Search results for: electronic exchange of information
11900 On q-Non-extensive Statistics with Non-Tsallisian Entropy
Authors: Petr Jizba, Jan Korbel
Abstract:
We combine an axiomatics of Rényi with the q-deformed version of Khinchin axioms to obtain a measure of information (i.e., entropy) which accounts both for systems with embedded self-similarity and non-extensivity. We show that the entropy thus obtained is uniquely solved in terms of a one-parameter family of information measures. The ensuing maximal-entropy distribution is phrased in terms of a special function known as the Lambert W-function. We analyze the corresponding ‘high’ and ‘low-temperature’ asymptotics and reveal a non-trivial structure of the parameter space.Keywords: multifractals, Rényi information entropy, THC entropy, MaxEnt, heavy-tailed distributions
Procedia PDF Downloads 44311899 Conventional and Computational Investigation of the Synthesized Organotin(IV) Complexes Derived from o-Vanillin and 3-Nitro-o-Phenylenediamine
Authors: Harminder Kaur, Manpreet Kaur, Akanksha Kapila, Reenu
Abstract:
Schiff base with general formula H₂L was derived from condensation of o-vanillin and 3-nitro-o-phenylenediamine. This Schiff base was used for the synthesis of organotin(IV) complexes with general formula R₂SnL [R=Phenyl or n-octyl] using equimolar quantities. Elemental analysis UV-Vis, FTIR, and multinuclear spectroscopic techniques (¹H, ¹³C, and ¹¹⁹Sn) NMR were carried out for the characterization of the synthesized complexes. These complexes were coloured and soluble in polar solvents. Computational studies have been performed to obtain the details of the geometry and electronic structures of ligand as well as complexes. Geometry of the ligands and complexes have been optimized at the level of Density Functional Theory with B3LYP/6-311G (d,p) and B3LYP/MPW1PW91 respectively followed by vibrational frequency analysis using Gaussian 09. Observed ¹¹⁹Sn NMR chemical shifts of one of the synthesized complexes showed tetrahedral geometry around Tin atom which is also confirmed by DFT. HOMO-LUMO energy distribution was calculated. FTIR, ¹HNMR and ¹³CNMR spectra were also obtained theoretically using DFT. Further IRC calculations were employed to determine the transition state for the reaction and to get the theoretical information about the reaction pathway. Moreover, molecular docking studies can be explored to ensure the anticancer activity of the newly synthesized organotin(IV) complexes.Keywords: DFT, molecular docking, organotin(IV) complexes, o-vanillin, 3-nitro-o-phenylenediamine
Procedia PDF Downloads 15911898 Education Delivery in Youth Justice Centres: Inside-Out Prison Exchange Program Pedagogy in an Australian Context
Authors: Tarmi A'Vard
Abstract:
This paper discusses the transformative learning experience for students participating in the Inside-Out Prison Exchange Program (Inside-out) and explores the value this pedagogical approach may have in youth justice centers. Inside-Out is a semester-long university course which is unique as it takes 15 university students, with their textbook and theory-based knowledge, behind the walls to study alongside 15 incarcerated students, who have the lived experience of the criminal justice system. Inside-out is currently offered in three Victorian prisons, expanding to five in 2020. The Inside-out pedagogy which is based on transformative dialogic learning is reliant upon the participants sharing knowledge and experiences to develop an understanding and appreciation of the diversity and uniqueness of one another. Inside-out offers the class an opportunity to create its own guidelines for dialogue, which can lead to the student’s sense of equality, which is fundamental in the success of this program. Dialogue allows active participation by all parties in reconciling differences, collaborating ideas, critiquing and developing hypotheses and public policies, and encouraging self-reflection and exploration. The structure of the program incorporates the implementation of circular seating (where the students alternate between inside and outside), activities, individual reflective tasks, group work, and theory analysis. In this circle everyone is equal, this includes the educator, who serves as a facilitator more so than the traditional teacher role. A significant function of the circle is to develop a group consciousness, allowing the whole class to see itself as a collective, and no one person holds a superior role. This also encourages participants to be responsible and accountable for their behavior and contributions. Research indicates completing academic courses, like Inside-Out, contributes positively to reducing recidivism. Inside-Out’s benefits and success in many adult correctional institutions have been outlined in evaluation reports and scholarly articles. The key findings incorporate the learning experiences for the students in both an academic capability and professional practice and development. Furthermore, stereotypes and pre-determined ideas are challenged, and there is a promotion of critical thinking and evidence of self-discovery and growth. There is empirical data supporting positive outcomes of education in youth justice centers in reducing recidivism and increasing the likelihood of returning to education upon release. Hence, this research could provide the opportunity to increase young people’s engagement in education which is a known protective factor for assisting young people to move away from criminal behavior. In 2016, Tarmi completed the Inside-Out educator training in Philadelphia, Pennsylvania, and has developed an interest in exploring the pedagogy of Inside-Out, specifically targeting young offenders in a Youth Justice Centre.Keywords: dialogic transformative learning, inside-out prison exchange program, prison education, youth justice
Procedia PDF Downloads 12611897 Information Needs and Seeking Behaviour of Postgraduate Students of Kohat University of Science and Technology, Khyber Pakhtunkhwa, Pakistan
Authors: Saeed Ullah Jan, Muhammad Ali, Misbah Ullah Awan
Abstract:
Purpose: This study investigated the information needs and seeking behaviour, and hurdles to information seeking of Post Graduate students of Kohat University of Science and Technology (KUST), Khyber Pakhtunkhwa. It focused on the information requirements of the post-graduate students of the university, the pattern they use for seeking information, and the difficulties they face while seeking information. Design/Methodology/approach: This study used a quantitative approach, adapting a survey questionnaire method for data collection. The population of this study was composed of M.Phil. and Ph.D. students of 2019 and 2020 in the faculties of Physical and Numerical Sciences, Chemical and Pharmaceutical Sciences, Biological Sciences, and Social Sciences of KUST. The sample size was 260. Students were selected randomly. The study response rate was 77%, and data were analyzed through SPSS (22 versions). Key findings: The study revealed that Most students' information needs were for study and research activities, new knowledge, and career development. To fulfill these needs, the scholars use various sources and resources. The sources they used for information needs were journal articles, textbooks, and research projects commonly. For the information-seeking purpose, often, students prefer books that have some importance. The other factors that played an essential role in selecting material were topical relevance, Novelty, Recommended by colleagues, and publisher's reputation. Most of the students thought that Book Exhibitions, Open Access systems in the Library, and the Display of new arrivals could enhance the students' information-seeking. The main problem seeking information was faced by them was a shortage of printed information resources. Overall they wanted more facilities, enhancement in the library collection, and better services. Delimitations of the study: This study has not included 1) BS and M.Sc. Students of KUST; 2) The colleges and institutions affiliated with KUST; 3) This study was delimited only to the Post Graduate students of KUST. Practical implication(s): The findings of the study motivate the policymakers and authorities of KUST to restructure the information literacy programs to fulfill the scholars' information needs. It may inform the policymakers to know the difficulties faced by scholars during information seeking. Contribution to the knowledge: No significant work has been done on the students' information needs and seeking behaviour at KUST. The study analyzed the information needs and seeking behaviour of post graduate students. It brought a clear picture of information needs and seeking behaviour of scholars and addressed the problems faced by them during the seeking process.Keywords: information needs of Pakistan, information-seeking behaviors, postgraduate students, university libraries, Kohat university of science and technology, Khyber Pakhtunkhwa, Pakistan
Procedia PDF Downloads 9111896 A Group Setting of IED in Microgrid Protection Management System
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu
Abstract:
There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.Keywords: IEC 61850, IED, group Setting, microgrid
Procedia PDF Downloads 46311895 Instructional Consequences of the Transiency of Spoken Words
Authors: Slava Kalyuga, Sujanya Sombatteera
Abstract:
In multimedia learning, written text is often transformed into spoken (narrated) text. This transient information may overwhelm limited processing capacity of working memory and inhibit learning instead of improving it. The paper reviews recent empirical studies in modality and verbal redundancy effects within a cognitive load framework and outlines conditions under which negative effects of transiency may occur. According to the modality effect, textual information accompanying pictures should be presented in an auditory rather than visual form in order to engage two available channels of working memory – auditory and visual - instead of only one of them. However, some studies failed to replicate the modality effect and found differences opposite to those expected. Also, according to the multimedia redundancy effect, the same information should not be presented simultaneously in different modalities to avoid unnecessary cognitive load imposed by the integration of redundant sources of information. However, a few studies failed to replicate the multimedia redundancy effect too. Transiency of information is used to explain these controversial results.Keywords: cognitive load, transient information, modality effect, verbal redundancy effect
Procedia PDF Downloads 38011894 Applying Wavelet Transform to Ferroresonance Detection and Protection
Authors: Chun-Wei Huang, Jyh-Cherng Gu, Ming-Ta Yang
Abstract:
Non-synchronous breakage or line failure in power systems with light or no loads can lead to core saturation in transformers or potential transformers. This can cause component and capacitance matching resulting in the formation of resonant circuits, which trigger ferroresonance. This study employed a wavelet transform for the detection of ferroresonance. Simulation results demonstrate the efficacy of the proposed method.Keywords: ferroresonance, wavelet transform, intelligent electronic device, transformer
Procedia PDF Downloads 49611893 Passengers’ Behavior Analysis under the Public Transport Disruption: An Agent-Based Simulation
Abstract:
This paper study the travel behavior of passengers in a public transport disruption under information provision strategies. We develop a within-day approach for multi-agent simulation to evaluate the behavior of the agents, under comprehensive scenarios through various information exposure, equilibrium, and non-equilibrium scenarios. In particular, we quantify the effects of information strategies in disruption situation on passengers’ satisfaction, number of involved agents, and the caused delay. An agent-based micro-simulation model (MATSim) is applied for the city of Zürich, Switzerland, for the purpose of activity-based simulation in a multimodal network. Statistic outcome is analysed for all the agents who may be involved in the disruption. Agents’ movement in the public transport network illustrates agents’ adaptations to available information about the disruption. Agents’ delays and utility reveal that information significantly affects agents’ satisfaction and delay in public transport disruption. Besides, while the earlier availability of the information causes the fewer consequent delay for the involved agents, however, it also leads to more amount of affected agents.Keywords: agent-based simulation, disruption management, passengers’ behavior simulation, public transport
Procedia PDF Downloads 15211892 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 30711891 Demand of Media and Information for the Public Relation Media for Local Learning Resource Salaya, Nakhon Pathom
Authors: Patsara Sirikamonsin, Sathapath Kilaso
Abstract:
This research aims to study the media and information demand for public relations in Salaya, Nakhonpathom. The research objectives are: 1. to research on conflicts of communication and seeking solutions and improvements of media information in Salaya, Nakhonpathom; 2. to study about opinions and demand for media information to reach out the improvements of people communications among Salaya, Nakhonpathom; 3. to explore the factors related to relationship and behaviors on obtaining media information for public relations among Salaya, Nakhonpathom. The research is conducted by questionnaire which is interpreted by statistical analysis concluding with analysis, frequency, percentage, average and standard deviations. The research results demonstrate: 1. The conflicts of communications among Salaya, Nakhonpathom are lacking equipment and technological knowledge and public relations. 2. Most people have demand on media improvements for vastly broadcasting public relations in order to nourish the social values. This research intentionally is to create the infographic media which are easily accessible, uncomplicated and popular, in the present.Keywords: media and information, the public relation printed media, local learning resource
Procedia PDF Downloads 15911890 Review of Assessment of Integrated Information System (IIS) in Organisation
Authors: Mariya Salihu Ingawa, Sani Suleiman Isah
Abstract:
The assessment of Integrated Information System (IIS) in organisation is an important initiative to enable the Information System (IS) managers, as well as top management to understand the success status of their investment in IS integration efforts. However, without a proper assessment, an organisation will not know its IIS status, which may affect their judgment on what action should be taken onwards. Current research on IIS assessment is lacking and those related literature on IIS assessment focus more on assessing the technical aspect of IIS. It is argued that assessing technical aspect alone is inadequate since organisational and strategic aspects in IIS should also be considered. Current methods, techniques and tools used by vendors for IIS assessment also are lack of comprehensive measures to fully assess the Integrated Information System in term of technical, organisational and strategic domains. The purpose of this study is to establish critical success factors for measuring success of an Integrated Information System. These factors are used as the basis for constructing an approach to comprehensively assess IIS in an organisation. A comprehensive list of success factors for IIS assessment, established from literature, was initially presented. An expert surveys using both manual and online methods were conducted to verify the factors. Based on the factors, an instrument for IIS assessment was constructed. The results from a case study indicate that through comprehensive assessment approach, not only the level of success been known, but also reveals the contributing factors. This research contributes to the field of Information Systems specifically in the area of Integrated Information System assessment.Keywords: integrated information system, expert surveys, organisation, assessment
Procedia PDF Downloads 38811889 Software Quality Promotion and Improvement through Usage of a PSP Oriented Information System
Authors: Gaoussou Doukoure Abdel Kader, Mnkandla Ernest
Abstract:
This research aims to investigate the usage of a personal software process oriented information system in order to facilitate the promotion of software quality and its improvement in organizations. In this light, at the term of a literature review on software quality and related concepts, the personal software process is discussed, more particularly in terms of software quality. Semi-structured interviews will be conducted with a team of software engineers on the first hand to establish a baseline on their understanding of what quality entails for them. The PSP methodology will then be presented to the engineers in its most basic aspects. The research will then proceed to practical case study where a PSP oriented information system is submitted to engineers for usage throughout their development process. Reports from the PSP information system as well as feedback from the engineers will be used in conjunction with the theoretical foundation to establish a PSP inspired framework for software quality promotion and improvement.Keywords: information communication technology, personal software process, software quality, process quality, software engineering
Procedia PDF Downloads 49411888 Juvenile Justice in Maryland: The Evidence Based Approach to Youth with History of Victimization and Trauma
Authors: Gabriela Wasileski, Debra L. Stanley
Abstract:
Maryland efforts to decrease the juvenile criminality and recidivism shifts towards evidence based sentencing. While in theory the evidence based sentencing has an impact on the reduction of juvenile delinquency and drug abuse; the assessment of juveniles’ risk and needs usually lacks crucial information about juvenile’s prior victimization. The Maryland Comprehensive Assessment and Service Planning (MCASP) Initiative is the primary tool for developing and delivering a treatment service plan for juveniles at risk. Even though it consists of evidence-based screening and assessment instruments very little is currently known regarding the effectiveness and the impact of the assessment in general. In keeping with Maryland’s priority to develop successful evidence-based recidivism reduction programs, this study examined results of assessments based on MCASP using a representative sample of the juveniles at risk and their assessment results. Specifically, it examined: (1) the results of the assessments in an electronic database (2) areas of need that are more frequent among delinquent youth in a system/agency, (3) the overall progress of youth in an agency’s care (4) the impact of child victimization and trauma experiences reported in the assessment. The project will identify challenges regarding the use of MCASP in Maryland, and will provide a knowledge base to support future research and practices.Keywords: Juvenile Justice, assessment of risk and need, victimization and crime, recidivism
Procedia PDF Downloads 31811887 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 8711886 Bridging Healthcare Information Systems and Customer Relationship Management for Effective Pandemic Response
Authors: Sharda Kumari
Abstract:
As the Covid-19 pandemic continues to leave its mark on the global business landscape, companies have had to adapt to new realities and find ways to sustain their operations amid social distancing measures, government restrictions, and heightened public health concerns. This unprecedented situation has placed considerable stress on both employees and employers, underscoring the need for innovative approaches to manage the risks associated with Covid-19 transmission in the workplace. In response to these challenges, the pandemic has accelerated the adoption of digital technologies, with an increasing preference for remote interactions and virtual collaboration. Customer relationship management (CRM) systems have risen to prominence as a vital resource for organizations navigating the post-pandemic world, providing a range of benefits that include acquiring new customers, generating insightful consumer data, enhancing customer relationships, and growing market share. In the context of pandemic management, CRM systems offer three primary advantages: (1) integration features that streamline operations and reduce the need for multiple, costly software systems; (2) worldwide accessibility from any internet-enabled device, facilitating efficient remote workforce management during a pandemic; and (3) the capacity for rapid adaptation to changing business conditions, given that most CRM platforms boast a wide array of remotely deployable business growth solutions, a critical attribute when dealing with a dispersed workforce in a pandemic-impacted environment. These advantages highlight the pivotal role of CRM systems in helping organizations remain resilient and adaptive in the face of ongoing global challenges.Keywords: healthcare, CRM, customer relationship management, customer experience, digital transformation, pandemic response, patient monitoring, patient management, healthcare automation, electronic health record, patient billing, healthcare information systems, remote workforce, virtual collaboration, resilience, adaptable business models, integration features, CRM in healthcare, telehealth, pandemic management
Procedia PDF Downloads 10111885 Data Refinement Enhances The Accuracy of Short-Term Traffic Latency Prediction
Authors: Man Fung Ho, Lap So, Jiaqi Zhang, Yuheng Zhao, Huiyang Lu, Tat Shing Choi, K. Y. Michael Wong
Abstract:
Nowadays, a tremendous amount of data is available in the transportation system, enabling the development of various machine learning approaches to make short-term latency predictions. A natural question is then the choice of relevant information to enable accurate predictions. Using traffic data collected from the Taiwan Freeway System, we consider the prediction of short-term latency of a freeway segment with a length of 17 km covering 5 measurement points, each collecting vehicle-by-vehicle data through the electronic toll collection system. The processed data include the past latencies of the freeway segment with different time lags, the traffic conditions of the individual segments (the accumulations, the traffic fluxes, the entrance and exit rates), the total accumulations, and the weekday latency profiles obtained by Gaussian process regression of past data. We arrive at several important conclusions about how data should be refined to obtain accurate predictions, which have implications for future system-wide latency predictions. (1) We find that the prediction of median latency is much more accurate and meaningful than the prediction of average latency, as the latter is plagued by outliers. This is verified by machine-learning prediction using XGBoost that yields a 35% improvement in the mean square error of the 5-minute averaged latencies. (2) We find that the median latency of the segment 15 minutes ago is a very good baseline for performance comparison, and we have evidence that further improvement is achieved by machine learning approaches such as XGBoost and Long Short-Term Memory (LSTM). (3) By analyzing the feature importance score in XGBoost and calculating the mutual information between the inputs and the latencies to be predicted, we identify a sequence of inputs ranked in importance. It confirms that the past latencies are most informative of the predicted latencies, followed by the total accumulation, whereas inputs such as the entrance and exit rates are uninformative. It also confirms that the inputs are much less informative of the average latencies than the median latencies. (4) For predicting the latencies of segments composed of two or three sub-segments, summing up the predicted latencies of each sub-segment is more accurate than the one-step prediction of the whole segment, especially with the latency prediction of the downstream sub-segments trained to anticipate latencies several minutes ahead. The duration of the anticipation time is an increasing function of the traveling time of the upstream segment. The above findings have important implications to predicting the full set of latencies among the various locations in the freeway system.Keywords: data refinement, machine learning, mutual information, short-term latency prediction
Procedia PDF Downloads 16911884 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture
Authors: Ilgoun Kim, Jongpil Jeong
Abstract:
Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.Keywords: enterprise architecture, IT Finance, smart logistics, CIPs
Procedia PDF Downloads 16711883 Prioritizing the Most Important Information from Contractors’ BIM Handover for Firefighters’ Responsibilities
Authors: Akram Mahdaviparsa, Tamera McCuen, Vahideh Karimimansoob
Abstract:
Fire service is responsible for protecting life, assets, and natural resources from fire and other hazardous incidents. Search and rescue in unfamiliar buildings is a vital part of firefighters’ responsibilities. Providing firefighters with precise building information in an easy-to-understand format is a potential solution for mitigating the negative consequences of fire hazards. The negative effect of insufficient knowledge about a building’s indoor environment impedes firefighters’ capabilities and leads to lost property. A data rich building information modeling (BIM) is a potentially useful source in three-dimensional (3D) visualization and data/information storage for fire emergency response. Therefore, this research’s purpose is prioritizing the required information for firefighters from the most important information to the least important. A survey was carried out with firefighters working in the Norman Fire Department to obtain the importance of each building information item. The results show that “the location of exit doors, windows, corridors, elevators, and stairs”, “material of building elements”, and “building data” are the three most important information specified by firefighters. The results also implied that the 2D model of architectural, structural and way finding is more understandable in comparison with the 3D model, while the 3D model of MEP system could convey more information than the 2D model. Furthermore, color in visualization can help firefighters to understand the building information easier and quicker. Sufficient internal consistency of all responses was proven through developing the Pearson Correlation Matrix and obtaining Cronbach’s alpha of 0.916. Therefore, the results of this study are reliable and could be applied to the population.Keywords: BIM, building fire response, ranking, visualization
Procedia PDF Downloads 13311882 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone
Authors: R. Bernaoui, P. Ohly
Abstract:
Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.Keywords: algeria, breeder-veterinarian, digital heritage, networking
Procedia PDF Downloads 12111881 Intellectual Property Rights and Health Rights: A Feasible Reform Proposal to Facilitate Access to Drugs in Developing Countries
Authors: M. G. Cattaneo
Abstract:
The non-effectiveness of certain codified human rights is particularly apparent with reference to the lack of access to essential drugs in developing countries, which represents a breach of the human right to receive adequate health assistance. This paper underlines the conflict and the legal contradictions between human rights, namely health rights, international Intellectual Property Rights, in particular patent law, as well as international trade law. The paper discusses the crucial links between R&D costs for innovation, patents and new medical drugs, with the goal of reformulating the hierarchies of priorities and of interests at stake in the international intellectual property (IP) law system. Different from what happens today, International patent law should be a legal instrument apt at rebalancing an axiological asymmetry between the (conflicting) needs at stake The core argument in the paper is the proposal of an alternative pathway, namely a feasible proposal for a patent law reform. IP laws tend to balance the benefits deriving from innovation with the costs of the provided monopoly, but since developing countries and industrialized countries are in completely different political and economic situations, it is necessary to (re)modulate such exchange according to the different needs. Based on this critical analysis, the paper puts forward a proposal, called Trading Time for Space (TTS), whereby a longer time for patent exclusive life in western countries (Time) is offered to the patent holder company, in exchange for the latter selling the medical drug at cost price in developing countries (Space). Accordingly, pharmaceutical companies should sell drugs in developing countries at the cost price, or alternatively grant a free license for the sale in such countries, without any royalties or fees. However, such social service shall be duly compensated. Therefore, the consideration for such a service shall be an extension of the temporal duration of the patent’s exclusive in the country of origin that will compensate the reduced profits caused by the supply at the price cost in developing countries.Keywords: global health, global justice, patent law reform, access to drugs
Procedia PDF Downloads 24611880 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings
Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush
Abstract:
It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.Keywords: internet of things, building information modeling, facilities management, structural health monitoring
Procedia PDF Downloads 20811879 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 15311878 Studies of Heavy Metal Ions Removal Efficiency in the Presence of Anionic Surfactant Using Ion Exchangers
Authors: Anna Wolowicz, Katarzyna Staszak, Zbigniew Hubicki
Abstract:
Nowadays heavy metal ions as well as surfactants are widely used throughout the world due to their useful properties. The consequence of such widespread use is their significant production. On the other hand, the increasing demand for surfactants and heavy metal ions results in production of large amounts of wastewaters which are discharged to the environment from mining, metal plating, pharmaceutical, cosmetic, fertilizer, paper, pesticide and electronic industries, pigments producing, petroleum refining and from autocatalyst, fibers, food, polymer industries etc. Heavy metal ions are non-biodegradable in the environment, cable of accumulation in living organisms and organs, toxic and carcinogenic. On the other hand, not only heavy metal ions but also surfactants affect the purity of water and soils. Some of surfactants are also toxic, harmful and dangerous because they are able to penetrate into surface waters causing foaming, blocked diffusion of oxygen from the atmosphere and act as emulsifiers of hydrophobic substances and increase solubility of many the dangerous pollutants. Among surfactants the anionic ones dominate and their share in the global production of surfactants is around 50 ÷ 60%. Due to the negative impact of heavy metals and surfactants on aquatic ecosystems and living organisms, removal and monitoring of their concentration in the environment is extremely important. Surfactants and heavy metal ions removal can be achieved by different biological and physicochemical methods. The adsorption as well as the ion-exchange methods play here a significant role. The aim of this study was heavy metal ions removal from aqueous solutions using different types of ion exchangers in the presence of anionic surfactants. Preliminary studies of copper(II), nickel(II), zinc(II) and cobalt(II) removal from acidic solutions using ion exchangers (Lewatit MonoPlus TP 220, Lewatit MonoPlus SR 7, Purolite A 400 TL, Purolite A 830, Purolite S 984, Dowex PSR 2, Dowex PSR3, Lewatit AF-5) allowed to select the most effective ones for the above mentioned sorbates and then to checking their removal efficiency in the presence of anionic surfactants. As it was found out Lewatit MonoPlus TP 220 of the chelating type, show the highest sorption capacities for copper(II) ions in comparison with the other ion exchangers under discussion, e.g. 9.98 mg/g (0.1 M HCl); 9.12 mg/g (6 M HCl). Moreover, cobalt(II) removal efficiency was the highest in 0.1 M HCl using also Lewatit MonoPlus TP 220 (6.9 mg/g) similar to zinc(II) (9.1 mg/g) and nickiel(II) (6.2 mg/g). As the anionic surfactant sodium dodecyl sulphate (SDS) was used and surfactant parameters such as viscosity (η), density (ρ) and critical micelle concentration (CMC) were obtained: η = 1.13 ± 0,01 mPa·s; ρ = 999.76 mg/cm3; CMC = 2.26 g/cm3. The studies of copper(II) removal from acidic solutions in the presence of SDS of different concentration show negligible effects on copper(II) removal efficiency. The sorption capacity of Cu(II) from 0.1 M acidic solution of 500 mg/L initial concentration was equal to 46.8 mg/g whereas in the presence of SDS 45.3 mg/g (0.1 mg SDS/L), 47.1 mg/g (0.5 mg SDS/L), 46.6 mg/g (1 mg SDS/L).Keywords: anionic surfactant, heavy metal ions, ion exchanger, removal
Procedia PDF Downloads 14211877 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 32511876 A Systematic Review on Challenges in Big Data Environment
Authors: Rimmy Yadav, Anmol Preet Kaur
Abstract:
Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.Keywords: big data, privacy, data management, network and energy consumption
Procedia PDF Downloads 31111875 Young People’s Participation in Decision-Making Using Information and Communication Technology
Authors: Marina Diković
Abstract:
By giving personal opinions, suggestions and criticism through e-democracy, young people can reinforce the adoption of decisions which they have an impact on. The purpose of this research was to examine the opinion of university students about the possibility of their decision-making by using information and communication technology (ICT). The questionnaire examined young people's values and behaviour associated with e-democracy and the related decision-making. Students are most active online when it comes to finding information connected with their academic responsibilities, but less frequently take part in democratic processes in society, both at the national and local level. E-democracy as a tool can be learned in programmes of Human Rights Education and Citizenship Education.Keywords: active citizens, e-democracy, information and communication technology (ICT), university students
Procedia PDF Downloads 22711874 Effects of Bipolar Plate Coating Layer on Performance Degradation of High-Temperature Proton Exchange Membrane Fuel Cell
Authors: Chen-Yu Chen, Ping-Hsueh We, Wei-Mon Yan
Abstract:
Over the past few centuries, human requirements for energy have been met by burning fossil fuels. However, exploiting this resource has led to global warming and innumerable environmental issues. Thus, finding alternative solutions to the growing demands for energy has recently been driving the development of low-carbon and even zero-carbon energy sources. Wind power and solar energy are good options but they have the problem of unstable power output due to unpredictable weather conditions. To overcome this problem, a reliable and efficient energy storage sub-system is required in future distributed-power systems. Among all kinds of energy storage technologies, the fuel cell system with hydrogen storage is a promising option because it is suitable for large-scale and long-term energy storage. The high-temperature proton exchange membrane fuel cell (HT-PEMFC) with metallic bipolar plates is a promising fuel cell system because an HT-PEMFC can tolerate a higher CO concentration and the utilization of metallic bipolar plates can reduce the cost of the fuel cell stack. However, the operating life of metallic bipolar plates is a critical issue because of the corrosion phenomenon. As a result, in this work, we try to apply different coating layer on the metal surface and to investigate the protection performance of the coating layers. The tested bipolar plates include uncoated SS304 bipolar plates, titanium nitride (TiN) coated SS304 bipolar plates and chromium nitride (CrN) coated SS304 bipolar plates. The results show that the TiN coated SS304 bipolar plate has the lowest contact resistance and through-plane resistance and has the best cell performance and operating life among all tested bipolar plates. The long-term in-situ fuel cell tests show that the HT-PEMFC with TiN coated SS304 bipolar plates has the lowest performance decay rate. The second lowest is CrN coated SS304 bipolar plate. The uncoated SS304 bipolar plate has the worst performance decay rate. The performance decay rates with TiN coated SS304, CrN coated SS304 and uncoated SS304 bipolar plates are 5.324×10⁻³ % h⁻¹, 4.513×10⁻² % h⁻¹ and 7.870×10⁻² % h⁻¹, respectively. In addition, the EIS results indicate that the uncoated SS304 bipolar plate has the highest growth rate of ohmic resistance. However, the ohmic resistance with the TiN coated SS304 bipolar plates only increases slightly with time. The growth rate of ohmic resistances with TiN coated SS304, CrN coated SS304 and SS304 bipolar plates are 2.85×10⁻³ h⁻¹, 3.56×10⁻³ h⁻¹, and 4.33×10⁻³ h⁻¹, respectively. On the other hand, the charge transfer resistances with these three bipolar plates all increase with time, but the growth rates are all similar. In addition, the effective catalyst surface areas with all bipolar plates do not change significantly with time. Thus, it is inferred that the major reason for the performance degradation is the elevated ohmic resistance with time, which is associated with the corrosion and oxidation phenomena on the surface of the stainless steel bipolar plates.Keywords: coating layer, high-temperature proton exchange membrane fuel cell, metallic bipolar plate, performance degradation
Procedia PDF Downloads 28111873 Evaluation of Molasses and Sucrose as Cabohydrate Sources for Biofloc System on Nile Tilapia (Oreochromis niloticus) Performances
Authors: A. M. Nour, M. A. Zaki, E. A. Omer, Nourhan Mohamed
Abstract:
Performances of mixed-sex Nile tilapia (Oreochromis niloticus) fingerlings (11.33 ± 1.78 g /fish) reared under biofloc system developed by molasses and sucrose as carbon sources in indoor fiberglass tanks were evaluated. Six indoor fiberglass tanks (1m 3 each filled with 1000 l of underground fresh water), each was stocked with 2kg fish were used for 14 weeks experimental period. Three experimental groups were designed (each group 2 tanks) as following: 1-control: 20% daily without biofloc, 2-zero water exchange rate with biofloc (molasses as C source) and 3-zero water exchange rate with biofloc (sucrose as C source). Fish in all aquariums were fed on floating feed pellets (30% crude protein, 3 mm in diameter) at a rate of 3% of the actual live fish body, 3 times daily and 6 days a week. Carbohydrate supplementations were applied daily to each tank two hrs, after feeding to maintain the carbon: nitrogen ratio (C: N) ratio 20:1. Fish were reared under continuous aeration by pumping air into the water in the tank bottom using two sandy diffusers and constant temperature between 27.0-28.0 ºC by using electrical heaters for 10 weeks. Criteria's for assessment of water quality parameters, biofloc production and fish growth performances were collected and evaluated. The results showed that total ammonia nitrogen in control group was higher than biofloc groups. The biofloc volumes were 19.13 mg/l and 13.96 mg/l for sucrose and molasses, respectively. Biofloc protein (%), ether extract (%) and gross energy (kcal/100g DM), they were higher in biofloc molasses group than biofloc sucrose group. Tilapia growth performances were significantly higher (P < 0.05) with molasses group than in sucrose and control groups, respectively. The highest feed and nutrient utilization values for protein efficiency ratio (PER), protein productive (PPV%) and energy utilization (EU, %) were higher in molasses group followed by sucrose group and control group respectively.Keywords: biofloc, Nile tilapia, cabohydrates, performances
Procedia PDF Downloads 19211872 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 4811871 Library Anxiety among Library and Information Science Students at Khushal Khan Khattak University Karak, Pakistan: A Bostick Approach
Authors: Saeed Ullah Jan, Shafaq, Sumbul
Abstract:
Anxiety is one of the most common emotions and is a normal reaction to danger or a threat. It is a normal reaction to stress and can be beneficial in some situations. It can alert us to dangers and help us prepare and pay attention. The prime aim of this study was to examine the level of anxiety of Library and Information Science students at the Department of Library and Information Science, Khushal Khan Khattak University Karak. A survey method was used for the completion of this study. The response of male respondents was better than female LIS students at the Department of Library and Information Science, Khushal Khan Khattak University Karak. The librarians should have to focus on the information needs of the university students. Special training needs to be arranged for female students to improve their library usage and readership rate.Keywords: library-anxiety, library anxiety-students, library anxiety -students-Pakistan, stress
Procedia PDF Downloads 191