Search results for: daily internet usage time
21562 Online Graduate Students’ Perspective on Engagement in Active Learning in the United States
Authors: Ehi E. Aimiuwu
Abstract:
As of 2017, many researchers in educational journals are still wondering if students are effectively and efficiently engaged in active learning in the online learning environment. The goal of this qualitative single case study and narrative research is to explore if students are actively engaged in their online learning. Seven online students in the United States from LinkedIn and residencies were interviewed for this study. Eleven online learning techniques from research were used as a framework. Data collection tools were used for the study that included a digital audiotape, observation sheet, interview protocol, transcription, and NVivo 12 Plus qualitative software. Data analysis process, member checking, and key themes were used to reach saturation. About 85.7% of students preferred individual grading. About 71.4% of students valued professor’s interacting 2-3 times weekly, participating through posts and responses, having good internet access, and using email. Also, about 57.1% said students log in 2-3 times weekly to daily, professor’s social presence helps, regular punctuality in work submission, and prefer assessments style of research, essay, and case study. About 42.9% appreciated syllabus usefulness and professor’s expertise.Keywords: class facilitation, course management, online teaching, online education, student engagement
Procedia PDF Downloads 12921561 Volatility and Stylized Facts
Authors: Kalai Lamia, Jilani Faouzi
Abstract:
Measuring and controlling risk is one of the most attractive issues in finance. With the persistence of uncontrolled and erratic stocks movements, volatility is perceived as a barometer of daily fluctuations. An objective measure of this variable seems then needed to control risks and cover those that are considered the most important. Non-linear autoregressive modeling is our first evaluation approach. In particular, we test the presence of “persistence” of conditional variance and the presence of a degree of a leverage effect. In order to resolve for the problem of “asymmetry” in volatility, the retained specifications point to the importance of stocks reactions in response to news. Effects of shocks on volatility highlight also the need to study the “long term” behaviour of conditional variance of stocks returns and articulate the presence of long memory and dependence of time series in the long run. We note that the integrated fractional autoregressive model allows for representing time series that show long-term conditional variance thanks to fractional integration parameters. In order to stop at the dynamics that manage time series, a comparative study of the results of the different models will allow for better understanding volatility structure over the Tunisia stock market, with the aim of accurately predicting fluctuation risks.Keywords: asymmetry volatility, clustering, stylised facts, leverage effect
Procedia PDF Downloads 29921560 Memory, Self, and Time: A Bachelardian Perspective
Authors: Michael Granado
Abstract:
The French philosopher Gaston Bachelard’s philosophy of time is articulated in his two works on the subject, the Intuition of the Instant (1932) and his The Dialectic of Duration (1936). Both works present a systematic methodology predicated upon the assumption that our understanding of time has radically changed as a result of Einstein and subsequently needs to be reimagined. Bachelard makes a major distinction in his discussion of time: 1. Time as it is (physical time), 2. Time as we experience it (phenomenological time). This paper will focus on the second distinction, phenomenological time, and explore the connections between Bachelard’s work and contemporary psychology. Several aspects of Bachelard’s philosophy of time nicely complement our current understanding of memory and self and clarify how the self relates to experienced time. Two points, in particular, stand out; the first is the relative nature of subjective time, and the second is the implications of subjective time in the formation of the narrative self. Bachelard introduces two philosophical concepts to explain these points: rhythmanalysis and reverie. By exploring these concepts, it will become apparent that there is an undeniable link between memory, self, and time. Through the use of narrative self, the individual connects and links memories and time together to form a sense of personal identity.Keywords: Gaston Bachelard, memory, self, time
Procedia PDF Downloads 16521559 Don't Just Guess and Slip: Estimating Bayesian Knowledge Tracing Parameters When Observations Are Scant
Authors: Michael Smalenberger
Abstract:
Intelligent tutoring systems (ITS) are computer-based platforms which can incorporate artificial intelligence to provide step-by-step guidance as students practice problem-solving skills. ITS can replicate and even exceed some benefits of one-on-one tutoring, foster transactivity in collaborative environments, and lead to substantial learning gains when used to supplement the instruction of a teacher or when used as the sole method of instruction. A common facet of many ITS is their use of Bayesian Knowledge Tracing (BKT) to estimate parameters necessary for the implementation of the artificial intelligence component, and for the probability of mastery of a knowledge component relevant to the ITS. While various techniques exist to estimate these parameters and probability of mastery, none directly and reliably ask the user to self-assess these. In this study, 111 undergraduate students used an ITS in a college-level introductory statistics course for which detailed transaction-level observations were recorded, and users were also routinely asked direct questions that would lead to such a self-assessment. Comparisons were made between these self-assessed values and those obtained using commonly used estimation techniques. Our findings show that such self-assessments are particularly relevant at the early stages of ITS usage while transaction level data are scant. Once a user’s transaction level data become available after sufficient ITS usage, these can replace the self-assessments in order to eliminate the identifiability problem in BKT. We discuss how these findings are relevant to the number of exercises necessary to lead to mastery of a knowledge component, the associated implications on learning curves, and its relevance to instruction time.Keywords: Bayesian Knowledge Tracing, Intelligent Tutoring System, in vivo study, parameter estimation
Procedia PDF Downloads 17221558 A Script for Presentation to the Management of a Teaching Hospital on MYCIN: A Clinical Decision Support System
Authors: Rashida Suleiman, Asamoah Jnr. Boakye, Suleiman Ahmed Ibn Ahmed
Abstract:
In recent years, there has been an enormous success in discoveries of scientific knowledge in medicine coupled with the advancement of technology. Despite all these successes, diagnoses and treatment of diseases have become complex. MYCIN is a groundbreaking illustration of a clinical decision support system (CDSS), which was developed to assist physicians in the diagnosis and treatment of bacterial infections by providing suggestions for antibiotic regimens. MYCIN was one of the earliest expert systems to demonstrate how CDSSs may assist human decision-making in complicated areas. Relevant databases were searched using google scholar, PubMed and general Google search, which were peculiar to clinical decision support systems. The articles were then screened for a comprehensive overview of the functionality, consultative style and statistical usage of MYCIN, a clinical decision support system. Inferences drawn from the articles showed some usage of MYCIN for problem-based learning among clinicians and students in some countries. Furthermore, the data demonstrated that MYCIN had completed clinical testing at Stanford University Hospital following years of research. The system (MYCIN) was shown to be extremely accurate and effective in diagnosing and treating bacterial infections, and it demonstrated how CDSSs might enhance clinical decision-making in difficult circumstances. Despite the challenges MYCIN presents, the benefits of its usage to clinicians, students and software developers are enormous.Keywords: clinical decision support system, MYCIN, diagnosis, bacterial infections, support systems
Procedia PDF Downloads 14521557 Artificial Neural Network for Forecasting of Daily Reservoir Inflow: Case Study of the Kotmale Reservoir in Sri Lanka
Authors: E. U. Dampage, Ovindi D. Bandara, Vinushi S. Waraketiya, Samitha S. R. De Silva, Yasiru S. Gunarathne
Abstract:
The knowledge of water inflow figures is paramount in decision making on the allocation for consumption for numerous purposes; irrigation, hydropower, domestic and industrial usage, and flood control. The understanding of how reservoir inflows are affected by different climatic and hydrological conditions is crucial to enable effective water management and downstream flood control. In this research, we propose a method using a Long Short Term Memory (LSTM) Artificial Neural Network (ANN) to assist the aforesaid decision-making process. The Kotmale reservoir, which is the uppermost reservoir in the Mahaweli reservoir complex in Sri Lanka, was used as the test bed for this research. The ANN uses the runoff in the Kotmale reservoir catchment area and the effect of Sea Surface Temperatures (SST) to make a forecast for seven days ahead. Three types of ANN are tested; Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), and LSTM. The extensive field trials and validation endeavors found that the LSTM ANN provides superior performance in the aspects of accuracy and latency.Keywords: convolutional neural network, CNN, inflow, long short-term memory, LSTM, multi-layer perceptron, MLP, neural network
Procedia PDF Downloads 15121556 Text Mining of Veterinary Forums for Epidemiological Surveillance Supplementation
Authors: Samuel Munaf, Kevin Swingler, Franz Brülisauer, Anthony O’Hare, George Gunn, Aaron Reeves
Abstract:
Web scraping and text mining are popular computer science methods deployed by public health researchers to augment traditional epidemiological surveillance. However, within veterinary disease surveillance, such techniques are still in the early stages of development and have not yet been fully utilised. This study presents an exploration into the utility of incorporating internet-based data to better understand the smallholder farming communities within Scotland by using online text extraction and the subsequent mining of this data. Web scraping of the livestock fora was conducted in conjunction with text mining of the data in search of common themes, words, and topics found within the text. Results from bi-grams and topic modelling uncover four main topics of interest within the data pertaining to aspects of livestock husbandry: feeding, breeding, slaughter, and disposal. These topics were found amongst both the poultry and pig sub-forums. Topic modeling appears to be a useful method of unsupervised classification regarding this form of data, as it has produced clusters that relate to biosecurity and animal welfare. Internet data can be a very effective tool in aiding traditional veterinary surveillance methods, but the requirement for human validation of said data is crucial. This opens avenues of research via the incorporation of other dynamic social media data, namely Twitter and Facebook/Meta, in addition to time series analysis to highlight temporal patterns.Keywords: veterinary epidemiology, disease surveillance, infodemiology, infoveillance, smallholding, social media, web scraping, sentiment analysis, geolocation, text mining, NLP
Procedia PDF Downloads 9821555 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things
Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane
Abstract:
In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm
Procedia PDF Downloads 21221554 Internet of Things in Higher Education: Implications for Students with Disabilities
Authors: Scott Hollier, Ruchi Permvattana
Abstract:
The purpose of this abstract is to share the findings of a recently completed disability-related Internet of Things (IoT) project undertaken at Curtin University in Australia. The project focused on identifying how IoT could support people with disabilities with their educational outcomes. To achieve this, the research consisted of an analysis of current literature and interviews conducted with students with vision, hearing, mobility and print disabilities. While the research acknowledged the ability to collect data with IoT is now a fairly common occurrence, its benefits and applicability still need to be grounded back into real-world applications. Furthermore, it is important to consider if there are sections of our society that may benefit from these developments and if those benefits are being fully realised in a rush by large companies to achieve IoT dominance for their particular product or digital ecosystem. In this context, it is important to consider a group which, to our knowledge, has had little specific mainstream focus in the IoT area –people with disabilities. For people with disabilities, the ability for every device to interact with us and with each other has the potential to yield significant benefits. In terms of engagement, the arrival of smart appliances is already offering benefits such as the ability for a person in a wheelchair to give verbal commands to an IoT-enabled washing machine if the buttons are out of reach, or for a blind person to receive a notification on a smartphone when dinner has finished cooking in an IoT-enabled microwave. With clear benefits of IoT being identified for people with disabilities, it is important to also identify what implications there are for education. With higher education being a critical pathway for many people with disabilities in finding employment, the question as to whether such technologies can support the educational outcomes of people with disabilities was what ultimately led to this research project. This research will discuss several significant findings that have emerged from the research in relation to how consumer-based IoT can be used in the classroom to support the learning needs of students with disabilities, how industrial-based IoT sensors and actuators can be used to monitor and improve the real-time learning outcomes for the delivery of lectures and student engagement, and a proposed method for students to gain more control over their learning environment. The findings shared in this presentation are likely to have significant implications for the use of IoT in the classroom through the implementation of affordable and accessible IoT solutions and will provide guidance as to how policies can be developed as the implications of both benefits and risks continue to be considered by educators.Keywords: disability, higher education, internet of things, students
Procedia PDF Downloads 11921553 Farmers Perception in Pesticide Usage in Curry Leaf (Murraya koeinigii (L.))
Authors: Swarupa Shashi Senivarapu Vemuri
Abstract:
Curry leaf (Murraya koeinigii (L.)) exported from India had insecticide residues above maximum residue limits, which are hazardous to consumer health and caused rejection of the commodity at the point of entry in Europe and middle east resulting in a check on export of curry leaf. Hence to study current pesticide usage patterns in major curry leaf growing areas, a survey on pesticide use pattern was carried out in curry leaf growing areas in Guntur districts of Andhra Pradesh during 2014-15, by interviewing farmers growing curry leaf utilizing the questionnaire to assess their knowledge and practices on crop cultivation, general awareness on pesticide recommendations and use. Education levels of farmers are less, where 13.96 per cent were only high school educated, and 13.96% were illiterates. 18.60% farmers were found cultivating curry leaf crop in less than 1 acre of land, 32.56% in 2-5 acres, 20.93% in 5-10 acres and 27.91% of the farmers in more than 10 acres of land. Majority of the curry leaf farmers (93.03%) used pesticide mixtures rather than applying single pesticide at a time, basically to save time, labour, money and to combat two or more pests with single spray. About 53.48% of farmers applied pesticides at 2 days interval followed by 34.89% of the farmers at 4 days interval, and about 11.63% of the farmers sprayed at weekly intervals. Only 27.91% of farmers thought that the quantity of pesticides used at their farm is adequate, 90.69% of farmers had perception that pesticides are helpful in getting good returns. 83.72% of farmers felt that crop change is the only way to control sucking pests which damages whole crop. About 4.65% of the curry leaf farmers opined that integrated pest management practices are alternative to pesticides and only 11.63% of farmers felt natural control as an alternative to pesticides. About 65.12% of farmers had perception that high pesticide dose will give higher yields. However, in general, Curry leaf farmers preferred to contact pesticide dealers (100%) and were not interested in contacting either agricultural officer or a scientist. Farmers were aware of endosulfan ban 93.04%), in contrast, only 65.12, per cent of farmers knew about the ban of monocrotophos on vegetables. Very few farmers knew about pesticide residues and decontamination by washing. Extension educational interventions are necessary to produce fresh curry leaf free from pesticide residues.Keywords: Curry leaf, decontamination, endosulfan, leaf roller, psyllids, tetranychid mite
Procedia PDF Downloads 33521552 EMG Based Orthosis for Upper Limb Rehabilitation in Hemiparesis Patients
Authors: Nancy N. Sharmila, Aparna Mishra
Abstract:
Hemiparesis affects almost 80% of stroke patients each year. It is marked by paralysis or weakness on one half of the body. Our model provides both assistance and physical therapy for hemiparesis patients for swift recovery. In order to accomplish our goal a force is provided that pulls the forearm up (as in flexing the arm), and pushes the forearm down (as in extending the arm), which will also assist the user during ADL (Activities of Daily Living). The model consists of a mechanical component which is placed around the patient’s bicep and an EMG control circuit to assist patients in daily activities, which makes it affordable and easy to use. In order to enhance the neuromuscular system’s effectiveness in synchronize the movement, proprioceptive neuromuscular facilitation (PNF) concept is used. The EMG signals are acquired from the unaffected arm as an input to drive the orthosis. This way the patient is invigorated to use the orthosis for regular exercise.Keywords: EMG, hemiparesis, orthosis, rehabilitation
Procedia PDF Downloads 44521551 Let It Rain In Our Conscious To Flourish Our Individual Self Like A Sakura: The Balance Model From Ppt And Rain Spiritual Method Used In A Drugs Prevention Program For Teenagers In A Psychoeducational Manner
Authors: Moise Alin Ionuț Cornel
Abstract:
In a pilot lesson of prevention of consumption drugs in a classroom of teenager`s where the school want them to know how to manage their thoughts and emotions to protect themself an to be strong in an possible environment of drugs consumption. At this classroom was applied the RAIN(Recognize, Accept, Investigation,Non-identify) spiritual method and the balance model from positive and transcultural psychotherapy (PPT) in a manner of a game play for them to understand the methods in an individual experience. The balance model from PPT with his 4 parts and used in 3 ways, and the RAIN spiritual method was used to see how the teenager`s can bring clarity about theirs individual self and how they spend the time and energy in the daily life. The 3 ways of how they can used this model was explained like a analogy with the 3 periods of the SAKURA (Japanese cherry) flourish (kaika, mankai and chiru). The teenager`s received a new perspective and in the same time new tools from the spiritual point of view combined with the psychotherapeutic point of view to manage their thoughts, emotions, time and energy in the form of a psychoeducational game to be able to prevent the use of drugs.Keywords: addiction, drugs consumption prevention education, psychotherapy, Self, Spirituality, teenagers
Procedia PDF Downloads 7021550 Design and Implementation a Virtualization Platform for Providing Smart Tourism Services
Authors: Nam Don Kim, Jungho Moon, Tae Yun Chung
Abstract:
This paper proposes an Internet of Things (IoT) based virtualization platform for providing smart tourism services. The virtualization platform provides a consistent access interface to various types of data by naming IoT devices and legacy information systems as pathnames in a virtual file system. In the other words, the IoT virtualization platform functions as a middleware which uses the metadata for underlying collected data. The proposed platform makes it easy to provide customized tourism information by using tourist locations collected by IoT devices and additionally enables to create new interactive smart tourism services focused on the tourist locations. The proposed platform is very efficient so that the provided tourism services are isolated from changes in raw data and the services can be modified or expanded without changing the underlying data structure.Keywords: internet of things (IoT), IoT platform, serviceplatform, virtual file system (VSF)
Procedia PDF Downloads 50221549 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress
Authors: Zhiyong Li, Hiroshi Katayama
Abstract:
Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)
Procedia PDF Downloads 32521548 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture
Authors: Takumi Shindo, Koji Okamura
Abstract:
The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.Keywords: ICN, information centric network, CCN, energy
Procedia PDF Downloads 33721547 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 34521546 A Study to Explore the Views of Students regarding E-Learning as an Instructional Tool at University Level
Authors: Zafar Iqbal
Abstract:
This study involved students of 6th semester enrolled in a Bachelor of Computer Science Program at university level. In this era of science and technology, e-learning can be helpful for grassroots in providing them access to education tenant in less developed areas. It is a potential substitute of face-to-face teaching being used in different countries. The purpose of the study was to explore the views of students about e-learning (Facebook) as an instructional tool. By using purposive sampling technique an intact class of 30 students included both male and female were selected where e-learning was used as an instructional tool. The views of students were explored through qualitative approach by using focus group interviews. The approach was helpful to develop comprehensive understanding of students’ views towards e- learning. In addition, probing questions were also asked and recorded. Data was transcribed, generated nodes and then coded text against these nodes. For this purpose and further analysis, NVivo 10 software was used. Themes were generated and tangibly presented through cluster analysis. Findings were interesting and provide sufficient evidence that face book is a subsequent e-learning source for students of higher education. Students acknowledged it as best source of learning and it was aligned with their academic and social behavior. It was not time specific and therefore, feasible for students who work day time and can get on line access to the material when they got free time. There were some distracters (time wasters) reported by the students but can be minimized by little effort. In short, e-learning is need of the day and potential learning source for every individual who have access to internet living at any part of the globe.Keywords: e-learning, facebook, instructional tool, higher education
Procedia PDF Downloads 37421545 Properties of Self-Compacting Concrete Mixed with Fly Ash
Authors: Abhinandan Singh Gill, Gurbir Kaur Jawanda
Abstract:
Since the introduction of self-consolidating concrete (SCC) in Japan during the late 1980’s, acceptance and usage of this concrete in the construction industry has been steadily gaining momentum. In the United States, the usage of SCC has been spearheaded by the precast concrete industry. Good SCC must possess the following key fresh properties: filling ability, passing ability, and resistance to segregation. Self-compacting concrete is one of 'the most revolutionary developments' in concrete research; this concrete is able to flow and to fill the most restocked places of the form work without vibration. There are several methods for testing its properties. In the fresh state: the most frequently used are slump flow test, L box and V-funnel. This work presents properties of self-compacting concrete, mixed with fly ash. The test results for acceptance characteristics of self-compacting concrete such as slump flow; V-funnel and L-Box are presented. Further, the compressive strength at the ages of 7, 28 days was also determined and results are included here.Keywords: compressive strength, fly ash, self-compacting concrete, slump flow test, super plasticizer
Procedia PDF Downloads 41121544 21st Century Business Dynamics: Acting Local and Thinking Global through Extensive Business Reporting Language (XBRL)
Authors: Samuel Faboyede, Obiamaka Nwobu, Samuel Fakile, Dickson Mukoro
Abstract:
In the present dynamic business environment of corporate governance and regulations, financial reporting is an inevitable and extremely significant process for every business enterprise. Several financial elements such as Annual Reports, Quarterly Reports, ad-hoc filing, and other statutory/regulatory reports provide vital information to the investors and regulators, and establish trust and rapport between the internal and external stakeholders of an organization. Investors today are very demanding, and emphasize greatly on authenticity, accuracy, and reliability of financial data. For many companies, the Internet plays a key role in communicating business information, internally to management and externally to stakeholders. Despite high prominence being attached to external reporting, it is disconnected in most companies, who generate their external financial documents manually, resulting in high degree of errors and prolonged cycle times. Chief Executive Officers and Chief Financial Officers are increasingly susceptible to endorsing error-laden reports, late filing of reports, and non-compliance with regulatory acts. There is a lack of common platform to manage the sensitive information – internally and externally – in financial reports. The Internet financial reporting language known as eXtensible Business Reporting Language (XBRL) continues to develop in the face of challenges and has now reached the point where much of its promised benefits are available. This paper looks at the emergence of this revolutionary twenty-first century language of digital reporting. It posits that today, the world is on the brink of an Internet revolution that will redefine the ‘business reporting’ paradigm. The new Internet technology, eXtensible Business Reporting Language (XBRL), is already being deployed and used across the world. It finds that XBRL is an eXtensible Markup Language (XML) based information format that places self-describing tags around discrete pieces of business information. Once tags are assigned, it is possible to extract only desired information, rather than having to download or print an entire document. XBRL is platform-independent and it will work on any current or recent-year operating system, or any computer and interface with virtually any software. The paper concludes that corporate stakeholders and the government cannot afford to ignore the XBRL. It therefore recommends that all must act locally and think globally now via the adoption of XBRL that is changing the face of worldwide business reporting.Keywords: XBRL, financial reporting, internet, internal and external reports
Procedia PDF Downloads 28621543 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection
Authors: Jinming Ma, Tianbing Xia, Janusz Getta
Abstract:
This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory
Procedia PDF Downloads 18121542 Effects of Corynebacterium cutis Lysate Administration on Hematology and Biochemistry Parameters with PPR Vaccine
Authors: Burak Dik, Oguzhan Avci, Irmak Dik, Emre Bahcivan
Abstract:
The objective of this study was to evaluate the effects of alone and combined administration of Peste des petits ruminants (PPR) vaccine with Corynebacterium cutis lysate (CCL) on the hematology and biochemistry parameters levels in sheep. CCL and PPR vaccine changes cell and organ activity. In this study, 12 ewes were divided into equal groups; first group; PPR vaccine was applied only one time 1 mL subcutan of armpit on 6 sheep, and the second group; CCL (1 mL) and PPR vaccine (1 mL) combination were applied only one time subcutan of armpit on 6 sheep. Blood samples were collected before treatment (0. hour, control) and after treatment (1, 3, 7, 14, 21 and 28 days) from the sheep. Plasma and serum samples were evaluated for hematology and biochemistry parameters and there were statistically significant in sheep. In conclusion, combined usage of PPR vaccine with CCL may not influence cells and organs. Repeated CCL treatment with vaccine can create hepatotoxic, renal and bone marrow effects in sheep.Keywords: Corynebacterium cutis lysate, hematology, peste des petits ruminants, vaccine
Procedia PDF Downloads 25121541 Forms of Promoting and Disseminating Traditional Local Wisdom to Create Occupations among the Elderly in Nonmueng Community, Muang Sub-District, Baan Doong District, Udonthani Province
Authors: Pennapa Palapin
Abstract:
This research sought to study the traditional local wisdom and study the promotion and dissemination of traditional local wisdom in order to find the forms of promotion and dissemination of traditional local wisdom to create occupations among the elderly at Nonmueng Community, Muang Sub-District, Baan Dung District, UdonThani Province. The criterion used to select the research sample group was, being a person having a role involved in the promotion and dissemination of traditional local wisdom to create occupations among the elderly at Nonmueng Community, Muang Sub-District, Baan Dung District, UdonThani Province; being an experienced person whom the residents of Nonmueng Community find trustworthy; and having lived in Nonmueng Community for a long time so as to be able to see the development and change that occurs. A total of 16 people were selected. Data was gathered as a qualitative study, through semi-structured in-depth interviews. The collected data was then summarised and discussed according to the research objectives. Finally, the data was presented in a narrative format. Results found that the identifying traditional local wisdom of the community (which grew from the residents’ experience and beneficial usage in daily life, passed down from generation to generation) was the weaving of cloth and basketry. As for the manner of promotion and dissemination of traditional local wisdom, the skills were passed down through teaching by example to family members, relatives and others in the community. This was done by the elders or elderly members of the community. For the promotion and dissemination of traditional local wisdom to create occupations among the elderly, the traditional local wisdom should be supported in every way through participation of the community members. For example, establish a museum of traditional local wisdom for the collection of traditional local wisdom in various fields, both in the past and at present. This would be a source of pride for the community, in order to make traditional local wisdom widely known and to create income for the community’s elderly. Additional ways include exhibitions of products made by traditional local wisdom, finding both domestic and international markets, as well as building both domestic and international networks aiming to find opportunities to market products made by traditional local wisdom.Keywords: traditional local wisdom, occupation, elderly, community
Procedia PDF Downloads 30121540 Evaluation of Cooperative Hand Movement Capacity in Stroke Patients Using the Cooperative Activity Stroke Assessment
Authors: F. A. Thomas, M. Schrafl-Altermatt, R. Treier, S. Kaufmann
Abstract:
Stroke is the main cause of adult disability. Especially upper limb function is affected in most patients. Recently, cooperative hand movements have been shown to be a promising type of upper limb training in stroke rehabilitation. In these movements, which are frequently found in activities of daily living (e.g. opening a bottle, winding up a blind), the force of one upper limb has to be equally counteracted by the other limb to successfully accomplish a task. The use of standardized and reliable clinical assessments is essential to evaluate the efficacy of therapy and the functional outcome of a patient. Many assessments for upper limb function or impairment are available. However, the evaluation of cooperative hand movement tasks are rarely included in those. Thus, the aim of this study was (i) to develop a novel clinical assessment (CASA - Cooperative Activity Stroke Assessment) for the evaluation of patients’ capacity to perform cooperative hand movements and (ii) to test its inter- and interrater reliability. Furthermore, CASA scores were compared to current gold standard assessments for upper extremity in stroke patients (i.e. Fugl-Meyer Assessment, Box & Blocks Test). The CASA consists of five cooperative activities of daily living including (1) opening a jar, (2) opening a bottle, (3) open and closing of a zip, (4) unscrew a nut and (5) opening a clipbox. Here, the goal is to accomplish the tasks as fast as possible. In addition to the quantitative rating (i.e. time) which is converted to a 7-point scale, also the quality of the movement is rated in a 4-point scale. To test the reliability of CASA, fifteen stroke subjects were tested within a week twice by the same two raters. Intra-and interrater reliability was calculated using the intraclass correlation coefficient (ICC) for total CASA score and single items. Furthermore, Pearson-correlation was used to compare the CASA scores to the scores of Fugl-Meyer upper limb assessment and the box and blocks test, which were assessed in every patient additionally to the CASA. ICC scores of the total CASA score indicated an excellent- and single items established a good to excellent inter- and interrater reliability. Furthermore, the CASA score was significantly correlated to the Fugl-Meyer and Box & Blocks score. The CASA provides a reliable assessment for cooperative hand movements which are crucial for many activities of daily living. Due to its non-costly setup, easy and fast implementation, we suggest it to be well suitable for clinical application. In conclusion, the CASA is a useful tool in assessing the functional status and therapy related recovery in cooperative hand movement capacity in stroke patients.Keywords: activitites of daily living, clinical assessment, cooperative hand movements, reliability, stroke
Procedia PDF Downloads 31921539 Media Richness Perspective on Web 2.0 Usage for Knowledge Creation: The Case of the Cocoa Industry in Ghana
Authors: Albert Gyamfi
Abstract:
Cocoa plays critical role in the socio-economic development of Ghana. Meanwhile, smallholder farmers most of whom are illiterate dominate the industry. According to the cocoa-based agricultural knowledge and information system (AKIS) model knowledge is created and transferred to the industry between three key actors: cocoa researchers, extension experts, and cocoa farmers. Dwelling on the SECI model, the media richness theory (MRT), and the AKIS model, a conceptual model of web 2.0-based AKIS model (AKIS 2.0) is developed and used to assess the possible effects of social media usage for knowledge creation in the Ghanaian cocoa industry. A mixed method approach with a survey questionnaire was employed, and a second-order multi-group structural equation model (SEM) was used to analyze the data. The study concludes that the use of web 2.0 applications for knowledge creation would lead to sustainable interactions among the key knowledge actors for effective knowledge creation in the cocoa industry in Ghana.Keywords: agriculture, cocoa, knowledge, media, web 2.0
Procedia PDF Downloads 33321538 Correlation Analysis of Energy Use, Architectural Design and Residential Lifestyle in Japan Smart Community
Authors: Tran Le Na, Didit Novianto, Yoshiaki Ushifusa, Weijun Gao
Abstract:
This paper introduces the characteristics of Japanese residential lifestyle and Japanese Architectural housing design, meanwhile, summarizes the results from an analysis of energy use of 12 households in electric-only multi dwellings in Higashida Smart Community, Kitakyushu, Japan. Using hourly load and daily load data collected from smart meter, we explore correlations of energy use in households according to the incentive of different levels of architectural characteristics and lifestyle, following three factors: Space (Living room, Kitchen, Bedroom, Bathroom), Time (daytime and night time, weekdays and weekend) and User (Elderly, Parents, Kids). The energy consumption reports demonstrated that the essential demand of household’s response to variable factors. From that exploratory analysis, we can define the role of housing equipment layout and spatial layout in residential housing design. Likewise, determining preferred spaces and time use can help to optimize energy consumption in households. This paper contributes to the application of Smart Home Energy Management System in Smart Community in Japan and provides a good experience to other countries.Keywords: smart community, energy efficiency, architectural housing design, residential lifestyle
Procedia PDF Downloads 20421537 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 8021536 Hesperidin through Acting on Proliferating Cell Nuclear Antigen and Follicle Stimulating Hormone Receptor Expression Decreased Ovarian Toxicity Induced by Malathion
Authors: Mahnaz Zarein, Hamed Shoorei
Abstract:
Background: Malathion is one of the most toxic agents widely used in agriculture throughout the world. This agent has adverse effects on the functions of multiple organs such as the reproductive system in both male and female genders. On the one hand, daily use of antioxidant supplementations such as hesperidin is capable to neutralize the deleterious impacts of malathion. Therefore, in this experimental study, the protective effects of hesperidin against ovarian toxicity induced by malathion were investigated. Material & Methods: Balb/c adult mice (n=32) were randomly divided into 4 groups including 1) the control group, treated with normal saline, 2) the Mal group, treated with 30mg/kg malathion, daily for 1 month, 3) Mal + Hes group, treated with 20 mg/kg malathion and 20 mg/kg hesperidin, daily for 1 month, and 5) Hes group, treated with 20 mg/kg hesperidin. At the end of the experimental period, mice were anesthetized and their drops of blood were collected to the assessment of some hormones such as LH, FSH, E2, and P4. Also, the right ovaries were used to H&E staining, and the left ovaries were used for IHC staining (PCNA and FSHR). Results: Histopathological assessments showed that the number of follicles, i.e. primordial, primary, and secondary, significantly decreased, while the atretic follicle counts remarkably increased compared to the control group (p<0.05). Hormonal levels revealed that the production of all mentioned hormones decreased in the Mal group in comparison with the control group (p<0.05). The expression of PCNA, as a proliferative marker, and FHSR, as a marker showing maturation, decreased when mice received malathion compared to the control group (p<0.05). Interestingly, treatment with hesperidin significantly neutralized the adverse effects of malathion on all mentioned parameters. Conclusion: Daily use of antioxidant supplementations such as hesperidin could alleviate the ovarian toxicity induced by malathion.Keywords: malathion, ovary, antioxidant hesperidin, FSHR PCNA, ovary
Procedia PDF Downloads 7521535 Green Extraction of Patchoulol from Patchouli Leaves Using Ultrasound-Assisted Ionic Liquids
Authors: G. C. Jadeja, M. A. Desai, D. R. Bhatt, J. K. Parikh
Abstract:
Green extraction techniques are fast paving ways into various industrial sectors due to the stringent governmental regulations leading to the banning of toxic chemicals’ usage and also due to the increasing health/environmental awareness. The present work describes the ionic liquids based sonication method for selectively extracting patchoulol from the leaves of patchouli. 1-Butyl-3-methylimidazolium tetrafluoroborate ([Bmim]BF4) and N,N,N,N’,N’,N’-Hexaethyl-butane-1,4-diammonium dibromide (dicationic ionic liquid - DIL) were selected for extraction. Ultrasound assisted ionic liquid extraction was employed considering concentration of ionic liquid (4–8 %, w/w), ultrasound power (50–150 W for [Bmim]BF4 and 20–80 W for DIL), temperature (30–50 oC) and extraction time (30–50 min) as major parameters influencing the yield of patchoulol. Using the Taguchi method, the parameters were optimized and analysis of variance (ANOVA) was performed to find the most influential factor in the selected extraction method. In case of [Bmim]BF4, the optimum conditions were found to be: 4 % (w/w) ionic liquid concentration, 50 W power, 30 oC temperature and extraction time of 30 min. The yield obtained under the optimum conditions was 3.99 mg/g. In case of DIL, the optimum conditions were obtained as 6 % (w/w) ionic liquid concentration, 80 W power, 30 oC temperature and extraction time of 40 min, for which the yield obtained was 4.03 mg/g. Temperature was found to be the most significant factor in both the cases. Extraction time was the insignificant parameter while extracting the product using [Bmim]BF4 and in case of DIL, power was found to be the least significant factor affecting the process. Thus, a green method of recovering patchoulol is proposed.Keywords: green extraction, ultrasound, patchoulol, ionic liquids
Procedia PDF Downloads 36221534 Analysis of the Strategic Value at the Usage of Green IT Application for the Organizational Product or Service in Order to Gain the Competitive Advantage; Case: E-Money of a Telecommunication Firm in Indonesia
Authors: I Putu Deny Arthawan Sugih Prabowo, Eko Nugroho, Rudy Hartanto
Abstract:
Known, Green IT is a concept about how to use the technology (IT) wisely, efficiently, and environmentally. However, it exists as the consequence of the rapid-growth of the technology (especially IT) currently. Not only for the environments, the usage of Green IT applications, e.g. Cloud Computing (Cloud Storage) and E-Money (E-Cash), also gives its benefits for the organizational business strategy (especially the organizational product/service strategy) in order to gain the organizational competitive advantage (to be the market leader). This paper takes the case at E-Money as a Value-Added Services (VAS) of a telecommunication firm (company) in Indonesia which it also competes with the competitors’ similar product (service). Although it has been a popular telecommunication firm’s product/service, but its strategic values for the organization (firm) is still unknown, and therefore, the aim of this paper is for analyzing its strategic values for gaining the organizational competitive advantage. However, in this paper, its strategic value analysis is viewed by how to assess (consider) its strategic benefits and also manage the challenges or risks of its implementation at the organization as an organizational product/service. Then the paper uses a research model for investigating the influences of both perceived risks and the organizational cultures to the usage of Green IT Application at the organization and also both the usage of Green IT Application at the organization and the threats-challenges of the organizational products/services to the competitive advantage of the organizational products/services. However, the paper uses the quantitative research method (collecting the information from the field respondents by using the research questionnaires) and then, the primary data is analyzed by both descriptive and inferential statistics. Also in this paper, SmartPLS is used for analyzing the primary data by the quantitative research method. Besides using the quantitative research method, the paper also uses the qualitative research method, such as interviewing the field respondent and/or directly field observation, for deeply confirming the quantitative research method’s analysis results at the certain domain, e.g. both organizational cultures and internal processes that support the usage of Green IT applications for the organizational product/service (E-Money in this paper case). However, the paper is still at an infant stage of in-progress research. Then the paper’s results may be used as a reference for the organization (firm or company) in developing the organizational business strategies, especially about the organizational product/service that relates to Green IT applications. Besides it, the paper may also be the future study, e.g. the influence of knowledge transfer about E-Money and/or other Green IT application-based products/services to the organizational service performance that relates to the product (service) in order to gain the competitive advantage.Keywords: Green IT, competitive advantage, strategic value, organization (firm or company), organizational product (service)
Procedia PDF Downloads 30521533 Evaluation of Computer Usage and Related Health Hazards
Authors: B. O. Adegoke, B. O. Ola, D. T. Ademiluyi
Abstract:
This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.Keywords: computer-related health hazard, musculoskeletal disorders, computer usage, work ability index
Procedia PDF Downloads 489