Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27245

Search results for: healthcare data security

21425 Degradation of Chlorpyrifos Pesticide in Aqueous Solution and Chemical Oxygen Demand from Real Effluent with Hydrodynamic Cavitation Approach

Authors: Shrikant Randhavane, Anjali Khambete

Abstract:

Use of Pesticides is vital in attaining food security and protection from harmful pests and insects in living environment. Chlorpyrifos, an organophosphate pesticide is widely used worldwide for various purposes. Due to its wide use and applications, its residues are found in environmental matrices and persist in nature for long duration of time. This has an adverse effect on human, aquatic and living bodies. Use of different methodologies is need of an hour to treat such type of recalcitrant compound. The paper focuses on Hydrodynamic Cavitation (HC), a hybrid Advanced Oxidation Potential (AOP) method to degrade Chlorpyrifos in aqueous water. Obtained results show that optimum inlet pressure of 5 bars gave maximum degradation of 99.25% for lower concentration and 87.14% for higher concentration Chlorpyrifos solution in 1 hour treatment time. Also, with known initial concentrations, comparing treatment time with optimum pressure of 5 bars, degradation efficiency increases with Hydrodynamic Cavitation. The potential application of HC in removal of Chemical Oxygen Demand (COD) from real effluent with venturi as cavitating device reveals around 40% COD removal with 1 hour of treatment time.

Keywords: advanced oxidation potential, cavitation, chlorpyrifos, COD

Procedia PDF Downloads 214
21424 The Experimental and Modeling Adsorption Properties of Sr2+ on Raw and Purified Bentonite

Authors: A. A. Khodadadi, S. C. Ravaj, B. D. Tavildari, M. B. Abdolahi

Abstract:

The adsorption properties of local bentonite (Semnan Iran) and purified prepared from this bentonite towards Sr2+ adsorption, were investigated by batch equilibration. The influence of equilibration time, adsorption isotherms, kinetic adsorption, solution pH, and presence of EDTA and NaCl on these properties was studied and discussed. Kinetic data were found to be well fitted with a pseudo-second order kinetic model. Sr2+ is preferably adsorbed by bentonite and purified bentonite. The D-R isotherm model has the best fit with experimental data than other adsorption isotherm models. The maximum adsorption of Sr2+ representing the highest negative charge density on the surface of the adsorbent was seen at pH 12. Presence of EDTA and NaCl decreased the amount of Sr2+ adsorption.

Keywords: bentonite, purified bentonite, Sr2+, equilibrium isotherm, kinetics

Procedia PDF Downloads 372
21423 Teacher Trainers’ Motivation in Transformation of Teaching and Learning: The Fun Way Approach

Authors: Malathi Balakrishnan, Gananthan M. Nadarajah, Noraini Abd Rahim, Amy Wong On Mei

Abstract:

The purpose of the study is to investigate the level of intrinsic motivation of trainers after attending a Continuous Professional Development Course (CPD) organized by Institute of Teacher Training Malaysia titled, ‘Transformation of Teaching and Learning the Fun Way’. This study employed a survey whereby 96 teacher trainers were given Situational Intrinsic Motivational Scale (SIMS) Instruments. Confirmatory factor analysis was carried out to get validity of this instrument in local setting. Data were analyzed with SPSS for descriptive statistic. Semi structured interviews were also administrated to collect qualitative data on participants experiences after participating in the two-day fun-filled program. The findings showed that the participants’ level of intrinsic motivation showed higher mean than the amotivation. The results revealed that the intrinsic motivation mean is 19.0 followed by Identified regulation with a mean of 17.4, external regulation 9.7 and amotivation 6.9. The interview data also revealed that the participants were motivated after attending this training program. It can be concluded that this program, which was organized by Institute of Teacher Training Malaysia, was able to enhance participants’ level of motivation. Self-Determination Theory (SDT) as a multidimensional approach to motivation was utilized. Therefore, teacher trainers may have more success using the ‘The fun way approach’ in conducting training program in future.

Keywords: teaching and learning, motivation, teacher trainer, SDT

Procedia PDF Downloads 455
21422 Involvement of Community Pharmacists in Public Health Services in Asir Region, Saudi Arabia: A Cross-Sectional Study

Authors: Mona Almanasef, Dalia Almaghaslah, Geetha Kandasamy, Rajalakshimi Vasudevan, Sadia Batool

Abstract:

Background: Community pharmacists are one of the most accessible healthcare practitioners worldwide and their services are used by a large proportion of the population. Expanding the roles of community pharmacists could contribute to reducing pressure on general health practice and other areas of health services. This research aimed to evaluate the contribution of community pharmacists in the provision of public health services and to investigate the perceived barriers to the provision of these services in Saudi Arabia. Materials and Methods: This study followed a cross-sectional design using an online anonymous self-administered questionnaire. The study took place in the Asir region, Saudi Arabia, between September 2019 and February 2020. A convenience sampling strategy was used to select and recruit the study participants. The questionnaire was adapted from previous research and involved three sections: demographics, involvement in public health services and barriers to practicing public health roles. Results: The total number of respondents was 193. The proportion of respondents who reported that they were “very involved” or “involved” in each service was 61.7% for weight management, 60.6% for sexual health, 57.5% for healthy eating, 53.4% for physical activity promotion, 51.3% for dental health, 46.1% for smoking cessation, 39.4% for screening for diabetes, 35.7% for screening for hypertension, 31.1% for alcohol dependence and drug misuse counseling, 30.6% for screening for dyslipidaemia, and 21.8% for vaccination and immunization. Most of the barriers in the current research were rated as having low relevance to the provision of public health services. Conclusion: Findings in the current research suggest that community pharmacists in the Asir region have varying levels of involvement in public health roles. Further research needs to be undertaken to understand the barriers to the provision of public health services and what strategies would be beneficial for enhancing the public health role of community pharmacists in Saudi Arabia.

Keywords: community pharmacist, public health, Asir region, Saudi Arabia

Procedia PDF Downloads 95
21421 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 514
21420 Islam, Forced Marriages and Pakistani Culture: An Analytical Overview

Authors: Naseem Akhter, Rozina Khattak, Arshad Munir

Abstract:

The Islamic social and family system is very clear concerning will, choice, consent and negation of compulsion and force in human life. Marriage is not only a civil contract but also a religious and spiritual contract between spouse (man and woman), which allows them for each other to live gladly, joyfully and legally in the society. It is an immortal and perpetual association between man and woman, which is filled with sympathetic affection, kindness, compassion and security. Islam gives specific rights to parents and guardians to set up the marriage ceremony and get done it as a respectful family occasion, confer their blessing and advice for a life partner of their children. The rights of parents and guardians are summed up in the term of "Willayah”. Islam does not permit parents, guardians and other relatives to compel their children regarding the marriage of their choice, because the groom and the bride are the real parties of the contract. Therefore, their willingness is of prime importance in order to spend whole life with each other. The Holy Prophet (peace and blessings of Allah be upon him) prohibits forcing a virgin to marriage without her permission, whether this is her father or someone else. The right of free consent to choose a life partner is the basic right for the human which is God (Allah) gifted. Unfortunately, forced marriage is a common practice in Pakistani society that has no link with Islam. This article is being written in the same context.

Keywords: choice, consent, forced marriage, Islam, parents, spouse

Procedia PDF Downloads 312
21419 A Clustering-Based Approach for Weblog Data Cleaning

Authors: Amine Ganibardi, Cherif Arab Ali

Abstract:

This paper addresses the data cleaning issue as a part of web usage data preprocessing within the scope of Web Usage Mining. Weblog data recorded by web servers within log files reflect usage activity, i.e., End-users’ clicks and underlying user-agents’ hits. As Web Usage Mining is interested in End-users’ behavior, user-agents’ hits are referred to as noise to be cleaned-off before mining. Filtering hits from clicks is not trivial for two reasons, i.e., a server records requests interlaced in sequential order regardless of their source or type, website resources may be set up as requestable interchangeably by end-users and user-agents. The current methods are content-centric based on filtering heuristics of relevant/irrelevant items in terms of some cleaning attributes, i.e., website’s resources filetype extensions, website’s resources pointed by hyperlinks/URIs, http methods, user-agents, etc. These methods need exhaustive extra-weblog data and prior knowledge on the relevant and/or irrelevant items to be assumed as clicks or hits within the filtering heuristics. Such methods are not appropriate for dynamic/responsive Web for three reasons, i.e., resources may be set up to as clickable by end-users regardless of their type, website’s resources are indexed by frame names without filetype extensions, web contents are generated and cancelled differently from an end-user to another. In order to overcome these constraints, a clustering-based cleaning method centered on the logging structure is proposed. This method focuses on the statistical properties of the logging structure at the requested and referring resources attributes levels. It is insensitive to logging content and does not need extra-weblog data. The used statistical property takes on the structure of the generated logging feature by webpage requests in terms of clicks and hits. Since a webpage consists of its single URI and several components, these feature results in a single click to multiple hits ratio in terms of the requested and referring resources. Thus, the clustering-based method is meant to identify two clusters based on the application of the appropriate distance to the frequency matrix of the requested and referring resources levels. As the ratio clicks to hits is single to multiple, the clicks’ cluster is the smallest one in requests number. Hierarchical Agglomerative Clustering based on a pairwise distance (Gower) and average linkage has been applied to four logfiles of dynamic/responsive websites whose click to hits ratio range from 1/2 to 1/15. The optimal clustering set on the basis of average linkage and maximum inter-cluster inertia results always in two clusters. The evaluation of the smallest cluster referred to as clicks cluster under the terms of confusion matrix indicators results in 97% of true positive rate. The content-centric cleaning methods, i.e., conventional and advanced cleaning, resulted in a lower rate 91%. Thus, the proposed clustering-based cleaning outperforms the content-centric methods within dynamic and responsive web design without the need of any extra-weblog. Such an improvement in cleaning quality is likely to refine dependent analysis.

Keywords: clustering approach, data cleaning, data preprocessing, weblog data, web usage data

Procedia PDF Downloads 167
21418 Vocational and Technical Education: A Practical Approach to Reducing Insecurity in Nigeria

Authors: S. S. Amoor

Abstract:

Insecurity is becoming a major tool in the hand of Nigeria’s enemies to increase poverty and hatred among the citizens and split the county into several political segments. It is based on this background that this paper critically examines Vocational and Technical Education as a practical and realistic approach to reducing insecurity in Nigeria so as to save the country from total disintegration. The paper discusses the concept of insecurity, types, causes and effects of insecurity, and how vocational and technical education and its variables are fundamental and practical measures to reducing insecurity in Nigeria. The paper concludes that the large army of unemployed and unskilled youths in Nigeria requires immediate attention in the area of provision of marketable vocational and technical skills, creativity and competences that will prepare them for employment or self-reliance. It is hoped that government jobs or self-employment will keep the teeming youths busy and therefore take their minds away from odd jobs that threaten the security of the country. In line with these, the paper recommends, among others, that since the teeming unemployed and unskilled youths are mostly from the rural areas, the state governments in collaboration with the local governments should take appropriate steps to provide the youths with vocational skills in carpentry, fashion designing, hair-dressing, driving, welding, mechanical works, among others. Once the youths are involved in one skilled trade or the other, insecurity would be reduced.

Keywords: vocational and technical education, insecurity, practical approach to reducing insecurity, unemployment

Procedia PDF Downloads 126
21417 A Qualitative South African Study on Exploration of the Moral Identity of Nurses

Authors: Yolanda Havenga

Abstract:

Being a competent nurse requires clinical, general, and moral competencies. Moral competence is a culmination of moral perceptions, moral judgment, moral behaviour, and moral identity. Moral identity is the values, images, and fundamental principles held in the collective minds and memories of nurses about what it means to be a ‘good nurse’. It is important to explore and describe South African nurses’ moral identities and excavate the post-colonial counter-narrative to nurses moral identities as a better understanding of these identities will enable means to positively address nurses’ moral behaviours. This study explored the moral identity of nurses within the South African context. A qualitative approach was followed triangulating with phenomenological and narrative designs with the same purposively sampled group of professional nurses. In-depth interviews were conducted until saturation of data occurred about the sampled nurses lived experiences of being a nurse in South Africa. They were probed about their core personal-, social-, and professional values. Data were analysed based on the steps used by Colaizzi. These nurses were then asked to write a narrative telling a personal story that portrayed a significant time in their professional career that defines their identity as a nurse. This data were analysed using a critical narrative approach and findings of the two sets of data were merged. Ethical approval was obtained and approval from all relevant gate keepers. In the findings, themes emerged related to personal, social and professional values, images and fundamental principles of being a nurse within the South African context. The findings of this study will inform a future national study including a representative sample of South African nurses.

Keywords: moral behaviour, moral identity, nurses, qualitative research

Procedia PDF Downloads 278
21416 Developing Measurement Instruments for Enterprise Resources Planning (ERP) Post-Implementation Failure Model

Authors: Malihe Motiei, Nor Hidayati Zakaria, Davide Aloini

Abstract:

This study aims to present a method to develop the failure measurement model for ERP post-implementation. To achieve this outcome, the study firstly evaluates the suitability of Technology-Organization-Environment framework for the proposed conceptual model. This study explains how to discover the constructs and subsequently to design and evaluate the constructs as formative or reflective. Constructs are used including reflective and purely formative. Then, the risk dimensions are investigated to determine the instruments to examine the impact of risk on ERP failure after implementation. Two construct as formative constructs consist inadequate implementation and poor organizational decision making. Subsequently six construct as reflective construct include technical risks, operational risks, managerial risks, top management risks, lack of external risks, and user’s inefficiency risks. A survey was conducted among Iranian industries to collect data. 69 data were collected from manufacturing sectors and the data were analyzed by Smart PLS software. The results indicated that all measurements included 39 critical risk factors were acceptable for the ERP post-implementation failure model.

Keywords: critical risk factors (CRFs), ERP projects, ERP post-implementation, measurement instruments, ERP system failure measurement model

Procedia PDF Downloads 357
21415 Athlete’s Preparation and Quality of Opponent as Determinants of Self-Efficacy among University Athletes in South-West Nigeria

Authors: Raimi Abiodun Moronfolu, Anthonia Olusola Moronfolu

Abstract:

The purpose of this study was to assess athlete’s preparation and quality of opponent as determinants of self-efficacy among university athletes in south-west Nigeria. The descriptive research method was employed in conducting the study. A total of 200 athletes, selected from 4 universities in South-West geopolitical zone of Nigeria through a stratified random sampling technique, were used in the study. The instrument used for data collection was a self-structured questionnaire named ‘Athletes Self-Efficacy Assessment Questionnaire (ASAQ)’. This was developed by the researchers and face validated by three experts in sports psychology. The test-retest method was used in establishing the reliability of the instrument (r=0.79). A total of 200 copies of the validated ASAQ were administered on selected respondents using the spot method. The data collected was used to develop a frequency distribution table for analysis. The descriptive statistics of percentage was used in presenting the data collected, while inferential statistics of linear regression was used in drawing inferences at a 0.05 level of significance. The findings indicated that athlete’s preparation and quality of opponent were significant determinants of self-efficacy among university athletes in South-West Nigeria.

Keywords: athletes, preparation, opponent, self-efficacy

Procedia PDF Downloads 129
21414 Utilization of Cervical Cancer Screening Among HIV Infected Women in Nairobi, Kenya

Authors: E. Njuguna, S. Ilovi, P. Muiruri, K. Mutai, J. Kinuthia, P. Njoroge

Abstract:

Introduction: Cervical cancer is the commonest cause of cancer-related morbidity and mortality among women in developing countries in Sub Saharan Africa. Screening for cervical cancer in all women regardless of HIV status is crucial for the early detection of cancer of the cervix when treatment is most effective in curing the disease. It is particularly more important to screen HIV infected women as they are more at risk of developing the disease and progressing faster once infected with HPV (Human Papilloma Virus). We aimed to determine the factors affecting the utilization of cervical cancer screenings among HIV infected women above 18 years of age at Kenyatta National Hospital (KNH) Comprehensive Care Center (CCC). Materials and Methods: A cross-sectional mixed quantitative and qualitative study involving randomly and purposefully selected HIV positive female respectively was conducted. Qualitative data collection involved 4 focus group discussions of eligible female participants while quantitative data were acquired by one to one interviewer administered structured questionnaires. The outcome variable was the utilization of cervical cancer screening. Data were entered into Access data base and analyzed using Stata version 11.1. Qualitative data were analyzed after coding for significant clauses and transcribing to determine themes arising. Results: We enrolled a total of 387 patients, mean age (IQ range) 40 years (36-44). Cervical cancer screening utilization was 46% despite a health care provider recommendation of 85%. The screening results were reported as normal in 72 of 81 (88.9%) and abnormal 7 of 81(8.6%) of the cases. Those who did not know their result were 2 of 81(2.5%). Patients were less likely to utilize the service with increasing number of years attending the clinic (OR 0.9, 95% CI 0.86-0.99, p-value 0.02), but more likely to utilize the service if recommendation by a staff was made (OR 10, 95% CI 4.2-23.9, p<0.001), and if cervical screening had been done before joining KNH CCC (OR 2.9, 95% CI 1.7-4.9, p < 0.001). Similarly, they were more likely to rate the services on cervical cancer screening as good (OR 5.0, 95% CI 1.7-3.4, p <0.001) and very good (OR 8.1, 95% CI 2.5-6.1, p<0.001) if they had utilized the service. The main barrier themes emerging from qualitative data included fear of screening due to excessive pain or bleeding, lack of proper communication on screening procedures and increased waiting time. Conclusions: Utilization of cervical cancer screening services was low despite health care recommendation. Patient socio-demographic characteristics did not influence whether or not they utilized the services, indicating the important role of the health care provider in the referral and provision of the service.

Keywords: cervical, cancer, HIV, women, comprehensive care center

Procedia PDF Downloads 268
21413 Adsorption Studies of Lead from Aqueos Solutions on Cocount Shell Activated Carbon

Authors: G. E. Sharaf El-Deen, S. E. A. Sharaf El-Deen

Abstract:

Activated carbon was prepared from coconut shell (ACS); a discarded agricultural waste was used to produce bioadsorbent through easy and environmental friendly processes. This activated carbon based biosorbent was evaluated for adsorptive removal of lead from water. The characterisation results showed this biosorbent had very high specific surface area and functional groups. The adsorption equilibrium data was well described by Langmuir, whilst kinetics data by pseudo-first order, pseudo-second order and Intraparticle diffusion models. The adsorption process could be described by the pseudo-second order kinetic.

Keywords: coconut shell, activated carbon, adsorption isotherm and kinetics, lead removal

Procedia PDF Downloads 300
21412 On Periodic Integer-Valued Moving Average Models

Authors: Aries Nawel, Bentarzi Mohamed

Abstract:

This paper deals with the study of some probabilistic and statistical properties of a Periodic Integer-Valued Moving Average Model (PINMA_{S}(q)). The closed forms of the mean, the second moment and the periodic autocovariance function are obtained. Furthermore, the time reversibility of the model is discussed in details. Moreover, the estimation of the underlying parameters are obtained by the Yule-Walker method, the Conditional Least Square method (CLS) and the Weighted Conditional Least Square method (WCLS). A simulation study is carried out to evaluate the performance of the estimation method. Moreover, an application on real data set is provided.

Keywords: periodic integer-valued moving average, periodically correlated process, time reversibility, count data

Procedia PDF Downloads 195
21411 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention

Authors: László Schmidt

Abstract:

Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.

Keywords: cybercrime, COVID-19, Hungary, criminal law

Procedia PDF Downloads 56
21410 The Effect of Socialization Tactics on Job Satisfaction of Employees, Regarding to Personality Types in Tehran University of Medical Science’s Employees

Authors: Maryam Hoorzad, Narges Shokry, Mandan Momeni

Abstract:

According to importance of socialization in effectiveness of organizations and on the other hand assessing the impact of individual differences on socialization tactics by measuring employees satisfaction, can be assessed for each of the personality types which socialization tactics is the more effective. The aim of this paper is to investigate how organizational socialization tactics affect job satisfaction of employees according to personality types. A survey was conducted using a measurement tool based on Van Maanen and Schein’s theory on organizational socialization tactics and Myers Briggs’ measurement tools of personality types. The respondents were employees with more than 3 years backward in Tehran University of Medical Science. Data collection was performed using both library and field, the data collection instrument was questionnaires and data were analysed using the Spss and Lisrel programs. It was found that investiture and serial tactics has a significant effect on employees satisfaction, any increase in investiture and serial tactics led to increase in job satisfaction and any increase in divestiture and disjunctive tactics led to reduction of job satisfaction. Investiture tactic has the most effect on employees satisfaction. Also based on the results, personality types affect the relationship between socialization tactics and job satisfaction. In the ESFJ personality type the effect of investiture tactic on employee satisfaction is the most.

Keywords: organizational socialization, organizational socialization tactics, personality types, job satisfaction

Procedia PDF Downloads 436
21409 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 106
21408 Digital System Design for Strategic Improvement Planning in Education: A Socio-Technical and Iterative Design Approach

Authors: Neeley Current, Fatih Demir, Kenneth Haggerty, Blake Naughton, Isa Jahnke

Abstract:

Educational systems seek reform using data-intensive continuous improvement processes known as strategic improvement plans (SIPs). Schools turn to digital systems to monitor, analyze and report SIPs. One technical challenge of these digital systems focuses on integrating a highly diverse set of data sources. Another challenge is to create a learnable sociotechnical system to help administrators, principals and teachers add, manipulate and interpret data. This study explores to what extent one particular system is usable and useful for strategic planning activities and whether intended users see the benefit of the system achieve the goal of improving workflow related to strategic planning in schools. In a three-phase study, researchers used sociotechnical design methods to understand the current workflow, technology use, and processes of teachers and principals surrounding their strategic improvement planning. Additionally, design review and task analysis usability methods were used to evaluate task completion, usability, and user satisfaction of the system. The resulting socio-technical models illustrate the existing work processes and indicate how and at which places in the workflow the newly developed system could have an impact. The results point to the potential of the system but also indicate that it was initially too complicated for use. However, the diverse users see the potential benefits, especially to overcome the diverse set of data sources, and that the system could fill a gap for schools in planning and conducting strategic improvement plans.

Keywords: continuous improvement process, education reform, strategic improvement planning, sociotechnical design, software development, usability

Procedia PDF Downloads 294
21407 Structural Damage Detection Using Sensors Optimally Located

Authors: Carlos Alberto Riveros, Edwin Fabián García, Javier Enrique Rivero

Abstract:

The measured data obtained from sensors in continuous monitoring of civil structures are mainly used for modal identification and damage detection. Therefore when modal identification analysis is carried out the quality in the identification of the modes will highly influence the damage detection results. It is also widely recognized that the usefulness of the measured data used for modal identification and damage detection is significantly influenced by the number and locations of sensors. The objective of this study is the numerical implementation of two widely known optimum sensor placement methods in beam-like structures

Keywords: optimum sensor placement, structural damage detection, modal identification, beam-like structures.

Procedia PDF Downloads 426
21406 Factors Affecting Green Consumption Behaviors of the Urban Residents in Hanoi, Vietnam

Authors: Phan Thi Song Thuong

Abstract:

This paper uses data from a survey on the green consumption behavior of Hanoi residents in October 2022. Data was gathered from a survey conducted in ten districts in the center of Hanoi, with 393 respondents. The hypothesis focuses on understanding the factors that may affect green consumption behavior, such as demographic characteristics, concerns about the environment and health, people living around, self-efficiency, and mass media. A number of methods, such as the T-test, exploratory factor analysis, and a linear regression model, are used to prove the hypotheses. Accordingly, the results show that gender, age, and education level have separate effects on the green consumption behavior of respondents.

Keywords: green consumption, urban residents, environment, sustainable, linear regression

Procedia PDF Downloads 123
21405 Outbound Tourism in Developed Countries: Analysis of the Trends, Behavior and the Transformation of the Moroccan Demand for International Travels

Authors: M. Boukhrouk, R. Ed-Dali

Abstract:

Outbound tourism in Morocco, as in the majority of developing countries, reveals some of the aspects of inequality between the north and the south. Considered by some researchers as one of the facets of the development crisis, access to tourism and especially international tourism is a chance for a small minority with financial means, while the vast portions of the population dream rather of immigrating to a developed country for the sake of improving their standard of living. The right to travel is also limited by visa requirements, procedures in host countries, security and technical measures and creates discrimination in the practice of tourism. These conditions do not seem to be favorable to the democratization of the practice of international tourism for the populations of the southern countries. This paper is a contribution to the reading of the trends of outbound tourism in developing countries through the example of Morocco. It highlights the different aspects of Moroccan outbound tourism, destinations and the behavior of tourists through an analysis of the offer of a sample of 50 travel agencies. In the same vein, it offers a reading grid of the possibilities offered for the development of outbound tourism and the various existing obstacles to the democratization of international outbound tourism in the southern countries. This reading reveals the transformation in the behavior of Moroccan international tourists as well as the profound changes in Moroccan society, through a model of statistical analysis.

Keywords: demand, Hajj, Morocco, outbound tourism, tendency, Umrah

Procedia PDF Downloads 172
21404 The Use of Boosted Multivariate Trees in Medical Decision-Making for Repeated Measurements

Authors: Ebru Turgal, Beyza Doganay Erdogan

Abstract:

Machine learning aims to model the relationship between the response and features. Medical decision-making researchers would like to make decisions about patients’ course and treatment, by examining the repeated measurements over time. Boosting approach is now being used in machine learning area for these aims as an influential tool. The aim of this study is to show the usage of multivariate tree boosting in this field. The main reason for utilizing this approach in the field of decision-making is the ease solutions of complex relationships. To show how multivariate tree boosting method can be used to identify important features and feature-time interaction, we used the data, which was collected retrospectively from Ankara University Chest Diseases Department records. Dataset includes repeated PF ratio measurements. The follow-up time is planned for 120 hours. A set of different models is tested. In conclusion, main idea of classification with weighed combination of classifiers is a reliable method which was shown with simulations several times. Furthermore, time varying variables will be taken into consideration within this concept and it could be possible to make accurate decisions about regression and survival problems.

Keywords: boosted multivariate trees, longitudinal data, multivariate regression tree, panel data

Procedia PDF Downloads 201
21403 Classification of Red, Green and Blue Values from Face Images Using k-NN Classifier to Predict the Skin or Non-Skin

Authors: Kemal Polat

Abstract:

In this study, it has been estimated whether there is skin by using RBG values obtained from the camera and k-nearest neighbor (k-NN) classifier. The dataset used in this study has an unbalanced distribution and a linearly non-separable structure. This problem can also be called a big data problem. The Skin dataset was taken from UCI machine learning repository. As the classifier, we have used the k-NN method to handle this big data problem. For k value of k-NN classifier, we have used as 1. To train and test the k-NN classifier, 50-50% training-testing partition has been used. As the performance metrics, TP rate, FP Rate, Precision, recall, f-measure and AUC values have been used to evaluate the performance of k-NN classifier. These obtained results are as follows: 0.999, 0.001, 0.999, 0.999, 0.999, and 1,00. As can be seen from the obtained results, this proposed method could be used to predict whether the image is skin or not.

Keywords: k-NN classifier, skin or non-skin classification, RGB values, classification

Procedia PDF Downloads 243
21402 Assessing Significance of Correlation with Binomial Distribution

Authors: Vijay Kumar Singh, Pooja Kushwaha, Prabhat Ranjan, Krishna Kumar Ojha, Jitendra Kumar

Abstract:

Present day high-throughput genomic technologies, NGS/microarrays, are producing large volume of data that require improved analysis methods to make sense of the data. The correlation between genes and samples has been regularly used to gain insight into many biological phenomena including, but not limited to, co-expression/co-regulation, gene regulatory networks, clustering and pattern identification. However, presence of outliers and violation of assumptions underlying Pearson correlation is frequent and may distort the actual correlation between the genes and lead to spurious conclusions. Here, we report a method to measure the strength of association between genes. The method assumes that the expression values of a gene are Bernoulli random variables whose outcome depends on the sample being probed. The method considers the two genes as uncorrelated if the number of sample with same outcome for both the genes (Ns) is equal to certainly expected number (Es). The extent of correlation depends on how far Ns can deviate from the Es. The method does not assume normality for the parent population, fairly unaffected by the presence of outliers, can be applied to qualitative data and it uses the binomial distribution to assess the significance of association. At this stage, we would not claim about the superiority of the method over other existing correlation methods, but our method could be another way of calculating correlation in addition to existing methods. The method uses binomial distribution, which has not been used until yet, to assess the significance of association between two variables. We are evaluating the performance of our method on NGS/microarray data, which is noisy and pierce by the outliers, to see if our method can differentiate between spurious and actual correlation. While working with the method, it has not escaped our notice that the method could also be generalized to measure the association of more than two variables which has been proven difficult with the existing methods.

Keywords: binomial distribution, correlation, microarray, outliers, transcriptome

Procedia PDF Downloads 408
21401 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province

Authors: Poramet Saeng-On

Abstract:

This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.

Keywords: homestay, lodging business, management, standard

Procedia PDF Downloads 438
21400 Computation of Flood and Drought Years over the North-West Himalayan Region Using Indian Meteorological Department Rainfall Data

Authors: Sudip Kumar Kundu, Charu Singh

Abstract:

The climatic condition over Indian region is highly dependent on monsoon. India receives maximum amount of rainfall during southwest monsoon. Indian economy is highly dependent on agriculture. The presence of flood and drought years influenced the total cultivation system as well as the economy of the country as Indian agricultural systems is still highly dependent on the monsoon rainfall. The present study has been planned to investigate the flood and drought years for the north-west Himalayan region from 1951 to 2014 by using area average Indian Meteorological Department (IMD) rainfall data. For this investigation the Normalized index (NI) has been utilized to find out whether the particular year is drought or flood. The data have been extracted for the north-west Himalayan (NWH) region states namely Uttarakhand (UK), Himachal Pradesh (HP) and Jammu and Kashmir (J&K) to find out the rainy season average rainfall for each year, climatological mean and the standard deviation. After calculation it has been plotted by the diagrams (or graphs) to show the results- some of the years associated with drought years, some are flood years and rest are neutral. The flood and drought years can also relate with the large-scale phenomena El-Nino and La-Lina.

Keywords: IMD, rainfall, normalized index, flood, drought, NWH

Procedia PDF Downloads 285
21399 Learning Mandarin Chinese as a Foreign Language in a Bilingual Context: Adult Learners’ Perceptions of the Use of L1 Maltese and L2 English in Mandarin Chinese Lessons in Malta

Authors: Christiana Gauci-Sciberras

Abstract:

The first language (L1) could be used in foreign language teaching and learning as a pedagogical tool to scaffold new knowledge in the target language (TL) upon linguistic knowledge that the learner already has. In a bilingual context, code-switching between the two languages usually occurs in classrooms. One of the reasons for code-switching is because both languages are used for scaffolding new knowledge. This research paper aims to find out why both the L1 (Maltese) and the L2 (English) are used in the classroom of Mandarin Chinese as a foreign language (CFL) in the bilingual context of Malta. This research paper also aims to find out the learners’ perceptions of the use of a bilingual medium of instruction. Two research methods were used to collect qualitative data; semi-structured interviews with adult learners of Mandarin Chinese and lesson observations. These two research methods were used so that the data collected in the interviews would be triangulated with data collected in lesson observations. The L1 (Maltese) is the language of instruction mostly used. The teacher and the learners switch to the L2 (English) or to any other foreign language according to the need at a particular instance during the lesson.

Keywords: Chinese, bilingual, pedagogical purpose of L1 and L2, CFL acquisition

Procedia PDF Downloads 192
21398 Evaluation of SDS (Software Defined Storage) Controller (CorpHD) for Various Storage Demands

Authors: Shreya Bokare, Sanjay Pawar, Shika Nema

Abstract:

Growth in cloud applications is generating the tremendous amount of data, building load on traditional storage management systems. Software Defined Storage (SDS) is a new storage management concept becoming popular to handle this large amount of data. CoprHD is one of the open source SDS controller, available for experimentation and development in the storage industry. In this paper, the storage management techniques provided by CoprHD to manage heterogeneous storage platforms are experimented and analyzed. Various storage management parameters such as time to provision, storage capacity measurement, and heterogeneity are experimentally evaluated along with the theoretical expression to prove the completeness of CoprHD controller for storage management.

Keywords: software defined storage, SDS, CoprHD, open source, SMI-S simulator, clarion, Symmetrix

Procedia PDF Downloads 308
21397 Investigation of Organisational Culture and Its Impacts on Job Satisfaction among Language Teachers at a Language School

Authors: Davut Uysal

Abstract:

Turkish higher education system has experienced some structural changes in recent decades, which resulted in the concentration on English language teaching as a foreign language at high education institutions. However, the number of studies examining the relationship between organizational culture and job satisfaction among language teachers at higher education institutions, who are the key elements of the teaching process, is very limited in the country. The main objective of this study is to find out the perceptions of English language instructors regarding organizational culture and its impact on their job satisfaction at School of Foreign Language, Anadolu University in Turkey. Questionnaire technique was used in data collection, and the collected data was analysed with the help of SPSS data analysis program. The findings of the study revealed that the respondents of the study had positive perceptions regarding current organizational culture indicating satisfaction with co-worker relations and administration, supervision support and the work itself, as well as their satisfaction with the available professional development opportunities provided by their institution. A significant relationship between overall organizational culture and job satisfaction was found in the study. This study also presents some key elements to increase the job satisfaction levels of the language teachers by managing corporate communication and to improve the organisational culture based on the findings of the study as they are two interrelated issues.

Keywords: corporate communication, English teacher, organizational culture, job satisfaction

Procedia PDF Downloads 162
21396 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 403