students of the university, the pattern they use for seeking information, and the difficulties they face while seeking information. Design/Methodology/approach: This study used a quantitative approach, adapting a survey questionnaire method for data collection. The population of this study was composed of M.Phil. and Ph.D. students of 2019 and 2020 in the faculties of Physical and Numerical Sciences, Chemical and Pharmaceutical Sciences, Biological Sciences, and Social Sciences of KUST. The sample size was 260. Students were selected randomly. The study response rate was 77%, and data were analyzed through SPSS (22 versions). Key findings: The study revealed that Most students' information needs were for study and research activities, new knowledge, and career development. To fulfill these needs, the scholars use various sources and resources. The sources they used for information needs were journal articles, textbooks, and research projects commonly. For the information-seeking purpose, often, students prefer books that have some importance. The other factors that played an essential role in selecting material were topical relevance, Novelty, Recommended by colleagues, and publisher's reputation. Most of the students thought that Book Exhibitions, Open Access systems in the Library, and the Display of new arrivals could enhance the students' information-seeking. The main problem seeking information was faced by them was a shortage of printed information resources. Overall they wanted more facilities, enhancement in the library collection, and better services. Delimitations of the study: This study has not included 1) BS and M.Sc. Students of KUST; 2) The colleges and institutions affiliated with KUST; 3) This study was delimited only to the Post Graduate students of KUST. Practical implication(s): The findings of the study motivate the policymakers and authorities of KUST to restructure the information literacy programs to fulfill the scholars' information needs. It may inform the policymakers to know the difficulties faced by scholars during information seeking. Contribution to the knowledge: No significant work has been done on the students' information needs and seeking behaviour at KUST. The study analyzed the information needs and seeking behaviour of post graduate students. It brought a clear picture of information needs and seeking behaviour of scholars and addressed the problems faced by them during the seeking process.Keywords: information needs of Pakistan, information-seeking behaviors, postgraduate students, university libraries, Kohat university of science and technology, Khyber Pakhtunkhwa, Pakistan
Procedia PDF Downloads 9411306 The Return of the Rejected Kings: A Comparative Study of Governance and Procedures of Standards Development Organizations under the Theory of Private Ordering
Authors: Olia Kanevskaia
Abstract:
Standardization has been in the limelight of numerous academic studies. Typically described as ‘any set of technical specifications that either provides or is intended to provide a common design for a product or process’, standards do not only set quality benchmarks for products and services, but also spur competition and innovation, resulting in advantages for manufacturers and consumers. Their contribution to globalization and technology advancement is especially crucial in the Information and Communication Technology (ICT) and telecommunications sector, which is also characterized by a weaker state-regulation and expert-based rule-making. Most of the standards developed in that area are interoperability standards, which allow technological devices to establish ‘invisible communications’ and to ensure their compatibility and proper functioning. This type of standard supports a large share of our daily activities, ranging from traffic coordination by traffic lights to the connection to Wi-Fi networks, transmission of data via Bluetooth or USB and building the network architecture for the Internet of Things (IoT). A large share of ICT standards is developed in the specialized voluntary platforms, commonly referred to as Standards Development Organizations (SDOs), which gather experts from various industry sectors, private enterprises, governmental agencies and academia. The institutional architecture of these bodies can vary from semi-public bodies, such as European Telecommunications Standards Institute (ETSI), to industry-driven consortia, such as the Internet Engineering Task Force (IETF). The past decades witnessed a significant shift of standard setting to those institutions: while operating independently from the states regulation, they offer a rather informal setting, which enables fast-paced standardization and places technical supremacy and flexibility of standards above other considerations. Although technical norms and specifications developed by such nongovernmental platforms are not binding, they appear to create significant regulatory impact. In the United States (US), private voluntary standards can be used by regulators to achieve their policy objectives; in the European Union (EU), compliance with harmonized standards developed by voluntary European Standards Organizations (ESOs) can grant a product a free-movement pass. Moreover, standards can de facto manage the functioning of the market when other regulative alternatives are not available. Hence, by establishing (potentially) mandatory norms, SDOs assume regulatory functions commonly exercised by States and shape their own legal order. The purpose of this paper is threefold: First, it attempts to shed some light on SDOs’ institutional architecture, focusing on private, industry-driven platforms and comparing their regulatory frameworks with those of formal organizations. Drawing upon the relevant scholarship, the paper then discusses the extent to which the formulation of technological standards within SDOs constitutes a private legal order, operating in the shadow of governmental regulation. Ultimately, this contribution seeks to advise whether a state-intervention in industry-driven standard setting is desirable, and whether the increasing regulatory importance of SDOs should be addressed in legislation on standardization.Keywords: private order, standardization, standard-setting organizations, transnational law
Procedia PDF Downloads 16611305 From Private Bodies to a Shareable Body Politic. A Theological Solution to a Foundational Political Problem.
Authors: Patrick Downey
Abstract:
The political problem besetting all nations, tribes, and families, as illuminated by Plato in the fifth book of his Republic, is the problem of our own private body with its own particular pleasures and pains. This problem we might label the “irrational love of one’s own.” The reasonable philosopher loves reality just because it is, but we love things only if we can convince ourselves that they are “ours” or an imaginative extension of “ours.” The resulting problem, that can only be medicated, but not cured, is that the “body private,” whether our own, our family, tribe, or nation, always lies underneath any level of “body politic” and threatens the bloodshed and disintegration of civil war. This is also the political problem the Bible deals with throughout, beginning with Adam and Eve’s fall from rationally shareable bodies (“the two were one flesh”) into unshareable bodies whose now shameful “privacy” must be hid behind a bloody rather than bloodless veil. The blood is the sign of always threatening civil war, whether murder between brothers, feuds within tribes, or later, war between nations. The scarlet thread of blood tying the entire Bible together, Old and New Testament, reminds us that however far our loves are pushed out beyond our private body to family, tribe or nation, they remain irrational because unshareable. Only by loving the creator God who first loved us, can we rationally love anything of our own, but it must be loved as gift rather than as a possession. Such a love renders all bodies and nations truly shareable, and achieving this shareability is the paradoxical plot of the Bible, wherein the Word becomes flesh in a particular body amidst a particular people and nation. Yet even with His own nation and His own Son, this Lord is not “partial” and demands justice towards widows, orphans, and sojourners, because the irrational love of only our own can become rational solely through the resurrection of this particular body, king of this particular nation and these particular people. His body, along with all other bodies, can thus now retain their particular wounds and history, while yet remaining shareable. Likewise, all nations will share in the nation of Israel, in the same way all distinct languages will share an understanding through the inner rational word that we see illustrated in Pentecost. Without the resurrection, however, this shareability of bodies and nations remains merely a useful fiction, as Plato saw, and the equally fictitious “rationality” of some sort of deductive universalism will not go away. Reading Scripture in terms of Plato’s “irrational love of one’s own” therefore raises questions for both a Protestant and Catholic understanding of nations, questions that neither can answer adequately without this philosophical and exegetical attention.Keywords: body private, nations, shareability, body politic
Procedia PDF Downloads 9411304 Instructional Consequences of the Transiency of Spoken Words
Authors: Slava Kalyuga, Sujanya Sombatteera
Abstract:
In multimedia learning, written text is often transformed into spoken (narrated) text. This transient information may overwhelm limited processing capacity of working memory and inhibit learning instead of improving it. The paper reviews recent empirical studies in modality and verbal redundancy effects within a cognitive load framework and outlines conditions under which negative effects of transiency may occur. According to the modality effect, textual information accompanying pictures should be presented in an auditory rather than visual form in order to engage two available channels of working memory – auditory and visual - instead of only one of them. However, some studies failed to replicate the modality effect and found differences opposite to those expected. Also, according to the multimedia redundancy effect, the same information should not be presented simultaneously in different modalities to avoid unnecessary cognitive load imposed by the integration of redundant sources of information. However, a few studies failed to replicate the multimedia redundancy effect too. Transiency of information is used to explain these controversial results.Keywords: cognitive load, transient information, modality effect, verbal redundancy effect
Procedia PDF Downloads 38211303 Passengers’ Behavior Analysis under the Public Transport Disruption: An Agent-Based Simulation
Abstract:
This paper study the travel behavior of passengers in a public transport disruption under information provision strategies. We develop a within-day approach for multi-agent simulation to evaluate the behavior of the agents, under comprehensive scenarios through various information exposure, equilibrium, and non-equilibrium scenarios. In particular, we quantify the effects of information strategies in disruption situation on passengers’ satisfaction, number of involved agents, and the caused delay. An agent-based micro-simulation model (MATSim) is applied for the city of Zürich, Switzerland, for the purpose of activity-based simulation in a multimodal network. Statistic outcome is analysed for all the agents who may be involved in the disruption. Agents’ movement in the public transport network illustrates agents’ adaptations to available information about the disruption. Agents’ delays and utility reveal that information significantly affects agents’ satisfaction and delay in public transport disruption. Besides, while the earlier availability of the information causes the fewer consequent delay for the involved agents, however, it also leads to more amount of affected agents.Keywords: agent-based simulation, disruption management, passengers’ behavior simulation, public transport
Procedia PDF Downloads 15611302 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS
Authors: Ali Riza Perçin, Eser Bingül
Abstract:
Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.Keywords: social media, "generation Y", terrorist organization, islamic state IS
Procedia PDF Downloads 42911301 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 31111300 Demand of Media and Information for the Public Relation Media for Local Learning Resource Salaya, Nakhon Pathom
Authors: Patsara Sirikamonsin, Sathapath Kilaso
Abstract:
This research aims to study the media and information demand for public relations in Salaya, Nakhonpathom. The research objectives are: 1. to research on conflicts of communication and seeking solutions and improvements of media information in Salaya, Nakhonpathom; 2. to study about opinions and demand for media information to reach out the improvements of people communications among Salaya, Nakhonpathom; 3. to explore the factors related to relationship and behaviors on obtaining media information for public relations among Salaya, Nakhonpathom. The research is conducted by questionnaire which is interpreted by statistical analysis concluding with analysis, frequency, percentage, average and standard deviations. The research results demonstrate: 1. The conflicts of communications among Salaya, Nakhonpathom are lacking equipment and technological knowledge and public relations. 2. Most people have demand on media improvements for vastly broadcasting public relations in order to nourish the social values. This research intentionally is to create the infographic media which are easily accessible, uncomplicated and popular, in the present.Keywords: media and information, the public relation printed media, local learning resource
Procedia PDF Downloads 16311299 Review of Assessment of Integrated Information System (IIS) in Organisation
Authors: Mariya Salihu Ingawa, Sani Suleiman Isah
Abstract:
The assessment of Integrated Information System (IIS) in organisation is an important initiative to enable the Information System (IS) managers, as well as top management to understand the success status of their investment in IS integration efforts. However, without a proper assessment, an organisation will not know its IIS status, which may affect their judgment on what action should be taken onwards. Current research on IIS assessment is lacking and those related literature on IIS assessment focus more on assessing the technical aspect of IIS. It is argued that assessing technical aspect alone is inadequate since organisational and strategic aspects in IIS should also be considered. Current methods, techniques and tools used by vendors for IIS assessment also are lack of comprehensive measures to fully assess the Integrated Information System in term of technical, organisational and strategic domains. The purpose of this study is to establish critical success factors for measuring success of an Integrated Information System. These factors are used as the basis for constructing an approach to comprehensively assess IIS in an organisation. A comprehensive list of success factors for IIS assessment, established from literature, was initially presented. An expert surveys using both manual and online methods were conducted to verify the factors. Based on the factors, an instrument for IIS assessment was constructed. The results from a case study indicate that through comprehensive assessment approach, not only the level of success been known, but also reveals the contributing factors. This research contributes to the field of Information Systems specifically in the area of Integrated Information System assessment.Keywords: integrated information system, expert surveys, organisation, assessment
Procedia PDF Downloads 39111298 Software Quality Promotion and Improvement through Usage of a PSP Oriented Information System
Authors: Gaoussou Doukoure Abdel Kader, Mnkandla Ernest
Abstract:
This research aims to investigate the usage of a personal software process oriented information system in order to facilitate the promotion of software quality and its improvement in organizations. In this light, at the term of a literature review on software quality and related concepts, the personal software process is discussed, more particularly in terms of software quality. Semi-structured interviews will be conducted with a team of software engineers on the first hand to establish a baseline on their understanding of what quality entails for them. The PSP methodology will then be presented to the engineers in its most basic aspects. The research will then proceed to practical case study where a PSP oriented information system is submitted to engineers for usage throughout their development process. Reports from the PSP information system as well as feedback from the engineers will be used in conjunction with the theoretical foundation to establish a PSP inspired framework for software quality promotion and improvement.Keywords: information communication technology, personal software process, software quality, process quality, software engineering
Procedia PDF Downloads 50111297 Computer Self-Efficacy, Study Behaviour and Use of Electronic Information Resources in Selected Polytechnics in Ogun State, Nigeria
Authors: Fredrick Olatunji Ajegbomogun, Bello Modinat Morenikeji, Okorie Nancy Chituru
Abstract:
Electronic information resources are highly relevant to students' academic and research needs but are grossly underutilized, despite the institutional commitment to making them available. The under-utilisation of these resources could be attributed to a low level of study behaviour coupled with a low level of computer self-efficacy. This study assessed computer self-efficacy, study behaviour, and the use of electronic information resources by students in selected polytechnics in Ogun State. A simple random sampling technique using Krejcie and Morgan's (1970) Table was used to select 370 respondents for the study. A structured questionnaire was used to collect data on respondents. Data were analysed using frequency counts, percentages, mean, standard deviation, Pearson Product Moment Correlation (PPMC) and multiple regression analysis. Results reveal that the internet (= 1.94), YouTube (= 1.74), and search engines (= 1.72) were the common information resources available to the students, while the Internet (= 4.22) is the most utilized resource. Major reasons for using electronic information resources were to source materials and information (= 3.30), for research (= 3.25), and to augment class notes (= 2.90). The majority (91.0%) of the respondents have a high level of computer self-efficacy in the use of electronic information resources through selecting from screen menus (= 3.12), using data files ( = 3.10), and efficient use of computers (= 3.06). Good preparation for tests (= 3.27), examinations (= 3.26), and organization of tutorials (= 3.11) are the common study behaviours of the respondents. Overall, 93.8% have good study behaviour. Inadequate computer facilities to access information (= 3.23), and poor internet access (= 2.87) were the major challenges confronting students’ use of electronic information resources. According to the PPMC results, study behavior (r = 0.280) and computer self-efficacy (r = 0.304) have significant (p 0.05) relationships with the use of electronic information resources. Regression results reveal that self-efficacy (=0.214) and study behavior (=0.122) positively (p 0.05) influenced students' use of electronic information resources. The study concluded that students' use of electronic information resources depends on the purpose, their computer self-efficacy, and their study behaviour. Therefore, the study recommended that the management should encourage the students to improve their study habits and computer skills, as this will enhance their continuous and more effective utilization of electronic information resources.Keywords: computer self-efficacy, study behaviour, electronic information resources, polytechnics, Nigeria
Procedia PDF Downloads 12911296 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 9111295 Prioritizing the Most Important Information from Contractors’ BIM Handover for Firefighters’ Responsibilities
Authors: Akram Mahdaviparsa, Tamera McCuen, Vahideh Karimimansoob
Abstract:
Fire service is responsible for protecting life, assets, and natural resources from fire and other hazardous incidents. Search and rescue in unfamiliar buildings is a vital part of firefighters’ responsibilities. Providing firefighters with precise building information in an easy-to-understand format is a potential solution for mitigating the negative consequences of fire hazards. The negative effect of insufficient knowledge about a building’s indoor environment impedes firefighters’ capabilities and leads to lost property. A data rich building information modeling (BIM) is a potentially useful source in three-dimensional (3D) visualization and data/information storage for fire emergency response. Therefore, this research’s purpose is prioritizing the required information for firefighters from the most important information to the least important. A survey was carried out with firefighters working in the Norman Fire Department to obtain the importance of each building information item. The results show that “the location of exit doors, windows, corridors, elevators, and stairs”, “material of building elements”, and “building data” are the three most important information specified by firefighters. The results also implied that the 2D model of architectural, structural and way finding is more understandable in comparison with the 3D model, while the 3D model of MEP system could convey more information than the 2D model. Furthermore, color in visualization can help firefighters to understand the building information easier and quicker. Sufficient internal consistency of all responses was proven through developing the Pearson Correlation Matrix and obtaining Cronbach’s alpha of 0.916. Therefore, the results of this study are reliable and could be applied to the population.Keywords: BIM, building fire response, ranking, visualization
Procedia PDF Downloads 13611294 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone
Authors: R. Bernaoui, P. Ohly
Abstract:
Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.Keywords: algeria, breeder-veterinarian, digital heritage, networking
Procedia PDF Downloads 12511293 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings
Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush
Abstract:
It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.Keywords: internet of things, building information modeling, facilities management, structural health monitoring
Procedia PDF Downloads 21411292 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 32711291 The Combined Effect of the Magnetic Field and Ammonium Chlorides on Deposits Zn-Ni Obtained in Different Conditions
Authors: N.Benachour, S. Chouchane, J. P. Chopart
Abstract:
The zinc-nickel deposition on stainless steel substrate was obtained in a chloride bath composed of ZnCl2 (1.8M), NiCl2.6H2O (1.1M), boric acid H3BO3 (1M) and NH4Cl (4M). One configuration was studied the amplitude or field B (0.5 et1T) is parallel to the surface of the working electrodes .the other share the study of various layer was carried out by XRD. The study of the effect of ammonium chloride in combination with the magnetohydrodynamic effect gave several deposits supposedly good physical properties.Keywords: ammonium chloride, magnetic field, nickel-zinc alloys, co-deposition
Procedia PDF Downloads 27811290 A Systematic Review on Challenges in Big Data Environment
Authors: Rimmy Yadav, Anmol Preet Kaur
Abstract:
Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.Keywords: big data, privacy, data management, network and energy consumption
Procedia PDF Downloads 31411289 Young People’s Participation in Decision-Making Using Information and Communication Technology
Authors: Marina Diković
Abstract:
By giving personal opinions, suggestions and criticism through e-democracy, young people can reinforce the adoption of decisions which they have an impact on. The purpose of this research was to examine the opinion of university students about the possibility of their decision-making by using information and communication technology (ICT). The questionnaire examined young people's values and behaviour associated with e-democracy and the related decision-making. Students are most active online when it comes to finding information connected with their academic responsibilities, but less frequently take part in democratic processes in society, both at the national and local level. E-democracy as a tool can be learned in programmes of Human Rights Education and Citizenship Education.Keywords: active citizens, e-democracy, information and communication technology (ICT), university students
Procedia PDF Downloads 22911288 Exploring the Effect of Accounting Information on Systematic Risk: An Empirical Evidence of Tehran Stock Exchange
Authors: Mojtaba Rezaei, Elham Heydari
Abstract:
This paper highlights the empirical results of analyzing the correlation between accounting information and systematic risk. This association is analyzed among financial ratios and systematic risk by considering the financial statement of 39 companies listed on the Tehran Stock Exchange (TSE) for five years (2014-2018). Financial ratios have been categorized into four groups and to describe the special features, as representative of accounting information we selected: Return on Asset (ROA), Debt Ratio (Total Debt to Total Asset), Current Ratio (current assets to current debt), Asset Turnover (Net sales to Total assets), and Total Assets. The hypotheses were tested through simple and multiple linear regression and T-student test. The findings illustrate that there is no significant relationship between accounting information and market risk. This indicates that in the selected sample, historical accounting information does not fully reflect the price of stocks.Keywords: accounting information, market risk, systematic risk, stock return, efficient market hypothesis, EMH, Tehran stock exchange, TSE
Procedia PDF Downloads 13911287 Gender Supportive Systems-Key to Good Governance in Agriculture: Challenges and Strategies
Authors: Padmaja Kaja, Kiran Kumar Gellaboina
Abstract:
A lion’s share of agricultural work is contributed by women in India as it is the case in many developing countries, yet women are not securing the pride as a farmer. Many policies are supporting women empowerment in India, especially in agriculture sector considering the importance of sustainable food security. However these policies many times failed to achieve the targeted results of mainstreaming gender. Implementing the principles of governance would lead to gender equality in agriculture. This paper deals with the social norms and obligations prevailed with reference to Indian context which abstain women from having resources. This paper is formulated by using primary research done in eight districts of Telangana and Andhra Pradesh states of India supported by secondary research. Making amendments to Hindu Succession Act in united Andhra Pradesh much prior to the positioning of the amended act in the whole country lead to a better land holding a share of women in Andhra Pradesh. The policies like registering government distributed lands in the name of women in the state also have an added value. However, the women participation in decision-making process in agriculture is limited in elite families when compared to socially under privileged families, further too it was higher in drought affected districts like Mahbubnagar in Telangana when compared to resource-rich East Godavari district in Andhra Pradesh. Though National Gender Resource Centre for Agriculture (NGRCA) at centre and Gender Cells in the states were established a decade ago, extension reach to the women farmers is still lagging behind. Capturing the strength of women self groups in India especially in Andhra Pradesh to link up with agriculture extension might improve the extension reach of women farmers. Maintenance of micro level women data sets, creating women farmers networks with government departments like agriculture, irrigation, revenue and formal credit institutes would result in good governance to mainstream gender in agriculture. Further to add that continuous monitoring and impact assessments of the programmes and projects for gender inclusiveness would reiterate the government efforts.Keywords: food security, gender, governance, mainstreaming
Procedia PDF Downloads 25311286 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 5211285 Library Anxiety among Library and Information Science Students at Khushal Khan Khattak University Karak, Pakistan: A Bostick Approach
Authors: Saeed Ullah Jan, Shafaq, Sumbul
Abstract:
Anxiety is one of the most common emotions and is a normal reaction to danger or a threat. It is a normal reaction to stress and can be beneficial in some situations. It can alert us to dangers and help us prepare and pay attention. The prime aim of this study was to examine the level of anxiety of Library and Information Science students at the Department of Library and Information Science, Khushal Khan Khattak University Karak. A survey method was used for the completion of this study. The response of male respondents was better than female LIS students at the Department of Library and Information Science, Khushal Khan Khattak University Karak. The librarians should have to focus on the information needs of the university students. Special training needs to be arranged for female students to improve their library usage and readership rate.Keywords: library-anxiety, library anxiety-students, library anxiety -students-Pakistan, stress
Procedia PDF Downloads 19611284 Managing Change in the Academic Libraries in the Perspective of Web 2.0
Authors: Raj Kumar, Navjyoti Dhingra
Abstract:
Academic libraries are the hubs in which knowledge is a major resource and the performances of these knowledge in terms of adding and delivering value to their users depend upon their ability and effectiveness in engendering, arranging, managing, and using this knowledge. Developments in Information and Communication Technology’s (ICT), the libraries have been incorporated at the electronic edge to facilitate a rapid transfer of information on a global scale. Web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. Web 2.0 reflects changes in how one can use the web rather than describing any technical or structural change. Libraries provide manifold channels of Information access to its e-users. The rapid expansion of tools, formats, services and technologies has presented many options to unfold Library Collection. Academic libraries must develop ways and means to meet their user’s expectations and remain viable. Web 2.0 tools are the first step on that journey. Web 2.0 has been widely used by the libraries to promote functional services like access to catalogue or for external activities like information or photographs of library events, enhancement of usage of library resources and bringing users closer to the library. The purpose of this paper is to provide a reconnaissance of Web 2.0 tools for enhancing library services in India. The study shows that a lot of user-friendly tools can be adopted by information professionals to effectively cater to information needs of its users. The authors have suggested a roadmap towards a revitalized future for providing various information opportunities to techno-savvy users.Keywords: academic libraries, change management, social media, Web 2.0
Procedia PDF Downloads 21511283 Artificial Intelligence in Enterprise Information Systems: A Review
Authors: Danah S. Alabdulmohsin
Abstract:
Due to the fast growth of organizational data as well as the emergence of new technologies such as artificial intelligence (AI), organizations tend to utilize these new technologies in their enterprise information systems (EIS) either to overcome the issues they struggle with or to enhance their functions. The aim of this paper is to review the potential role of AI technologies in EIS, namely: enterprise resource planning systems (ERP), customer relation management systems (CRM), supply chain management systems (SCM), knowledge systems (KM), and human resources management systems (HRM). The paper provided the definitions of these systems as well as the definitions of AI technologies that have been used in EIS. In addition, the paper discussed the challenges that organizations might face while integrating AI with their information systems and explained why some organizations fail in achieving successful implementations of the integration.Keywords: artificial intelligence, AI, enterprise information system, EIS, integration
Procedia PDF Downloads 100