Search results for: information giving
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11513

Search results for: information giving

10913 Obstacles in Integrating ICT in Education: A Cross-Sectional Study in GCC Countries

Authors: Mohammed Alhawiti

Abstract:

This paper investigates the insight of educational practitioners concerning challenges that seriously obstruct the comprehension of ICT-related goals of educational institutes. ICT education is a broad area encircling a variety of discipline; both those traditionally classified as IT such as information systems, engineering etc., as well as recent areas, which cross over a variety of educational fields. The results are from a local survey among national representative samples of institutes across GCC countries. The research entails a brief synopsis of the design of this project, a review of key indicators regarding ICT (Information and Communication Technologies) in various institutions, key obstacles and an investigation of the co-variation between challenges and related factors at the country-level.

Keywords: information, communication technology, GCC countries, education sector

Procedia PDF Downloads 431
10912 The Capabilities of New Communication Devices in Development of Informing: Case Study Mobile Functions in Iran

Authors: Mohsen Shakerinejad

Abstract:

Due to the growing momentum of technology, the present age is called age of communication and information. And With Astounding progress of Communication and information tools, current world Is likened to the "global village". That a message can be sent from one point to another point of the world in a Time scale Less than a minute. However, one of the new sociologists -Alain Touraine- in describing the destructive effects of new changes arising from the development of information appliances refers to the "new fields for undemocratic social control And the incidence of acute and unrest social and political tensions", Yet, in this era That With the advancement of the industry, the life of people has been industrial too, quickly and accurately Data Transfer, Causes Blowing new life in the Body of Society And according to the features of each society and the progress of science and technology, Various tools should be used. One of these communication tools is Mobile. Cellular phone As Communication and telecommunication revolution in recent years, Has had a great influence on the individual and collective life of societies. This powerful communication tool Have had an Undeniable effect, On all aspects of life, including social, economic, cultural, scientific, etc. so that Ignoring It in Design, Implementation and enforcement of any system is not wise. Nowadays knowledge and information are one of the most important aspects of human life. Therefore, in this article, it has been tried to introduce mobile potentials in receive and transmit News and Information. As it follows, among the numerous capabilities of current mobile phones features such as sending text, photography, sound recording, filming, and Internet connectivity could indicate the potential of this medium of communication in the process of sending and receiving information. So that nowadays, mobile journalism as an important component of citizen journalism Has a unique role in information dissemination.

Keywords: mobile, informing, receiving information, mobile journalism, citizen journalism

Procedia PDF Downloads 410
10911 A Time since of Injection Model for Hepatitis C Amongst People Who Inject Drugs

Authors: Nader Al-Rashidi, David Greenhalgh

Abstract:

Mathematical modelling techniques are now being used by health organizations worldwide to help understand the likely impact that intervention strategies treatment options and combinations of these have on the prevalence and incidence of hepatitis C virus (HCV) in the people who inject drugs (PWID) population. In this poster, we develop a deterministic, compartmental mathematical model to approximate the spread of the HCV in a PWID population that has been divided into two groups by time since onset of injection. The model assumes that after injection needles adopt the most infectious state of their previous state or that of the PWID who last injected with them. Using analytical techniques, we find that the model behaviour is determined by the basic reproductive number R₀, where R₀ = 1 is a critical threshold separating two different outcomes. The disease-free equilibrium is globally stable if R₀ ≤ 1 and unstable if R₀ > 1. Additionally, we make some simulations where have confirmed that the model tends to this endemic equilibrium value with realistic parameter values giving an HCV prevalence.

Keywords: hepatitis C, people who inject drugs, HCV, PWID

Procedia PDF Downloads 144
10910 Effect of Political and Social Context in Libya on Accounting Information System to Meet Development Needs

Authors: Bubaker F. Shareia, Almuetaz R. Boubakr

Abstract:

The aim of this paper is to show how Libya’s legal, economic, political, social, and cultural systems have shaped Libyan development. This will provide a background to develop an understanding of the current role of the accounting information system in Libya and the challenges facing the design of the aeronautical information system to meet the development needs of Libya. Our knowledge of the unified economic operating systems of the world paves the way for the economic development of every developing country. In order to achieve this understanding, every developing country should be provided with a high-efficiency communications system in order to be able to interact globally. From the point of view of the theory of globalization, Libya's understanding of its socio-economic and political systems is vital in order to be able to adopt and apply accounting techniques that will assist in the economic development of Libya.

Keywords: accounting, economic development, globalisation theory, information system

Procedia PDF Downloads 272
10909 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd County

Authors: Leila Habibi, Hadi Hakimi, Hadi Sadeghian, Maryam Jafari Mehrabadi

Abstract:

Nowadays, the importance of information technology and web-based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, entrepreneurship and making money, introducing of hotels and side information to tourists via web are some examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists. So, the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd County as one of the most tourist visited counties in Iran. The quality of hotel website in a county can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd County with standard indexes and items that extracted from literature and theoretical framework. Content analysis is used for analyzing hotel websites with indexes and items in methodology. In the other words, all of the items are compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score which represents the position of the hotel among the others. All of scores and status of hotels are displayed in their own figures. The result of this research shows that many hotels do not offer standard web-based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web-based services and information.

Keywords: e-tourism, hotel websites, tourism, web-tourism

Procedia PDF Downloads 292
10908 Multi-Channel Information Fusion in C-OTDR Monitoring Systems: Various Approaches to Classify of Targeted Events

Authors: Andrey V. Timofeev

Abstract:

The paper presents new results concerning selection of optimal information fusion formula for ensembles of C-OTDR channels. The goal of information fusion is to create an integral classificator designed for effective classification of seismoacoustic target events. The LPBoost (LP-β and LP-B variants), the Multiple Kernel Learning, and Weighing of Inversely as Lipschitz Constants (WILC) approaches were compared. The WILC is a brand new approach to optimal fusion of Lipschitz Classifiers Ensembles. Results of practical usage are presented.

Keywords: Lipschitz Classifier, classifiers ensembles, LPBoost, C-OTDR systems

Procedia PDF Downloads 461
10907 Impact of Health Sector Economic Reforms in Underdeveloped Countries

Authors: Haga Abdelrahman Elimam

Abstract:

This paper investigates the connotation, and some of the realistic implications, of the economic reform of health sector in under developed countries. The paper investigates the issues that economic reforms have to address, and the policy targets they are considered to accomplish. The work argues that the development of economic reform is not connected only with understanding the priorities and refining them, furthermore with reformation and restructuring the organizations through which health policies are employed. Considering various organizational values, that are likely to be regular to all economic reform programs, a regulatory approach to institutional reform is unsuitable. The paper further investigates the selection of economic reform that may as well influence via technical suggestions and analysis, but the verdict to continue, and the consequent success of execution, eventually depends on the progressive political sustainability. The paper concludes by giving examples of institutional reforms from various underdeveloped countries and includes recommendation of the responsibility and control of donor organizations.

Keywords: economic reform, health sector, underdeveloped countries, technical suggestions

Procedia PDF Downloads 423
10906 Driving Innovation by Enhancing Employee Roles: The Balancing Act of Employee-Driven Innovation

Authors: L. Tirabeni, K. E. Soderquist, P. Pisano

Abstract:

Our purpose is to investigate how the relationship between employees and innovation management processes can drive organizations to successful innovations. This research is deeply related to a new way of thinking about human resources management practices. It’s not simply about improving the employees’ engagement, but rather about a different and more radical commitment: the employee can take on the role traditionally played by the customer, namely to become the first tester of an innovative product or service, the first user/customer and eventually the first investor in the innovation. This new perception of employees could create the basis of a novelty in the innovation process where innovation is taken to a next level when the problems with customer driven innovation on the one hand, and employees driven innovation on the other can be balanced. This research identifies an effective approach to innovation where the employees will participate throughout the whole innovation process, not only in the idea creation but also in the idea definition and development by giving feedback in parallel to that provided by customers and lead-users.

Keywords: employee-driven innovation, engagement, human resource management, innovative companies

Procedia PDF Downloads 412
10905 Environmental Liability of Architects: Architects Destroying the City in Designed and Creative Way, Dhaka City

Authors: Md. Ratin

Abstract:

This paper aims to show how Dhaka city is getting destroyed and the creator and guide of the city – the architects destroying the city in more designed and creative way. The liability of architects should be first and foremost to make the would, country, city a better living environment. As without it where the architects will do their design? To make a better living environment architects should conserve the tress, river and other related ingredient related to the environment. This paper attempts to show how cutting down trees and filling rivers causing more problem than having a great architecture in those places. For increasing people in a city like Dhaka, we need more shelter. But for providing those architects building more living spaces. But as a liability of an architect, one should give something back to the environment too. With time the city’s greenery and water body are getting vanished like magic. And for this, the architects should be blamed for giving us a disastrous future. The analysis is based on literature survey and survey by questionnaire, interviews of users.

Keywords: architect, environment, liability, river

Procedia PDF Downloads 346
10904 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd City

Authors: Leila Habibi, Hadi Hakimi, Maryam Jafari Mehrabadi, Hadi Sadeghian

Abstract:

Nowadays, the importance of information technology and web- based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, Entrepreneurship and making money, introducing of hotels and side information to tourists via web are some Examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists so; the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd City as one of the most tourist visited counties in Iran. The quality of hotel website in a city such as this city can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd City with standard indexes and items that extracted from Literature and theoretical framework. It is used content analysis for analyzing of hotel websites with indexes and items in methodology. In the other words, all of the items is compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score and it represents the position of the hotel among the others. All of scores and status of hotels is displayed in their own Figures. The result of this research shows that many hotels do not offer standard web -based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web- based services and information.

Keywords: e-tourism, hotel websites, tourism, web-tourism

Procedia PDF Downloads 293
10903 Integrating ICT- Based Applications for Sustainable Tourism Development in Algeria

Authors: Boutkhil Guemide, Chellali Benachaiba

Abstract:

Information and Communication Technology (ICT) has an inevitable impact on different industries and their performances. The tourism industry as the largest and fastest growing industry in the world cannot be excluded from this technology and its huge impacts. ICT provides information about tourist attractions in the different destinations before travelling and may improve tourists’ satisfaction. Although Algeria has great tourism potentials, it still needs to be performed well in promoting its attractions to international tourists via ICT tools yet. This research explores the impact of ICT on foreign tourists’ satisfaction of the tourism industry and uses Algerian tourist agencies as a case study, and proposes a model for the impact of ICT on sustainable tourism. Finally, it is concluded that e-ticketing, e-reservation, online payment, multilingual and updated information websites are essential needs for planning strategies in the field of e-tourism. Also, it is recommended that the tourism authorities should develop e-tourism infrastructures in order to keep up with the competitiveness of this field to enable the country to benefit from the global benefits of the tourism industry.

Keywords: Information and Communications Technology (ICT), tourism, tourists’ satisfaction, sustainable tourism

Procedia PDF Downloads 536
10902 Quantum Information Scrambling and Quantum Chaos in Silicon-Based Fermi-Hubbard Quantum Dot Arrays

Authors: Nikolaos Petropoulos, Elena Blokhina, Andrii Sokolov, Andrii Semenov, Panagiotis Giounanlis, Xutong Wu, Dmytro Mishagli, Eugene Koskin, Robert Bogdan Staszewski, Dirk Leipold

Abstract:

We investigate entanglement and quantum information scrambling (QIS) by the example of a many-body Extended and spinless effective Fermi-Hubbard Model (EFHM and e-FHM, respectively) that describes a special type of quantum dot array provided by Equal1 labs silicon-based quantum computer. The concept of QIS is used in the framework of quantum information processing by quantum circuits and quantum channels. In general, QIS is manifest as the de-localization of quantum information over the entire quantum system; more compactly, information about the input cannot be obtained by local measurements of the output of the quantum system. In our work, we will first make an introduction to the concept of quantum information scrambling and its connection with the 4-point out-of-time-order (OTO) correlators. In order to have a quantitative measure of QIS we use the tripartite mutual information, in similar lines to previous works, that measures the mutual information between 4 different spacetime partitions of the system and study the Transverse Field Ising (TFI) model; this is used to quantify the dynamical spreading of quantum entanglement and information in the system. Then, we investigate scrambling in the quantum many-body Extended Hubbard Model with external magnetic field Bz and spin-spin coupling J for both uniform and thermal quantum channel inputs and show that it scrambles for specific external tuning parameters (e.g., tunneling amplitudes, on-site potentials, magnetic field). In addition, we compare different Hilbert space sizes (different number of qubits) and show the qualitative and quantitative differences in quantum scrambling as we increase the number of quantum degrees of freedom in the system. Moreover, we find a "scrambling phase transition" for a threshold temperature in the thermal case, that is, the temperature of the model that the channel starts to scramble quantum information. Finally, we make comparisons to the TFI model and highlight the key physical differences between the two systems and mention some future directions of research.

Keywords: condensed matter physics, quantum computing, quantum information theory, quantum physics

Procedia PDF Downloads 99
10901 Efficient Management through Predicting of Use E-Management within Higher Educational Institutions

Authors: S. Maddi Muhammed, Paul Davis, John Geraghty, Mabruk Derbesh

Abstract:

This study discusses the probability of using electronic management in higher education institutions in Libya. This could be as sampled by creating an electronic gate at the faculties of Engineering and Computing "Information Technology" at Zaytuna University or any other university in Libya. As we all know, the competitive advantage amongst universities is based on their ability to use information technology efficiently and broadly. Universities today value information technology as part of the quality control and assurance and a ranking criterion for a range of services including e-learning and e-Registration. This could be done by developing email systems, electronic or virtual libraries, electronic cards, and other services provided to all students, faculty or staff. This paper discusses a range of important topics that explain how to apply the gate "E" with the faculties at Zaytuna University, Bani Walid colleges in Libya.

Keywords: e-management, educational institutions (EI), Libya, Zaytuna, information technology

Procedia PDF Downloads 456
10900 Reduction of Patient’s Dose of I-131 Therapy by Used Local Diuretic Juice

Authors: Mosab kh. A. A. Bashir, E. Mohamed-Ahmed

Abstract:

The aim of the study is to compare the results of the external exposure and the range of the dose spread by the patients, hospitalized in two different groups of 3-5 d receiving radioiodine therapy because of thyroid cancer, and one of group were giving the local diuretic plant (barley) as local juice. The control group was 28 patients they were isolated as international precautions after taken I-131 capsule 100 mCi, and their external exposure was recorded day by day after first 24 hrs. and the distance for external measurement was 1 m at the abdominal level. The mean of external exposure values of patients at fourth day were 30.24±12.92 µSv h−1. The second group after taking I-131 capsule 100 mCi we were given barley juice (250 mL) after every meal three times on day and their external exposure was recorded day by day after first 24 hrs. The mean of external exposure values of patients of this group at third day was 26.92±9.89 (14-55) µSv h−1. It was observed that the external exposure from the second group clearly decreased to low levels which contributed to the decrease in patient dose and also to the decrease in the exposure from the patient to his/her family.

Keywords: local diuretic juice, therapy, radiation medicine, diuretic plant

Procedia PDF Downloads 315
10899 Who Killed Kalief? Examining the Effects of Solitary Confinement on Juvenile Detainees in the United States

Authors: Esther Baldwin

Abstract:

It is well settled that the use of solitary confinement can cause psychological and physical harm to detainees. For juveniles, who are more susceptible to irreparable harm due to their underdeveloped psyches, the risks are exacerbated. Despite these risks, across the United States juvenile detainees are regularly held in isolation for prolonged periods of time. This essay will examine the broad impact of solitary confinement on juvenile detainees while giving particular focus to the story of Kalief Browder, a juvenile awaiting trial on Rikers Island in New York for a period of three years, nearly two years of which were spent in solitary confinement. Although sadly, his story is not uncommon, Kalief’s story offers a unique perspective in that it provides first-hand insight on the effects of solitary confinement on juveniles. It is our hope that by sharing his story, we will demand better detention practices and policies for juveniles under correctional control in the United States.

Keywords: criminal justice system, juveniles, Kalief browder, solitary confinement

Procedia PDF Downloads 322
10898 Giving Gustatory Aesthetics Its Place at the Table

Authors: Brock Decker

Abstract:

Vision and hearing have been given metaphysical, epistemic, moral and aesthetic preference over the gustatory senses since the very beginnings of Western philosophy. This unjustified prejudice has directed philosophical inquiry away from taste and smell and the values and interests of those concerned with them. The metaphysical and epistemic prejudices that have hindered work in this field are confronted by accepting an oblique invitation from David Hume to pursue a gustatory aesthetics of taste. A framework for further discussion of gustatory experience is added by arguing that taste and smell are cognitively configurable senses capable of bifurcated intentionality and that the taste perception of states of affairs is influenced both by culture and personal preference. Taste perceptions are revealed to admit an aesthetic standard. Using both a Humean aesthetic and a Brillat-Savarin-inspired understanding of taste can explain and discriminate between untrained and expert aesthetic taste experiences and contribute a perspective free from traditional prejudice for future work in the aesthetics of taste.

Keywords: aesthetics, Hume, Korsmeyer, taste, Scruton

Procedia PDF Downloads 62
10897 Chinese Fantasy Novel: New Word Teaching for Non-Native Learners

Authors: Bok Check Meng, Goh Ying Soon

Abstract:

Giving additional learning materials such as Chinese fantasy novel to non-native learners can be strenuous. Instructors have to understand the underpinning theories about cognitive theory for new word instruction. This paper discusses the underpinning theories. Relevant literature reviews are given. There are basically five major areas of cognitive related theories mentioned in this article. These include motivational learning theory, Affective theory of learning, Cognitive psychology theory, Vocabulary acquisition theory and Bloom’s cognitive levels theory. A theoretical framework has been constructed. Thus, this will give a hand in ensuring non-native learners might gain positive outcomes in the instruction process. Instructors who are interested in teaching new word from Chinese fantasy novel in specific to support additional learning might be able to get insights from this article.

Keywords: Chinese fantasy novel, new word teaching, non-native learners, cognitive theory, bloom

Procedia PDF Downloads 735
10896 Role of mHealth in Effective Response to Disaster

Authors: Mohammad H. Yarmohamadian, Reza Safdari, Nahid Tavakoli

Abstract:

In recent years, many countries have suffered various natural disasters. Disaster response continues to face the challenges in health care sector in all countries. Information and communication management is a significant challenge in disaster scene. During the last decades, rapid advances in information technology have led to manage information effectively and improve communication in health care setting. Information technology is a vital solution for effective response to disasters and emergencies so that if an efficient ICT-based health information system is available, it will be highly valuable in such situation. Of that, mobile technology represents a nearly computing technology infrastructure that is accessible, convenient, inexpensive and easy to use. Most projects have not yet reached the deployment stage, but evaluation exercises show that mHealth should allow faster processing and transport of patients, improved accuracy of triage and better monitoring of unattended patients at a disaster scene. Since there is a high prevalence of cell phones among world population, it is expected the health care providers and managers to take measures for applying this technology for improvement patient safety and public health in disasters. At present there are challenges in the utilization of mhealth in disasters such as lack of structural and financial issues in our country. In this paper we will discuss about benefits and challenges of mhealth technology in disaster setting considering connectivity, usability, intelligibility, communication and teaching for implementing this technology for disaster response.

Keywords: information technology, mhealth, disaster, effective response

Procedia PDF Downloads 440
10895 Willingness to Use Mobile Telephone Technology to Improve Pregnancy Outcomes among Women in Lagos, Nigeria

Authors: O. Onigbogi, M. Onigbogi Jr., O. Ojo

Abstract:

Background: The advances in mobile telephone technology has led to a rise in its use globally which has improved service delivery, empowered businesses and changed the way people access information. The practice of many health professionals has also been affected by the information and communications technology (ICT) revolution because they have better access to information. This study was conducted to assess the willingness to participate in mobile technology interventions to improve pregnancy outcomes in Lagos, Nigeria. Materials and Methods: A total of 238 respondents completed self-administered questionnaires. SPSS version 18 data editor was used to analyze data. Univariate odds ratios and 95% confidence intervals (95 % CI) were used to evaluate the correlates of Willingness to Use (WTU) mobile phones to receive health messages during pregnancy. Results: A total of 107 women (45% of the respondents) reported that they will be willing to receive health-related information on their phones during pregnancy. Greater willingness was associated with higher education (OR = 1.25, 95% CI: 1.13–1.53), involvement with community volunteer organizations (OR = 1.25, 95% CI: 1.05–1.52), monetary incentives (OR = 1.37, 95% CI: 1.14–1.45) and nulliparity (OR = 1.39, 95% CI: 1.02–1.42). Decreased willingness was associated with concerns about wrong interpretation of information (OR = 0.42, 95% CI: 0.21–0.54), poor mobile telephone service by providers (OR = 0.61, 95% CI: 0.52–0.78), increase in number of messages (OR = 0.78, 95% CI: 0.53–0.76). Conclusion: The level of WTU recorded indicates that much work still needs to be done before this novel approach could be used adopted in delivering health-related information. Incentives for would-be subjects should also be a part of the planning to encourage greater participation.

Keywords: mobile, outcomes, pregnancy, technology, telephone

Procedia PDF Downloads 224
10894 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 120
10893 The Role of Information Technology in Supply Chain Management

Authors: V. Jagadeesh, K. Venkata Subbaiah, P. Govinda Rao

Abstract:

This paper explaining about the significance of information technology tools and software packages in supply chain management (SCM) in order to manage the entire supply chain. Managing materials flow and financial flow and information flow effectively and efficiently with the aid of information technology tools and packages in order to deliver right quantity with right quality of goods at right time by using right methods and technology. Information technology plays a vital role in streamlining the sales forecasting and demand planning and Inventory control and transportation in supply networks and finally deals with production planning and scheduling. It achieves the objectives by streamlining the business process and integrates within the enterprise and its extended enterprise. SCM starts with customer and it involves sequence of activities from customer, retailer, distributor, manufacturer and supplier within the supply chain framework. It is the process of integrating demand planning and supply network planning and production planning and control. Forecasting indicates the direction for planning raw materials in order to meet the production planning requirements. Inventory control and transportation planning allocate the optimal or economic order quantity by utilizing shortest possible routes to deliver the goods to the customer. Production planning and control utilize the optimal resources mix in order to meet the capacity requirement planning. The above operations can be achieved by using appropriate information technology tools and software packages for the supply chain management.

Keywords: supply chain management, information technology, business process, extended enterprise

Procedia PDF Downloads 377
10892 Implementation of Building Information Modeling in Turkish Government Sector Projects

Authors: Mohammad Lemar Zalmai, Mustafa Nabi Kocakaya, Cemil Akcay, Ekrem Manisali

Abstract:

In recent years, the Building Information Modeling (BIM) approach has been developed expeditiously. As people see the benefits of this approach, it has begun to be used widely in construction projects and some countries made it mandatory to get more benefits from it. To promote the implementation of BIM in construction projects, it will be helpful to get some relevant information from surveys and interviews. The purpose of this study is to research the current adoption and implementation of BIM in public projects in Turkey. This study specified the challenges of BIM implementation in Turkey and proposed some solutions to overcome them. In this context, the challenges for BIM implementation and the factors that affect the BIM usage are determined based on previous academic researches and expert opinions by conducting interviews and questionnaire surveys. Several methods are used to process information in order to obtain weights of different factors to make BIM widespread in Turkey. This study concluded interviews' and questionnaire surveys' outcomes and proposed some suggestions to promote the implementation of BIM in Turkey. We believe research findings will be a good reference for boosting BIM implementation in Turkey.

Keywords: building information modelling, BIM implementations, Turkish construction industry, Turkish government sector projects

Procedia PDF Downloads 138
10891 Ensemble of Misplacement, Juxtaposing Feminine Identity in Time and Space: An Analysis of Works of Modern Iranian Female Photographers

Authors: Delaram Hosseinioun

Abstract:

In their collections, Shirin Neshat, Mitra Tabrizian, Gohar Dashti and Newsha Tavakolian adopt a hybrid form of narrative to confront the restrictions imposed on women in hegemonic public and private spaces. Focusing on motives such as social marginalisation, crisis of belonging, as well as lack of agency for women, the artists depict the regression of women’s rights in their respective generations. Based on the ideas of Michael Bakhtin, namely his concept of polyphony or the plurality of contradictory voices, the views of Judith Butler on giving an account to oneself and Henri Leverbre’s theories on social space, this study illustrates the artists’ concept of identity in crisis through time and space. The research explores how the artists took their art as a novel dimension to depict and confront the hardships imposed on Iranian women. Henri Lefebvre makes a distinction between complex social structures through which individuals situate, perceive and represent themselves. By adding Bakhtin’s polyphonic view to Lefebvre’s concepts of perceived and lived spaces, the study explores the sense of social fragmentation in the works of Dashti and Tavakolian. One argument is that as the representatives of the contemporary generation of female artists who spend their lives in Iran and faced a higher degree of restrictions, their hyperbolic and theatrical styles stand as a symbolic act of confrontation against restrictive socio-cultural norms imposed on women. Further, the research explores the possibility of reclaiming one's voice and sense of agency through art, corresponding with the Bakhtinian sense of polyphony and Butler’s concept of giving an account to oneself. Works of Neshat and Tabrizian as the representatives of the previous generation who faced exile and diaspora, encompass a higher degree of misplacement, violence and decay of women’s presence. In Their works, the women’s body encompasses Lefebvre’s dismantled temporal and special setting. Notably, the ongoing social conviction and gender-based dogma imposed on women frame some of the concurrent motives among the selected collections of the four artists. By applying an interdisciplinary lens and integrating the conducted interviews with the artists, the study illustrates how the artists seek a transcultural account for themselves and women in their generations. Further, the selected collections manifest the urgency for an authentic and liberal voice and setting for women, resonating with the concurrent Women, Life, Freedom movement in Iran.

Keywords: persian modern female photographers, transcultural studies, shirin neshat, mitra tabrizian, gohar dashti, newsha tavakolian, butler, bakhtin, lefebvre

Procedia PDF Downloads 78
10890 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 317
10889 Acquisitions on Prehistoric Dynamics in Central-Western Sicily

Authors: Angelo Vintaloro

Abstract:

Recent discoveries in territory never studied have given a different reading of Sicilian prehistory with the acquisition of important data on the penetration of the Minoan and Mycenaean colonization and on trade in the center-west of Sicily. The large settlement of Montagna Vecchia, in the territory of Corleone, has typical components starting from the Neolithic and was located along the road from Palermo to Agrigento, which connected the southern coast to the northern one. It was already the most important trade route on the island, as it represented a portion of the long North African/South French trade route, from the Campaniform period, at the beginning of the second millennium BC, through the mediation of the islands of Sicily, Sardinia, and Corsica. Years ago, it seemed that this colonization had stopped in south-eastern Sicily, but these recent discoveries changed the situation and gave us the confirmation that many peoples contributed to giving a permanent presence to this territory. Some areas of probable sacred destination have also been identified, closely linked to the subsequent Hellenic colonization of Sicily.

Keywords: corleone, vecchia, preistoria, ellenismo

Procedia PDF Downloads 98
10888 Converse to the Sherman Inequality with Applications in Information Theory

Authors: Ana Barbir, S. Ivelic Bradanovic, D. Pecaric, J. Pecaric

Abstract:

We proved a converse to Sherman's inequality. Using the concept of f-divergence we obtained some inequalities for the well-known entropies, such as Shannon entropies that have many applications in many applied sciences, for example, in information theory, biology and economics Zipf-Mandelbrot law gave improvement in account for the low-rankwords in corpus. Applications of Zipf-Mandelbrot law can be found in linguistics, information sciences and also mostly applicable in ecological eld studies. We also introduced an entropy by applying the Zipf-Mandelbrot law and derived some related inequalities.

Keywords: f-divergence, majorization inequality, Sherman inequality, Zipf-Mandelbrot entropy

Procedia PDF Downloads 169
10887 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 178
10886 Diagnosis of the Lubrification System of a Gas Turbine Using the Adaptive Neuro-Fuzzy Inference System

Authors: H. Mahdjoub, B. Hamaidi, B. Zerouali, S. Rouabhia

Abstract:

The issue of fault detection and diagnosis (FDD) has gained widespread industrial interest in process condition monitoring applications. Accordingly, the use of neuro-fuzzy technic seems very promising. This paper treats a diagnosis modeling a strategic equipment of an industrial installation. We propose a diagnostic tool based on adaptive neuro-fuzzy inference system (ANFIS). The neuro-fuzzy network provides an abductive diagnosis. Moreover, it takes into account the uncertainties on the maintenance knowledge by giving a fuzzy characterization of each cause. This work was carried out with real data of a lubrication circuit from the gas turbine. The machine of interest is a gas turbine placed in a gas compressor station at South Industrial Centre (SIC Hassi Messaoud Ouargla, Algeria). We have defined the zones of good and bad functioning, and the results are presented to demonstrate the advantages of the proposed method.

Keywords: fault detection and diagnosis, lubrication system, turbine, ANFIS, training, pattern recognition

Procedia PDF Downloads 490
10885 A Framework for Building Information Modelling Execution Plan in the Construction Industry, Lagos State, Nigeria

Authors: Tosin Deborah Akanbi

Abstract:

The Building Information Modeling Execution Plan (BEP) is a document that manifests the specifications for the adoption and execution of building information modeling in the construction sector in an organized manner so as to attain the listed goals. In this regard, the study examined the barriers to the adoption of building information modeling, evaluated the effect of building information modeling adoption characteristics on the key elements of a building information modeling execution plan and developed a strategic framework for a BEP in the Lagos State construction industry. Data were gathered through a questionnaire survey with 332 construction professionals in the study area. Three online structured interviews were conducted to support and validate the findings of the quantitative analysis. The results showed the significant relationships and connections between the variables in the framework: BIM usage and model quality control (aBIMskill -> dMQ, Beta = 0.121, T statistics = 1.829), BIM adoption characteristics and information exchange (bBIM_CH -> dIE, Beta = 0.128, T statistics = 1.727), BIM adoption characteristics and process design (bBIM_CH -> dPD, Beta = 0.170, T statistics = 2.754), BIM adoption characteristics and roles and responsibilities (bBIM_CH -> dRR, Beta = 0.131, T statistics = 2.181), interest BIM barriers and BIM adoption characteristics (cBBIM_INT -> bBIM_CH, Beta = 0.137, T statistics = 2.309), legal BIM barriers and BIM adoption characteristics (cBBIM_LEG -> bBIM_CH, Beta = 0.168, T statistics = 2.818), professional BIM barriers and BIM adoption characteristics (cBBIM_PRO -> bBIM_CH, Beta = 0.152, T statistics = 2.645). The results also revealed that seven final themes were generated, namely: model structure and process design, BIM information exchange and collaboration procedures, project goals and deliverables, project model quality control, roles and responsibilities, reflect Lagos state construction industry and validity of the BEP framework. Thus, there is a need for the policy makers to direct interventions to promote, encourage and support the understanding and adoption of BIM by emphasizing the various benefits of using the technology in the Lagos state construction industry.

Keywords: building information modelling execution plan, BIM adoption characteristics, BEP framework, construction industry

Procedia PDF Downloads 18
10884 Performance Analysis of Curved U-Slot Patch Antenna with Enhanced Bandwidth and Isolation for Mimo Systems

Authors: Umesh Kumar, Arun Kumar Shukla, B. V. V. Ravindra Babu

Abstract:

The paper presents a compact tri band Curved U-Slot patch antenna with improved bandwidth and isolation characteristics. The proposed antenna excited by coaxial feed resonates at tri band of 2.8 GHz, 4.1 GHz and 5.7 GHz for VSWR ≤ 1.5 with an improved bandwidth of 99.7% and also for getting high gain antenna of 11.31 dB. A 2×2 MIMO is developed using the proposed antenna giving an excellent isolation of 28 dB between the two antennas. The simulation results of return loss, Mutual Coupling, Gain, VSWR, Surface Current Distribution and Electrical Distribution are presented. By keeping the substrate thickness constant over various dielectric constants, simulations were carried out using MATLAB® and HFSS (High Frequency Structure Simulator) software.

Keywords: performance analysis, curved U-slot patch, antenna with enhanced bandwidth, isolation for mimo systems

Procedia PDF Downloads 587