Search results for: library information science
12191 Enhanced Visual Sharing Method for Medical Image Security
Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar
Abstract:
In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.Keywords: information security, medical images, cryptography, visual sharing
Procedia PDF Downloads 41412190 Defining the Push and Pull Factors to Adopt Health Information Technologies by Health Entrepreneurs
Authors: Elaheh Ezami, Behzad Mohammadian, Elham Aznab
Abstract:
Health service design will need to change due to bringing in new digital health tools. This highlights the importance of innovation in adopting Health Information Technology (HIT). It can be argued that innovation in the health sector correlates with entrepreneurship. Various reasons exist for health entrepreneurs to advocate increased investment in HIT to compensate for shortcomings in the health sector and improve the quality of healthcare. Furthermore, every innovative program presents challenges and motivations for entrepreneurs that may distract or encourage the adoption of technology. Our study used a systematic literature review to identify relevant articles that defined the frustrations and promotions of using health information technology in organizations or enterprises. A meta-analysis of the articles was conducted to identify the factors driving or pulling entrepreneurs to use HIT.Keywords: health information technology, health entrepreneurship, health enterprise, health entrepreneurs' innovation
Procedia PDF Downloads 11412189 Risk Tolerance and Individual Worthiness Based on Simultaneous Analysis of the Cognitive Performance and Emotional Response to a Multivariate Situational Risk Assessment
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
A method and system for neuropsychological performance test, comprising a mobile terminal, used to interact with a cloud server which stores user information and is logged into by the user through the terminal device; the user information is directly accessed through the terminal device and is processed by artificial neural network, and the user information comprises user facial emotions information, performance test answers information and user chronometrics. This assessment is used to evaluate the cognitive performance and emotional response of the subject to a series of dichotomous questions describing various situations of daily life and challenging the users' knowledge, values, ethics, and principles. In industrial applications, the timing of this assessment will depend on the users' need to obtain a service from a provider, such as opening a bank account, getting a mortgage or an insurance policy, authenticating clearance at work, or securing online payments.Keywords: artificial intelligence, neurofinance, neuropsychology, risk management
Procedia PDF Downloads 13812188 Development of an Information System Based Airport Evaluation Method
Authors: Eniko Nagy, Csaba Csiszar
Abstract:
Satisfaction of air transportation passengers is significantly affected by the perceived quality of airport information services. The development potential of ICT is considerable. The traditional and new functions of ‘smart’ airports are realized by complex services aiding seamless, comfortable and less time-consuming travel. Based on the elements of the transportation chain the information management functions, their relationships and the technical solutions have been identified. The functions have been categorized by their development level and evaluation scores have been assigned to each category. Correction factors influencing the usefulness of the technology or the service have been introduced. A method for the calculation of ‘smart’ index in order to compare the airports in objective way has been developed; thus facilitating further developments. The method has been applied for the case study of Budapest.Keywords: air transportation informatics, evaluation, information service, smart airport
Procedia PDF Downloads 21312187 Awareness about Authenticity of Health Care Information from Internet Sources among Health Care Students in Malaysia: A Teaching Hospital Study
Authors: Renjith George, Preethy Mary Donald
Abstract:
Use of internet sources to retrieve health care related information among health care professionals has increased tremendously as the accessibility to internet is made easier through smart phones and tablets. Though there are huge data available at a finger touch, it is doubtful whether all the sources providing health care information adhere to evidence based practice. The objective of this survey was to study the prevalence of use of internet sources to get health care information, to assess the mind-set towards the authenticity of health care information available via internet sources and to study the awareness about evidence based practice in health care among medical and dental students in Melaka-Manipal Medical College. The survey was proposed as there is limited number of studies reported in the literature and this is the first of its kind in Malaysia. A cross sectional survey was conducted among the medical and dental students of Melaka-Manipal Medical College. A total of 521 students including medical and dental students in their clinical years of undergraduate study participated in the survey. A questionnaire consisting of 14 questions were constructed based on data available from the published literature and focused group discussion and was pre-tested for validation. Data analysis was done using SPSS. The statistical analysis of the results of the survey proved that the use of internet resources for health care information are equally preferred over the conventional resources among health care students. Though majority of the participants verify the authenticity of information from internet sources, there was considerable percentage of candidates who feels that all the information from the internet can be utilised for clinical decision making or were not aware about the need of verification of authenticity of such information. 63.7 % of the participants rely on evidence based practice in health care for clinical decision making while 34.2 % were not aware about it. A minority of 2.1% did not agree with the concept of evidence based practice. The observations of the survey reveals the increasing use of internet resources for health care information among health care students. The results warrants the need to move towards evidence based practice in health care as all health care information available online may not be reliable. The health care person should be judicious while utilising the information from such resources for clinical decision making.Keywords: authenticity, evidence based practice, health care information, internet
Procedia PDF Downloads 44612186 Solving the Set Covering Problem Using the Binary Cat Swarm Optimization Metaheuristic
Authors: Broderick Crawford, Ricardo Soto, Natalia Berrios, Eduardo Olguin
Abstract:
In this paper, we present a binary cat swarm optimization for solving the Set covering problem. The set covering problem is a well-known NP-hard problem with many practical applications, including those involving scheduling, production planning and location problems. Binary cat swarm optimization is a recent swarm metaheuristic technique based on the behavior of discrete cats. Domestic cats show the ability to hunt and are curious about moving objects. The cats have two modes of behavior: seeking mode and tracing mode. We illustrate this approach with 65 instances of the problem from the OR-Library. Moreover, we solve this problem with 40 new binarization techniques and we select the technical with the best results obtained. Finally, we make a comparison between results obtained in previous studies and the new binarization technique, that is, with roulette wheel as transfer function and V3 as discretization technique.Keywords: binary cat swarm optimization, binarization methods, metaheuristic, set covering problem
Procedia PDF Downloads 39612185 Muhammad Bin Abi Al-Surūr Al-Bakriyy Al-Ṣiddīqiyy and His Approach to Interpretation: Sūrat Al-Fatḥ as an Example
Authors: Saleem Abu Jaber
Abstract:
Born into a Sufi family, in which his father and other relatives, as well as additional community members, were particularly rooted in scholarly and cultural inquiry, Muḥammad ʾAbū al-Surūr al-Bikriyy al-Ṣidīqiyy (1562–1598 CE) was a prominent scholar of his time. Despite his relative youth, he became influential in his writings, which included Quranic exegeses and works on Hadith, Arabic grammar, jurisprudence, and Sufism. He was also a practicing physician and was the first person to be named Mufti of the Sultanate in Egypt. He was active in the political arena, having been close to the Ottoman sultans, providing them his support and counsel. He strived for their empowerment and victory and often influenced their political convictions and actions. Al-Ṣidīqiyy enjoyed the patronage of his contemporary Ottoman Caliphate sultans. In general, these sultans always promoted studies in the Islamic sciences and were keen to support scholars and gain their trust. This paper addresses al-Ṣidīqiyy’s legacy as a Quranic commentator, focusing on his exegesis (tafsīr) of Sūrat al-Fatḥ (48), written in 1589. It appears in a manuscript found at the Süleymaniye Library in Istanbul, consisting of one volume of 144 pages. It is believed that no other manuscript containing the text of this exegesis is to be found in any other library or institute for Arabic manuscripts. According to al-Ṣabbāġ (1995), al-Ṣidīqiyy had written a complete commentary of the Quran, but efforts to recover it have only unearthed the current commentary, as well as that of Sūrat al-Kahf (18), Sūrat al-ʾAnʿām (6), and ʾĀyat al-Kursī (2:255). The only critical edition published to date is that of Sūrat al-Kahf. The other two are currently being prepared for publication as well. The paucity of scholarly studies on the works of al-Ṣidīqiyy renders the current study particularly significant, as it provides introduction to al-Ṣidīqiyy’s exegesis, a synopsis of the biographical and cultural background of its author and his family, and a critical evaluation of his scholarly contribution. It will introduce the manuscript on which this study is based and elaborate on the structure and rationale of the exegesis, on its very attribution to al-Ṣidīqiyy, and subsequently evaluate its overall significance to the understanding of Sufi approaches to Quranic interpretation in 16th century Ottoman Egypt. An analysis of al-Ṣidīqiyy’s approach to interpreting the Quran leads to the definitive conclusion that it indeed reflects Sufi principles. For instance, when citing other Sufi commentators, including his own ancestors, he uses the epithets mawlāna ‘our elder, our patron,’ al-ʾustāḏ ‘the master,’ unique to Sufi parlance. Crucially, his interpretation, is written in a realistic, uncomplicated, fetching style, as was customary among Sufi scholars of his time, whose leaning was one of clarity, based on their perception of themselves as being closest to Muḥammad and his family, and by extension to the sunna, as reflected in the traditional narrative of the Prophet’s biography and teachings.Keywords: Quran’ sufiism, manuscript, exegesis, surah, Al-fath, sultanate, sunna
Procedia PDF Downloads 5312184 Intersectional Perspectives on Gender Equality in Higher Education: A Survey on Swiss Universities of Applied Science
Authors: Birgit Schmid, Brigitte Liebig, Susanne Burren, Maritza Le Breton, Martin Boehnel, Celestina Porta
Abstract:
Internationalization of students is part of the agenda of many universities worldwide. Yet, how well do universities achieve to guarantee educational success for male and female students of migrant background? This contribution aims on analyzing the effects of the Swiss university environment on perceived educational outcome of migrant students from a gender sensitive perspective. Social selectivity and gender inequalities strongly influence students’ access and success at universities. However, the complex interaction between universities and their disciplinary environments, and educational success of migrant students of both sex remains rarely examined so far. Starting from an intersectional perspective and neo-institutional approaches on higher education organizations, this contribution addresses formal/informal factors in the university environment in its impact on male/female students’ perception of well-being, success and dropout motivation. The paper starts from a most recent Swiss online-survey of Bachelor-students in two Universities of Applied Science and a University of Education in Switzerland. It compares students’ perspectives in four large BA degree courses with different male/female ratio, i.e. educational science, technical/computer science, economy, and social work (N=9`608). Results highlight the complex interplay of gender, migrant background and further dimensions of social differentiation on students’ perception in these different fields of education. Further, they illustrate correlations between students’ perception of discriminatory contexts, poor ratings of social integration and study success, as well a higher rate of dropout ideas. The paper lines out, that formal aspects of internationalization are less important for successfully integrating male/female migrant students than informal university conditions, such as a culture of diversity, which has to become integral part of internationalization strategies.Keywords: gender and migration, higher education, internationalization, success
Procedia PDF Downloads 19012183 Physical Fitness Evaluation of MARA Junior Science Collage Rugby Player
Authors: Mohamad Nizam Asmuni, Ahmad Naszeri Salleh, Yunus Adam, Azhar Yaacob, Mohd Hafiz Rosli, Muhamad Nazrul Hakim Abdullah
Abstract:
Athletes at the school should have good physical fitness to participate in tournament. Currently, there are no standards for the level of physical fitness for MARA Junior Science Collage (MJSC). Therefore, this research is to determine the level of physical fitness of rugby player at MJSC. A total of 62 samples (age 16.4 ± 0.75) among rugby players at MJSC were randomly selected to participate in this study. Height, weight, body fat percentage, body mass index (BMI) and other physical testing are measured and recorded. The results showed that the average of body mass index (BMI) for rugby players is 23.4 ± 4:51. Body mass index (BMI) of rugby players can be categorized as pre-obese based on World Health Organization (WHO) guidelines. BMI for rugby players was categorized as healthy based on body fat ranges for standard adults at NY Obesity Research Center. Bleep test results show that the average Bleep test is level 7 and shuttle 5; average VO2max was 37.94 L/min. Physical fitness and performance of rugby players at MJSC is lower compared to the rugby junior athletes in University Putra Malaysia (UPM). Therefore, physical fitness of rugby players must be improved to ensure the rugby players at MJSC could be performs better in the tournament.Keywords: physical fitness, MARA junior science collage (MJSC), body mass index (BMI), bleep test
Procedia PDF Downloads 48212182 Accounting Management Information System for Convenient Shop in Bangkok Thailand
Authors: Anocha Rojanapanich
Abstract:
The purpose of this research is to develop and design an accounting management information system for convenient shop in Bangkok Thailand. The study applied the System Development Life Cycle (SDLC) for development which began with study and analysis of current data, including the existing system. Then, the system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Product diversity, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management and importance of cost information for decision making also as well as.Keywords: accounting management information system, convenient shop, cost information for decision making system, development life cycle
Procedia PDF Downloads 42012181 Mechanisms Underlying Comprehension of Visualized Personal Health Information: An Eye Tracking Study
Authors: Da Tao, Mingfu Qin, Wenkai Li, Tieyan Wang
Abstract:
While the use of electronic personal health portals has gained increasing popularity in the healthcare industry, users usually experience difficulty in comprehending and correctly responding to personal health information, partly due to inappropriate or poor presentation of the information. The way personal health information is visualized may affect how users perceive and assess their personal health information. This study was conducted to examine the effects of information visualization format and visualization mode on the comprehension and perceptions of personal health information among personal health information users with eye tracking techniques. A two-factor within-subjects experimental design was employed, where participants were instructed to complete a series of personal health information comprehension tasks under varied types of visualization mode (i.e., whether the information visualization is static or dynamic) and three visualization formats (i.e., bar graph, instrument-like graph, and text-only format). Data on a set of measures, including comprehension performance, perceptions, and eye movement indicators, were collected during the task completion in the experiment. Repeated measure analysis of variance analyses (RM-ANOVAs) was used for data analysis. The results showed that while the visualization format yielded no effects on comprehension performance, it significantly affected users’ perceptions (such as perceived ease of use and satisfaction). The two graphic visualizations yielded significantly higher favorable scores on subjective evaluations than that of the text format. While visualization mode showed no effects on users’ perception measures, it significantly affected users' comprehension performance in that dynamic visualization significantly reduced users' information search time. Both visualization format and visualization mode had significant main effects on eye movement behaviors, and their interaction effects were also significant. While the bar graph format and text format had similar time to first fixation across dynamic and static visualizations, instrument-like graph format had a larger time to first fixation for dynamic visualization than for static visualization. The two graphic visualization formats yielded shorter total fixation duration compared with the text-only format, indicating their ability to improve information comprehension efficiency. The results suggest that dynamic visualization can improve efficiency in comprehending important health information, and graphic visualization formats were favored more by users. The findings are helpful in the underlying comprehension mechanism of visualized personal health information and provide important implications for optimal design and visualization of personal health information.Keywords: eye tracking, information comprehension, personal health information, visualization
Procedia PDF Downloads 10812180 The Development of Open Access in Latin America and Caribbean: Mapping National and International Policies and Scientific Publications of the Region
Authors: Simone Belli, Sergio Minniti, Valeria Santoro
Abstract:
ICTs and technology transfer can benefit and move a country forward in economic and social development. However, ICT and access to the Internet have been inequitably distributed in most developing countries. In terms of science production and dissemination, this divide articulates itself also through the inequitable distribution of access to scientific knowledge and networks, which results in the exclusion of developing countries from the center of science. Developing countries are on the fringe of Science and Technology (S&T) production due not only to low investment in research but also to the difficulties to access international scholarly literature. In this respect, Open access (OA) initiatives and knowledge infrastructure represent key elements for both producing significant changes in scholarly communication and reducing the problems of developing countries. The spreading of the OA movement in the region, exemplified by the growth of regional and national initiatives, such as the creation of OA institutional repositories (e.g. SciELO and Redalyc) and the establishing of supportive governmental policies, provides evidence of the significant role that OA is playing in reducing the scientific gap between Latin American countries and improving their participation in the so-called ‘global knowledge commons’. In this paper, we map OA publications in Latin America and observe how Latin American countries are moving forward and becoming a leading force in widening access to knowledge. Our analysis, developed as part of the H2020 EULAC Focus research project, is based on mixed methods and consists mainly of a bibliometric analysis of OA publications indexed in the most important scientific databases (Web of Science and Scopus) and OA regional repositories, as well as the qualitative analysis of documents related to the main OA initiatives in Latin America. Through our analysis, we aim at reflecting critically on what policies, international standards, and best practices might be adapted to incorporate OA worldwide and improve the infrastructure of the global knowledge commons.Keywords: open access, LAC countries, scientific publications, bibliometric analysis
Procedia PDF Downloads 21212179 Design and Implementation of Reliable Location-Based Social Community Services
Authors: B. J. Kim, K. W. Nam, S. J. Lee
Abstract:
Traditional social network services provide users with more information than is needed, and it is not easy to verify the authenticity of the information. This paper proposes a system that can only post messages where users are located to enhance the reliability of social networking services. The proposed system implements a Google Map API to post postings on the map and to read postings within a range of distances from the users’ location. The proposed system will only provide alerts, memories, and information about locations within a given range depending on the users' current location, providing reliable information that they believe will be necessary in real time. It is expected that the proposed system will be able to meet the real demands of users and create a more reliable social network services environment.Keywords: social network, location, reliability, posting
Procedia PDF Downloads 25712178 Boosting Crime Scene Investigations Capabilities through Crime Script Analysis
Authors: Benoit Leclerc
Abstract:
The concept of scripts and the role that crime scripts has been playing in criminology during the last decade is reviewed. Particularly illuminating is the potential use of scripts not only to understand and disrupt offender scripts (e.g., commonly referred as crime scripts) but to capture victim and guardian scripts to increase the likelihood of preventing crime. Similarly, the concept of scripts is applied to forensic science – another field that can benefit from script analysis. First, similar to guardian scripts, script analysis can illuminate the process of completing crime scene investigations for those who investigate (crime scene investigators or other professionals involved in crime scene investigations), and as a result, provide a range of intervention-points to improve the success of these investigations. Second, script analysis can also provide valuable information on offenders’ crime-commission processes for crime scene investigators and highlight a number of ‘contact points’ that could be targeted during investigations.Keywords: crime scripts, crime scene investigation, script analysis, situational crime prevention
Procedia PDF Downloads 27512177 Girls' Underperformance in Science: From Biological Determinism and Feminist Perspectives
Authors: Raza Ullah, Hazir Ullah
Abstract:
There is ample evidence that reveals the outstanding performance of girls in a different range of subjects. However, it is pertinent to mention here that boys have historically dominated girls, particularly in math, physics, and technological subjects across the globe with the exception of few developed countries. This article examines the reasons why girls are underdog in STEM subjects. The article critically analyzes two main approaches towards gender and education: biological determinist and feminist. This article highlights that social factors influencing girls performance in STEM subjects have not analyzed critically, and girls underachieving in science has linked with biological and sex differences. The article concludes that the underperformance of girls in a STEM subject is the direct response of socio-cultural factors. Thus, socio-cultural factors are responsible for the dearth of girls in STEM subjects.Keywords: gender, underperformance, STEM, education, sex
Procedia PDF Downloads 16212176 Bridging the Digital Divide in India: Issus and Challenges
Authors: Parveen Kumar
Abstract:
The cope the rapid change of technology and to control the ephemeral rate of information generation, librarians along with their professional colleagues need to equip themselves as per the requirement of the electronic information society. E-learning is purely based on computer and communication technologies. The terminologies like computer based learning. It is the delivery of content via all electronic media through internet, internet, Extranets television broadcast, CD-Rom documents, etc. E-learning poses lot of issues in the transformation of literature or knowledge from the conventional medium to ICT based format and web based services.Keywords: e-learning, digital libraries, online learning, electronic information society
Procedia PDF Downloads 51012175 Information Construction of Higher Education in Teaching Practice
Authors: Yang Meng, James L. Patnao
Abstract:
With the rapid development of information technology and the impact of the epidemic environment, the traditional teaching model can’t longer meet the requirements of the development of the times. The development of teaching mechanism is the inevitable trend of the future development of higher education. We must further promote the informatization of higher education in teaching practice, let modern information technology penetrate and practice in classroom teaching, and provide promising opportunities for the high-quality development of higher education. This article mainly through the distribution of questionnaires to teachers of colleges and universities, so as to understand the degree of informatization in the teaching of colleges and universities. And on the basis of domestic and foreign scholars' research on higher education informatization, it analyzes the existing problems, and finds the optimal solution based on the needs of education and teaching development. According to the survey results, most college teachers will use information technology in teaching practice, but the information technology teaching tools used by teachers are relatively simple, and most of them only use slides. In addition, backward informatization infrastructure and less informatization training are the main challenges facing the current teaching informatization construction. If colleges and universities can make good use of information technology and multimedia technology and combine it with traditional teaching, it will definitely promote the development of college education and further promote the modernization and informatization of higher education.Keywords: higher education, teaching practice, informatization construction, e-education
Procedia PDF Downloads 12212174 Monte Carlo Neutronic Calculations on Laser Inertial Fusion Energy (LIFE)
Authors: Adem Acır
Abstract:
In this study, time dependent neutronic analysis of incineration of minor actinides of a Laser Fusion Inertial Confinement Fusion Fission Energy (LIFE) engine was performed. The calculations were carried out by using MCNP codes with ENDF/B.VI neutron data library. In the neutronic calculations, TRISO particles fueled with minor actinides with natural lithium coolant were performed. The natural lithium cooled LIFE engine used 10 % TRISO fuel minor actinides composition. Tritium breeding ratios (TBR) and energy multiplication factor (M) burnup values were computed as 1.46 and 3.75, respectively. The reactor operation time was calculated as ~ 21 years. The burnup values were obtained as ~1060 GWD/MT, respectively. As a result, the very higher burnup were achieved of LIFE engine.Keywords: Monte Carlo, minor actinides, nuclear waste, LIFE engine
Procedia PDF Downloads 29312173 Executive Leadership in Kinesiology, Exercise and Sport Science: The Five 'C' Concept
Authors: Jim Weese
Abstract:
The Kinesiology, Exercise and Sport Science environment remain excellent venues for leadership research. Prescribed leadership (coaching), emergent leadership (players and organizations), and executive leadership are all popular themes in the research literature. Leadership remains a popular area of inquiry in the sport management domain as well as an interesting area for practitioners who wish to heighten their leadership practices and effectiveness. The need for effective leadership in these areas given competing demands for attention and resources may be at an all-time high. The presenter has extensive research and practical experience in the area and has developed his concept based on the latest leadership literature. He refers to this as the Five ’C’s of Leadership. These components, noted below, have been empirically validated and have served as the foundation for extensive consulting with academic, sport, and business leaders. Credibility (C1) is considered the foundation of leadership. There are two components to this area, namely: (a) leaders being respected for having the relevant knowledge, insights, and experience to be seen as credible sources of information, and (b) followers perceiving the leader as being a person of character, someone who is honest, reliable, consistent, and trustworthy. Compelling Vision (C2) refers to the leader’s ability to focus the attention of followers on a desired end goal. Effective leaders understand trends and developments in their industry. They also listen attentively to the needs and desires of their stakeholders and use their own instincts and experience to shape these ideas into an inspiring vision that is effectively and continuously communicated. Charismatic Communicator (C3) refers to the leader’s ability to formally and informally communicate with members. Leaders must deploy mechanisms and communication techniques to keep their members informed and engaged. Effective leaders sprinkle in ‘proof points’ that reinforce the vision’s relevance and/or the unit’s progress towards its attainment. Contagious Enthusiasm (C4) draws on the emotional intelligence literature as it relates to exciting and inspiring followers. Effective leaders demonstrate a level of care, commitment, and passion for their people and feelings of engagement permeate the group. These leaders genuinely care about the task at hand, and for the people working to make it a reality. Culture Builder (C5) is the capstone component of the model and is critical to long-term success and survival. Organizational culture refers to the dominant beliefs, values and attitudes of members of a group or organization. Some have suggested that developing and/or imbedding a desired culture for an organization is the most important responsibility for a leader. The author outlines his Five ‘C’s’ of Leadership concept and provide direct application to executive leadership in Kinesiology, Exercise and Sport Science.Keywords: effectiveness, leadership, management, sport
Procedia PDF Downloads 30012172 Multi-Stream Graph Attention Network for Recommendation with Knowledge Graph
Abstract:
In recent years, Graph neural network has been widely used in knowledge graph recommendation. The existing recommendation methods based on graph neural network extract information from knowledge graph through entity and relation, which may not be efficient in the way of information extraction. In order to better propose useful entity information for the current recommendation task in the knowledge graph, we propose an end-to-end Neural network Model based on multi-stream graph attentional Mechanism (MSGAT), which can effectively integrate the knowledge graph into the recommendation system by evaluating the importance of entities from both users and items. Specifically, we use the attention mechanism from the user's perspective to distil the domain nodes information of the predicted item in the knowledge graph, to enhance the user's information on items, and generate the feature representation of the predicted item. Due to user history, click items can reflect the user's interest distribution, we propose a multi-stream attention mechanism, based on the user's preference for entities and relationships, and the similarity between items to be predicted and entities, aggregate user history click item's neighborhood entity information in the knowledge graph and generate the user's feature representation. We evaluate our model on three real recommendation datasets: Movielens-1M (ML-1M), LFM-1B 2015 (LFM-1B), and Amazon-Book (AZ-book). Experimental results show that compared with the most advanced models, our proposed model can better capture the entity information in the knowledge graph, which proves the validity and accuracy of the model.Keywords: graph attention network, knowledge graph, recommendation, information propagation
Procedia PDF Downloads 11612171 Doing More with Less: Passion for Entrepreneurship in the Research-Constraint Contexts of Developing and Emerging Economies
Authors: Marcel Hechler
Abstract:
Since passion is considered one of the most important motivating factors for entrepreneurship, we examined the influence of the availability of resources and information on the emergence of a harmonious passion for entrepreneurship (HPE). Drawing on self-determination theory and a cross-cultural sample of 1,085 entrepreneurs from seven developing countries, we argue that the availability of resources and information increases an entrepreneur's autonomy and, thus, promotes the emergence of HPE.Keywords: harmonious passion, access to resources and information, developing and emerging countries, self-determination theory
Procedia PDF Downloads 16412170 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth
Authors: Hui-Chuan Lu
Abstract:
In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster
Procedia PDF Downloads 36112169 Block Based Imperial Competitive Algorithm with Greedy Search for Traveling Salesman Problem
Authors: Meng-Hui Chen, Chiao-Wei Yu, Pei-Chann Chang
Abstract:
Imperial competitive algorithm (ICA) simulates a multi-agent algorithm. Each agent is like a kingdom has its country, and the strongest country in each agent is called imperialist, others are colony. Countries are competitive with imperialist which in the same kingdom by evolving. So this country will move in the search space to find better solutions with higher fitness to be a new imperialist. The main idea in this paper is using the peculiarity of ICA to explore the search space to solve the kinds of combinational problems. Otherwise, we also study to use the greed search to increase the local search ability. To verify the proposed algorithm in this paper, the experimental results of traveling salesman problem (TSP) is according to the traveling salesman problem library (TSPLIB). The results show that the proposed algorithm has higher performance than the other known methods.Keywords: traveling salesman problem, artificial chromosomes, greedy search, imperial competitive algorithm
Procedia PDF Downloads 45812168 Role of Social Media for Institutional Branding: Ethics of Communication Review
Authors: Iva Ariani, Mohammad Alvi Pratama
Abstract:
Currently, the world of communication experiences a rapid development. There are many ways of communication utilized in line with the development of science which creates many technologies that encourage a rapid development of communication system. However, despite giving convenience for the society, the development of communication system is not accompanied by the development of applicable values and regulations. Therefore, it raises many issues regarding false information or hoax which can influence the society’s mindset. This research aims to know the role of social media towards the reputation of an institution using a communication ethics study. It is a qualitative research using interview, observation, and literature study for collecting data. Then, the data will be analyzed using philosophical methods which are hermeneutic and deduction methods. This research is expected to show the role of social media in developing an institutional reputation in ethical review.Keywords: social media, ethics, communication, reputation
Procedia PDF Downloads 20712167 Geographic Information System Using Google Fusion Table Technology for the Delivery of Disease Data Information
Authors: I. Nyoman Mahayasa Adiputra
Abstract:
Data in the field of health can be useful for the purposes of data analysis, one example of health data is disease data. Disease data is usually in a geographical plot in accordance with the area. Where the data was collected, in the city of Denpasar, Bali. Disease data report is still published in tabular form, disease information has not been mapped in GIS form. In this research, disease information in Denpasar city will be digitized in the form of a geographic information system with the smallest administrative area in the form of district. Denpasar City consists of 4 districts of North Denpasar, East Denpasar, West Denpasar and South Denpasar. In this research, we use Google fusion table technology for map digitization process, where this technology can facilitate from the administrator and from the recipient information. From the administrator side of the input disease, data can be done easily and quickly. From the receiving end of the information, the resulting GIS application can be published in a website-based application so that it can be accessed anywhere and anytime. In general, the results obtained in this study, divided into two, namely: (1) Geolocation of Denpasar and all of Denpasar districts, the process of digitizing the map of Denpasar city produces a polygon geolocation of each - district of Denpasar city. These results can be utilized in subsequent GIS studies if you want to use the same administrative area. (2) Dengue fever mapping in 2014 and 2015. Disease data used in this study is dengue fever case data taken in 2014 and 2015. Data taken from the profile report Denpasar Health Department 2015 and 2016. This mapping can be useful for the analysis of the spread of dengue hemorrhagic fever in the city of Denpasar.Keywords: geographic information system, Google fusion table technology, delivery of disease data information, Denpasar city
Procedia PDF Downloads 12912166 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 6612165 Project Management Agile Model Based on Project Management Body of Knowledge Guideline
Authors: Mehrzad Abdi Khalife, Iraj Mahdavi
Abstract:
This paper presents the agile model for project management process. For project management process, the Project Management Body of Knowledge (PMBOK) guideline has been selected as platform. Combination of computational science and artificial intelligent methodology has been added to the guideline to transfer the standard to agile project management process. The model is the combination of practical standard, computational science and artificial intelligent. In this model, we present communication model and protocols to keep process agile. Here, we illustrate the collaboration man and machine in project management area with artificial intelligent approach.Keywords: artificial intelligent, conceptual model, man-machine collaboration, project management, standard
Procedia PDF Downloads 34112164 The Impact of the Covid-19 Crisis on the Information Behavior in the B2B Buying Process
Authors: Stehr Melanie
Abstract:
The availability of apposite information is essential for the decision-making process of organizational buyers. Due to the constraints of the Covid-19 crisis, information channels that emphasize face-to-face contact (e.g. sales visits, trade shows) have been unavailable, and usage of digitally-driven information channels (e.g. videoconferencing, platforms) has skyrocketed. This paper explores the question in which areas the pandemic induced shift in the use of information channels could be sustainable and in which areas it is a temporary phenomenon. While information and buying behavior in B2C purchases has been regularly studied in the last decade, the last fundamental model of organizational buying behavior in B2B was introduced by Johnston and Lewin (1996) in times before the advent of the internet. Subsequently, research efforts in B2B marketing shifted from organizational buyers and their decision and information behavior to the business relationships between sellers and buyers. This study builds on the extensive literature on situational factors influencing organizational buying and information behavior and uses the economics of information theory as a theoretical framework. The research focuses on the German woodworking industry, which before the Covid-19 crisis was characterized by a rather low level of digitization of information channels. By focusing on an industry with traditional communication structures, a shift in information behavior induced by an exogenous shock is considered a ripe research setting. The study is exploratory in nature. The primary data source is 40 in-depth interviews based on the repertory-grid method. Thus, 120 typical buying situations in the woodworking industry and the information and channels relevant to them are identified. The results are combined into clusters, each of which shows similar information behavior in the procurement process. In the next step, the clusters are analyzed in terms of the post and pre-Covid-19 crisis’ behavior identifying stable and dynamic information behavior aspects. Initial results show that, for example, clusters representing search goods with low risk and complexity suggest a sustainable rise in the use of digitally-driven information channels. However, in clusters containing trust goods with high significance and novelty, an increased return to face-to-face information channels can be expected after the Covid-19 crisis. The results are interesting from both a scientific and a practical point of view. This study is one of the first to apply the economics of information theory to organizational buyers and their decision and information behavior in the digital information age. Especially the focus on the dynamic aspects of information behavior after an exogenous shock might contribute new impulses to theoretical debates related to the economics of information theory. For practitioners - especially suppliers’ marketing managers and intermediaries such as publishers or trade show organizers from the woodworking industry - the study shows wide-ranging starting points for a future-oriented segmentation of their marketing program by highlighting the dynamic and stable preferences of elaborated clusters in the choice of their information channels.Keywords: B2B buying process, crisis, economics of information theory, information channel
Procedia PDF Downloads 18412163 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 50012162 A Location-Based Search Approach According to Users’ Application Scenario
Authors: Shih-Ting Yang, Chih-Yun Lin, Ming-Yu Li, Jhong-Ting Syue, Wei-Ming Huang
Abstract:
Global positioning system (GPS) has become increasing precise in recent years, and the location-based service (LBS) has developed rapidly. Take the example of finding a parking lot (such as Parking apps). The location-based service can offer immediate information about a nearby parking lot, including the information about remaining parking spaces. However, it cannot provide expected search results according to the requirement situations of users. For that reason, this paper develops a “Location-based Search Approach according to Users’ Application Scenario” according to the location-based search and demand determination to help users obtain the information consistent with their requirements. The “Location-based Search Approach based on Users’ Application Scenario” of this paper consists of one mechanism and three kernel modules. First, in the Information Pre-processing Mechanism (IPM), this paper uses the cosine theorem to categorize the locations of users. Then, in the Information Category Evaluation Module (ICEM), the kNN (k-Nearest Neighbor) is employed to classify the browsing records of users. After that, in the Information Volume Level Determination Module (IVLDM), this paper makes a comparison between the number of users’ clicking the information at different locations and the average number of users’ clicking the information at a specific location, so as to evaluate the urgency of demand; then, the two-dimensional space is used to estimate the application situations of users. For the last step, in the Location-based Search Module (LBSM), this paper compares all search results and the average number of characters of the search results, categorizes the search results with the Manhattan Distance, and selects the results according to the application scenario of users. Additionally, this paper develops a Web-based system according to the methodology to demonstrate practical application of this paper. The application scenario-based estimate and the location-based search are used to evaluate the type and abundance of the information expected by the public at specific location, so that information demanders can obtain the information consistent with their application situations at specific location.Keywords: data mining, knowledge management, location-based service, user application scenario
Procedia PDF Downloads 123