Search results for: diffusion of information
10882 A Qualitative Exploration of How Brazilian Immigrant Mothers Living in the United States Obtain Information about Physical Activity and Screen-Viewing for Their Young Children
Authors: Ana Cristina Lindsay, Mary L. Greaney
Abstract:
Background: Racial/ethnic minority children of low-income immigrant families remain at increased risk of obesity. Consistent with high rates of childhood obesity among racial/ethnic minority children are high rates of physical inactivity and increased levels of sedentary behaviors (e.g., TV and other screen viewing). Brazilians comprise a fast-growing immigrant population group in the US, yet little research has focused on the health issues affecting Brazilian immigrant children. The purpose of this qualitative study was to explore how Brazilian-born immigrant mothers living in the United States obtain information about physical activity and screen-time for their young children. Methods: Qualitative research including focus groups with Brazilian immigrant mothers of preschool-age children living in the U.S. Results: Results revealed that Brazilian immigrant mothers obtain information on young children’s physical activity and screen-time from a variety of sources including interpersonal communication, television and magazines, government health care programs (WIC program) and professionals (e.g., nurses and pediatricians). A noteworthy finding is the significant role of foreign information sources (Brazilian TV shows and magazines) on mothers’ access to information about these early behaviors. Future research is needed to quantify and better understanding Brazilian parents’ access to accurate and sound information related to young children’s physical activity and screen-viewing behaviors. Conclusions: To our knowledge, no existing research has examined how Brazilian immigrant mothers living in the United States obtain information about these behaviors. This information is crucial for the design of culturally appropriate early childhood obesity prevention interventions tailored to the specific needs of this ethnic group.Keywords: physical activity, scree-time, information, immigrant, mothers, Brazilian, United States
Procedia PDF Downloads 27510881 Information Theoretic Approach for Beamforming in Wireless Communications
Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif
Abstract:
Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.Keywords: beamforming, interference, mutual information, wireless communications
Procedia PDF Downloads 28010880 An Innovation Decision Process View in an Adoption of Total Laboratory Automation
Authors: Chia-Jung Chen, Yu-Chi Hsu, June-Dong Lin, Kun-Chen Chan, Chieh-Tien Wang, Li-Ching Wu, Chung-Feng Liu
Abstract:
With fast advances in healthcare technology, various total laboratory automation (TLA) processes have been proposed. However, adopting TLA needs quite high funding. This study explores an early adoption experience by Taiwan’s large-scale hospital group, the Chimei Hospital Group (CMG), which owns three branch hospitals (Yongkang, Liouying and Chiali, in order by service scale), based on the five stages of Everett Rogers’ Diffusion Decision Process. 1.Knowledge stage: Over the years, two weaknesses exists in laboratory department of CMG: 1) only a few examination categories (e.g., sugar testing and HbA1c) can now be completed and reported within a day during an outpatient clinical visit; 2) the Yongkang Hospital laboratory space is dispersed across three buildings, resulting in duplicated investment in analysis instruments and inconvenient artificial specimen transportation. Thus, the senior management of the department raised a crucial question, was it time to process the redesign of the laboratory department? 2.Persuasion stage: At the end of 2013, Yongkang Hospital’s new building and restructuring project created a great opportunity for the redesign of the laboratory department. However, not all laboratory colleagues had the consensus for change. Thus, the top managers arranged a series of benchmark visits to stimulate colleagues into being aware of and accepting TLA. Later, the director of the department proposed a formal report to the top management of CMG with the results of the benchmark visits, preliminary feasibility analysis, potential benefits and so on. 3.Decision stage: This TLA suggestion was well-supported by the top management of CMG and, finally, they made a decision to carry out the project with an instrument-leasing strategy. After the announcement of a request for proposal and several vendor briefings, CMG confirmed their laboratory automation architecture and finally completed the contracts. At the same time, a cross-department project team was formed and the laboratory department assigned a section leader to the National Taiwan University Hospital for one month of relevant training. 4.Implementation stage: During the implementation, the project team called for regular meetings to review the results of the operations and to offer an immediate response to the adjustment. The main project tasks included: 1) completion of the preparatory work for beginning the automation procedures; 2) ensuring information security and privacy protection; 3) formulating automated examination process protocols; 4) evaluating the performance of new instruments and the instrument connectivity; 5)ensuring good integration with hospital information systems (HIS)/laboratory information systems (LIS); and 6) ensuring continued compliance with ISO 15189 certification. 5.Confirmation stage: In short, the core process changes include: 1) cancellation of signature seals on the specimen tubes; 2) transfer of daily examination reports to a data warehouse; 3) routine pre-admission blood drawing and formal inpatient morning blood drawing can be incorporated into an automatically-prepared tube mechanism. The study summarizes below the continuous improvement orientations: (1) Flexible reference range set-up for new instruments in LIS. (2) Restructure of the specimen category. (3) Continuous review and improvements to the examination process. (4) Whether installing the tube (specimen) delivery tracks need further evaluation.Keywords: innovation decision process, total laboratory automation, health care
Procedia PDF Downloads 41910879 Segmental Motion of Polymer Chain at Glass Transition Probed by Single Molecule Detection
Authors: Hiroyuki Aoki
Abstract:
The glass transition phenomenon has been extensively studied for a long time. The glass transition of polymer materials is assigned to the transition of the dynamics of the chain backbone segment. However, the detailed mechanism of the transition behavior of the segmental motion is still unclear. In the current work, the single molecule detection technique was employed to reveal the trajectory of the molecular motion of the single polymer chain. The center segment of poly(butyl methacrylate) chain was labeled by a perylenediimide dye molecule and observed by a highly sensitive fluorescence microscope in a defocus condition. The translational and rotational diffusion of the center segment in a single polymer chain was analyzed near the glass transition temperature. The direct observation of the individual polymer chains revealed the intermittent behavior of the segmental motion, indicating the spatial inhomogeneity.Keywords: glass transition, molecular motion, polymer materials, single molecule
Procedia PDF Downloads 33710878 A Conceptual Framework for Assessing the Development of Health Information Systems Enterprise Architecture Interoperability
Authors: Prosper Tafadzwa Denhere, Ephias Ruhode, Munyaradzi Zhou
Abstract:
Health Information Systems (HISs) interoperability is emerging to be the future of modern healthcare systems Enterprise Architecture (EA), where healthcare entities are seamlessly interconnected to share healthcare data. The reality that the healthcare industry has been characterised by an influx of fragmented stand-alone e-Health systems, which present challenges of healthcare information sharing across platforms, desires much attention for systems integration efforts. The lack of an EA conceptual framework resultantly crates the need for investigating an ideal solution to the objective of Health Information Systems interoperability development assessment. The study takes a qualitative exploratory approach through a design science research context. The research aims to study the various themes withdrawn from the literature that can help in the assessment of interoperable HISs development through a literature study. Themes derived from the study include HIS needs, HIS readiness, HIS constraints, and HIS technology integration elements and standards tied to the EA development architectural layers of The Open Group Architecture Framework (TOGAF) as an EA development methodology. Eventually, the themes were conceptualised into a framework reviewed by two experts. The essence of the study was to provide a framework within which interoperable EA of HISs should be developed.Keywords: enterprise architecture, eHealth, health information systems, interoperability
Procedia PDF Downloads 10510877 Iot-Based Interactive Patient Identification and Safety Management System
Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro
Abstract:
We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band
Procedia PDF Downloads 31110876 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 2910875 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand
Authors: Thossaporn Thossansin
Abstract:
This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices
Procedia PDF Downloads 32510874 The Effect of Manure Loaded Biochar on Soil Microbial Communities
Authors: T. Weber, D. MacKenzie
Abstract:
The script in this paper describes the use of advanced simulation environment using electronic systems (microcontroller, operational amplifiers, and FPGA). The simulation was used for non-linear dynamic systems behaviour with required observer structure working with parallel real-time simulation based on state-space representation. The proposed deposited model was used for electrodynamic effects including ionising effects and eddy current distribution also. With the script and proposed method, it is possible to calculate the spatial distribution of the electromagnetic fields in real-time and such systems. For further purpose, the spatial temperature distribution may also be used. With upon system, the uncertainties and disturbances may be determined. This provides the estimation of the more precise system states for the required system and additionally the estimation of the ionising disturbances that arise due to radiation effects in space systems. The results have also shown that a system can be developed specifically with the real-time calculation (estimation) of the radiation effects only. Electronic systems can take damage caused by impacts with charged particle flux in space or radiation environment. TID (Total Ionising Dose) of 1 Gy and Single Effect Transient (SET) free operation up to 50 MeVcm²/mg may assure certain functions. Single-Event Latch-up (SEL) results on the placement of several transistors in the shared substrate of an integrated circuit; ionising radiation can activate an additional parasitic thyristor. This short circuit between semiconductor-elements can destroy the device without protection and measurements. Single-Event Burnout (SEB) on the other hand, increases current between drain and source of a MOSFET and destroys the component in a short time. A Single-Event Gate Rupture (SEGR) can destroy a dielectric of semiconductor also. In order to be able to react to these processes, it must be calculated within a shorter time that ionizing radiation and dose is present. For this purpose, sensors may be used for the realistic evaluation of the diffusion and ionizing effects of the test system. For this purpose, the Peltier element is used for the evaluation of the dynamic temperature increases (dT/dt), from which a measure of the ionization processes and thus radiation will be detected. In addition, the piezo element may be used to record highly dynamic vibrations and oscillations to absorb impacts of charged particle flux. All available sensors shall be used to calibrate the spatial distributions also. By measured value of size and known location of the sensors, the entire distribution in space can be calculated retroactively or more accurately. With the formation, the type of ionisation and the direct effect to the systems and thus possible prevent processes can be activated up to the shutdown. The results show possibilities to perform more qualitative and faster simulations independent of space-systems and radiation environment also. The paper gives additionally an overview of the diffusion effects and their mechanisms.Keywords: cattle, biochar, manure, microbial activity
Procedia PDF Downloads 10310873 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach
Authors: Alev Atak
Abstract:
In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.Keywords: financial sentiment, machine learning, information disclosure, risk
Procedia PDF Downloads 9410872 Numerical Computation of Sturm-Liouville Problem with Robin Boundary Condition
Authors: Theddeus T. Akano, Omotayo A. Fakinlede
Abstract:
The modelling of physical phenomena, such as the earth’s free oscillations, the vibration of strings, the interaction of atomic particles, or the steady state flow in a bar give rise to Sturm-Liouville (SL) eigenvalue problems. The boundary applications of some systems like the convection-diffusion equation, electromagnetic and heat transfer problems requires the combination of Dirichlet and Neumann boundary conditions. Hence, the incorporation of Robin boundary condition in the analyses of Sturm-Liouville problem. This paper deals with the computation of the eigenvalues and eigenfunction of generalized Sturm-Liouville problems with Robin boundary condition using the finite element method. Numerical solutions of classical Sturm–Liouville problems are presented. The results show an agreement with the exact solution. High results precision is achieved with higher number of elements.Keywords: Sturm-Liouville problem, Robin boundary condition, finite element method, eigenvalue problems
Procedia PDF Downloads 36210871 Corrosion Monitoring of Weathering Steel in a Simulated Coastal-Industrial Environment
Authors: Thee Chowwanonthapunya, Junhua Dong, Wei Ke
Abstract:
The atmospheres in many cities along the coastal lines in the world have been rapidly changed to coastal-industrial atmosphere. Hence, it is vital to investigate the corrosion behavior of steel exposed to this kind of environment. In this present study, Electrochemical Impedance Spectrography (EIS) and film thickness measurements were applied to monitor the corrosion behavior of weathering steel covered with a thin layer of the electrolyte in a wet-dry cyclic condition, simulating a coastal-industrial environment at 25 oC and 60 % RH. The results indicate that in all cycles, the corrosion rate increases during the drying process due to an increase in anion concentration and an acceleration of oxygen diffusion enhanced by the effect of the thinning out of the electrolyte. During the wet-dry cyclic corrosion test, the long-term corrosion behavior of this steel depends on the periods of exposure. Corrosion process is first accelerated and then decelerated. The decelerating corrosion process is contributed to the formation of the protective rust, favored by the wet-dry cycle and the acid regeneration process during the rusting process.Keywords: atmospheric corrosion, EIS, low alloy, rust
Procedia PDF Downloads 44910870 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice
Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese
Abstract:
Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.Keywords: documentation, knowledge, patient care, patient’s information, training
Procedia PDF Downloads 19010869 Synthesis and in-Vitro Biological Activity of Novel Gallic Acid Derivatives
Authors: Hossein Mostafavi
Abstract:
A diversity of biological activities and pharmaceutical uses have been attributed to gallic acid derivatives such as antibacterial, anticancer, anti inflammatory. A series of gallic acid derivatives were synthesized, and their structure was confirmed by FT-IR, HNMR, CNMR, elemental analysis. In vitro biological activity of compounds was determined against Proteus vulgaris ATCC 7829, Escherichia coli ATCC 25922, as (Gram-negative) bacteria and bacillus cereus ATCC 11778, Staphylococus aureus ATCC 6538 as (Gram-positive) bacteria. Antibacterial susceptibility tests were done by use of the paper disc diffusion method on Mueller Hinton agar (Merck). Chloramiphenicol, Penicilline, Streptomycin and Tetracycline were standard reference antibiotics. The zone of inhibition against bacteria was measured after 24 hours at 37 °C. Compounds 3, 4, 5 were the main antibacterial compounds against Gram-negative bacteria but not Gram-positive.Keywords: gallic acid derivatives, antibacterial, antibiotics, inhibition
Procedia PDF Downloads 13610868 Critical Success Factors of Information Technology Projects
Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim
Abstract:
Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.Keywords: critical success factors, CSF, IT projects, IS projects, software development projects
Procedia PDF Downloads 40010867 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13410866 Development of a Technology Assessment Model by Patents and Customers' Review Data
Authors: Kisik Song, Sungjoo Lee
Abstract:
Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.Keywords: technology assessment, patents, citation information, opinion mining
Procedia PDF Downloads 46610865 Social Accountability: Persuasion and Debate to Contain Corruption
Authors: A. Lambert-Mogiliansky
Abstract:
In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.Keywords: accountability, corruption, persuasion, debate
Procedia PDF Downloads 38010864 In Vitro Studies on Antimicrobial Activities of Lactic Acid Bacteria Isolated from Fresh Fruits for Biocontrol of Pathogens
Authors: Okolie Pius Ifeanyi, Emerenini Emilymary Chima
Abstract:
Aims: The study investigated the diversity and identities of Lactic Acid Bacteria (LAB) isolated from different fresh fruits using Molecular Nested PCR analysis and the efficacy of cell free supernatants from Lactic Acid Bacteria (LAB) isolated from fresh fruits for in vitro control of some tomato pathogens. Study Design: Nested PCR approach was used in this study employing universal 16S rRNA gene primers in the first round PCR and LAB specific Primers in the second round PCR with the view of generating specific Nested PCR products for the LAB diversity present in the samples. The inhibitory potentials of supernatant obtained from LAB isolates of fruits origin that were molecularly characterized were investigated against some tomato phytopathogens using agar-well method with the view to develop biological agents for some tomato disease causing organisms. Methodology: Gram positive, catalase negative strains of LAB were isolated from fresh fruits on Man Rogosa and Sharpe agar (Lab M) using streaking method. Isolates obtained were molecularly characterized by means of genomic DNA extraction kit (Norgen Biotek, Canada) method. Standard methods were used for Nested Polymerase Chain Reaction (PCR) amplification targeting the 16S rRNA gene using universal 16S rRNA gene and LAB specific primers, agarose gel electrophoresis, purification and sequencing of generated Nested PCR products (Macrogen Inc., USA). The partial sequences obtained were identified by blasting in the non-redundant nucleotide database of National Center for Biotechnology Information (NCBI). The antimicrobial activities of characterized LAB against some tomato phytopathogenic bacteria which include (Xanthomonas campestries, Erwinia caratovora, and Pseudomonas syringae) were obtained by using the agar well diffusion method. Results: The partial sequences obtained were deposited in the database of National Centre for Biotechnology Information (NCBI). Isolates were identified based upon the sequences as Weissella cibaria (4, 18.18%), Weissella confusa (3, 13.64%), Leuconostoc paramensenteroides (1, 4.55%), Lactobacillus plantarum (8, 36.36%), Lactobacillus paraplantarum (1, 4.55%) and Lactobacillus pentosus (1, 4.55%). The cell free supernatants of LAB from fresh fruits origin (Weissella cibaria, Weissella confusa, Leuconostoc paramensenteroides, Lactobacillus plantarum, Lactobacillus paraplantarum and Lactobacillus pentosus) can inhibits these bacteria by creating clear zones of inhibition around the wells containing cell free supernatants of the above mentioned strains of lactic acid bacteria. Conclusion: This study shows that potentially LAB can be quickly characterized by molecular methods to specie level by nested PCR analysis of the bacteria isolate genomic DNA using universal 16S rRNA primers and LAB specific primer. Tomato disease causing organisms can be most likely biologically controlled by using extracts from LAB. This finding will reduce the potential hazard from the use of chemical herbicides on plant.Keywords: nested pcr, molecular characterization, 16s rRNA gene, lactic acid bacteria
Procedia PDF Downloads 41410863 Multiresolution Mesh Blending for Surface Detail Reconstruction
Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal
Abstract:
In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending
Procedia PDF Downloads 13910862 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia
Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez
Abstract:
The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis
Procedia PDF Downloads 23910861 Austenite Transformation in Duplex Stainless Steels under Fast Cooling Rates
Authors: L. O. Luengas, E. V. Morales, L. F. G. De Souza, I. S. Bott
Abstract:
Duplex Stainless Steels are well known for its good mechanical properties, and corrosion resistance. However, when submitted to heating, these features can be lost since the good properties are strongly dependent on the austenite-ferrite phase ratio which has to be approximately 1:1 to keep the phase balance. In a welded joint, the transformation kinetics at the heat affected zone (HAZ) is a function of the cooling rates applied which in turn are dependent on the heat input. The HAZ is usually ferritized at these temperatures, and it has been argued that small variations of the chemical composition can play a role in the solid state transformation sequence of ferrite to austenite during cooling. The δ → γ transformation has been reported to be massive and diffusionless due to the fast cooling rate, but it is also considered a diffusion controlled transformation. The aim of this work is to evaluate the effect of different heat inputs on the HAZ of two duplex stainless steels UNS S32304 and S32750, obtained by physical simulation.Keywords: duplex stainless steels, HAZ, microstructural characterization, physical simulation
Procedia PDF Downloads 27710860 Mutual Information Based Image Registration of Satellite Images Using PSO-GA Hybrid Algorithm
Authors: Dipti Patra, Guguloth Uma, Smita Pradhan
Abstract:
Registration is a fundamental task in image processing. It is used to transform different sets of data into one coordinate system, where data are acquired from different times, different viewing angles, and/or different sensors. The registration geometrically aligns two images (the reference and target images). Registration techniques are used in satellite images and it is important in order to be able to compare or integrate the data obtained from these different measurements. In this work, mutual information is considered as a similarity metric for registration of satellite images. The transformation is assumed to be a rigid transformation. An attempt has been made here to optimize the transformation function. The proposed image registration technique hybrid PSO-GA incorporates the notion of Particle Swarm Optimization and Genetic Algorithm and is used for finding the best optimum values of transformation parameters. The performance comparision obtained with the experiments on satellite images found that the proposed hybrid PSO-GA algorithm outperforms the other algorithms in terms of mutual information and registration accuracy.Keywords: image registration, genetic algorithm, particle swarm optimization, hybrid PSO-GA algorithm and mutual information
Procedia PDF Downloads 40810859 AINA: Disney Animation Information as Educational Resources
Authors: Piedad Garrido, Fernando Repulles, Andy Bloor, Julio A. Sanguesa, Jesus Gallardo, Vicente Torres, Jesus Tramullas
Abstract:
With the emergence and development of Information and Communications Technologies (ICTs), Higher Education is experiencing rapid changes, not only in its teaching strategies but also in student’s learning skills. However, we have noticed that students often have difficulty when seeking innovative, useful, and interesting learning resources for their work. This is due to the lack of supervision in the selection of good query tools. This paper presents AINA, an Information Retrieval (IR) computer system aimed at providing motivating and stimulating content to both students and teachers working on different areas and at different educational levels. In particular, our proposal consists of an open virtual resource environment oriented to the vast universe of Disney comics and cartoons. Our test suite includes Disney’s long and shorts films, and we have performed some activities based on the Just In Time Teaching (JiTT) methodology. More specifically, it has been tested by groups of university and secondary school students.Keywords: information retrieval, animation, educational resources, JiTT
Procedia PDF Downloads 34710858 Evaluation and Strategic Development of IT in Accounting in Turkey
Authors: Eda Kocakaya, Sebahat Seker, Dogan Argun
Abstract:
The aim of this study is to determine the process of information technologies and the connections between concepts in accounting management services in Turkey. The objective of this study is to determine the adaptation and evaluation process of information technologies and the connections between concepts and differences in accounting management services in Turkey. The situation and determination of the IT applications of Accounting Management were studied. The applications of • Billing • Order Processing • Accounts Receivable/Payable Management • Contract Management • Bank Account Management Were discussed in this study. The IT applications were demonstrated and realized in actual accounting services. The sectoral representative's companies were selected, and the IT application was searched by bibliometric analysis.Keywords: management, accounting, information technologies, adaptation
Procedia PDF Downloads 30910857 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 6110856 Exact Solutions for Steady Response of Nonlinear Systems under Non-White Excitation
Authors: Yaping Zhao
Abstract:
In the present study, the exact solutions for the steady response of quasi-linear systems under non-white wide-band random excitation are considered by means of the stochastic averaging method. The non linearity of the systems contains the power-law damping and the cross-product term of the power-law damping and displacement. The drift and diffusion coefficients of the Fokker-Planck-Kolmogorov (FPK) equation after averaging are obtained by a succinct approach. After solving the averaged FPK equation, the joint probability density function and the marginal probability density function in steady state are attained. In the process of resolving, the eigenvalue problem of ordinary differential equation is handled by integral equation method. Some new results are acquired and the novel method to deal with the problems in nonlinear random vibration is proposed.Keywords: random vibration, stochastic averaging method, FPK equation, transition probability density
Procedia PDF Downloads 50310855 Value Relevance of Accounting Information: A Study of Steel Sector in India
Authors: Pradyumna Mohanty
Abstract:
The paper aims to explore whether accounting information of Indian companies in the Steel sector are value relevant or not. Ohlson’s model which usually takes into consideration book value per share (BV) and earnings per share (EARN) has been used and the same has been expanded to include two more variables such as cash flow from operations (CFO) and return on equity (ROE). The data were collected from CMIE-Prowess data base in respect of BSE-listed steel companies and the time frame spans from 2010 to 2014. OLS regression has been used to test the value relevance of these accounting numbers. Results indicate that both CFO and BV are having significant influence on the stock price in two out of five years of study. But, BV is emerging as the most significant and highly value relevant of all the four variables during the entire period of study.Keywords: value relevance, accounting information, book value per share, earnings per share
Procedia PDF Downloads 15810854 Exploring the Influence of Normative, Financial and Environmental Decision Frames in Nudging 'Green' Behaviour, and Increasing Uptake of Energy-Efficient Technologies
Authors: Rebecca Hafner, Daniel Read, David Elmes
Abstract:
The persuasive potential of normative and feedback (financial vs. environmental) information in ‘nudging’ people towards making environmentally sound decisions was explored in a hypothetical choice experiment. The research was specifically focused on determining how subtle variations in the decision frame could be used to increase the selection of energy efficient vs. standard technologies, using the context of home heating choice. Participants were given a choice of a standard heating system (a gas boiler) and a relatively more-energy efficient option (a heat pump). The experiment had a 2 (normative vs. no normative information) by 3 feedback type (financial, environmental, none) design. The last group constituted the control. Half of the participants were given normative information about what the majority of others in their neighbourhood had opted to do when faced with the same choice set, prior to making their decision. The other half received no such information. Varying feedback frames were incorporated by providing participants with information on either financial or environmental savings that could be achieved by choosing the heat pump. No such information was provided in the control group. A significant interaction was found between normative information and feedback frame type. Specifically, the impact of feedback frames was found to be reduced when normative information was provided; illustrating the overriding influence of normative information on option preference. Participants were significantly more likely to select the heat pump if they were vs. were not given normative information. Yet when no normative information was provided, the persuasive influence of the financial frame was increased – highlighting this as an effective means of encouraging uptake of new technologies in this instance. Conversely, the environmental frame was not found to differ significantly from the control. Marginal carryover effects were also found for stated future real-life decision-making behaviour, with participants who were versus were not given normative information being marginally more likely to state they would consider installing a heat pump when they next need to replace their heating system in real life. We conclude that normative and financial feedback framing techniques are highly effective in increasing uptake of new, energy efficient heating technologies involving significant upfront financial outlay. The implications for researchers looking to promote ‘green’ choice in the context of new technology adoption are discussed.Keywords: energy-efficient technology adoption, environmental decision making, financial vs. environmental feedback framing techniques, social norms
Procedia PDF Downloads 30810853 Enhancing Problem Communication and Management Using Civil Information Modeling for Infrastructure Projects
Authors: Yu-Cheng Lin, Yu-Chih Su
Abstract:
Generally, there are many numerous existing problems during the construction phase special in civil engineering. The problems communication and management (PCM) of civil engineering are important and necessary to enhance the performance of construction management. The civil information modelling (CIM) approach is used to retain information with digital format and assist easy updating and transferring of information in the 3D environment for all related civil and infrastructure projects. When the application of CIM technology is adopted in infrastructure projects, all the related project participants can discuss problems and obtain feedback and responds among project participants integrated with the assistance of CIM models 3D illustration. Usually, electronic mail (e-mail) is one of the most popular communication tools among all related participants for rapid transit system (MRT), also known as a subway or metro, construction project in Taiwan. Furthermore, all interfaces should be traced and managed effectively during the process. However, there are many problems with the use of e-mail for communication of all interfaces. To solve the above problems, this study proposes a CIM-based Problem Communication and Management (CPCM) system to improve performance of problem communication and management. The CPCM system is applied to a case study of an MRT project in Taiwan to identify its CPCM effectiveness. Case study results show that the proposed CPCM system and Markup-enabled CIM Viewer are effective CIM-based communication tools in CIM-supported PCM work of civil engineering. Finally, this study identifies conclusion, suggestion, benefits, and limitations for further applications.Keywords: building information modeling, civil information modeling, infrastructure, general contractor
Procedia PDF Downloads 152