Search results for: text information retrieval
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11831

Search results for: text information retrieval

10871 Drug and Poison Information Centers: An Emergent Need of Health Care Professionals in Pakistan

Authors: Asif Khaliq, Sayeeda A. Sayed

Abstract:

The drug information centers provide drug related information to the requesters that include physicians, pharmacist, nurses and other allied health care professionals. The International Pharmacist Federation (FIP) describes basic functions of a drug and poison information centers as drug evaluation, therapeutic counseling, pharmaceutical advice, research, pharmaco-vigilence and toxicology. Continuous advancement in the field of medicine has expanded the medical literature, which has increased demand of a drug and poison information center for the guidance, support and facilitation of physicians. The objective of the study is to determine the need of drug and poison information centers in public and private hospitals of Karachi, Pakistan. A cross sectional study was conducted during July 2013 to April 2014 using a self-administered, multi-itemed questionnaire. Non Probability Convenient sampling was used to select the study participants. A total of 307 physicians from public and private hospitals of Karachi participated in the study. The need for 24/7 Drug and poison information center was highlighted by 92 % of physicians and 67% physicians suggested opening a drug information center at the hospital. It was reported that 70% physicians take at least 15 minutes for searching the information about the drug while managing a case. Regarding the poisoning case management, 52% physicians complaint about the unavailability of medicines in hospitals; and mentioned the importance of medicines for safe and timely management of patients. Although 73% physicians attended continued medical education (CME) sessions, 92 % physicians insisted on the need of 24/7 Drug and poison information center. The scarcity of organized channel for obtaining the information about drug and poisons is one of the most crucial problems for healthcare workers in Pakistan. The drug and poison information center is an advisory body that assists health care professional and patients in provision of appropriate drug and hazardous substance information. Drug and poison information center is one of the integral needs for running an effective health care system. Provision of a 24 /7 drug information centers with specialized staff offer multiple benefits to the hospitals while reducing treatment delays, addressing awareness gaps of all stakeholders and ensuring provision of quality health care.

Keywords: drug and poison information centers, Pakistan, physicians, public and private hospitals

Procedia PDF Downloads 328
10870 Introducing a Video-Based E-Learning Module to Improve Disaster Preparedness at a Tertiary Hospital in Oman

Authors: Ahmed Al Khamisi

Abstract:

The Disaster Preparedness Standard (DPS) is one of the elements that is evaluated by the Accreditation Canada International (ACI). ACI emphasizes to train and educate all staff, including service providers and senior leaders, on emergency and disaster preparedness upon the orientation and annually thereafter. Lack of awareness and deficit of knowledge among the healthcare providers about DPS have been noticed in a tertiary hospital where ACI standards were implemented. Therefore, this paper aims to introduce a video-based e-learning (VB-EL) module that explains the hospital’s disaster plan in a simple language which will be easily accessible to all healthcare providers through the hospital’s website. The healthcare disaster preparedness coordinator in the targeted hospital will be responsible to ensure that VB-EL is ready by 25 April 2019. This module will be developed based on the Kirkpatrick evaluation method. In fact, VB-EL combines different data forms such as images, motion, sounds, text in a complementary fashion which will suit diverse learning styles and individual learning pace of healthcare providers. Moreover, the module can be adjusted easily than other tools to control the information that healthcare providers receive. It will enable healthcare providers to stop, rewind, fast-forward, and replay content as many times as needed. Some anticipated limitations in the development of this module include challenges of preparing VB-EL content and resistance from healthcare providers.

Keywords: Accreditation Canada International, Disaster Preparedness Standard, Kirkpatrick evaluation method, video-based e-learning

Procedia PDF Downloads 147
10869 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 169
10868 The Factors that Effect to User Satisfaction of Information System in Bangkok Hospital

Authors: Somchai Buaroong

Abstract:

This research attempted to study information system success in dimensions of the user satisfaction level and to find the association between the independent factors of the user experiences, user knowledge, and user attitude. The study sample was selected using simple random sampling that comprised of 190 users who had used the Bangkok HIS. The data were reported from 165 questionnaires. The results found that the user satisfaction was at a moderate level, user satisfaction on the information quality and system quality was at a moderate level, while satisfaction on service quality was at a high level. The computer knowledge of the user was at a moderate level, and the user attitude was at a positive level. The participation of the user was at a low level and the participation in decision and in evaluation was at a low level; however participation in implementation and in benefit was at a moderate.

Keywords: information system success, hospital information system, user attitude, user satisfaction

Procedia PDF Downloads 321
10867 Foundation of the Information Model for Connected-Cars

Authors: Hae-Won Seo, Yong-Gu Lee

Abstract:

Recent progress in the next generation of automobile technology is geared towards incorporating information technology into cars. Collectively called smart cars are bringing intelligence to cars that provides comfort, convenience and safety. A branch of smart cars is connected-car system. The key concept in connected-cars is the sharing of driving information among cars through decentralized manner enabling collective intelligence. This paper proposes a foundation of the information model that is necessary to define the driving information for smart-cars. Road conditions are modeled through a unique data structure that unambiguously represent the time variant traffics in the streets. Additionally, the modeled data structure is exemplified in a navigational scenario and usage using UML. Optimal driving route searching is also discussed using the proposed data structure in a dynamically changing road conditions.

Keywords: connected-car, data modeling, route planning, navigation system

Procedia PDF Downloads 374
10866 Building Information Models Utilization for Design Improvement of Infrastructure

Authors: Keisuke Fujioka, Yuta Itoh, Masaru Minagawa, Shunji Kusayanagi

Abstract:

In this study, building information models of the underground temporary structures and adjacent embedded pipes were constructed to show the importance of the information on underground pipes adjacent to the structures to enhance the productivity of execution of construction. Next, the bar chart used in actual construction process were employed to make the Gantt chart, and the critical pass analysis was carried out to show that accurate information on the arrangement of underground existing pipes can be used for the enhancement of the productivity of the construction of underground structures. In the analyzed project, significant construction delay was not caused by unforeseeable existence of underground pipes by the management ability of the construction manager. However, in many cases of construction executions in the developing countries, the existence of unforeseeable embedded pipes often causes substantial delay of construction. Design change based on uncertainty on the position information of embedded pipe can be also important risk for contractors in domestic construction. So CPM analyses were performed by a project-management-software to the situation that influence of the tasks causing construction delay was assumed more significant. Through the analyses, the efficiency of information management on underground pipes and BIM analysis in the design stage for workability improvement was indirectly confirmed.

Keywords: building-information modelling, construction information modelling, design improvement, infrastructure

Procedia PDF Downloads 308
10865 Causal Relationship between Corporate Governance and Financial Information Transparency: A Simultaneous Equations Approach

Authors: Maali Kachouri, Anis Jarboui

Abstract:

We focus on the causal relationship between governance and information transparency as well as interrelation among the various governance mechanisms. This paper employs a simultaneous equations approach to show this relationship in the Tunisian context. Based on an 8-year dataset, our sample covers 28 listed companies over 2006-2013. Our findings suggest that internal and external governance mechanisms are interdependent. Moreover, in order to analyze the causal effect between information transparency and governance mechanisms, we found evidence that information transparency tends to increase good corporate governance practices.

Keywords: simultaneous equations approach, transparency, causal relationship, corporate governance

Procedia PDF Downloads 355
10864 A Study of the Use of Arguments in Nominalizations as Instanciations of Grammatical Metaphors Finished in -TION in Academic Texts of Native Speakers

Authors: Giovana Perini-Loureiro

Abstract:

The purpose of this research was to identify whether the nominalizations terminating in -TION in the academic discourse of native English speakers contain the arguments required by their input verbs. In the perspective of functional linguistics, ideational metaphors, with nominalization as their most pervasive realization, are lexically dense, and therefore frequent in formal texts. Ideational metaphors allow the academic genre to instantiate objectification, de-personalization, and the ability to construct a chain of arguments. The valence of those nouns present in nominalizations tends to maintain the same elements of the valence from its original verbs, but these arguments are not always expressed. The initial hypothesis was that these arguments would also be present alongside the nominalizations, through anaphora or cataphora. In this study, a qualitative analysis of the occurrences of the five more frequent nominalized terminations in -TION in academic texts was accomplished, and thus a verification of the occurrences of the arguments required by the original verbs. The assembling of the concordance lines was done through COCA (Corpus of Contemporary American English). After identifying the five most frequent nominalizations (attention, action, participation, instruction, intervention), the concordance lines were selected at random to be analyzed, assuring the representativeness and reliability of the sample. It was possible to verify, in all the analyzed instances, the presence of arguments. In most instances, the arguments were not expressed, but recoverable, either in the context or in the shared knowledge among the interactants. It was concluded that the realizations of the arguments which were not expressed alongside the nominalizations are part of a continuum, starting from the immediate context with anaphora and cataphora; up to a knowledge shared outside the text, such as specific area knowledge. The study also has implications for the teaching of academic writing, especially with regards to the impact of nominalizations on the thematic and informational flow of the text. Grammatical metaphors are essential to academic writing, hence acknowledging the occurrence of its arguments is paramount to achieve linguistic awareness and the writing prestige required by the academy.

Keywords: corpus, functional linguistics, grammatical metaphors, nominalizations, academic English

Procedia PDF Downloads 147
10863 Gendered Effects on Productivity Gap Due to Information Asymmetry

Authors: Shruti Sengupta

Abstract:

According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.

Keywords: agriculture, gender, information asymmetry, farm income, social bias

Procedia PDF Downloads 142
10862 Everyday Life Information Seeking among Female Students: A Survey of University and Private Hostels at Lahore

Authors: Sadaf Rafiq, Muhammad Waqas, Shakeel Ahmad Khan, Nisar Ahmad

Abstract:

Everyday life information seeking (ELIS) is considered as the mastery of life. It plays an important role in daily problem solving activities. Female students living in university hostels need variety of information to fulfil their everyday information needs. To find accurate and timely information is really challenging for females students who move from rural areas for educational purposes. These challenges involve culture differences, stress, financial issues, homesickness, diet needs and change in sleeping and eating habits. These complications create numerous problems for female students to adjust themselves in new and unfamiliar environment. Although the Internet has increased the ease of seeking everyday life information to survive successfully but there is still uncertainty to fully rely on the quality of information available on the web. Pakistan is an underdeveloped country where limited budget is allocated for educational institutions to enable them in developing well established hostels for their students. Female students who pursue for higher education has to stay at hostels for years to obtain education goals. It really becomes very difficult for them to spend life in hostels if they are not properly facilitated with relevant information sources to acquire everyday life information. The proposed study attempts to investigate the everyday life information seeking behavior of female students who are living in university and private hostels of Lahore. It investigates the various sources of information used by female students. It also identifies the problems faced by the female students in accessing everyday life information. The results of this study will be helpful for university management to understand their information need and provide required information sources which are essential for them to spend a comfortable, successful and peaceful life in hostels and achieve their educational goals. To achieve the objectives of the study, we will use quantitative research approach by using questionnaire as a data collection tool. The population of this study will be the university students living in public and private hostels of Lahore, Pakistan. This study will increase the understanding of everyday life information seeking behavior of female students living in hostels. Results of the study will be helpful for hostel administrations to better understand the students’ everyday life information needs and provide high quality of information services and living environment.

Keywords: everyday, information seeking, hostel, female

Procedia PDF Downloads 151
10861 Writing the Roaming Female Self: Identity and Romantic Selfhood in Mary Wollstonecraft’s Letters Written during a Short Stay in Sweden, Denmark, and Norway (1796)

Authors: Kalyani Gandhi

Abstract:

The eighteenth century in Britain saw a great burst of activity in writing (letters, journals, newspapers, essays); often these modes of writing had a public-spirited bent in-step with the prevailing intellectual atmosphere. Mary Wollstonecraft was one of the leading intellectuals of that period who utilized letter writing to convey her thoughts on the exciting political developments of the late eighteenth century. Fusing together her anxieties and concerns about humanity in general and herself in particular, Wollstonecraft’s views of the world around her are filtered through the lens of her subjectivity. Thus, Wollstonecraft’s letters covered a wide range of topics on both the personal and political level (for the two are often entwined in Wollstonecraft’s characteristic style of analysis) such as sentiment, gender, nature, peasantry, the class system, the legal system, political duties and rights of both rulers and subjects, death, immortality, religion, family and education. Therefore, this paper intends to examine the manner in which Wollstonecraft utilizes letter-writing to constitute and develop Romantic self-hood, understand the world around her and illustrate her ideas on the political and social happenings in Europe. The primary text analyzed will be Mary Wollstonecraft's Letters Written During a Short Stay in Sweden, Denmark and Norway (1796) and the analysis of this text will be supplemented by researching 18th-century British letter writing culture, with a special emphasis on the epistolary habits of women. Within this larger framework, this paper intends to examine the manner in which this hybrid of travel and epistolary writing aided Mary Wollstonecraft's expression on Romantic selfhood and how it was complicated by ideas of gender. This paper reveals Wollstonecraft's text to be wrought with anxiety about the world around her and within her; thus, the personal-public nature of the epistolary format particularly suits her characteristic point of view that looks within and without. That is to say, Wollstonecraft’s anxieties about gender and self, are as much about the women she sees in the world around her as much as they are about her young daughter and herself. Wollstonecraft constantly explores and examines this anxiety within the different but interconnected realms of politics, economics, history and society. In fact, it is her complex technique of entwining these aforementioned concerns with a closer look at interpersonal relationships among men and women (she often mentions specific anecdotes and instances) that make Wollstonecraft's Letters so engaging and insightful. Thus, Wollstonecraft’s Letters is an exemplar of British Romantic writing due to the manner in which it explores the bond between the individual and society. Mary Wollstonecraft's nuances this exploration by incorporating her concerns about women and the playing out of gender in society. Thus, Wollstonecraft’s Letters is an invaluable contribution to the field of British Romanticism, particularly as it offers crucial insight on female Romantic writing that can broaden and enrich the current academic understanding of the field.

Keywords: British romanticism, letters, feminism, travel writing

Procedia PDF Downloads 215
10860 Gendered Effects on Productivity Gap Due to Information Asymmetry in India

Authors: Shruti Sengupta

Abstract:

According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.

Keywords: agriculture, gender, information asymmetry, farm income, social bias

Procedia PDF Downloads 104
10859 An Interactive Online Academic Writing Resource for Research Students in Engineering

Authors: Eleanor K. P. Kwan

Abstract:

English academic writing, it has been argued, is an acquired language even for English speakers. For research students whose English is not their first language, however, the acquisition process is often more challenging. Instead of hoping that students would acquire the conventions themselves through extensive reading, there is a need for the explicit teaching of linguistic conventions in academic writing, as explicit teaching could help students to be more aware of the different generic conventions in different disciplines in science. This paper presents an interuniversity effort to develop an online academic writing resource for research students in five subdisciplines in engineering, upon the completion of the needs analysis which indicates that students and faculty members are more concerned about students’ ability to organize an extended text than about grammatical accuracy per se. In particular, this paper focuses on the materials developed for thesis writing (also called dissertation writing in some tertiary institutions), as theses form an essential graduation requirement for all research students and this genre is also expected to demonstrate the writer’s competence in research and contributions to the research community. Drawing on Swalesian move analysis of research articles, this online resource includes authentic materials written by students and faculty members from the participating institutes. Highlight will be given to several aspects and challenges of developing this online resource. First, as the online resource aims at moving beyond providing instructions on academic writing, a range of interactive activities need to be designed to engage the users, which is one feature which differentiates this online resource from other equally informative websites on academic writing. Second, it will also include discussion on divergent textual practices in different subdisciplines, which help to illustrate different practices among these subdisciplines. Third, since theses, probably one of the most extended texts a research student will complete, require effective use of signposting devices to facility readers’ understanding, this online resource will also provide both explanation and activities on different components that contribute to text coherence. Finally results from piloting will also be included to shed light on the effectiveness of the materials, which could be useful for future development.

Keywords: academic writing, English for academic purposes, online language learning materials, scientific writing

Procedia PDF Downloads 269
10858 Distance Education Technologies for Empowerment and Equity in an Information Technology Environment

Authors: Leila Goosen, Toppie N. Mukasa-Lwanga

Abstract:

The purpose of this paper relates to exploring academics’ use of distance education technologies for empowerment and equity in an Information Technology environment. Literature was studied on academics’ technology use towards effective teaching and meaningful learning in a distance education Information Technology environment. Main arguments presented center on formulating and situating significant concepts within an appropriate theoretical and conceptual framework, including those related to distance education, throughput and other measures of academic efficiency. The research design, sampling, data collection instrument and the validity and reliability thereof, as well as the data analysis method used is described. The paper discusses results related to academics’ use of technology towards effective teaching and meaningful learning in a distance education Information Technology environment. Conclusions are finally presented on the way in which this paper makes a significant and original contribution regarding academics’ use of technology towards effective teaching and meaningful learning in a distance education Information Technology environment.

Keywords: distance, education, technologies, Information Technology Environment

Procedia PDF Downloads 524
10857 Experimental Evaluation of Succinct Ternary Tree

Authors: Dmitriy Kuptsov

Abstract:

Tree data structures, such as binary or in general k-ary trees, are essential in computer science. The applications of these data structures can range from data search and retrieval to sorting and ranking algorithms. Naive implementations of these data structures can consume prohibitively large volumes of random access memory limiting their applicability in certain solutions. Thus, in these cases, more advanced representation of these data structures is essential. In this paper we present the design of the compact version of ternary tree data structure and demonstrate the results for the experimental evaluation using static dictionary problem. We compare these results with the results for binary and regular ternary trees. The conducted evaluation study shows that our design, in the best case, consumes up to 12 times less memory (for the dictionary used in our experimental evaluation) than a regular ternary tree and in certain configuration shows performance comparable to regular ternary trees. We have evaluated the performance of the algorithms using both 32 and 64 bit operating systems.

Keywords: algorithms, data structures, succinct ternary tree, per- formance evaluation

Procedia PDF Downloads 160
10856 An Experimental Study of Online Peer-to-Peer Language Learning

Authors: Abrar Al-Hasan

Abstract:

Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.

Keywords: e-Learning, language learning marketplace, peer-to-peer, social network

Procedia PDF Downloads 386
10855 Seismic Performance Evaluation of Existing Building Using Structural Information Modeling

Authors: Byungmin Cho, Dongchul Lee, Taejin Kim, Minhee Lee

Abstract:

The procedure for the seismic retrofit of existing buildings includes the seismic evaluation. In the evaluation step, it is assessed whether the buildings have satisfactory performance against seismic load. Based on the results of that, the buildings are upgraded. To evaluate seismic performance of the buildings, it usually goes through the model transformation from elastic analysis to inelastic analysis. However, when the data is not delivered through the interwork, engineers should manually input the data. In this process, since it leads to inaccuracy and loss of information, the results of the analysis become less accurate. Therefore, in this study, the process for the seismic evaluation of existing buildings using structural information modeling is suggested. This structural information modeling makes the work economic and accurate. To this end, it is determined which part of the process could be computerized through the investigation of the process for the seismic evaluation based on ASCE 41. The structural information modeling process is developed to apply to the seismic evaluation using Perform 3D program usually used for the nonlinear response history analysis. To validate this process, the seismic performance of an existing building is investigated.

Keywords: existing building, nonlinear analysis, seismic performance, structural information modeling

Procedia PDF Downloads 386
10854 Financial Information and Collective Bargaining: Conflicting or Complementing

Authors: Humayun Murshed, Shibly Abdullah

Abstract:

The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision-making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organizations within which the case studies are conducted.

Keywords: collective bargaining, developing countries, disclosures, financial information

Procedia PDF Downloads 471
10853 Infrastructure Development – Stages in Development

Authors: Seppo Sirkemaa

Abstract:

Information systems infrastructure is the basis of business systems and processes in the company. It should be a reliable platform for business processes and activities but also have the flexibility to change business needs. The development of an infrastructure that is robust, reliable, and flexible is a challenge. Understanding technological capabilities and business needs is a key element in the development of successful information systems infrastructure.

Keywords: development, information technology, networks, technology

Procedia PDF Downloads 119
10852 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 85
10851 The Impact of Psychiatric Symptoms on Return to Work after Occupational Injury

Authors: Kuan-Han Lin, Kuan-Yin Lin, Ka-Chun Siu

Abstract:

The purpose of this systematic review was to determine the impact of post-traumatic stress disorders (PTSD) symptom or depressive symptoms on return to work (RTW) after occupational injury. The original articles of clinical trials and observational studies from PubMed, MEDLINE, and PsycINFO between January 1980 and November 2016 were retrieved. Two reviewers evaluated the abstracts identified by the search criteria for full-text review. To be included in the final analysis, studies were required to use either intervention or observational study design to examine the association between psychiatric symptoms and RTW. A modified checklist designed by Downs & Black and Crombie was used to assess the methodological quality of included study. A total of 58 articles were identified from the electronic databases after duplicate removed. Seven studies fulfilled the inclusion criteria and were critically reviewed. The rates of RTW in the included studies were reported to be 6% to 63.6% among workers after occupational injuries. This review found that post-traumatic stress symptom and depressive symptoms were negatively associated with RTW. Although the impact of psychiatric symptoms on RTW after occupational injury remains poorly understood, this review brought up the important information that injured workers with psychiatric symptoms had poor RTW outcome. Future work should address the effective management of psychiatric factors affecting RTW among workers.

Keywords: depressive symptom, occupational injury, post-traumatic stress disorder, return to work

Procedia PDF Downloads 263
10850 Training a Neural Network to Segment, Detect and Recognize Numbers

Authors: Abhisek Dash

Abstract:

This study had three neural networks, one for number segmentation, one for number detection and one for number recognition all of which are coupled to one another. All networks were trained on the MNIST dataset and were convolutional. It was assumed that the images had lighter background and darker foreground. The segmentation network took 28x28 images as input and had sixteen outputs. Segmentation training starts when a dark pixel is encountered. Taking a window(7x7) over that pixel as focus, the eight neighborhood of the focus was checked for further dark pixels. The segmentation network was then trained to move in those directions which had dark pixels. To this end the segmentation network had 16 outputs. They were arranged as “go east”, ”don’t go east ”, “go south east”, “don’t go south east”, “go south”, “don’t go south” and so on w.r.t focus window. The focus window was resized into a 28x28 image and the network was trained to consider those neighborhoods which had dark pixels. The neighborhoods which had dark pixels were pushed into a queue in a particular order. The neighborhoods were then popped one at a time stitched to the existing partial image of the number one at a time and trained on which neighborhoods to consider when the new partial image was presented. The above process was repeated until the image was fully covered by the 7x7 neighborhoods and there were no more uncovered black pixels. During testing the network scans and looks for the first dark pixel. From here on the network predicts which neighborhoods to consider and segments the image. After this step the group of neighborhoods are passed into the detection network. The detection network took 28x28 images as input and had two outputs denoting whether a number was detected or not. Since the ground truth of the bounds of a number was known during training the detection network outputted in favor of number not found until the bounds were not met and vice versa. The recognition network was a standard CNN that also took 28x28 images and had 10 outputs for recognition of numbers from 0 to 9. This network was activated only when the detection network votes in favor of number detected. The above methodology could segment connected and overlapping numbers. Additionally the recognition unit was only invoked when a number was detected which minimized false positives. It also eliminated the need for rules of thumb as segmentation is learned. The strategy can also be extended to other characters as well.

Keywords: convolutional neural networks, OCR, text detection, text segmentation

Procedia PDF Downloads 161
10849 The Economic System (Islam) and Riba's Prohibition on Historical Perspective

Authors: Risanda Alirastra Budiantoro, Riesanda Najmi Sasmita, Sri Herianingrum

Abstract:

Allah has given the guidance in the form of Islam for Muslim to take and lead all the aspects of life including the economic activity. The Islamic economic system is believed to be the answer to the economic problems that exist at this time. The goal is to achieve falah in kaffah by not doing some economic activities that are in violation as prescribed by Islam. An example for this is riba. Discourse on riba can be said ‘classical’ both in the development of Islamic thought and in Islamic civilization because riba often occurs in all aspects of public life, especially economic transactions (in Islam called muamalah). Riba is an additional retrieval, either in a sale and purchase transaction or lending in a false or contrary to the principle of muamalah in Islam. Prohibition of riba is obtained from various sources by the Qur'an and Hadith Rasulullah SAW, so the scholars firmly and clearly defined the prohibition of riba because there are exploitative elements that can harm the others. So, this study is aimed to identify Islamic economic system and the prohibition of riba in historical perspective. From the results of this study, it is expected to be a good reference for the reader to understand the Islamic economic system and riba in the future.

Keywords: economics system, riba, historical perspective, economy

Procedia PDF Downloads 319
10848 Design Patterns for Emergency Management Processes

Authors: Tomáš Ludík, Jiří Barta, Josef Navrátil

Abstract:

Natural or human made disasters have a significant negative impact on the environment. At the same time there is an extensive effort to support management and decision making in emergency situations by information technologies. Therefore the purpose of the paper is to propose a design patterns applicable in emergency management, enabling better analysis and design of emergency management processes and therefore easier development and deployment of information systems in the field of emergency management. It will be achieved by detailed analysis of existing emergency management legislation, contingency plans, and information systems. The result is a set of design patterns focused at emergency management processes that enable easier design of emergency plans or development of new information system. These results will have a major impact on the development of new information systems as well as to more effective and faster solving of emergencies.

Keywords: analysis and design, Business Process Modelling Notation, contingency plans, design patterns, emergency management

Procedia PDF Downloads 485
10847 Clinical Validation of an Automated Natural Language Processing Algorithm for Finding COVID-19 Symptoms and Complications in Patient Notes

Authors: Karolina Wieczorek, Sophie Wiliams

Abstract:

Introduction: Patient data is often collected in Electronic Health Record Systems (EHR) for purposes such as providing care as well as reporting data. This information can be re-used to validate data models in clinical trials or in epidemiological studies. Manual validation of automated tools is vital to pick up errors in processing and to provide confidence in the output. Mentioning a disease in a discharge letter does not necessarily mean that a patient suffers from this disease. Many of them discuss a diagnostic process, different tests, or discuss whether a patient has a certain disease. The COVID-19 dataset in this study used natural language processing (NLP), an automated algorithm which extracts information related to COVID-19 symptoms, complications, and medications prescribed within the hospital. Free-text patient clinical patient notes are rich sources of information which contain patient data not captured in a structured form, hence the use of named entity recognition (NER) to capture additional information. Methods: Patient data (discharge summary letters) were exported and screened by an algorithm to pick up relevant terms related to COVID-19. Manual validation of automated tools is vital to pick up errors in processing and to provide confidence in the output. A list of 124 Systematized Nomenclature of Medicine (SNOMED) Clinical Terms has been provided in Excel with corresponding IDs. Two independent medical student researchers were provided with a dictionary of SNOMED list of terms to refer to when screening the notes. They worked on two separate datasets called "A” and "B”, respectively. Notes were screened to check if the correct term had been picked-up by the algorithm to ensure that negated terms were not picked up. Results: Its implementation in the hospital began on March 31, 2020, and the first EHR-derived extract was generated for use in an audit study on June 04, 2020. The dataset has contributed to large, priority clinical trials (including International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) by bulk upload to REDcap research databases) and local research and audit studies. Successful sharing of EHR-extracted datasets requires communicating the provenance and quality, including completeness and accuracy of this data. The results of the validation of the algorithm were the following: precision (0.907), recall (0.416), and F-score test (0.570). Percentage enhancement with NLP extracted terms compared to regular data extraction alone was low (0.3%) for relatively well-documented data such as previous medical history but higher (16.6%, 29.53%, 30.3%, 45.1%) for complications, presenting illness, chronic procedures, acute procedures respectively. Conclusions: This automated NLP algorithm is shown to be useful in facilitating patient data analysis and has the potential to be used in more large-scale clinical trials to assess potential study exclusion criteria for participants in the development of vaccines.

Keywords: automated, algorithm, NLP, COVID-19

Procedia PDF Downloads 102
10846 Wolof Voice Response Recognition System: A Deep Learning Model for Wolof Audio Classification

Authors: Krishna Mohan Bathula, Fatou Bintou Loucoubar, FNU Kaleemunnisa, Christelle Scharff, Mark Anthony De Castro

Abstract:

Voice recognition algorithms such as automatic speech recognition and text-to-speech systems with African languages can play an important role in bridging the digital divide of Artificial Intelligence in Africa, contributing to the establishment of a fully inclusive information society. This paper proposes a Deep Learning model that can classify the user responses as inputs for an interactive voice response system. A dataset with Wolof language words ‘yes’ and ‘no’ is collected as audio recordings. A two stage Data Augmentation approach is adopted for enhancing the dataset size required by the deep neural network. Data preprocessing and feature engineering with Mel-Frequency Cepstral Coefficients are implemented. Convolutional Neural Networks (CNNs) have proven to be very powerful in image classification and are promising for audio processing when sounds are transformed into spectra. For performing voice response classification, the recordings are transformed into sound frequency feature spectra and then applied image classification methodology using a deep CNN model. The inference model of this trained and reusable Wolof voice response recognition system can be integrated with many applications associated with both web and mobile platforms.

Keywords: automatic speech recognition, interactive voice response, voice response recognition, wolof word classification

Procedia PDF Downloads 116
10845 Technology in the Calculation of People Health Level: Design of a Computational Tool

Authors: Sara Herrero Jaén, José María Santamaría García, María Lourdes Jiménez Rodríguez, Jorge Luis Gómez González, Adriana Cercas Duque, Alexandra González Aguna

Abstract:

Background: Health concept has evolved throughout history. The health level is determined by the own individual perception. It is a dynamic process over time so that you can see variations from one moment to the next. In this way, knowing the health of the patients you care for, will facilitate decision making in the treatment of care. Objective: To design a technological tool that calculates the people health level in a sequential way over time. Material and Methods: Deductive methodology through text analysis, extraction and logical knowledge formalization and education with expert group. Studying time: September 2015- actually. Results: A computational tool for the use of health personnel has been designed. It has 11 variables. Each variable can be given a value from 1 to 5, with 1 being the minimum value and 5 being the maximum value. By adding the result of the 11 variables we obtain a magnitude in a certain time, the health level of the person. The health calculator allows to represent people health level at a time, establishing temporal cuts being useful to determine the evolution of the individual over time. Conclusion: The Information and Communication Technologies (ICT) allow training and help in various disciplinary areas. It is important to highlight their relevance in the field of health. Based on the health formalization, care acts can be directed towards some of the propositional elements of the concept above. The care acts will modify the people health level. The health calculator allows the prioritization and prediction of different strategies of health care in hospital units.

Keywords: calculator, care, eHealth, health

Procedia PDF Downloads 264
10844 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct

Authors: Muhammet Dursun Kaya, Hasan Asil

Abstract:

One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.

Keywords: information technology, data mining, scientific development, clustering

Procedia PDF Downloads 278
10843 Algorithmic Obligations: Proactive Liability for AI-Generated Content and Copyright Compliance

Authors: Aleksandra Czubek

Abstract:

As AI systems increasingly shape content creation, existing copyright frameworks face significant challenges in determining liability for AI-generated outputs. Current legal discussions largely focus on who bears responsibility for infringing works, be it developers, users, or entities benefiting from AI outputs. This paper introduces a novel concept of algorithmic obligations, proposing that AI developers be subject to proactive duties that ensure their models prevent copyright infringement before it occurs. Building on principles of obligations law traditionally applied to human actors, the paper suggests a shift from reactive enforcement to proactive legal requirements. AI developers would be legally mandated to incorporate copyright-aware mechanisms within their systems, turning optional safeguards into enforceable standards. These obligations could vary in implementation across international, EU, UK, and U.S. legal frameworks, creating a multi-jurisdictional approach to copyright compliance. This paper explores how the EU’s existing copyright framework, exemplified by the Copyright Directive (2019/790), could evolve to impose a duty of foresight on AI developers, compelling them to embed mechanisms that prevent infringing outputs. By drawing parallels to GDPR’s “data protection by design,” a similar principle could be applied to copyright law, where AI models are designed to minimize copyright risks. In the UK, post-Brexit text and data mining exemptions are seen as pro-innovation but pose risks to copyright protections. This paper proposes a balanced approach, introducing algorithmic obligations to complement these exemptions. AI systems benefiting from text and data mining provisions should integrate safeguards that flag potential copyright violations in real time, ensuring both innovation and protection. In the U.S., where copyright law focuses on human-centric works, this paper suggests an evolution toward algorithmic due diligence. AI developers would have a duty similar to product liability, ensuring that their systems do not produce infringing outputs, even if the outputs themselves cannot be copyrighted. This framework introduces a shift from post-infringement remedies to preventive legal structures, where developers actively mitigate risks. The paper also breaks new ground by addressing obligations surrounding the training data of large language models (LLMs). Currently, training data is often treated under exceptions such as the EU’s text and data mining provisions or U.S. fair use. However, this paper proposes a proactive framework where developers are obligated to verify and document the legal status of their training data, ensuring it is licensed or otherwise cleared for use. In conclusion, this paper advocates for an obligations-centered model that shifts AI-related copyright law from reactive litigation to proactive design. By holding AI developers to a heightened standard of care, this approach aims to prevent infringement at its source, addressing both the outputs of AI systems and the training processes that underlie them.

Keywords: ip, technology, copyright, data, infringement, comparative analysis

Procedia PDF Downloads 19
10842 DCDNet: Lightweight Document Corner Detection Network Based on Attention Mechanism

Authors: Kun Xu, Yuan Xu, Jia Qiao

Abstract:

The document detection plays an important role in optical character recognition and text analysis. Because the traditional detection methods have weak generalization ability, and deep neural network has complex structure and large number of parameters, which cannot be well applied in mobile devices, this paper proposes a lightweight Document Corner Detection Network (DCDNet). DCDNet is a two-stage architecture. The first stage with Encoder-Decoder structure adopts depthwise separable convolution to greatly reduce the network parameters. After introducing the Feature Attention Union (FAU) module, the second stage enhances the feature information of spatial and channel dim and adaptively adjusts the size of receptive field to enhance the feature expression ability of the model. Aiming at solving the problem of the large difference in the number of pixel distribution between corner and non-corner, Weighted Binary Cross Entropy Loss (WBCE Loss) is proposed to define corner detection problem as a classification problem to make the training process more efficient. In order to make up for the lack of Dataset of document corner detection, a Dataset containing 6620 images named Document Corner Detection Dataset (DCDD) is made. Experimental results show that the proposed method can obtain fast, stable and accurate detection results on DCDD.

Keywords: document detection, corner detection, attention mechanism, lightweight

Procedia PDF Downloads 354