Search results for: receiving information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11476

Search results for: receiving information

10846 Novel Recommender Systems Using Hybrid CF and Social Network Information

Authors: Kyoung-Jae Kim

Abstract:

Collaborative Filtering (CF) is a popular technique for the personalization in the E-commerce domain to reduce information overload. In general, CF provides recommending items list based on other similar users’ preferences from the user-item matrix and predicts the focal user’s preference for particular items by using them. Many recommender systems in real-world use CF techniques because it’s excellent accuracy and robustness. However, it has some limitations including sparsity problems and complex dimensionality in a user-item matrix. In addition, traditional CF does not consider the emotional interaction between users. In this study, we propose recommender systems using social network and singular value decomposition (SVD) to alleviate some limitations. The purpose of this study is to reduce the dimensionality of data set using SVD and to improve the performance of CF by using emotional information from social network data of the focal user. In this study, we test the usability of hybrid CF, SVD and social network information model using the real-world data. The experimental results show that the proposed model outperforms conventional CF models.

Keywords: recommender systems, collaborative filtering, social network information, singular value decomposition

Procedia PDF Downloads 294
10845 A Social Care Intervention for Improving the Quality of Life of People Living with HIV/AIDS in Ghana

Authors: Tina Abrefa-Gyan

Abstract:

Background: In Ghana and the rest of sub-Saharan Africa, HIV/AIDS is a public health threat and also causes medical crises for many who are infected with the virus. Objective: This study tested a social care intervention developed to help improve the quality of life of those living with HIV/AIDS in Ghana. Method: Adult respondents (N = 248) were assigned to receive the intervention or usual care for six weeks. Results: Results of the study revealed significant differences between the treatment and control groups in their reports of quality of life. Respondents reported better quality of life upon receiving the intervention. Implication: This study sheds light on the positive relationship between the intervention and quality of life among those living with HIV/AIDS in Ghana. Conclusion: The intervention is innovative and novel in the setting. It will, therefore, help to reduce the risks such as depression, low cognitive functioning, and low physical functioning associated with low quality of life among people living with HIV/AIDS in Ghana in specific, and in sub-Saharan Africa in general.

Keywords: social care intervention, HIV/AIDS, Ghana, quality of life

Procedia PDF Downloads 473
10844 Fabrication of Wearable Antennas through Thermal Deposition

Authors: Jeff Letcher, Dennis Tierney, Haider Raad

Abstract:

Antennas are devices for transmitting and/or receiving signals which make them a necessary component of any wireless system. In this paper, a thermal deposition technique is utilized as a method to fabricate antenna structures on substrates. Thin-film deposition is achieved by evaporating a source material (metals in our case) in a vacuum which allows vapor particles to travel directly to the target substrate which is encased with a mask that outlines the desired structure. The material then condenses back to solid state. This method is used in comparison to screen printing, chemical etching, and ink jet printing to indicate advantages and disadvantages to the method. The antenna created undergoes various testing of frequency ranges, conductivity, and a series of flexing to indicate the effectiveness of the thermal deposition technique. A single band antenna that is operated at 2.45 GHz intended for wearable and flexible applications was successfully fabricated through this method and tested. It is concluded that thermal deposition presents a feasible technique of producing such antennas.

Keywords: thermal deposition, wearable antennas, bluetooth technology, flexible electronics

Procedia PDF Downloads 282
10843 Non-AIDS Related Multiple Brain and Orbital Lymphoma Mimicking Meningioma: A Case Report

Authors: Eghosa Morgan, Bourtarbouch Mahjouba, Heida El Ouahabi, Poluyi Edward, Diawarra Seylan

Abstract:

Non-AIDS lymphoma, a type of primary central nervous system (CNS) lymphoma is an uncommon aggressive infiltrative malignant tumour involving several sites in the central nervous system, such as the periventricular region and leptomeninges. In this article, the authors presented a 26-year old man with painless progressive right exophthalmos and scalp swelling with no symptoms and signs of intracranial hypertension and hyperthyroidism. Magnetic resonance imaging (MRI) done revealed isointense masses with brilliant homogenous enhancement on contrast administration resembling a meningioma, with a dura tail – like attachment as seen in meningioma. He had surgery for the right orbital tumour and histopathological diagnosis confirmed our suspicion of lymphoma (B type). Steroid was given in the post-operative period which led to significant regression of the tumours, hence its description as ‘vanishing tumour’. He is presently receiving methotrexate-based chemotherapy and subsequently planned for radiotherapy.

Keywords: central nervous system (CNS), meningioma, non-aids lymphoma, orbital

Procedia PDF Downloads 91
10842 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 165
10841 Speed-Up Data Transmission by Using Bluetooth Module on Gas Sensor Node of Arduino Board

Authors: Hiesik Kim, YongBeum Kim

Abstract:

Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to speed up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group(SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as Open source hardware, Gas sensor, and Bluetooth Module and algorithm controlling transmission speed is demonstrated. Experiment controlling transmission speed also is progressed by developing Android Application receiving measured data, and controlling this speed is available at the experiment result. it is important that in the future, improvement for communication algorithm be needed because few error occurs when data is transferred or received.

Keywords: Arduino, Bluetooth, gas sensor, internet of things, transmission Speed

Procedia PDF Downloads 485
10840 Implications on Informed Consent of Information Available to Patients on the Internet Regarding Hip and Knee Osteoarthritis

Authors: R. W. Walker, J. M. Lynch, K. Anderson, R. G. Middleton

Abstract:

Hip and knee arthritis are two of the commonest conditions that result in elective orthopaedic outpatient referral. At clinic appointments advice given regarding lifestyle modifications or treatment options may not be fully understood by patients. The majority of patients now use the internet to research their condition and use this to inform their decision about treatments. This study assessed the quality of patient information regarding hip and knee arthritis. To assess the quality of patient information regarding knee and hip arthritis available on the internet. Two internet searches were carried out one month apart using the search terms “knee arthritis” and “hip arthritis” on Google, a search engine that accounts for over 90% or internet searches in the UK. Sites were evaluated using the DISCERN instrument, a validated tool for measuring the quality of consumer health information. The first 50 results for each search were analysed by two different observers and discrepancies in scores were reviewed by both observers together and a score was agreed upon. In total 200 search result websites were assessed, of which 84 fulfilled the inclusion criteria. 53% (n=44) were funded directly by commercial healthcare businesses and of these, 70% (n=31) were funded by a surgeon/hospital promoting end-user purchase of surgical intervention. Overall 35% (n=29) websites were “for-profit” information websites where funding was from advertising revenues from pharmaceutical and prosthesis companies. 81% (n=67) offered information about surgical treatments however only 43% (n=36) mentioned the risk of complications of surgery. 67% (n=56) did not have any reference to sources for the information they detailed and 57% (n=47) had no apparent date for the production of the information they offered. Overall 17% (n=14) of websites were judged as being of high quality, with 29% (n=24) being of moderate quality and 54% (n=45) being of low quality. The quality of health information regarding hip and knee arthritis on the internet is highly variable and the majority of websites assessed were of poor quality. A preponderance of websites were funded by a commercial surgical service offering athroplasty at consumer cost, with a further third being funded indirectly via advertising revenues from commercial businesses. The vast majority of websites only mentioned surgery as a treatment and nearly half of all websites did not mention the risks or complications of surgical intervention at all. This has implications for the consent process. As such, Clinicians should be aware of the heterogeneous nature of patient information on the internet and be prepared to advise their patients about good quality websites where further reliable information can be sought.

Keywords: hip osteoarthritis, informed consent, knee osteoarthritis, patient information

Procedia PDF Downloads 93
10839 Volunteered Geographic Information Coupled with Wildfire Fire Progression Maps: A Spatial and Temporal Tool for Incident Storytelling

Authors: Cassandra Hansen, Paul Doherty, Chris Ferner, German Whitley, Holly Torpey

Abstract:

Wildfire is a natural and inevitable occurrence, yet changing climatic conditions have increased the severity, frequency, and risk to human populations in the wildland/urban interface (WUI) of the Western United States. Rapid dissemination of accurate wildfire information is critical to both the Incident Management Team (IMT) and the affected community. With the advent of increasingly sophisticated information systems, GIS can now be used as a web platform for sharing geographic information in new and innovative ways, such as virtual story map applications. Crowdsourced information can be extraordinarily useful when coupled with authoritative information. Information abounds in the form of social media, emergency alerts, radio, and news outlets, yet many of these resources lack a spatial component when first distributed. In this study, we describe how twenty-eight volunteer GIS professionals across nine Geographic Area Coordination Centers (GACC) sourced, curated, and distributed Volunteered Geographic Information (VGI) from authoritative social media accounts focused on disseminating information about wildfires and public safety. The combination of fire progression maps with VGI incident information helps answer three critical questions about an incident, such as: where the first started. How and why the fire behaved in an extreme manner and how we can learn from the fire incident's story to respond and prepare for future fires in this area. By adding a spatial component to that shared information, this team has been able to visualize shared information about wildfire starts in an interactive map that answers three critical questions in a more intuitive way. Additionally, long-term social and technical impacts on communities are examined in relation to situational awareness of the disaster through map layers and agency links, the number of views in a particular region of a disaster, community involvement and sharing of this critical resource. Combined with a GIS platform and disaster VGI applications, this workflow and information become invaluable to communities within the WUI and bring spatial awareness for disaster preparedness, response, mitigation, and recovery. This study highlights progression maps as the ultimate storytelling mechanism through incident case studies and demonstrates the impact of VGI and sophisticated applied cartographic methodology make this an indispensable resource for authoritative information sharing.

Keywords: storytelling, wildfire progression maps, volunteered geographic information, spatial and temporal

Procedia PDF Downloads 179
10838 Assessment of Utilization of Provider Initiated HIV Testing and Counseling and Associated Factors among Adult out Patient Department Patients in Wonchi Woreda, South West Shoa Zone, Central Ethiopia

Authors: Dinka Fikadu, Mulugeta Shegaze

Abstract:

Background: Currently in health facility, provider-initiated human immunodeficiency virus testing is the key entry point to prevention, care, treatment and support services, but most people remains unaware of their HIV status due to various reasons. In many high-prevalence countries, fewer than one in ten people with HIV are aware of their HIV status. HIV, the virus that causes AIDS, “acquired immunodeficiency syndrome, "has become one of the world’s most serious health and development challenges. Reaching individuals with HIV who do not know their serostatus is a global public health priority. Objective: To assess utilization of provider initiated HIV testing and counseling and associated factors among adult outpatient department patients. Methods: Health facility based cross sectional study was conducted among 392 adult outpatient department patients in Wonchi woreda from February 24 to March 24 /2013. The study participant was recruited patients from all adult outpatient department patients of all four public health facilities of wonchi woreda using systematic sampling. A structured interviewer administered questionnaire was used to elicit all important variables from the study participants and multiple logistic regression analysis was used. Result: A total of 371 adult outpatient department patients aged between 15 to 64 years were actively participated in the study and 291(78.4%) of them utilized provider initiated HIV testing and counseling and 80(21.6%) of them refused. Knowledge on HIV is low in the study population; majority of the participants didn’t have comprehensive knowledge (64.7%) and (35.3%) fail to reject misconception about means of HIV transmission and prevention. Utilization of provider-initiated HIV testing and counseling were associated with divorced/widowed marital status[AOR (95%CI) = 0.32(0.15, 0.69)], being male sex [AOR (95%CI) =1.81(1.01, 3.24)], having comprehensive knowledge on HIV [AOR (95%CI) =0.408(0.220,0.759)],having awareness about provider initiated HIV testing and counseling [AOR(95%CI) =2.89(1.48,5.66)] and receiving test on HIV before[AOR (95%CI)=4.15(2.30, 7.47)]. Conclusion: Utilization of provider initiated HIV testing and counseling among adult outpatient departments in wonchi woreda public health facility was [(78.4%)].Strengthening health information through mass media and peer education on HIV to address barrier to testing in the community such as low awareness on PITC, to increase up take of PITC among adult OPD patients.

Keywords: utilization, human immune deficiency, testing, provider, initiate

Procedia PDF Downloads 304
10837 Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5

Authors: Kemkanit Sanyanunthana

Abstract:

The purpose of this research is to study the management system of information technology which supports the education of five private universities in Thailand, according to the case studies which have been developing their qualities and standards of management and education by service provision of information technology to support the excellence performance. The concept to connect information technology with a suitable system has been created by information technology administrators for development, as a system that can be used throughout the organizations to help reach the utmost benefits of using all resources. Hence, the researcher as a person who has been performing these duties within higher education is interested to do this research by selecting the Control Objective for Information and Related Technology 5 (COBIT 5) for the Malcolm Baldrige National Quality Award (MBNQA) of America, or the National Award which applies the concept of Total Quality Management (TQM) to the organization evaluation. Such evaluation is called the Education Criteria for Performance Excellence (EdPEx) focuses on studying and comparing education quality development for excellent performance using COBIT 5 in terms of information technology to study the problems and obstacles of the investigation process for an information technology system, which is considered as an instrument to drive all organizations to reach the excellence performance of the information technology, and to be the model of evaluation and analysis of the process to be in accordance with the strategic plans of the information technology in the universities. This research is conducted in the form of descriptive and survey research according to the case studies. The data collection were carried out by using questionnaires through the administrators working related to the information technology field, and the research documents related to the change management as the main study. The research can be concluded that the performance based on the APO domain process (ALIGN, PLAN AND ORGANISE) of the COBIT 5 standard frame, which emphasizes concordant governance and management of strategic plans for the organizations, could reach only 95%. This might be because of some restrictions such as organizational cultures; therefore, the researcher has studied and analyzed the management of information technology in universities as a whole, under the organizational structures, to reach the performance in accordance with the overall APO domain which would affect the determined strategic plans to be able to develop based on the excellence performance of information technology, and to apply the risk management system at the organizational level into every performance process which would develop the work effectiveness for the resources management of information technology to reach the utmost benefits. 

Keywords: COBIT5, APO, EdPEx Criteria, MBNQA

Procedia PDF Downloads 326
10836 The Covid-19 Pandemic: Transmission, Misinformation, and Implications on Public Health

Authors: Jonathan De Rothewelle

Abstract:

A pandemic, such as that of COVID-19, can be a time of panic and stress; concerns about health supersede others such as work and leisure. With such concern comes the seeking of crucial information— information that, during a global health crisis, could mean the difference between life and death. Whether newspapers, cable news, or radio, media plays an important role in the transmission of medical information to the general public. Moreover, the news media in particular must uphold its obligation to the public to only disseminate factual, useful information. The circulation of misinformation, whether explicit or implicit, may profoundly impact global health. Using a discursive analytic framework founded in linguistics, the images and headlines of top coverage of COVID-19 from the most influential media outlets will be examined. Micro-analyses reveal what may be interpreted as evidence of sensationalism, which may be argued to a form of misinformation, and ultimately a departure from ethical media. Withdrawal from responsible reporting and publishing, expressly in times of epidemic, may cause further confusion and panic.

Keywords: public health, pandemic, public education, media

Procedia PDF Downloads 152
10835 Privacy Preservation Concerns and Information Disclosure on Social Networks: An Ongoing Research

Authors: Aria Teimourzadeh, Marc Favier, Samaneh Kakavand

Abstract:

The emergence of social networks has revolutionized the exchange of information. Every behavior on these platforms contributes to the generation of data known as social network data that are processed, stored and published by the social network service providers. Hence, it is vital to investigate the role of these platforms in user data by considering the privacy measures, especially when we observe the increased number of individuals and organizations engaging with the current virtual platforms without being aware that the data related to their positioning, connections and behavior is uncovered and used by third parties. Performing analytics on social network datasets may result in the disclosure of confidential information about the individuals or organizations which are the members of these virtual environments. Analyzing separate datasets can reveal private information about relationships, interests and more, especially when the datasets are analyzed jointly. Intentional breaches of privacy is the result of such analysis. Addressing these privacy concerns requires an understanding of the nature of data being accumulated and relevant data privacy regulations, as well as motivations for disclosure of personal information on social network platforms. Some significant points about how user's online information is controlled by the influence of social factors and to what extent the users are concerned about future use of their personal information by the organizations, are highlighted in this paper. Firstly, this research presents a short literature review about the structure of a network and concept of privacy in Online Social Networks. Secondly, the factors of user behavior related to privacy protection and self-disclosure on these virtual communities are presented. In other words, we seek to demonstrates the impact of identified variables on user information disclosure that could be taken into account to explain the privacy preservation of individuals on social networking platforms. Thirdly, a few research directions are discussed to address this topic for new researchers.

Keywords: information disclosure, privacy measures, privacy preservation, social network analysis, user experience

Procedia PDF Downloads 283
10834 Technoscience in the Information Society

Authors: A. P. Moiseeva, Z. S. Zavyalova

Abstract:

This paper focuses on the Technoscience phenomenon and its role in modern society. It gives a review of the latest research on Technoscience. Based on the works of Paul Forman, Bernadette Bensaude-Vincent, Bruno Latour, Maria Caramez Carlotto and others, the authors consider the concept of Technoscience, its specific character and prospects of its development.

Keywords: technoscience, information society, transdisciplinarity, European Technology Platforms

Procedia PDF Downloads 665
10833 Assessment of Indigenous People Living Condition in Coal Mining Region: An Evidence from Dhanbad, India

Authors: Arun Kumar Yadav

Abstract:

Coal contributes a significant role in India’s developmental mission. But, ironically, on the other side it causes large scale population displacement and significant changes in indigenous people’s livelihood mechanism. Dhanbad which is regarded as one of the oldest and large mining area, as well as a “Coal Capital of India”. Here, mining exploration work started nearly a century ago. But with the passage of time, mining brings a lot of changes in the life of local people. In this context, study tries to do comparative situational analysis of the changes in the living condition of dwellers living in mines affected and non-mines affected villages based on livelihood approach. Since, this place has long history of mining so it is very difficult to conduct before and after comparison between mines and non-mines affected areas. Consequently, the present study is based on relative comparison approach to elucidate the actual scenario. By using primary survey data which was collected by the author during the month of September 2014 to March 2015 at Dhanbad, Jharkhand. The data were collected from eight villages, these were categorised broadly into mines and non-mines affected villages. Further at micro level, mines affected villages has been categorised into open cast and underground mines. This categorization will help us to capture the deeper understanding about the issues of mine affected villages group. Total of 400 household were surveyed. Result depicts that in every sphere mining affected villages are more vulnerable. Regarding financial capital, although mine affected villages are engaged in mining work and get higher mean income. But in contrast, non-mine affected villages are more occupationally diversified. They have an opportunity to earn money from diversified extents like agricultural land, working in mining area, selling coal informally as well as receiving remittances. Non-mines affected villages are in better physical capital which comprises of basic infrastructure to support livelihood. They have an access to secured shelter, adequate water supply & sanitation, and affordable information and transport. Mining affected villages are more prone to health risks. Regarding social capital, it shows that in comparison to last five years, law and order has been improved in mine affected villages.

Keywords: displacement, indigenous, livelihood, mining

Procedia PDF Downloads 312
10832 Critical Evaluation and Analysis of Effects of Different Queuing Disciplines on Packets Delivery and Delay for Different Applications

Authors: Omojokun Gabriel Aju

Abstract:

Communication network is a process of exchanging data between two or more devices via some forms of transmission medium using communication protocols. The data could be in form of text, images, audio, video or numbers which can be grouped into FTP, Email, HTTP, VOIP or Video applications. The effectiveness of such data exchange will be proved if they are accurately delivered within specified time. While some senders will not really mind when the data is actually received by the receiving device, inasmuch as it is acknowledged to have been received by the receiver. The time a data takes to get to a receiver could be very important to another sender, as any delay could cause serious problem or even in some cases rendered the data useless. The validity or invalidity of a data after delay will therefore definitely depend on the type of data (information). It is therefore imperative for the network device (such as router) to be able to differentiate among the packets which are time sensitive and those that are not, when they are passing through the same network. So, here is where the queuing disciplines comes to play, to handle network resources when such network is designed to service widely varying types of traffics and manage the available resources according to the configured policies. Therefore, as part of the resources allocation mechanisms, a router within the network must implement some queuing discipline that governs how packets (data) are buffered while waiting to be transmitted. The implementation of the queuing discipline will regulate how the packets are buffered while waiting to be transmitted. In achieving this, various queuing disciplines are being used to control the transmission of these packets, by determining which of the packets get the highest priority, less priority and which packets are dropped. The queuing discipline will therefore control the packets latency by determining how long a packet can wait to be transmitted or dropped. The common queuing disciplines are first-in-first-out queuing, Priority queuing and Weighted-fair queuing (FIFO, PQ and WFQ). This paper critically evaluates and analyse through the use of Optimized Network Evaluation Tool (OPNET) Modeller, Version 14.5 the effects of three queuing disciplines (FIFO, PQ and WFQ) on the performance of 5 different applications (FTP, HTTP, E-Mail, Voice and Video) within specified parameters using packets sent, packets received and transmission delay as performance metrics. The paper finally suggests some ways in which networks can be designed to provide better transmission performance while using these queuing disciplines.

Keywords: applications, first-in-first-out queuing (FIFO), optimised network evaluation tool (OPNET), packets, priority queuing (PQ), queuing discipline, weighted-fair queuing (WFQ)

Procedia PDF Downloads 361
10831 Using Optical Character Recognition to Manage the Unstructured Disaster Data into Smart Disaster Management System

Authors: Dong Seop Lee, Byung Sik Kim

Abstract:

In the 4th Industrial Revolution, various intelligent technologies have been developed in many fields. These artificial intelligence technologies are applied in various services, including disaster management. Disaster information management does not just support disaster work, but it is also the foundation of smart disaster management. Furthermore, it gets historical disaster information using artificial intelligence technology. Disaster information is one of important elements of entire disaster cycle. Disaster information management refers to the act of managing and processing electronic data about disaster cycle from its’ occurrence to progress, response, and plan. However, information about status control, response, recovery from natural and social disaster events, etc. is mainly managed in the structured and unstructured form of reports. Those exist as handouts or hard-copies of reports. Such unstructured form of data is often lost or destroyed due to inefficient management. It is necessary to manage unstructured data for disaster information. In this paper, the Optical Character Recognition approach is used to convert handout, hard-copies, images or reports, which is printed or generated by scanners, etc. into electronic documents. Following that, the converted disaster data is organized into the disaster code system as disaster information. Those data are stored in the disaster database system. Gathering and creating disaster information based on Optical Character Recognition for unstructured data is important element as realm of the smart disaster management. In this paper, Korean characters were improved to over 90% character recognition rate by using upgraded OCR. In the case of character recognition, the recognition rate depends on the fonts, size, and special symbols of character. We improved it through the machine learning algorithm. These converted structured data is managed in a standardized disaster information form connected with the disaster code system. The disaster code system is covered that the structured information is stored and retrieve on entire disaster cycle such as historical disaster progress, damages, response, and recovery. The expected effect of this research will be able to apply it to smart disaster management and decision making by combining artificial intelligence technologies and historical big data.

Keywords: disaster information management, unstructured data, optical character recognition, machine learning

Procedia PDF Downloads 130
10830 Closed-Form Sharma-Mittal Entropy Rate for Gaussian Processes

Authors: Septimia Sarbu

Abstract:

The entropy rate of a stochastic process is a fundamental concept in information theory. It provides a limit to the amount of information that can be transmitted reliably over a communication channel, as stated by Shannon's coding theorems. Recently, researchers have focused on developing new measures of information that generalize Shannon's classical theory. The aim is to design more efficient information encoding and transmission schemes. This paper continues the study of generalized entropy rates, by deriving a closed-form solution to the Sharma-Mittal entropy rate for Gaussian processes. Using the squeeze theorem, we solve the limit in the definition of the entropy rate, for different values of alpha and beta, which are the parameters of the Sharma-Mittal entropy. In the end, we compare it with Shannon and Rényi's entropy rates for Gaussian processes.

Keywords: generalized entropies, Sharma-Mittal entropy rate, Gaussian processes, eigenvalues of the covariance matrix, squeeze theorem

Procedia PDF Downloads 522
10829 Problems Arising in Visual Perception

Authors: K. A. Tharanga, K. H. H. Damayanthi

Abstract:

Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object.seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just anmassive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.

Keywords: empirical, perception, sceptisism, nihilism

Procedia PDF Downloads 95
10828 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 134
10827 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains

Authors: Jing Jin

Abstract:

The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.

Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry

Procedia PDF Downloads 67
10826 Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network

Authors: Joshua Midha

Abstract:

The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations.

Keywords: terrorism, behavioral intervention, propaganda, SNA, extremism

Procedia PDF Downloads 95
10825 Effectiveness of Medication and Non-Medication Therapy on Working Memory of Children with Attention Deficit and Hyperactivity Disorder

Authors: Mohaammad Ahmadpanah, Amineh Akhondi, Mohammad Haghighi, Ali Ghaleiha, Leila Jahangard, Elham Salari

Abstract:

Background: Working memory includes the capability to keep and manipulate information in a short period of time. This capability is the basis of complicated judgments and has been attended to as the specific and constant character of individuals. Children with attention deficit and hyperactivity are among the people suffering from deficiency in the active memory, and this deficiency has been attributed to the problem of frontal lobe. This study utilizes a new approach with suitable tasks and methods for training active memory and assessment of the effects of the trainings. Participants: The children participating in this study were of 7-15 year age, who were diagnosed by the psychiatrist and psychologist as hyperactive and attention deficit based on DSM-IV criteria. The intervention group was consisted of 8 boys and 6 girls with the average age of 11 years and standard deviation of 2, and the control group was consisted of 2 girls and 5 boys with an average age of 11.4 and standard deviation of 3. Three children in the test group and two in the control group were under medicinal therapy. Results: Working memory training meaningfully improved the performance in not-trained areas as visual-spatial working memory as well as the performance in Raven progressive tests which are a perfect example of non-verbal, complicated reasoning tasks. In addition, motional activities – measured based on the number of head movements during computerized measuring program – was meaningfully reduced in the medication group. The results of the second test showed that training similar exercise to teenagers and adults results in the improvement of cognition functions, as in hyperactive people. Discussion: The results of this study showed that the performance of working memory is improved through training, and these trainings are extended and generalized in other areas of cognition functions not receiving any training. Trainings resulted in the improvement of performance in the tasks related to prefrontal. They had also a positive and meaningful impact on the moving activities of hyperactive children.

Keywords: attention deficit hyperactivity disorder, working memory, non-medical treatment, children

Procedia PDF Downloads 367
10824 Green Marketing and Sustainable Development: Challenges and Opportunities

Authors: Guru P. S. Rangasamy

Abstract:

In the cutting edge period of globalization, it has turned into a test to keep the clients and also shoppers in overlay and even keep our regular habitat safe and that is the greatest need of the time. Purchasers are likewise mindful of the ecological issues like a dangerous atmospheric deviation and the effect of natural contamination. Green showcasing is a marvel which has created specific critical in the present day advertise and has risen as an imperative idea in India, as in different parts of the creating and created world and is viewed as an essential procedure of encouraging practical improvement. In this exploration paper, primary accentuation has been made of idea, need, and significance of green promoting. It investigates the principle issues in reception of green showcasing hones. The paper portrays the present situation of Indian market and investigates the difficulties and openings organizations have with green advertising, why organizations are receiving it and eventual fate of green promoting and presumes that green showcasing is something that will consistently develop in both practice and request.

Keywords: environmental pollution, green marketing, globalization, global warming, sustainable development

Procedia PDF Downloads 290
10823 Applying the Information System to Enhance the Management of Perioperative Nursing

Authors: Ya-Yi Yen

Abstract:

The operating room is a medical environment full of high-risk, high-complexity and high-cost. In addition to assuring patient safety, the operating room should effort on the efficient and safe medical quality for the surgical patients of high risk, elders, and children. If the nursing staffs of operation room carry on the pre-operative visiting prior to surgery, the patient's anxiety and complications are expected to be alleviated, and the hospitalization days may also be shortened. Purpose: Applying the information system to enhance pre-operative visiting, case tracking, and effectiveness recording Method: (I) Application the information system to screen cases by integrating the operation scheduling, and linking the severe surgery codes, for to shorten the time to track cases of operative visiting. Through the improvement, the time required decreased to 1.5 minutes per day from 20 minutes per day, and nursing staffs’ satisfaction with satisfaction for tracking and visiting procedure of case increased to 86% from 54%. (II)The electronic establishment of the operative visiting record enhanced the integrity of the operative visiting record. The integrity rate was rise to 92% from 66%, while nursing staffs’ satisfaction with the visiting record increased to 82% from 61.3%. Since information technology continues evolving, the application of information technology is helpful to the integration of nursing information, simplification of processes, and saving of man-hours. This article introduces the application of information systems to simplify the processes and improve the effectiveness of operation visiting and tracking, including the saving of time, improving the integrity rate of record, and improving the satisfaction of nursing staffs.

Keywords: effectiveness, information system, perioperative nursing, pre-operative visiting

Procedia PDF Downloads 144
10822 Opportunities and Challenges: Tracing the Evolution of India's First State-led Curriculum-based Media Literacy Intervention

Authors: Ayush Aditya

Abstract:

In today's digitised world, the extent of an individual’s social involvement is largely determined by their interaction over the internet. The Internet has emerged as a primary source of information consumption and a reliable medium for receiving updates on everyday activities. Owing to this change in the information consumption pattern, the internet has also emerged as a hotbed of misinformation. Experts are of the view that media literacy has emerged as one of the most effective strategies for addressing the issue of misinformation. This paper aims to study the evolution of the Kerala government's media literacy policy, its implementation strategy, challenges and opportunities. The objective of this paper is to create a conceptual framework containing details of the implementation strategy based on the Kerala model. Extensive secondary research of literature, newspaper articles, and other online sources was carried out to locate the timeline of this policy. This was followed by semi-structured interview discussions with government officials from Kerala to trace the origin and evolution of this policy. Preliminary findings based on the collected data suggest that this policy is a case of policy by chance, as the officer who headed this policy during the state level implementation was the one who has already piloted a media literacy program in a district called Kannur as the district collector. Through this paper, an attempt is made to trace the history of the media literacy policy starting from the Kannur intervention in 2018, which was started to address the issue of vaccine hesitancy around measles rubella(MR) vaccination. If not for the vaccine hesitancy, this program would not have been rolled out in Kannur. Interviews with government officials suggest that when authorities decided to take up this initiative in 2020, a huge amount of misinformation emerging during the COVID-19 pandemic was the trigger. There was misinformation regarding government orders, healthcare facilities, vaccination, and lockdown regulations, which affected everyone, unlike the case of Kannur, where it was only a certain age group of kids. As a solution to this problem, the state government decided to create a media literacy curriculum to be taught in all government schools of the state starting from standard 8 till graduation. This was a tricky task, as a new course had to be immediately introduced in the school curriculum amid all the disruptions in the education system caused by the pandemic. It was revealed during the interview that in the case of the state-wide implementation, every step involved multiple checks and balances, unlike the earlier program where stakeholders were roped-in as and when the need emerged. On the pedagogy, while the training during the pilot could be managed through PowerPoint presentation, designing a state-wide curriculum involved multiple iterations and expert approvals. The reason for this is COVID-19 related misinformation has lost its significance. In the next phase of the research, an attempt will be made to compare other aspects of the pilot implementation with the state-wide implementation.

Keywords: media literacy, digital media literacy, curriculum based media literacy intervention, misinformation

Procedia PDF Downloads 95
10821 Investigating the Effect of Handicrafts Recreation on the Interior Design of Traditional Arts Gallery

Authors: Amir Masoud Dabagh, Mahsa Khaleghi

Abstract:

The world has entered a new phase of cultural, social, economic, and so on in the last two centuries. Apart from its positive benefits and achievements to the world, it has also incurred many costs, most of which can be mentioned as destroying or at least diminishing the role of the costumes, traditions and authentic culture of the past communities. Understanding what lasts in traditional arts is vital and worthy of study because receiving it and embracing art and forms of art using that last the artistic creation removes the age-old color and smell of its face, making it immortal and persistent in all ages. This paper attempts to present traditional art concepts and solutions for interior design with the approach of handicrafts recreation as a symbol and manifestation of national identity and proof of ancient civilizations, which is at the center of tourists' attention today. The research method is a descriptive-analytical one that first explores the theoretical foundations of research, which are the concepts of recreation and traditional arts, and analyzes the process of recreation that conceals the recollection of past experiences as well as the dynamics and creativity.

Keywords: recreation, handicrafts, interior design, concept, traditional arts

Procedia PDF Downloads 113
10820 Camel Thorn Has Hepatoprotective Activity Against Carbon Tetrachloride or Acetaminophen-Induced Hepatotoxicity but Enhances the Cardiac Toxicity of Adriamycin in Rodents

Authors: Awad G. Abdellatif, Huda M. Gargoum, Abdelkader A. Debani, Mudafara Bengleil, Salmin Alshalmani, N. El Zuki, Omran El Fitouri

Abstract:

In this study, the administration of 660 mg/kg of the ethanolic extract of the Alhgigraecorum (camel thorn) to mice, showed a significant decrease in the level of transaminases in animals treated with a combination of CTE plus carbon tetrachloride (CCl4) or acetaminophen as compared to animals receiving CCl4 or acetaminophen alone. The histopathological investigation also confirmed that camel thorn extract protects the liver against damage-induced either by carbon tetrachloride or acetaminophen. On the other hand, the cardiac toxicity produced by adriamycin was significantly increased in the presence of the ethanolic extract of camel thorn. Our study suggested that camel thorn can protect the liver against the injury produced by carbon tetrachloride or acetaminophen, with an unexpected increase in the cardiac toxicity–induced by adriamycin in rodents.

Keywords: ethanolic, alhgigraecorum, tetrachloride, acetaminophen

Procedia PDF Downloads 503
10819 Obstacles in Integrating ICT in Education: A Cross-Sectional Study in GCC Countries

Authors: Mohammed Alhawiti

Abstract:

This paper investigates the insight of educational practitioners concerning challenges that seriously obstruct the comprehension of ICT-related goals of educational institutes. ICT education is a broad area encircling a variety of discipline; both those traditionally classified as IT such as information systems, engineering etc., as well as recent areas, which cross over a variety of educational fields. The results are from a local survey among national representative samples of institutes across GCC countries. The research entails a brief synopsis of the design of this project, a review of key indicators regarding ICT (Information and Communication Technologies) in various institutions, key obstacles and an investigation of the co-variation between challenges and related factors at the country-level.

Keywords: information, communication technology, GCC countries, education sector

Procedia PDF Downloads 432
10818 Effect of Political and Social Context in Libya on Accounting Information System to Meet Development Needs

Authors: Bubaker F. Shareia, Almuetaz R. Boubakr

Abstract:

The aim of this paper is to show how Libya’s legal, economic, political, social, and cultural systems have shaped Libyan development. This will provide a background to develop an understanding of the current role of the accounting information system in Libya and the challenges facing the design of the aeronautical information system to meet the development needs of Libya. Our knowledge of the unified economic operating systems of the world paves the way for the economic development of every developing country. In order to achieve this understanding, every developing country should be provided with a high-efficiency communications system in order to be able to interact globally. From the point of view of the theory of globalization, Libya's understanding of its socio-economic and political systems is vital in order to be able to adopt and apply accounting techniques that will assist in the economic development of Libya.

Keywords: accounting, economic development, globalisation theory, information system

Procedia PDF Downloads 273
10817 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd County

Authors: Leila Habibi, Hadi Hakimi, Hadi Sadeghian, Maryam Jafari Mehrabadi

Abstract:

Nowadays, the importance of information technology and web-based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, entrepreneurship and making money, introducing of hotels and side information to tourists via web are some examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists. So, the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd County as one of the most tourist visited counties in Iran. The quality of hotel website in a county can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd County with standard indexes and items that extracted from literature and theoretical framework. Content analysis is used for analyzing hotel websites with indexes and items in methodology. In the other words, all of the items are compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score which represents the position of the hotel among the others. All of scores and status of hotels are displayed in their own figures. The result of this research shows that many hotels do not offer standard web-based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web-based services and information.

Keywords: e-tourism, hotel websites, tourism, web-tourism

Procedia PDF Downloads 292