Search results for: information giving
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11507

Search results for: information giving

10187 An Insight into the Interaction Study of a WhiB Protein and its Binding Partner

Authors: Sonam Kumari

Abstract:

Tuberculosis is the deadliest disease worldwide. Millions of people lose their lives every year due to this disease. It has turned lethal due to the erratic nature of its causative organism, Mycobacterium tuberculosis (Mtb). Mtb tends to enter into an inactive, dormant state and emerge to replicating state upon encountering favorable conditions. The mechanism by which Mtb switches from the dormant state to the replicative form is still poorly characterized. Proteome studies have given us an insight into the role of certain proteins in giving stupendous virulence to Mtb, but numerous dotsremain unconnected and unaccounted. The WhiB family of proteins is one such protein that is associated with developmental processes in actinomycetes. Mtb has seven such proteins (WhiB1 to WhiB7). WhiB proteins are transcriptional regulators; they regulate various essential genes of Mtbby binding to their promoter DNA. Biophysical parameters of the effect of DNA binding on WhiB proteins has not yet been appropriately characterized. Interaction with DNA induces conformational changes in the WhiB proteins, confirmed by steady-state fluorescence and circular dichroism spectroscopy. ITC has deduced thermodynamic parameters and the binding affinity of the interaction. Since these transcription factors are highly unstable in vitro, their stability and solubility were enhanced by the co-expression of molecular chaperones. The present study findings help determine the conditions under which the WhiB proteins interact with their interacting partner and the factors that influence their binding affinity. This is crucial in understanding their role in regulating gene expression in Mtbandin targeting WhiB proteins as a drug target to cure TB.

Keywords: mycobacterium tuberculosis, TB, whiB proteins, ITC

Procedia PDF Downloads 97
10186 Thermal Conductivity and Optical Absorption of GaAsPN/GaP for Tandem Solar Cells: Effect of Rapid Thermal Annealing

Authors: S. Ilahi, S. Almosni, F. Chouchene, M. Perrin, K. Zelazna, N. Yacoubi, R. Kudraweic, P. Rale, L. Lombez, J. F. Guillemoles, O. Durand, C. Cornet

Abstract:

Great efforts have been dedicated to obtain high quality of GaAsPN. The properties of GaAsPN have played a great part on the development of solar cells devices based in Si substrate. The incorporation of N in GaAsPN that having a band gap around of 1.7 eV is of special interest in view of growing in Si substrate. In fact, post-growth and rapid thermal annealing (RTA) could be an effective way to improve the quality of the layer. Then, the influence of growth conditions and post-growth annealing on optical and thermal parameters is considered. We have used Photothermal deflection spectroscopy PDS to investigate the impact of rapid thermal annealing on thermal and optical properties of GaAsPN. In fact, the principle of the PDS consists to illuminate the sample by a modulated monochromatic light beam. Then, the absorbed energy is converted into heat through the nonradiative recombination process. The generated thermal wave propagates into the sample and surrounding media creating a refractive-index gradient giving rise to the deflection of a laser probe beam skimming the sample surface. The incident light is assumed to be uniform, and only the sample absorbs the light. In conclusion, the results are promising revealing an improvement in absorption coefficient and thermal conductivity.

Keywords: GaAsPN absorber, photothermal defelction technique PDS, photonics on silicon, thermal conductivity

Procedia PDF Downloads 354
10185 Estimation of Time Loss and Costs of Traffic Congestion: The Contingent Valuation Method

Authors: Amira Mabrouk, Chokri Abdennadher

Abstract:

The reduction of road congestion which is inherent to the use of vehicles is an obvious priority to public authority. Therefore, assessing the willingness to pay of an individual in order to save trip-time is akin to estimating the change in price which was the result of setting up a new transport policy to increase the networks fluidity and improving the level of social welfare. This study holds an innovative perspective. In fact, it initiates an economic calculation that has the objective of giving an estimation of the monetized time value during the trips made in Sfax. This research is founded on a double-objective approach. The aim of this study is to i) give an estimation of the monetized value of time; an hour dedicated to trips, ii) determine whether or not the consumer considers the environmental variables to be significant, iii) analyze the impact of applying a public management of the congestion via imposing taxation of city tolls on urban dwellers. This article is built upon a rich field survey led in the city of Sfax. With the use of the contingent valuation method, we analyze the “declared time preferences” of 450 drivers during rush hours. Based on the fond consideration of attributed bias of the applied method, we bring to light the delicacy of this approach with regards to the revelation mode and the interrogative techniques by following the NOAA panel recommendations bearing the exception of the valorization point and other similar studies about the estimation of transportation externality.

Keywords: willingness to pay, contingent valuation, time value, city toll

Procedia PDF Downloads 434
10184 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables

Authors: Agah Tugrul Korucu

Abstract:

Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.

Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers

Procedia PDF Downloads 352
10183 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
10182 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 219
10181 Research the Counseling of Taichung Taiwan's 10 Creative Zones

Authors: Feng Shih-Jen, Chiang Yi-Hua, Yang Min-Chih

Abstract:

After going through mass production and contract manufacturing phases, under the global consumption trend, Taiwan’s traditional industry has turned to creative design, research and development to gain recognition in the consumer market, build competitiveness in the global market and further promote the products from Taiwan’s traditional industry. Taichung City is rich in cultural creative resources, outperforming other counties/cities in originality, creative talents, cultural taste, art/culture participation and global marketing. As the result this has created a diversified and vibrant cultural market in Taichung, giving Taichung the highest potential as a cultural creative city. This research, through the project by Taichung Cultural Creative Industry Promotion Office, has built an exchange platform for the cultural creative industry in central Taiwan. The platform will promote exchanges of creative ideas in the cultural creative industry in Taiwan as well as industrial transformation and brings more value for the industry. This study also proposes the idea of “Taichung Cultural Creative Exhibition” Therefore, this study was conducted in Taiwan, Taichung 10 Creative Zone Exhibition, which is divided into four stages counseling. Respectively, of the first order: the cultural creative Zone specialty shops offer; The second stage is the industrial settlement discussions and counseling workshops in the ground; The third stage of consultation for the recruitment of the cultural creative businesses separate estate; The fourth stage is the story of the build cultural and creative industry. Hope through periodic counseling, handling Taichung 10 Creative Zone Exhibition.

Keywords: cultural creative industry, counseling, Taichung, Taiwan's creative zones

Procedia PDF Downloads 498
10180 The Morality of the Sensitive in Adorno: Suffering and Recognition in the Mimesis Model

Authors: Talita Cavaignac

Abstract:

Adorno's critique of totality, especially in a split society marked by reification, also rests on the impossibility of generalizing normative principles. Given the unfeasibility of normative universalizations, which conditions can justify the possibility of criticism and normativity in Adorno's thought? If reason itself is still entangled in alienation from the model of the domination of nature, how could be possible a critical theory? In political terms, if the notion of totality is challenged by the critique of identity, how can Adorno maintain the ideal of liberation and reconciliation between private interests and the possibility of some sort of ethics without giving up a materialist theory of society and without betting in a necessary link between redemption and history? Faced with this complex of questions, it is intended to reflect on the sense in which the notion of ‘suffering’ could throw help to the epistemological problem of the foundations of criticism in Adorno's work. The idea is that, in contrast to a universalizable model of justice, Adorno mobilizes in the notion of ‘suffering’ a gateway to the critical reflection of society. He would thus develop an approach to moral problems through the sensual-bodily perspective, fear, pain, and somatic factors. Nevertheless, due to the attention to the damaged experience and to the constitution of subjectivity -a sense in which the concept of mimesis continues to stand out- we understand suffering as an expression of an objective reification. Following the statement of other authors, the intention is to think how the resources linked to the idea of ‘suffering’ in Adorno's writings are engaged in the reflection of the problem of morality and of the contradictions between universal and particular (articulated in Hegel's tradition).

Keywords: ethics, morality, sensitive, Theodor Adorno

Procedia PDF Downloads 136
10179 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 418
10178 Biogas as a Renewable Energy Fuel: A Review of Biogas Upgrading, Utilization and Storage

Authors: Imran Ullah Khana, Mohd Hafiz Dzarfan Othmanb, Haslenda Hashima, Takeshi Matsuurad, A. F. Ismailb, M. Rezaei-DashtArzhandib, I. Wan Azelee

Abstract:

Biogas upgrading is a widely studied and discussed topic, and its utilization as a natural gas substitute has gained significant attention in recent years. The production of biomethane provides a versatile application in both heat and power generation and as a vehicular fuel. This paper systematically reviews the state of the art of biogas upgrading technologies with upgrading efficiency, methane (CH4) loss, environmental effect, development and commercialization, and challenges in terms of energy consumption and economic assessment. The market situation for biogas upgrading has changed rapidly in recent years, giving membrane separation a significant market share with traditional biogas upgrading technologies. In addition, the potential utilization of biogas, efficient conversion into bio-compressed natural gas (bio-CNG), and storage systems are investigated in depth. Two storing systems for bio-CNG at filling stations, namely buffer and cascade storage systems are used. The best storage system should be selected on the basis of the advantages of both systems. Also, the fuel economy and mass emissions for bio-CNG and CNG-filled vehicles are studied. There is the same fuel economy and less carbon dioxide (CO2) emission for bio-CNG. Based on the results of comparisons between the technical features of upgrading technologies, various specific requirements for biogas utilization and the relevant investment, and operating and maintenance costs, future recommendations are made for biogas upgrading.

Keywords: biogas upgrading, cost, utilization, bio-CNG, storage, energy

Procedia PDF Downloads 50
10177 Information Technology Impacts on the Supply Chain Performance: Case Study Approach

Authors: Kajal Zarei

Abstract:

Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.

Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification

Procedia PDF Downloads 281
10176 Using Machine Learning Techniques to Extract Useful Information from Dark Data

Authors: Nigar Hussain

Abstract:

It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%.

Keywords: big data, dark data, machine learning, heatmap, random forest

Procedia PDF Downloads 28
10175 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 47
10174 Intellectual Capital and Transparency in Universities: An Empirical Study

Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez

Abstract:

This paper shows the general perceptions of Spanish university stakeholders in relation to the university’s annual reports and the adequacy and potential of intellectual capital reporting. To this end, a questionnaire was designed and sent to every member of the Social Councils of Spanish public universities. It was thought that these participants would provide a good example of the attitude of university stakeholders since they represent the different social groups connected with universities. From the results of this study we are in the position of confirming the need for universities to offer information on intellectual capital in their accounting information model.

Keywords: intellectual capital, disclosure, stakeholders, universities, annual report

Procedia PDF Downloads 500
10173 Preferred Character Size for Oblique Angles

Authors: Photjanat Phimnom, Haruetai Lohasiriwat

Abstract:

In today’s world, the LED display has been used for presenting visual information under various circumstances. Such information is an important intermediary in the human information processing. Researchers have been investigated diverse factors that influence this process effectiveness. The letter size is undoubtedly one major factor that has been tested and recommended by many standards and guidelines. However, viewing information on the display from direct perpendicular position is a typical assumption whereas many actual events are required viewing from the angles. This current research aims to study the effect of oblique viewing angle and viewing distance on ability to recognize alphabet, number, and English word. The total of ten participants was volunteered to our 3 x 4 x 4 within subject study. Independent variables include three distance levels (2, 6, and 12 m), four oblique angle (0, 45, 60, 75 degree), and four target types (alphabet, number, short words, and long words). Following the method of constant stimuli we found that the larger oblique angle, ranging from 0 to 75 degree from the line of sight, results in significant higher legibility threshold or larger font size required (p-value < 0.05). Viewing distance factor also shows to have significant effect on the threshold (p-value < 0.05). However, the effect from distance factor is expected to be confounded by the quality of the screen we used in our experiment. Lastly, our results show that single alphabet as well as single number are recognized at significant lower threshold (smaller font size) as compared to both short and long words (p-value < 0.05). Therefore, it is recommended that when designs information to be presented on LED display, understanding of all possible ranges of oblique angle should be taken into account in order to specify the preferred letter size. Additionally, the recommendation of letter size for 100 % readability in our tested conditions is provided in the paper.

Keywords: letter size, oblique angle, viewing distance, legibility threshold

Procedia PDF Downloads 394
10172 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 268
10171 Towards Understanding the Notions of Quality Education among Internationally-Accredited Christian Schools in Southeast Asia

Authors: Selaphares Jatico Tajale

Abstract:

This research aims to understand the notions of quality education by conducting case studies among internationally-accredited Christian schools in Southeast Asia. Five internationally-accredited Christian schools from Cambodia, Indonesia, Malaysia, The Philippines, and Singapore will be chosen as cases for this study. This study will utilize the processes of interviews, filling up of questionnaires, and writing of reflections in order to obtain data and relevant information. These processes will be conducted through multi-sectoral respondents such as administrators, academic heads, and faculty. This study employs five aspects within the realm of education as guides in the formulation of questionnaire and guide questions in the interview, namely: a) school context, b) classroom, c) quality assurance, d) stakeholders, e) faculty and staff. Guide interview questions and questions in the questionnaires are formulated to uncover information on how those five aspects were managed to achieve desired student learning outcomes and uncover other information useful for the study.

Keywords: internationally-accredited, notions of quality education, quality education, quality education in Southeast Asia

Procedia PDF Downloads 239
10170 Environmental Accounting Practice: Analyzing the Extent and Qualification of Environmental Disclosures of Turkish Companies Located in BIST-XKURY Index

Authors: Raif Parlakkaya, Mustafa Nihat Demirci, Mehmet Nuri Salur

Abstract:

Environmental pollution has detrimental effects on the quality of our life and its scope has reached such an extent that measures are being taken both at the national and international levels to reduce, prevent and mitigate its impact on social, economic and political spheres. Therefore, awareness of environmental problems has been increasing among stakeholders and accordingly among companies. It is seen that corporate reporting is expanding beyond environmental performance. Primary purpose of publishing an environmental report is to provide specific audiences with useful, meaningful information. This paper is intended to analyze the extent and qualification of environmental disclosures of Turkish publicly quoted firms and see how it varies from one sector to another. The data for the study were collected from annual activity reports of companies, listed on the corporate governance index (BIST-XKURY) of Istanbul Stock Exchange. Content analysis was the research methodology used to measure the extent of environmental disclosure. Accordingly, 2015 annual activity reports of companies that carry out business in some particular fields were acquired from Capital Market Board, websites of Public Disclosure Platform and companies’ own websites. These reports were categorized into five main aspects: Environmental policies, environmental management systems, environmental protection and conservation activities, environmental awareness and information on environmental lawsuits. Subsequently, each component was divided into several variables related to what each firm is supposed to disclose about environmental information. In this context, the nature and scope of the information disclosed on each item were assessed according to five different ways (N.I: No Information; G.E.: General Explanations; Q.E.: Qualitative Detailed Explanations; N.E.: Quantitative (numerical) Detailed Explanations; Q.&N.E.: Both Qualitative and Quantitative Explanations).

Keywords: environmental accounting, disclosure, corporate governance, content analysis

Procedia PDF Downloads 264
10169 The Use of Information and Communication Technology within and between Emergency Medical Teams during a Disaster: A Qualitative study

Authors: Badryah Alshehri, Kevin Gormley, Gillian Prue, Karen McCutcheon

Abstract:

In a disaster event, sharing patient information between the pre-hospital Emergency Medical Services (EMS) and Emergency Department (ED) hospitals is a complex process during which important information may be altered or lost due to poor communication. The aim of this study was to critically discuss the current evidence base in relation to communication between pre- EMS hospital and ED hospital professionals by the use of Information and Communication Systems (ICT). This study followed the systematic approach; six electronic databases were searched: CINAHL, Medline, Embase, PubMed, Web of Science, and IEEE Xplore Digital Library were comprehensively searched in January 2018 and a second search was completed in April 2020 to capture more recent publications. The study selection process was undertaken independently by the study authors. Both qualitative and quantitative studies were chosen that focused on factors that are positively or negatively associated with coordinated communication between pre-hospital EMS and ED teams in a disaster event. These studies were assessed for quality, and the data were analyzed according to the key screening themes which emerged from the literature search. Twenty-two studies were included. Eleven studies employed quantitative methods, seven studies used qualitative methods, and four studies used mixed methods. Four themes emerged on communication between EMTs (pre-hospital EMS and ED staff) in a disaster event using the ICT. (1) Disaster preparedness plans and coordination. This theme reported that disaster plans are in place in hospitals, and in some cases, there are interagency agreements with pre-hospital and relevant stakeholders. However, the findings showed that the disaster plans highlighted in these studies lacked information regarding coordinated communications within and between the pre-hospital and hospital. (2) Communication systems used in the disaster. This theme highlighted that although various communication systems are used between and within hospitals and pre-hospitals, technical issues have influenced communication between teams during disasters. (3) Integrated information management systems. This theme suggested the need for an integrated health information system that can help pre-hospital and hospital staff to record patient data and ensure the data is shared. (4) Disaster training and drills. While some studies analyzed disaster drills and training, the majority of these studies were focused on hospital departments other than EMTs. These studies suggest the need for simulation disaster training and drills, including EMTs. This review demonstrates that considerable gaps remain in the understanding of the communication between the EMS and ED hospital staff in relation to response in disasters. The review shows that although different types of ICTs are used, various issues remain which affect coordinated communication among the relevant professionals.

Keywords: emergency medical teams, communication, information and communication technologies, disaster

Procedia PDF Downloads 126
10168 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony

Authors: Lev Bertovsky

Abstract:

The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.

Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning

Procedia PDF Downloads 185
10167 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System

Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari

Abstract:

For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.

Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)

Procedia PDF Downloads 170
10166 Readjustment Plans for Urbanizing the Palestinian Society in Israel

Authors: Kais Nasser, Ronit Levine-Schnur

Abstract:

Due to the prolonged negligence of planning institutions, a large portion of Palestinian localities in Israel lack basic infrastructure, development, and urbanism and suffer from a severe shortage of housing. In the past years, planning institutions in Israel began to promote master planning for Palestinian localities and for new neighborhoods. Land readjustment plans (PLIs) were the primary planning mechanism. According to Israel’s planning institutions, readjustment plans aimed to afford housing and to ensure that new neighborhoods enjoy developed infrastructure, modern construction, public lands and urbanism. However, a wide group of Palestinian landowners and stakeholders opposed PLIs. This article exposes the reasons behind such objections. Methodology: The research carried out an in-depth analysis of approximately 1,780 objections to PLIs that have been advanced in recent years. These objections reveal what really concerns landowners, what they defend indeed, and how planning institutions dealt with their arguments. Initial Findings: Exploring the objections submitted by landowners to readjustment plans reveals a conceptual and cultural conflict between landowners and the planning institutions. While planning institutions believe that these plans can transform landowners and Arab society in general from a rural, local, and conservative life to a modern- urban life, the landowners believe that planning institutions strive to change their way of life and force them to adopt an urban life without giving much attention and respect to their tradition, habits and cultural way of life.

Keywords: land readjustment, culture, urbanization, minority

Procedia PDF Downloads 23
10165 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 328
10164 Determination of the Effect of Kaolin on the Antimicrobial Activity of Metronidazole-Kaolin Interaction

Authors: Omaimah Algohary

Abstract:

Kaolin is one of the principle intestinal adsorbents, has traditionally been used internally in the treatment of various enteric disorders, colitis, enteritis, dysentery, and diarrhea associated with food and alkaloidal poisoning and in traveler’s diarrhea. It binds to and traps bacteria and its toxins and gases in the gut. It also binds to water in the gut, which helps to make the stools firmer, hence giving symptomatic relief. Metronidazole is a synthetic antibacterial agent that is used primarily in the treatment of various anaerobic infections such as intra-abdominal infections, antiprotozoal, and as amebicidal. The need for safe, therapeutically effective antidiarrheal combination continuously lead to effective treatment. Metronidazol used for treatment of anaerobic bacteria and kaolin , when administered simultaneously, Metronidazole–Kaolin interactions have been reported by FDA but not studied. This project is the first to study the effect of Metronidazole–Kaolin interactions on the antimicrobial activity of metronidazole. Agar diffusion method performed to test the antimicrobial activity of metronidazole–kaolin antidiarrheal combination from aqueous solutions at an in-vivo simulated pHs conditions that obtained at 37+0.5 °C on Helicobacter pylori as anaerobic bacteria and E.coli as aerobic bacteria and used as a control for the technique. The antimicrobial activity of metronidazole combination as 1:1 and 1:2 with kaolin was abolished in acidic media as no zones of inhibition shown compared to only metronidazole that used as a control. In alkaline media metronidazole combination as 1:1 and 1:2 with kaolin showed diminutive activity compared to the control. These results proved that the kaolin adsorb metronidazole and abolish its antimicrobial activity and such combination should be avoided.

Keywords: kaolin, metronidazole, interaction, Helicobacter pylori. E. coli, antimicrobial activity

Procedia PDF Downloads 389
10163 Towards Update a Road Map Solution: Use of Information Obtained by the Extraction of Road Network and Its Nodes from a Satellite Image

Authors: Z. Nougrara, J. Meunier

Abstract:

In this paper, we present a new approach for extracting roads, there road network and its nodes from satellite image representing regions in Algeria. Our approach is related to our previous research work. It is founded on the information theory and the mathematical morphology. We therefore have to define objects as sets of pixels and to study the shape of these objects and the relations that exist between them. The main interest of this study is to solve the problem of the automatic mapping from satellite images. This study is thus applied for that the geographical representation of the images is as near as possible to the reality.

Keywords: nodes, road network, satellite image, updating a road map

Procedia PDF Downloads 425
10162 A Two-Stage Process for the Sustainable Production of Aliphatic Polyesters

Authors: A. Douka, S. Vouyiouka, L. M. Papaspyridi, D. Korres, C. Papaspyrides

Abstract:

A "green" process was studied for the preparation of partially renewable aliphatic polyesters based on 1,4-butanediol and 1,8-octanediol with various diacids and derivatives, namely diethyl succinate, adipic acid, sebacic acid, 1,12-dodecanedioic acid and 1,14-tetradecanedioic acid. A first step of enzymatic prepolymerization was carried out in the presence of two different solvents, toluene and diphenylether, applying molecular sieves and vacuum, respectively, to remove polycondensation by-products. Poly(octylene adipate) (PE 8.6), poly(octylene dodecanate)(PE 8.12) and poly(octylene tetradecanate) (PE 8.14) were firstly enzymatically produced in toluene using molecular sieves giving however, low-molecular-weight products. Thereafter, the synthesis of PE 8.12 and PE 8.14 was examined under optimized conditions using diphenylether as solvent and a more vigorous by-product removal step, such as application of vacuum. Apart from these polyesters, the optimized process was also implemented for the production of another long-chain polyester-poly(octylene sebacate) (PE 8.10) and a short-chain polyester-poly(butylene succinate) (PE 4.4). Subsequently, bulk post-polymerization in the melt or solid state was performed. SSP runs involved absence of biocatalyst and reaction temperatures (T) in the vicinity of the prepolymer melting point (Tm-T varied between 15.5 up to 4oC). Focusing on PE 4.4 and PE 8.12, SSP took place under vacuum or flowing nitrogen leading to increase of the molecular weight and improvement of the end product physical appearance and thermal properties.

Keywords: aliphatic polyester, enzymatic polymerization, solid state polymerization, Novozym 435

Procedia PDF Downloads 324
10161 Extension Services' Needs of Small Farmers in Biliran Province, Philippines

Authors: Mario C. Nierras

Abstract:

This study aimed to determine the extension services’ needs of small farmers in Biliran province, Philippines. It also sought to find out other issues/concerns of the small farmers. Extension services’ needs of small farmers were gathered through personal interviewing and observational analysis of randomly-selected small farmers in Biliran, Philippines. Biliran small farmers extension services’ needs include: raising fruits, raising legumes, raising vegetables, raising swine, raising cattle, and raising chicken (as priority broad skills). For the specific skills, diagnosing symptoms on fertilizer deficiencies, controlling plant pests and diseases, diagnosing signs on specific pest and disease damage, controlling animal pests and diseases, and doing artificial insemination were the priority skills. They considered an on-farm trial of new technology as most needed to be coupled with industry and quality-orientedness, as positive behaviors needed in farming success. The farmers still adhere to the so-called wait-and-see attitude, thus they are more convinced to follow a particular technology if they see a concrete result of the introduced changes. Technical needs prioritization of Biliran small farmers showed that they have a real need for crop and animal production skills to include the other issues/concerns. Extension service program planning for small farmers should be patterned after their technical needs giving due attention to some issues/concerns so that extension work could deliver the right skills for the right needs of the farmers.

Keywords: extension, extension service, extension service needs, extension service program, farmers, small farmers, marginal farmers

Procedia PDF Downloads 436
10160 The Convolution Recurrent Network of Using Residual LSTM to Process the Output of the Downsampling for Monaural Speech Enhancement

Authors: Shibo Wei, Ting Jiang

Abstract:

Convolutional-recurrent neural networks (CRN) have achieved much success recently in the speech enhancement field. The common processing method is to use the convolution layer to compress the feature space by multiple upsampling and then model the compressed features with the LSTM layer. At last, the enhanced speech is obtained by deconvolution operation to integrate the global information of the speech sequence. However, the feature space compression process may cause the loss of information, so we propose to model the upsampling result of each step with the residual LSTM layer, then join it with the output of the deconvolution layer and input them to the next deconvolution layer, by this way, we want to integrate the global information of speech sequence better. The experimental results show the network model (RES-CRN) we introduce can achieve better performance than LSTM without residual and overlaying LSTM simply in the original CRN in terms of scale-invariant signal-to-distortion ratio (SI-SNR), speech quality (PESQ), and intelligibility (STOI).

Keywords: convolutional-recurrent neural networks, speech enhancement, residual LSTM, SI-SNR

Procedia PDF Downloads 200
10159 A Practical and Efficient Evaluation Function for 3D Model Based Vehicle Matching

Authors: Yuan Zheng

Abstract:

3D model-based vehicle matching provides a new way for vehicle recognition, localization and tracking. Its key is to construct an evaluation function, also called fitness function, to measure the degree of vehicle matching. The existing fitness functions often poorly perform when the clutter and occlusion exist in traffic scenarios. In this paper, we present a practical and efficient fitness function. Unlike the existing evaluation functions, the proposed fitness function is to study the vehicle matching problem from both local and global perspectives, which exploits the pixel gradient information as well as the silhouette information. In view of the discrepancy between 3D vehicle model and real vehicle, a weighting strategy is introduced to differently treat the fitting of the model’s wireframes. Additionally, a normalization operation for the model’s projection is performed to improve the accuracy of the matching. Experimental results on real traffic videos reveal that the proposed fitness function is efficient and robust to the cluttered background and partial occlusion.

Keywords: 3D-2D matching, fitness function, 3D vehicle model, local image gradient, silhouette information

Procedia PDF Downloads 399
10158 A Web-Based Self-Learning Grammar for Spoken Language Understanding

Authors: S. Biondi, V. Catania, R. Di Natale, A. R. Intilisano, D. Panno

Abstract:

One of the major goals of Spoken Dialog Systems (SDS) is to understand what the user utters. In the SDS domain, the Spoken Language Understanding (SLU) Module classifies user utterances by means of a pre-definite conceptual knowledge. The SLU module is able to recognize only the meaning previously included in its knowledge base. Due the vastity of that knowledge, the information storing is a very expensive process. Updating and managing the knowledge base are time-consuming and error-prone processes because of the rapidly growing number of entities like proper nouns and domain-specific nouns. This paper proposes a solution to the problem of Name Entity Recognition (NER) applied to a SDS domain. The proposed solution attempts to automatically recognize the meaning associated with an utterance by using the PANKOW (Pattern based Annotation through Knowledge On the Web) method at runtime. The method being proposed extracts information from the Web to increase the SLU knowledge module and reduces the development effort. In particular, the Google Search Engine is used to extract information from the Facebook social network.

Keywords: spoken dialog system, spoken language understanding, web semantic, name entity recognition

Procedia PDF Downloads 338