Search results for: end-user trained information extraction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13189

Search results for: end-user trained information extraction

12379 Phytochemical Screening, and Antimicrobial Evaluation of Bioactive Compounds from Red Millipede (Trigoniulus corallinus)

Authors: Y. B. Idris, M. Sirajo, L. G. Hassan, T. Izuagie, T. Muktar, I. Lawal, A. U. Abubakar

Abstract:

This study investigates the extraction, phytochemical composition, and antimicrobial activity of bioactive compounds from red millipedes using three different solvents: n-Hexane, Chloroform, and Methanol. The largest yield was obtained from the methanol extract, which had percentage yields of 0.8%, 2.2%, and 5.6%, respectively. Terpenoids and sterols were found in all extracts according to preliminary zoochemical screening, but only the methanol extract included saponins and phenols. With a maximum zone of inhibition of 9 mm at 1000 µg/ml, antimicrobial susceptibility tests revealed that the methanol extract had the strongest antibacterial activity, especially against Escherichia coli and Staphylococcus aureus. Significant activity was also shown by the n-hexane extract, although the chloroform extract had only mild antibacterial activity. Tests for minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) verified that the methanol extract was more effective than the other extracts, particularly against S. aureus and S. typhi. None of the extracts, nonetheless, showed any discernible antifungal action. The potential of red millipede extracts, especially those based on methanol, as a source of antimicrobial chemicals for use in the future is highlighted by this work.

Keywords: millipedes, defensive extraction, antibacterial, antifungal, antimicrobial, minimum inhibitory concentration (MIC), minimum bacterial concentration (MBC)

Procedia PDF Downloads 9
12378 Facility Anomaly Detection with Gaussian Mixture Model

Authors: Sunghoon Park, Hank Kim, Jinwon An, Sungzoon Cho

Abstract:

Internet of Things allows one to collect data from facilities which are then used to monitor them and even predict malfunctions in advance. Conventional quality control methods focus on setting a normal range on a sensor value defined between a lower control limit and an upper control limit, and declaring as an anomaly anything falling outside it. However, interactions among sensor values are ignored, thus leading to suboptimal performance. We propose a multivariate approach which takes into account many sensor values at the same time. In particular Gaussian Mixture Model is used which is trained to maximize likelihood value using Expectation-Maximization algorithm. The number of Gaussian component distributions is determined by Bayesian Information Criterion. The negative Log likelihood value is used as an anomaly score. The actual usage scenario goes like a following. For each instance of sensor values from a facility, an anomaly score is computed. If it is larger than a threshold, an alarm will go off and a human expert intervenes and checks the system. A real world data from Building energy system was used to test the model.

Keywords: facility anomaly detection, gaussian mixture model, anomaly score, expectation maximization algorithm

Procedia PDF Downloads 270
12377 The Adoption of Process Management for Accounting Information Systems in Thailand

Authors: Manirath Wongsim

Abstract:

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption

Procedia PDF Downloads 465
12376 Implementation of Distributor Management Solution and Its Effects on Supply Chain Performance

Authors: Charles Amoatey, Ebenezer Kumah

Abstract:

Purpose: The purpose of this paper is to assess the effects of implementation of Distributor Management Solution (DMS) on supply chain performance in the Fast Moving Consumer Goods (FMCG) industry in Ghana. Methodology: A purposive sampling approach was used in selecting the respondents for the study. Data was collected from senior management and field supervisors from sales, distribution and customer service units of the case study firm and its channel members. This study made use of systematic literature review and results of survey data analysis to assess how information system has been used to improve supply chain performance. Findings: Results from the study showed that the critical effect factors from implementation of a DMS include (1) Obtain prompt and reliable feedback from the market; (2) Building the capacity and skills levels of employees as well as 3rd Party Agents; (3) Motivated top management to invest in MIS; and (4) Performance improvement in sales route management. The most critical challenges to an effective and sustainable MIS implementation are lack of enough trained IT employees and high barriers to cultural change especially with distributors. The paper recommends consistent investment in IS infrastructure and development of IT skills. Research limitations/implications: This study contributes to the literature by exploring the effects of distribution management solution implementation and supply chain performance in a developing country context. Considering the fact that this study is based on data from only one case study firm and its channel members, generalization of the results should be treated with caution. Practical implications: The findings have confirmed the benefits of implementing a Management Information System. The result should encourage channel members to allocate adequate resources for building MIS capacity to enhance their supply chain performance. Originality/Value: In this paper, the relationship between DMS/MIS implementation and improvement in supply chain performance, in the Ghanaian context, has been established.

Keywords: distributor management solution, fast-moving consumer goods, supply chain management, information systems, Ghana

Procedia PDF Downloads 560
12375 Extraction, Characterization, and Applicability of Rich β-Glucan Fractions from Fungal Biomass

Authors: Zaida Perez-Bassart, Berta Polanco-Estibalez, Maria Jose Fabra, Amparo Lopez-Rubio, Antonio Martinez-Abad

Abstract:

Mushroom production has enormously increased in recent years, not only as food products but also for applications in pharmaceuticals, nutraceuticals, and cosmetics. Consequently, interest in its chemical composition, nutritional value, and therapeutic properties has also increased. Fungi are rich in bioactive compounds such as polysaccharides, polyphenols, glycopeptides, and ergosterol, of great medicinal value, but within polysaccharides, β-glucans are the most prominent molecules. They are formed by D-glucose monomers, linked by β-glucosidic bonds β-(1,3) with side chains linked by β-(1,6) bonds. The number and position of the β-(1,6) branches strongly influence the arrangement of the tertiary structure, which, together with the molecular weight, determine the different attributed bioactivities (immunostimulating, anticancer, antimicrobial, prebiotic, etc.) and physico-chemical properties (solubility, bioaccessibility, viscosity or emulsifying). On the other hand, there is a growing interest in the study of fungi as an alternative source of chitin obtained from the by-products of the fungal industry. In this work, a cascade extraction process using aqueous neutral and alkaline treatments was carried out for Grifola frondosa and Lentinula edodes, and the compositional analysis and functional properties of each fraction were characterized. Interestingly, the first fraction obtained by using aqueous treatment at room temperature was the richest in polysaccharides, proteins, and polyphenols, thus obtaining a greater antioxidant capacity than in the other fractions. In contrast, the fractions obtained by alkaline treatments showed a higher degree of β-glucans purification compared to aqueous extractions but a lower extraction yield. Results revealed the different structural recalcitrance of β-glucans, preferentially linked to proteins or chitin depending on the fungus type, which had a direct impact on the functionalities and bioactivities of each fraction.

Keywords: fungi, mushroom, β-glucans, chitin

Procedia PDF Downloads 133
12374 Network Conditioning and Transfer Learning for Peripheral Nerve Segmentation in Ultrasound Images

Authors: Harold Mauricio Díaz-Vargas, Cristian Alfonso Jimenez-Castaño, David Augusto Cárdenas-Peña, Guillermo Alberto Ortiz-Gómez, Alvaro Angel Orozco-Gutierrez

Abstract:

Precise identification of the nerves is a crucial task performed by anesthesiologists for an effective Peripheral Nerve Blocking (PNB). Now, anesthesiologists use ultrasound imaging equipment to guide the PNB and detect nervous structures. However, visual identification of the nerves from ultrasound images is difficult, even for trained specialists, due to artifacts and low contrast. The recent advances in deep learning make neural networks a potential tool for accurate nerve segmentation systems, so addressing the above issues from raw data. The most widely spread U-Net network yields pixel-by-pixel segmentation by encoding the input image and decoding the attained feature vector into a semantic image. This work proposes a conditioning approach and encoder pre-training to enhance the nerve segmentation of traditional U-Nets. Conditioning is achieved by the one-hot encoding of the kind of target nerve a the network input, while the pre-training considers five well-known deep networks for image classification. The proposed approach is tested in a collection of 619 US images, where the best C-UNet architecture yields an 81% Dice coefficient, outperforming the 74% of the best traditional U-Net. Results prove that pre-trained models with the conditional approach outperform their equivalent baseline by supporting learning new features and enriching the discriminant capability of the tested networks.

Keywords: nerve segmentation, U-Net, deep learning, ultrasound imaging, peripheral nerve blocking

Procedia PDF Downloads 105
12373 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 86
12372 A Deep Learning Approach to Detect Complete Safety Equipment for Construction Workers Based on YOLOv7

Authors: Shariful Islam, Sharun Akter Khushbu, S. M. Shaqib, Shahriar Sultan Ramit

Abstract:

In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwear. The suggested method precisely locates these safety items by using the YOLO v7 (You Only Look Once) object detection algorithm. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research contributes to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry.

Keywords: deep learning, safety equipment detection, YOLOv7, computer vision, workplace safety

Procedia PDF Downloads 66
12371 Online Information Seeking: A Review of the Literature in the Health Domain

Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad

Abstract:

The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.

Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT

Procedia PDF Downloads 274
12370 The Digital Divide: Examining the Use and Access to E-Health Based Technologies by Millennials and Older Adults

Authors: Delana Theiventhiran, Wally J. Bartfay

Abstract:

Background and Significance: As the Internet is becoming the epitome of modern communications, there are many pragmatic reasons why the digital divide matters in terms of accessing and using E-health based technologies. With the rise of technology usage globally, those in the older adult generation may not be as familiar and comfortable with technology usage and are thus put at a disadvantage compared to other generations such as millennials when examining and using E-health based platforms and technology. Currently, little is known about how older adults and millennials access and use e-health based technologies. Methods: A systemic review of the literature was undertaken employing the following three databases: (i) PubMed, (ii) ERIC, and (iii) CINAHL; employing the search term 'digital divide and generations' to identify potential articles. To extract required data from the studies, a data abstraction tool was created to obtain the following information: (a) author, (b) year of publication, (c) sample size, (d) country of origin, (e) design/methods, (f) major findings/outcomes obtained. Inclusion criteria included publication dates between the years of Jan 2009 to Aug 2018, written in the English language, target populations of older adults aged 65 and above and millennials, and peer reviewed quantitative studies only. Major Findings: PubMed provided 505 potential articles, where 23 of those articles met the inclusion criteria. Specifically, ERIC provided 53 potential articles, where no articles met criteria following data extraction. CINAHL provided 14 potential articles, where eight articles met criteria following data extraction. Conclusion: Practically speaking, identifying how newer E-health based technologies can be integrated into society and identifying why there is a gap with digital technology will help reduce the impact on generations and individuals who are not as familiar with technology and Internet usage. The largest concern of all is how to prepare older adults for new and emerging E-health technologies. Currently, there is a dearth of literature in this area because it is a newer area of research and little is known about it. The benefits and consequences of technology being integrated into daily living are being investigated as a newer area of research. Several of the articles (N=11) indicated that age is one of the larger factors contributing to the digital divide. Similarly, many of the examined articles (N=5) identify that privacy concerns were one of the main deterrents of technology usage for elderly individuals aged 65 and above. The older adult generation feels that privacy is one of the major concerns, especially in regards to how data is collected, used and possibly sold to third party groups by various websites. Additionally, access to technology, the Internet, and infrastructure also plays a large part in the way that individuals are able to receive and use information. Lastly, a change in the way that healthcare is currently used, received and distributed would also help attribute to the change to ensure that no generation is left behind in a technologically advanced society.

Keywords: digital divide, e-health, millennials, older adults

Procedia PDF Downloads 171
12369 Feasibility of Agro Waste-Derived Adsorbent for Colour Removal

Authors: U. P. L. Wijayarathne, P. W. Vidanage, H. K. D. Jayampath, K. W. P. M. Kothalawala

Abstract:

Feasibility of utilizing Empty Bunch (EB) fibre, a solid waste of palm oil extraction process, as an adsorbent is analysed in this study. Empty bunch fibre is generated after the extraction of retained oil in the sterilized and threshed empty fruit bunches. Besides the numerous characteristics of EB fibre, which enable its utilization as a fuel, a bio-composite material, or mulch, EB fibre also shows exceptional characteristics of a good adsorbent. Fixed bed adsorption method is used to study the adsorptivity of EB fibre using a continuous adsorption column with Methyl-blue (1.13ppm) as the feed. Adsorptivity is assumed to be solely dependent on the bed porosity keeping other parameters (feed flow rate, bed height, bed diameter, and operating temperature) constant. Bed porosity is changed by means of compact ratio and the variation of the feed concentration is analysed using a photometric method. Break through curves are plotted at different porosity levels and optimum bed porosity is identified for a given feed stream. Feasibility of using the EB fibre as an inexpensive and an abundant adsorbent in wastewater treatment facilities, where the effluent colour reduction is adamant, is also discussed.

Keywords: adsorption, fixed bed, break through time, methylene blue, oil palm fibre

Procedia PDF Downloads 289
12368 Formulating Rough Approximations in Information Tables with Possibilistic Information

Authors: Michinori Nakata, Hiroshi Sakai

Abstract:

A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.

Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations

Procedia PDF Downloads 320
12367 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 147
12366 Design, Implementation and Evaluation of Health and Social Justice Trainings in Nigeria

Authors: Juliet Sorensen, Anna Maitland

Abstract:

Introduction: Characterized by lack of water and sanitation, food insecurity, and low access to hospitals and clinics, informal urban settlements in Lagos, Nigeria have very poor health outcomes. With little education and a general inability to demand basic rights, these communities are often disempowered and isolated from understanding, claiming, or owning their health needs. Utilizing community-based participatory research characterized by interdisciplinary, cross-cultural partnerships, evidence-based assessments, and both primary and secondary source research, a holistic health education and advocacy program was developed in Lagos to address health barriers for targeted communities. This includes a first of its kind guide formulated to teach community-based health educators how to transmit health information to low-literacy Nigerian audiences while supporting behavior change models and social support mechanisms. This paper discusses the interdisciplinary contributions to developing a health education program while also looking at the need for greater beneficiary ownership and implementation of health justice and access. Methods: In March 2016, an interdisciplinary group of medical, legal, and business graduate students and faculty from Northwestern University conduced a Health Needs Assessment (HNA) in Lagos with a partner and a local non-governmental organization. The HNA revealed that members of informal urban communities in Lagos were lacking basic health literacy, but desired to remedy this lacuna. Further, the HNA revealed that even where the government mandates specific services, many vulnerable populations are unable to access these services. The HNA concluded that a program focused on education, advocacy, and organizing around anatomy, maternal and sexual health, infectious disease and malaria, HIV/AIDS, emergency care, and water and sanitation would respond to stated needs while also building capacity in communities to address health barriers. Results: Based on the HNA, including both primary and secondary source research on integrated health education approaches and behavior change models and responsive, adaptive material development, a holistic program was developed for the Lagos partners and first implemented in November 2016. This program trained community-nominated health educators in adult, low-literacy, knowledge exchange approaches, utilizing information identified by communities as a priority. After a second training in March 2017, these educators will teach community-based groups and will support and facilitate behavior change models and peer-support methods around basic issues like hand washing and disease transmission. They will be supported by community paralegals who will help ensure that newly trained community groups can act on education around access, such as receiving free vaccinations, maternal health care, and HIV/AIDS medicines. Materials will continue to be updated as needs and issues arise, with a focus on identifying best practices around health improvements that can be shared across these partner communities. Conclusion: These materials are the first of their kind, and address a void of health information and understanding pervasive in informal-urban Lagos communities. Initial feedback indicates high levels of commitment and interest, as well as investment by communities in these materials, largely because they are responsive, targeted, and build community capacity. This methodology is an important step in dignity-based health justice solutions, albeit in the process of refinement.

Keywords: community health educators, interdisciplinary and cross cultural partnerships, health justice and access, Nigeria

Procedia PDF Downloads 247
12365 Development of Corn (Zea mays L.) Stalk Geotextile Net for Soil Erosion Mitigation

Authors: Cristina S. Decano, Vitaliana U. Malamug, Melissa E. Agulto, Helen F. Gavino

Abstract:

This study aimed to introduce new natural fiber to be used in the production of geotextile net for mitigation of soil erosion. Fiber extraction from the stalks was the main challenge faced during the processing of stalks to ropes. Thus, an investigation on the extraction procedures of corn (Zea mays L.) stalk under biological and chemical retting was undertaken. Results indicated significant differences among percent fiber yield as affected by the retting methods used with values of 15.07%, 12.97%, 11.60%, and 9.01%, for dew, water, chemical (1 day after harvest and15 days after harvest), respectively, with the corresponding average extracting duration of 70, 82, 89, and 94 minutes. Physical characterization of the developed corn stalk geotextile net resulted to average mass per unit area of 806.25 g/m2 and 241% water absorbing capacity. The effect of corn stalk geotextile net in mitigating soil erosion was evaluated in a laboratory experiment for 30o and 60o inclinations with three treatments: bare soil (A1), corn stalk geotextile net (A2) and combined cornstalk geotextile net and vegetation cover (A3). Results revealed that treatment A2 and A3 significantly decreased sediment yield and an increase in terms of soil loss reduction efficiency. The cost of corn stalk geotextile net is Php 62.41 per square meter.

Keywords: corn stalk, natural geotextile, retting, soil erosion

Procedia PDF Downloads 297
12364 Material Detection by Phase Shift Cavity Ring-Down Spectroscopy

Authors: Rana Muhammad Armaghan Ayaz, Yigit Uysallı, Nima Bavili, Berna Morova, Alper Kiraz

Abstract:

Traditional optical methods for example resonance wavelength shift and cavity ring-down spectroscopy used for material detection and sensing have disadvantages, for example, less resistance to laser noise, temperature fluctuations and extraction of the required information can be a difficult task like ring downtime in case of cavity ring-down spectroscopy. Phase shift cavity ring down spectroscopy is not only easy to use but is also capable of overcoming the said problems. This technique compares the phase difference between the signal coming out of the cavity with the reference signal. Detection of any material is made by the phase difference between them. By using this technique, air, water, and isopropyl alcohol can be recognized easily. This Methodology has far-reaching applications and can be used in air pollution detection, human breath analysis and many more.

Keywords: materials, noise, phase shift, resonance wavelength, sensitivity, time domain approach

Procedia PDF Downloads 147
12363 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies

Authors: Dumitru Valentin Florentin

Abstract:

The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.

Keywords: information technologies, impact, company, Romania, empirical study

Procedia PDF Downloads 422
12362 Photomicrograph-Based Neuropathology Consultation in Tanzania; The Utility of Static-Image Neurotelepathology in Low- And Middle-Income Countries

Authors: Francis Zerd, Brian E. Moore, Atuganile E. Malango, Patrick W. Hosokawa, Kevin O. Lillehei, Laurence Lemery Mchome, D. Ryan Ormond

Abstract:

Introduction: Since neuropathologic diagnosis in the developing world is hampered by limitations in technical infrastructure, trained laboratory personnel, and subspecialty-trained pathologists, the use of telepathology for diagnostic support, second-opinion consultations, and ongoing training holds promise as a means of addressing these challenges. This research aims to assess the utility of static teleneuropathology in improving neuropathologic diagnoses in low- and middle-income countries. Methods: Consecutive neurosurgical biopsy and resection specimens obtained at Muhimbili National Hospital in Tanzania between July 1, 2018, and June 30, 2019, were selected for retrospective, blinded static-image neuropathologic review followed by on-site review by an expert neuropathologist. Results: A total of 75 neuropathologic cases were reviewed. The agreement of static images and on-site glass diagnosis was 71% with strict criteria and 88% with less stringent criteria. This represents an overall improvement in diagnostic accuracy from 36% by general pathologists to 71% by a neuropathologist using static telepathology (or 76% to 88% with less stringent criteria). Conclusions: Telepathology offers a suitable means of providing diagnostic support, second-opinion consultations, and ongoing training to pathologists practicing in resource-limited countries. Moreover, static digital teleneuropathology is an uncomplicated, cost-effective, and reliable way to achieve these goals.

Keywords: neuropathology, resource-limited settings, static image, Tanzania, teleneuropathology

Procedia PDF Downloads 101
12361 Methyltrioctylammonium Chloride as a Separation Solvent for Binary Mixtures: Evaluation Based on Experimental Activity Coefficients

Authors: B. Kabane, G. G. Redhi

Abstract:

An ammonium based ionic liquid (methyltrioctylammonium chloride) [N8 8 8 1] [Cl] was investigated as an extraction potential solvent for volatile organic solvents (in this regard, solutes), which includes alkenes, alkanes, ketones, alkynes, aromatic hydrocarbons, tetrahydrofuran (THF), alcohols, thiophene, water and acetonitrile based on the experimental activity coefficients at infinite THF measurements were conducted by the use of gas-liquid chromatography at four different temperatures (313.15 to 343.15) K. Experimental data of activity coefficients obtained across the examined temperatures were used in order to calculate the physicochemical properties at infinite dilution such as partial molar excess enthalpy, Gibbs free energy and entropy term. Capacity and selectivity data for selected petrochemical extraction problems (heptane/thiophene, heptane/benzene, cyclohaxane/cyclohexene, hexane/toluene, hexane/hexene) were computed from activity coefficients data and compared to the literature values with other ionic liquids. Evaluation of activity coefficients at infinite dilution expands the knowledge and provides a good understanding related to the interactions between the ionic liquid and the investigated compounds.

Keywords: separation, activity coefficients, methyltrioctylammonium chloride, ionic liquid, capacity

Procedia PDF Downloads 142
12360 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 402
12359 Value Relevance of Accounting Information: Empirical Evidence from China

Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li

Abstract:

This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.

Keywords: accounting information, response time, value relevance, stock price

Procedia PDF Downloads 94
12358 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures

Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat

Abstract:

In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.

Keywords: association rules, clustering, similarity measure, statistical approaches

Procedia PDF Downloads 320
12357 Building a Model for Information Literacy Education in School Settings

Authors: Tibor Koltay

Abstract:

Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.

Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory

Procedia PDF Downloads 146
12356 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 80
12355 Classification Using Worldview-2 Imagery of Giant Panda Habitat in Wolong, Sichuan Province, China

Authors: Yunwei Tang, Linhai Jing, Hui Li, Qingjie Liu, Xiuxia Li, Qi Yan, Haifeng Ding

Abstract:

The giant panda (Ailuropoda melanoleuca) is an endangered species, mainly live in central China, where bamboos act as the main food source of wild giant pandas. Knowledge of spatial distribution of bamboos therefore becomes important for identifying the habitat of giant pandas. There have been ongoing studies for mapping bamboos and other tree species using remote sensing. WorldView-2 (WV-2) is the first high resolution commercial satellite with eight Multi-Spectral (MS) bands. Recent studies demonstrated that WV-2 imagery has a high potential in classification of tree species. The advanced classification techniques are important for utilising high spatial resolution imagery. It is generally agreed that object-based image analysis is a more desirable method than pixel-based analysis in processing high spatial resolution remotely sensed data. Classifiers that use spatial information combined with spectral information are known as contextual classifiers. It is suggested that contextual classifiers can achieve greater accuracy than non-contextual classifiers. Thus, spatial correlation can be incorporated into classifiers to improve classification results. The study area is located at Wuyipeng area in Wolong, Sichuan Province. The complex environment makes it difficult for information extraction since bamboos are sparsely distributed, mixed with brushes, and covered by other trees. Extensive fieldworks in Wuyingpeng were carried out twice. The first one was on 11th June, 2014, aiming at sampling feature locations for geometric correction and collecting training samples for classification. The second fieldwork was on 11th September, 2014, for the purposes of testing the classification results. In this study, spectral separability analysis was first performed to select appropriate MS bands for classification. Also, the reflectance analysis provided information for expanding sample points under the circumstance of knowing only a few. Then, a spatially weighted object-based k-nearest neighbour (k-NN) classifier was applied to the selected MS bands to identify seven land cover types (bamboo, conifer, broadleaf, mixed forest, brush, bare land, and shadow), accounting for spatial correlation within classes using geostatistical modelling. The spatially weighted k-NN method was compared with three alternatives: the traditional k-NN classifier, the Support Vector Machine (SVM) method and the Classification and Regression Tree (CART). Through field validation, it was proved that the classification result obtained using the spatially weighted k-NN method has the highest overall classification accuracy (77.61%) and Kappa coefficient (0.729); the producer’s accuracy and user’s accuracy achieve 81.25% and 95.12% for the bamboo class, respectively, also higher than the other methods. Photos of tree crowns were taken at sample locations using a fisheye camera, so the canopy density could be estimated. It is found that it is difficult to identify bamboo in the areas with a large canopy density (over 0.70); it is possible to extract bamboos in the areas with a median canopy density (from 0.2 to 0.7) and in a sparse forest (canopy density is less than 0.2). In summary, this study explores the ability of WV-2 imagery for bamboo extraction in a mountainous region in Sichuan. The study successfully identified the bamboo distribution, providing supporting knowledge for assessing the habitats of giant pandas.

Keywords: bamboo mapping, classification, geostatistics, k-NN, worldview-2

Procedia PDF Downloads 311
12354 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists

Authors: Miral Sabry AlAshry

Abstract:

The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.

Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution

Procedia PDF Downloads 372
12353 Determination of Rare Earth Element Patterns in Uranium Matrix for Nuclear Forensics Application: Method Development for Inductively Coupled Plasma Mass Spectrometry (ICP-MS) Measurements

Authors: Bernadett Henn, Katalin Tálos, Éva Kováss Széles

Abstract:

During the last 50 years, the worldwide permeation of the nuclear techniques induces several new problems in the environmental and in the human life. Nowadays, due to the increasing of the risk of terrorism worldwide, the potential occurrence of terrorist attacks using also weapon of mass destruction containing radioactive or nuclear materials as e.g. dirty bombs, is a real threat. For instance, the uranium pellets are one of the potential nuclear materials which are suitable for making special weapons. The nuclear forensics mainly focuses on the determination of the origin of the confiscated or found nuclear and other radioactive materials, which could be used for making any radioactive dispersive device. One of the most important signatures in nuclear forensics to find the origin of the material is the determination of the rare earth element patterns (REE) in the seized or found radioactive or nuclear samples. The concentration and the normalized pattern of the REE can be used as an evidence of uranium origin. The REE are the fourteen Lanthanides in addition scandium and yttrium what are mostly found together and really low concentration in uranium pellets. The problems of the REE determination using ICP-MS technique are the uranium matrix (high concentration of uranium) and the interferences among Lanthanides. In this work, our aim was to develop an effective chemical sample preparation process using extraction chromatography for separation the uranium matrix and the rare earth elements from each other following some publications can be found in the literature and modified them. Secondly, our purpose was the optimization of the ICP-MS measuring process for REE concentration. During method development, in the first step, a REE model solution was used in two different types of extraction chromatographic resins (LN® and TRU®) and different acidic media for environmental testing the Lanthanides separation. Uranium matrix was added to the model solution and was proved in the same conditions. Methods were tested and validated using REE UOC (uranium ore concentrate) reference materials. Samples were analyzed by sector field mass spectrometer (ICP-SFMS).

Keywords: extraction chromatography, nuclear forensics, rare earth elements, uranium

Procedia PDF Downloads 306
12352 Fermented Fruit and Vegetable Discard as a Source of Feeding Ingredients and Functional Additives

Authors: Jone Ibarruri, Mikel Manso, Marta Cebrián

Abstract:

A high amount of food is lost or discarded in the World every year. In addition, in the last decades, an increasing demand of new alternative and sustainable sources of proteins and other valuable compounds is being observed in the food and feeding sectors and, therefore, the use of food by-products as nutrients for these purposes sounds very interesting from the environmental and economical point of view. However, the direct use of discarded fruit and vegetables that present, in general, a low protein content is not interesting as feeding ingredient except if they are used as a source of fiber for ruminants. Especially in the case of aquaculture, several alternatives to the use of fish meal and other vegetable protein sources have been extensively explored due to the scarcity of fish stocks and the unsustainability of fishing for these purposes. Fish mortality is also of great concern in this sector as this problem highly reduces their economic feasibility. So, the development of new functional and natural ingredients that could reduce the need for vaccination is also of great interest. In this work, several fermentation tests were developed at lab scale using a selected mixture of fruit and vegetable discards from a wholesale market located in the Basque Country to increase their protein content and also to produce some bioactive extracts that could be used as additives in aquaculture. Fruit and vegetable mixtures (60/40 ww) were centrifugated for humidity reduction and crushed to 2-5 mm particle size. Samples were inoculated with a selected Rhizopus oryzae strain and fermented for 7 days in controlled conditions (humidity between 65 and 75% and 28ºC) in Petri plates (120 mm) by triplicate. Obtained results indicated that the final fermented product presented a twofold protein content (from 13 to 28% d.w). Fermented product was further processed to determine their possible functionality as a feed additive. Extraction tests were carried out to obtain an ethanolic extract (60:40 ethanol: water, v.v) and remaining biomass that also could present applications in food or feed sectors. The extract presented a polyphenol content of about 27 mg GAE/gr d.w with antioxidant activity of 8.4 mg TEAC/g d.w. Remining biomass is mainly composed of fiber (51%), protein (24%) and fat (10%). Extracts also presented antibacterial activity according to the results obtained in Agar Diffusion and to the Minimum Inhibitory Concentration (MIC) tests determined against several food and fish pathogen strains. In vitro, digestibility was also assessed to obtain preliminary information about the expected effect of extraction procedure on fermented product digestibility. First results indicated that remaining biomass after extraction doesn´t seem to improve digestibility in comparison to the initial fermented product. These preliminary results show that fermented fruit and vegetables can be a useful source of functional ingredients for aquaculture applications and a substitute of other protein sources in the feeding sector. Further validation will be also carried out through “in vivo” tests with trout and bass.

Keywords: fungal solid state fermentation, protein increase, functional extracts, feed ingredients

Procedia PDF Downloads 63
12351 Information Exchange Process Analysis between Authoring Design Tools and Lighting Simulation Tools

Authors: Rudan Xue, Annika Moscati, Rehel Zeleke Kebede, Peter Johansson

Abstract:

Successful buildings’ simulation and analysis inevitably require information exchange between multiple building information modeling (BIM) software. The BIM infor-mation exchange based on IFC is widely used. However, Industry Foundation Classifi-cation (IFC) files are not always reliable and information can get lost when using dif-ferent software for modeling and simulations. In this research, interviews with lighting simulation experts and a case study provided by a company producing lighting devices have been the research methods used to identify the necessary steps and data for suc-cessful information exchange between lighting simulation tools and authoring design tools. Model creation, information exchange, and model simulation have been identi-fied as key aspects for the success of information exchange. The paper concludes with recommendations for improved information exchange and more reliable simulations that take all the needed parameters into consideration.

Keywords: BIM, data exchange, interoperability issues, lighting simulations

Procedia PDF Downloads 237
12350 Optimization of Gold Adsorption from Aqua-Regia Gold Leachate Using Baggase Nanoparticles

Authors: Oluwasanmi Teniola, Abraham Adeleke, Ademola Ibitoye, Moshood Shitu

Abstract:

To establish an economical and efficient process for the recovery of gold metal from refractory gold ore obtained from Esperando axis of Osun state Nigeria, the adsorption of gold (III) from aqua reqia leached solution of the ore using bagasse nanoparticles has been studied under various experimental variables using batch technique. The extraction percentage of gold (III) on the prepared bagasse nanoparticles was determined from its distribution coefficients as a function of solution pH, contact time, adsorbent, adsorbate concentrations, and temperature. The rate of adsorption of gold (III) on the prepared bagasse nanoparticles is dependent on pH, metal concentration, amount of adsorbate, stirring rate, and temperature. The adsorption data obtained fit into the Langmuir and Freundlich equations. Three different temperatures were used to determine the thermodynamic parameters of the adsorption of gold (III) on bagasse nanoparticles. The heat of adsorption was measured to be a positive value ΔHo = +51.23kJ/mol, which serves as an indication that the adsorption of gold (III) on bagasse nanoparticles is endothermic. Also, the negative value of ΔGo = -0.6205 kJ/mol at 318K shows the spontaneity of the process. As the temperature was increased, the value of ΔGo becomes more negative, indicating that an increase in temperature favors the adsorption process. With the application of optimal adsorption variables, the adsorption capacity of gold was 0.78 mg/g of the adsorbent, out of which 0.70 mg of gold was desorbed with 0.1 % thiourea solution.

Keywords: adsorption, bagasse, extraction, nanoparticles, recovery

Procedia PDF Downloads 152