Search results for: casual-leisure information behaviors
10975 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach
Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila
Abstract:
Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.Keywords: education, gender, ICT, Nigeria
Procedia PDF Downloads 29710974 The Future of Truth and Lies in the Context of Technology-Mediated Environments
Authors: James P. Takona
Abstract:
Most of the global population has never lived through a pandemic, and thus there is so much that remains unknown about students' capacity for resiliency under such environments and circumstances and what a timeline for full recovery will look like. The session will guide participants to focus on misinformation and disinformation in the context of recent crisis events, with specific reference to how information flows across. Particular focus will be given to the flow of information in mediated technology and platforms with particular reference to K-12 and teacher preparation program environments. The paper will draw on theories and responses from the sociology of disaster, the social psychology of rumoring, and published studies on disinformation and misinformation. Applications will be identified and applied in the context of online information-sharing during crisis events. The session will offer the application of the Center for Contagious Diseases' Crisis and Emergency Risk Communication model to understand the themes and evolution of misinformation and disinformation. The paper will invite session participants to suggest and interact with raised challenges on the impact of dis-and misinformation.Keywords: Sociology of disaster, misinformation, dis-information, Social Psychology of rumors
Procedia PDF Downloads 8910973 Comparison of the Logistic and the Gompertz Growth Functions Considering a Periodic Perturbation in the Model Parameters
Authors: Avan Al-Saffar, Eun-Jin Kim
Abstract:
Both the logistic growth model and the gompertz growth model are used to describe growth processes. Both models driven by perturbations in different cases are investigated using information theory as a useful measure of sustainability and the variability. Specifically, we study the effect of different oscillatory modulations in the system's parameters on the evolution of the system and Probability Density Function (PDF). We show the maintenance of the initial conditions for a long time. We offer Fisher information analysis in positive and/or negative feedback and explain its implications for the sustainability of population dynamics. We also display a finite amplitude solution due to the purely fluctuating growth rate whereas the periodic fluctuations in negative feedback can lead to break down the system's self-regulation with an exponentially growing solution. In the cases tested, the gompertz and logistic systems show similar behaviour in terms of information and sustainability although they develop differently in time.Keywords: dynamical systems, fisher information, probability density function (pdf), sustainability
Procedia PDF Downloads 43110972 Managerial Risk-Taking: Evidences from the Tourism Industry
Authors: Min-Ming Wen
Abstract:
Applying the U.S. lodging and tourism industry as a research sample, we examine the relation between the corporate governance structure and managerial risk-taking behavior. In light of the global financial crisis, the importance of effective governance structures is essential in protecting claimholder interests. We propose a governance structure consisting of shareholder governance measured by anti-takeover provisions to examine whether the governance structure has a significant impact on managerial risk-taking behaviors in terms of the investment policy. We will use capital expenditure and R&D investment to measure managerial risk-taking and the firm’s investment policy. In addition, we will examine whether the effects of governance on investment policy differ significantly between speculative and investment-grade firms.Keywords: corporate governance, risk-taking, firm value, lodging industry
Procedia PDF Downloads 61610971 Information Theoretic Approach for Beamforming in Wireless Communications
Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif
Abstract:
Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.Keywords: beamforming, interference, mutual information, wireless communications
Procedia PDF Downloads 28010970 The Interaction between Human and Environment on the Perspective of Environmental Ethics
Authors: Mella Ismelina Farma Rahayu
Abstract:
Environmental problems could not be separated from unethical human perspectives and behaviors toward the environment. There is a fundamental error in the philosophy of people’s perspective about human and nature and their relationship with the environment, which in turn will create an inappropriate behavior in relation to the environment. The aim of this study is to investigate and to understand the ethics of the environment in the context of humans interacting with the environment by using the hermeneutic approach. The related theories and concepts collected from literature review are used as data, which were analyzed by using interpretation, critical evaluation, internal coherence, comparisons, and heuristic techniques. As a result of this study, there will be a picture related to the interaction of human and environment in the perspective of environmental ethics, as well as the problems of the value of ecological justice in the interaction of humans and environment. We suggest that the interaction between humans and environment need to be based on environmental ethics, in a spirit of mutual respect between humans and the natural world.Keywords: environment, environmental ethics, interaction, value
Procedia PDF Downloads 42210969 A Conceptual Framework for Assessing the Development of Health Information Systems Enterprise Architecture Interoperability
Authors: Prosper Tafadzwa Denhere, Ephias Ruhode, Munyaradzi Zhou
Abstract:
Health Information Systems (HISs) interoperability is emerging to be the future of modern healthcare systems Enterprise Architecture (EA), where healthcare entities are seamlessly interconnected to share healthcare data. The reality that the healthcare industry has been characterised by an influx of fragmented stand-alone e-Health systems, which present challenges of healthcare information sharing across platforms, desires much attention for systems integration efforts. The lack of an EA conceptual framework resultantly crates the need for investigating an ideal solution to the objective of Health Information Systems interoperability development assessment. The study takes a qualitative exploratory approach through a design science research context. The research aims to study the various themes withdrawn from the literature that can help in the assessment of interoperable HISs development through a literature study. Themes derived from the study include HIS needs, HIS readiness, HIS constraints, and HIS technology integration elements and standards tied to the EA development architectural layers of The Open Group Architecture Framework (TOGAF) as an EA development methodology. Eventually, the themes were conceptualised into a framework reviewed by two experts. The essence of the study was to provide a framework within which interoperable EA of HISs should be developed.Keywords: enterprise architecture, eHealth, health information systems, interoperability
Procedia PDF Downloads 10510968 Investigating the Relationship of Age, Annual Income, and Education on Women's Investment Behavior in the Arab Region
Authors: Razan Salem
Abstract:
This study aims to investigate the investment behavior of Arab women (in regards to their herding behavior, risk tolerance, confidence and investment literacy levels). This study aims to investigate the relationship between three demographic factors (age, income, education) and the investment behavior of Arab women. On average, women in the Arab region face several obstacles that limit them from fully participating in stocks investments. In the context, this study focuses on extending the existing literature to include Arab women individuals and their investment behaviors. To achieve the study’s objective, the researcher distributed 600 close-ended online questionnaires to a sample of Arab male and female individual investors in both Saudi Arabia and Jordan. The researcher used quantitative statistical methods (frequency distribution along with the Kruskal-Wallis H Test and the Mann-Whitney U Test) to analyze the 550 questionnaire respondents. The findings indicated that only age, educational level, and annual income level are associated with the investment behavior of Arab women, where age is only negatively associated with their financial risk tolerance levels. Additionally, income level is positively associated with Arab women‘s confidence and investment literacy levels, while educational level is only associated positively with their investment confidence levels. According to annual income, Arab women with lower incomes have lower confidence and investment literacy levels. The limited income level might prevent the sample Arab women from investing in the financial information and advisors that may help in improving their investment literacy levels. Furthermore, Arab women with lower educational levels have lower investment literacy levels and thus, this may limit their stock investments. Overall, the study contributes to the existing literature by focusing directly on examining the investment behavior of Arab women and its association with age, annual income, and education. Generally, there are scarce existing studies that investigate the association of demographic factors with the investment behavior of women only in regards to their herding behavior, risk tolerance, investment confidence, and investment literacy levels (combined), especially Arab women investors.Keywords: Arab region, demographic factors, investment behavior, women investors
Procedia PDF Downloads 19010967 Iot-Based Interactive Patient Identification and Safety Management System
Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro
Abstract:
We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band
Procedia PDF Downloads 31110966 Intrigues of Brand Activism versus Brand Antagonism in Rival Online Football Brand Communities: The Case of the Top Two Premier Football Clubs in Ghana
Authors: Joshua Doe, George Amoako
Abstract:
Purpose: In an increasingly digital world, the realm of sports fandom has extended its borders, creating a vibrant ecosystem of online communities centered around football clubs. This study ventures into the intricate interplay of motivations that drive football fans to respond to brand activism and its profound implications for brand antagonism and engagement among two of Ghana's most revered premier football clubs. Methods: A sample of 459 fervent fans from these two rival clubs were engaged through self-administered questionnaires expertly distributed via social media and online platforms. Data was analysed, using PLS-SEM. Findings: The tapestry of motivations that weave through these online football communities is as diverse as the fans themselves. It becomes apparent that fans are propelled by a spectrum of incentives. They seek education, yearn for information, revel in entertainment, embrace socialization, and fortify their self-esteem through their interactions within these digital spaces. Yet, it is the nuanced distinction in these motivations that shapes the trajectory of brand antagonism and engagement. Surprisingly, the study reveals a remarkable pattern. Football fans, despite their fierce rivalries, do not engage in brand antagonism based on educational pursuits, information-seeking endeavors, or socialization. Instead, it is motivations rooted in entertainment and self-esteem that serve as the fertile grounds for brand antagonism. Paradoxically, it is these very motivations coupled with the desire for socialization that nurture brand engagement, manifesting as active support and advocacy for their chosen club brand. Originality: Our research charters new waters by extending the boundaries of existing theories in the field. The Technology Acceptance Uses and Gratifications Theory, and Social Identity Theory all find new dimensions within the context of online brand community engagement. This not only deepens our understanding of the multifaceted world of online football fandom but also invites us to explore the implications these insights carry within the digital realm. Contribution to Practice: For marketers, our findings offer a treasure trove of actionable insights. They beckon the development of targeted content strategies that resonate with fan motivations. The implementation of brand advocacy programs, fostering opportunities for socialization, and the effective management of brand antagonism emerge as pivotal strategies. Furthermore, the utilization of data-driven insights is poised to refine consumer engagement strategies and strengthen brand affinity. Future Studies: For future studies, we advocate for longitudinal, cross-cultural, and qualitative studies that could shed further light on this topic. Comparative analyses across different types of online brand communities, an exploration of the role of brand community leaders, and inquiries into the factors that contribute to brand community dissolution all beckon the research community. Furthermore, understanding motivation-specific antagonistic behaviors and the intricate relationship between information-seeking and engagement present exciting avenues for further exploration. This study unfurls a vibrant tapestry of fan motivations, brand activism, and rivalry within online football communities. It extends a hand to scholars and marketers alike, inviting them to embark on a journey through this captivating digital realm, where passion, rivalry, and engagement harmonize to shape the world of sports fandom as we know it.Keywords: online brand engagement, football fans, brand antagonism, motivations
Procedia PDF Downloads 6510965 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 3110964 Fabric Drapemeter Development towards the Analysis of Its Behavior in 3-D Design
Authors: Aida Sheeta, M. Nashat Fors, Sherwet El Gholmy, Marwa Issa
Abstract:
Globalization has raised the customer preferences not only towards the high-quality garments but also the right fitting, comfort and aesthetic apparels. This only can be accomplished by the good interaction between fabric mechanical and physical properties as well as the required style. Consequently, this paper provides an integrated review of the fabric drape terminology because it is considered as an essential feature in which the fabric can form folds with the help of the gravity. Moreover, an instrument has been fabricated in order to analyze the static and dynamic drape behaviors using different fabric types. In addition, the obtained results find out the parameters affecting the drape coefficient using digital image processing for various kind of commercial fabrics. This was found to be an essential first step in order to analyze the behavior of this fabric when it is fabricated in a certain 3-D garment design.Keywords: cloth fitting, fabric drape nodes, garment silhouette, image processing
Procedia PDF Downloads 18810963 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand
Authors: Thossaporn Thossansin
Abstract:
This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices
Procedia PDF Downloads 32510962 A Study of Different Factors Influencing Youngsters’ Mobile Device Buying Behaviors in Malaysia
Authors: Z. S. Yip, T. K. Tan, C. C. Geh, T. T. Ting
Abstract:
The mobile phone is an indispensable device in today’s daily living. The arising new brands in the market with different specification are targeting at the different population. The most promising market would be the younger generation who are IT savvy. Therefore, it is beneficial to find out their factors of consideration in purchasing a mobile phone. A survey is carried out in Malaysia to discover the current youngster’s mobile phone buying behavior. This study has found that the most influencing factor of consideration is Price, followed by Feature, and Battery Lifespan. Gender and Income have no relationship with certain factors of consideration. It is important to discover the factors of consideration in order to provide industry insight into the current trend of smartphone in Malaysia.Keywords: buying behavior, smart phone, mobile brand, mobile operating system, specification, battery lifespan
Procedia PDF Downloads 35510961 The Influence of Workplace Aggression on Employee Turnover Intention
Authors: Nimra Parvez, Nawaz Ahmed
Abstract:
Workplace aggression not only is a proven safety and health issue but it also is a problem witnessed at workplace which has far-reaching consequences. It hinders the overall productivity of the organizations and individual employees. The current study examined employee turnover intentions as a result of workplace aggression. The study was conducted on employees from the private sector. Self-report questionnaires that measured the workplace aggression and turnover intentions of employees were used to target a sample size of 200 employees. In the hypothesis, it was assumed that high levels of workplace aggression at any organization will result in subsequent high levels of employee turnover intentions. It was therefore identified that there has been a relationship between workplace aggression and employee turnover intentions. The results determined a positive relationship between the workplace bullying behaviors towards the individuals and the turnover intention.Keywords: bullying, organizational commitment, turnover intention, workplace aggression
Procedia PDF Downloads 26510960 The Coaching on Lifestyle Intervention (CooL): Preliminary Results and Implementation Process
Authors: Celeste E. van Rinsum, Sanne M. P. L. Gerards, Geert M. Rutten, Ien A. M. van de Goor, Stef P. J. Kremers
Abstract:
Combined lifestyle interventions have shown to be effective in changing and maintaining behavioral lifestyle changes and reducing overweight and obesity. A lifestyle coach is expected to promote lifestyle changes in adults related to physical activity and diet. The present Coaching on Lifestyle (CooL) study examined participants’ physical activity level, dietary behavioral, and motivational changes immediately after the intervention and at 1.5 years after baseline. In CooL intervention a lifestyle coach coaches individuals from eighteen years and older with (a high risk of) obesity in group and individual sessions. In addition a process evaluation was conducted in order to examine the implementation process and to be able to interpret the changes within the participants. This action-oriented research has a pre-post design. Participants of the CooL intervention (N = 200) completed three questionnaires: at baseline, immediately after the intervention (on average after 44 weeks), and at 1.5 years after baseline. T-tests and linear regressions were conducted to test self-reported changes in physical activity (IPAQ), dietary behaviors, their quality of motivation for physical activity (BREQ-3) and for diet (REBS), body mass index (BMI), and quality of life (EQ-5D-3L). For the process evaluation, we used individual and group interviews, observations and document analyses to gain insight in the implementation process (e.g. the recruitment) and how the intervention was valued by the participants, lifestyle coaches, and referrers. The study is currently ongoing and therefore the results presented here are preliminary. On average, the participants that finished the intervention and those that have completed the long-term measurement improved their level of vigorous-intense physical activity, sedentary behavior, sugar-sweetened beverage consumption and BMI. Mixed results were observed in motivational regulation for physical activity and nutrition. Moreover, an improvement on the quality of life dimension anxiety/depression was found, also in the long-term. All the other constructs did not show significant change over time. The results of the process evaluation have shown that recruitment of clients was difficult. Participants evaluated the intervention positively and the lifestyle coaches have continuously adapted the structure and contents of the intervention throughout the study period, based on their experiences and feedback from research. Preliminary results indicate that the CooL-intervention may have beneficial effects on overweight and obese participants in terms of energy balance-related behaviors, weight reduction, and quality of life. Recruitment of participants and embedding the position of the lifestyle coach in traditional care structures is challenging.Keywords: combined lifestyle intervention, effect evaluation, lifestyle coaching, process evaluation, overweight, the Netherlands
Procedia PDF Downloads 22910959 The Primitive Code-Level Design Patterns for Distributed Programming
Authors: Bing Li
Abstract:
The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging
Procedia PDF Downloads 19210958 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach
Authors: Alev Atak
Abstract:
In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.Keywords: financial sentiment, machine learning, information disclosure, risk
Procedia PDF Downloads 9410957 A Nonlinear Approach for System Identification of a Li-Ion Battery Based on a Non-Linear Autoregressive Exogenous Model
Authors: Meriem Mossaddek, El Mehdi Laadissi, El Mehdi Loualid, Chouaib Ennawaoui, Sohaib Bouzaid, Abdelowahed Hajjaji
Abstract:
An electrochemical system is a subset of mechatronic systems that includes a wide variety of batteries and nickel-cadmium, lead-acid batteries, and lithium-ion. Those structures have several non-linear behaviors and uncertainties in their running range. This paper studies an effective technique for modeling Lithium-Ion (Li-Ion) batteries using a Nonlinear Auto-Regressive model with exogenous input (NARX). The Artificial Neural Network (ANN) is trained to employ the data collected from the battery testing process. The proposed model is implemented on a Li-Ion battery cell. Simulation of this model in MATLAB shows good accuracy of the proposed model.Keywords: lithium-ion battery, neural network, energy storage, battery model, nonlinear models
Procedia PDF Downloads 11510956 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice
Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese
Abstract:
Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.Keywords: documentation, knowledge, patient care, patient’s information, training
Procedia PDF Downloads 19010955 Critical Success Factors of Information Technology Projects
Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim
Abstract:
Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.Keywords: critical success factors, CSF, IT projects, IS projects, software development projects
Procedia PDF Downloads 40010954 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13410953 Development of a Technology Assessment Model by Patents and Customers' Review Data
Authors: Kisik Song, Sungjoo Lee
Abstract:
Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.Keywords: technology assessment, patents, citation information, opinion mining
Procedia PDF Downloads 46610952 Social Accountability: Persuasion and Debate to Contain Corruption
Authors: A. Lambert-Mogiliansky
Abstract:
In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.Keywords: accountability, corruption, persuasion, debate
Procedia PDF Downloads 38010951 A Phenomenological Exploration of Alcohol Consumption Patterns and Problems Among Male Students at the University of Kwazulu-Natal
Authors: Isaiah Phillip Smith
Abstract:
It is reported that alcohol consumption accounts for 3 million annual deaths globally, thus, it is a significant public health challenge internationally. The excessive consumption of alcohol is argued in literature to be related to problematic behaviors like crime, accident, fighting, violence, and unprotected sex, among others. Alcohol consumption among university students in South Africa particularly is considered endemic – with a prevalence rate of 25.27%, 32.34%, and 23.34% across universities, colleges, and high schools. Adopting the tenets of social learning and ecological theories, the culture of drinking amongst male university students is critically explored. This study found that age, gender, early exposure to alcohol, and peer pressure are significant factors contributing to alcohol consumption amongst university students. While participants acknowledged that moderate and responsible consumption of alcohol is necessary, they agree that it does not translate to responsible drinking behaviours.Keywords: alcohol, drinking, university, students
Procedia PDF Downloads 14010950 Multiresolution Mesh Blending for Surface Detail Reconstruction
Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal
Abstract:
In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending
Procedia PDF Downloads 13910949 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation
Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud
Abstract:
Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing
Procedia PDF Downloads 9710948 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia
Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez
Abstract:
The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis
Procedia PDF Downloads 23910947 A Compared Approach between Moderate Islamic Values and Basic Human Values
Authors: Adel Bessadok
Abstract:
The theory of values postulates that each human has a set of values, or attractive and trans-situational goals, that drive their actions. The Basic Human Values as an incentive construct that apprehends human's values have been shown to govern a wide range of human behaviors. Individuals within and within societies have very different value preferences that reflect their enculturation, their personal experiences, their social places and their genetic heritage. Using a focus group composed by Islamic religious Preachers and a sample of 800 young students; this ongoing study will establish Moderate Islamic Values parameters. We analyze later, for the same students sample the difference between Moderate Islamic Values and Schwartz’s Basic Human Values. Keywords—Moderate Islamic Values, Basic Human Values, Exploratory Factor Analysis and Confirmatory Factor Analysis.Keywords: moderate Islamic values, basic human values, exploratory factor analysis, confirmatory factor analysis
Procedia PDF Downloads 38210946 Mutual Information Based Image Registration of Satellite Images Using PSO-GA Hybrid Algorithm
Authors: Dipti Patra, Guguloth Uma, Smita Pradhan
Abstract:
Registration is a fundamental task in image processing. It is used to transform different sets of data into one coordinate system, where data are acquired from different times, different viewing angles, and/or different sensors. The registration geometrically aligns two images (the reference and target images). Registration techniques are used in satellite images and it is important in order to be able to compare or integrate the data obtained from these different measurements. In this work, mutual information is considered as a similarity metric for registration of satellite images. The transformation is assumed to be a rigid transformation. An attempt has been made here to optimize the transformation function. The proposed image registration technique hybrid PSO-GA incorporates the notion of Particle Swarm Optimization and Genetic Algorithm and is used for finding the best optimum values of transformation parameters. The performance comparision obtained with the experiments on satellite images found that the proposed hybrid PSO-GA algorithm outperforms the other algorithms in terms of mutual information and registration accuracy.Keywords: image registration, genetic algorithm, particle swarm optimization, hybrid PSO-GA algorithm and mutual information
Procedia PDF Downloads 408