Search results for: library information science
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13275

Search results for: library information science

11865 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission

Authors: Parisa Javid

Abstract:

In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.

Keywords: modern lighting systems, natural light, reduced energy consumption

Procedia PDF Downloads 99
11864 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 461
11863 Science Communication: A Possible Dialogue between Researchers and Agribusiness Farmers

Authors: Cristiane Hengler Corrêa Bernardo

Abstract:

The communication is an essential part of the process that characterizes scientific research. It should be present in every stage of research in a systemic way. However, this process is not always efficient and effective. Reports of researchers focused on agribusiness point to difficulties in communicating with farmers that negatively impact on research results and may cause distortions and even quite significant inconsistencies. This research aims at identifying the main noise and barriers in communication between agribusiness researchers and farmers. It discusses the possibility of creating a specific strategy to correct or minimize such failures. The main research question: what features of the communication process will be decisive for the communication between agribusiness researcher and farmer occur with greater efficiency? It is expected that the research will result in processes that may correct or minimize such problems, promoting dialogues more efficient knowledge. The research will adopt a qualitative approach, using action research as a form of investigative action for social and educational nature, aiming at promoting understanding and interaction between researchers and members of the investigated situations. To collect and analyze data to document analysis will be used; questionnaires and interviews and content analysis.

Keywords: agribusiness farmers, researchers, science communication, analysis

Procedia PDF Downloads 276
11862 The Future of Truth and Lies in the Context of Technology-Mediated Environments

Authors: James P. Takona

Abstract:

Most of the global population has never lived through a pandemic, and thus there is so much that remains unknown about students' capacity for resiliency under such environments and circumstances and what a timeline for full recovery will look like. The session will guide participants to focus on misinformation and disinformation in the context of recent crisis events, with specific reference to how information flows across. Particular focus will be given to the flow of information in mediated technology and platforms with particular reference to K-12 and teacher preparation program environments. The paper will draw on theories and responses from the sociology of disaster, the social psychology of rumoring, and published studies on disinformation and misinformation. Applications will be identified and applied in the context of online information-sharing during crisis events. The session will offer the application of the Center for Contagious Diseases' Crisis and Emergency Risk Communication model to understand the themes and evolution of misinformation and disinformation. The paper will invite session participants to suggest and interact with raised challenges on the impact of dis-and misinformation.

Keywords: Sociology of disaster, misinformation, dis-information, Social Psychology of rumors

Procedia PDF Downloads 89
11861 Comparison of the Logistic and the Gompertz Growth Functions Considering a Periodic Perturbation in the Model Parameters

Authors: Avan Al-Saffar, Eun-Jin Kim

Abstract:

Both the logistic growth model and the gompertz growth model are used to describe growth processes. Both models driven by perturbations in different cases are investigated using information theory as a useful measure of sustainability and the variability. Specifically, we study the effect of different oscillatory modulations in the system's parameters on the evolution of the system and Probability Density Function (PDF). We show the maintenance of the initial conditions for a long time. We offer Fisher information analysis in positive and/or negative feedback and explain its implications for the sustainability of population dynamics. We also display a finite amplitude solution due to the purely fluctuating growth rate whereas the periodic fluctuations in negative feedback can lead to break down the system's self-regulation with an exponentially growing solution. In the cases tested, the gompertz and logistic systems show similar behaviour in terms of information and sustainability although they develop differently in time.

Keywords: dynamical systems, fisher information, probability density function (pdf), sustainability

Procedia PDF Downloads 431
11860 A Comparison of Brands Equity between Samsung and Apple in the View of Students of Management Science Faculty, Suan Sunandha Rajabhat University

Authors: Somsak Klaysung

Abstract:

This study aims to investigate the comparison of brands equity between Samsung and Apple from students of Suan Sunandha Rajabhat University. The research method will using quantitative research, data was collected by questionnaires distributed to communication of arts students in the faculty of management science of Suan Sunandha Rajabhat University for 100 samples by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and inferential statistic is t-test for hypothesis testing. The results showed that brands equity between Apple and Samsung brand have the ability to recognize brand from the customer by perceived value of the uniqueness of brand and recall when in a situation that must be purchased (Salience), which is the lowest level in branding and consumers can recognize the capacity of the product (Judgment) and opinions about the quality and reliability when it comes to mobile phones Apple and Samsung brand are not different.

Keywords: Apple and Samsung brand, brand equity, judgment, performance, resonance, salience

Procedia PDF Downloads 215
11859 A Qualitative Exploration of How Brazilian Immigrant Mothers Living in the United States Obtain Information about Physical Activity and Screen-Viewing for Their Young Children

Authors: Ana Cristina Lindsay, Mary L. Greaney

Abstract:

Background: Racial/ethnic minority children of low-income immigrant families remain at increased risk of obesity. Consistent with high rates of childhood obesity among racial/ethnic minority children are high rates of physical inactivity and increased levels of sedentary behaviors (e.g., TV and other screen viewing). Brazilians comprise a fast-growing immigrant population group in the US, yet little research has focused on the health issues affecting Brazilian immigrant children. The purpose of this qualitative study was to explore how Brazilian-born immigrant mothers living in the United States obtain information about physical activity and screen-time for their young children. Methods: Qualitative research including focus groups with Brazilian immigrant mothers of preschool-age children living in the U.S. Results: Results revealed that Brazilian immigrant mothers obtain information on young children’s physical activity and screen-time from a variety of sources including interpersonal communication, television and magazines, government health care programs (WIC program) and professionals (e.g., nurses and pediatricians). A noteworthy finding is the significant role of foreign information sources (Brazilian TV shows and magazines) on mothers’ access to information about these early behaviors. Future research is needed to quantify and better understanding Brazilian parents’ access to accurate and sound information related to young children’s physical activity and screen-viewing behaviors. Conclusions: To our knowledge, no existing research has examined how Brazilian immigrant mothers living in the United States obtain information about these behaviors. This information is crucial for the design of culturally appropriate early childhood obesity prevention interventions tailored to the specific needs of this ethnic group.

Keywords: physical activity, scree-time, information, immigrant, mothers, Brazilian, United States

Procedia PDF Downloads 275
11858 Structure Analysis of Text-Image Connection in Jalayrid Period Illustrated Manuscripts

Authors: Mahsa Khani Oushani

Abstract:

Text and image are two important elements in the field of Iranian art, the text component and the image component have always been manifested together. The image narrates the text and the text is the factor in the formation of the image and they are closely related to each other. The connection between text and image is an interactive and two-way connection in the tradition of Iranian manuscript arrangement. The interaction between the narrative description and the image scene is the result of a direct and close connection between the text and the image, which in addition to the decorative aspect, also has a descriptive aspect. In this article the connection between the text element and the image element and its adaptation to the theory of Roland Barthes, the structuralism theorist, in this regard will be discussed. This study tends to investigate the question of how the connection between text and image in illustrated manuscripts of the Jalayrid period is defined according to Barthes’ theory. And what kind of proportion has the artist created in the composition between text and image. Based on the results of reviewing the data of this study, it can be inferred that in the Jalayrid period, the image has a reference connection and although it is of major importance on the page, it also maintains a close connection with the text and is placed in a special proportion. It is not necessarily balanced and symmetrical and sometimes uses imbalance for composition. This research has been done by descriptive-analytical method, which has been done by library collection method.

Keywords: structure, text, image, Jalayrid, painter

Procedia PDF Downloads 234
11857 The Study of Factors Affecting Social Responsibility among Undergraduate Students of the Faculty of Management Science, Suan Sunandha Rajabhat University

Authors: Somtop Keawchuer

Abstract:

The purpose of the research is to study the level of social responsibility among the undergraduate students of the faculty of Management Science, Suan Sunandha Rajabhat University. The research also studies the factors affecting social responsibility of the undergraduate students. The research methodology applied a self-administered questionnaire as a quantitative method. A convenience sampling was used to distribute the questionnaire. Finally, 350 questionnaires were received for data analysis. Data were analyzed by using descriptive statistics including percentage, mean, standard deviation, and inferential statistics including regression analysis for hypothesis testing. The results indicated that the level of social responsibility of the students was at a good level. In addition, internal and external factors were related to social responsibility of the undergraduate students with the statistical significance level of 0.05.

Keywords: internal and external factors, social responsibility, Suan Sunandha Rajabhat University, undergraduate students

Procedia PDF Downloads 272
11856 Information Theoretic Approach for Beamforming in Wireless Communications

Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif

Abstract:

Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.

Keywords: beamforming, interference, mutual information, wireless communications

Procedia PDF Downloads 280
11855 The Development of an Agent-Based Model to Support a Science-Based Evacuation and Shelter-in-Place Planning Process within the United States

Authors: Kyle Burke Pfeiffer, Carmella Burdi, Karen Marsh

Abstract:

The evacuation and shelter-in-place planning process employed by most jurisdictions within the United States is not informed by a scientifically-derived framework that is inclusive of the behavioral and policy-related indicators of public compliance with evacuation orders. While a significant body of work exists to define these indicators, the research findings have not been well-integrated nor translated into useable planning factors for public safety officials. Additionally, refinement of the planning factors alone is insufficient to support science-based evacuation planning as the behavioral elements of evacuees—even with consideration of policy-related indicators—must be examined in the context of specific regional transportation and shelter networks. To address this problem, the Federal Emergency Management Agency and Argonne National Laboratory developed an agent-based model to support regional analysis of zone-based evacuation in southeastern Georgia. In particular, this model allows public safety officials to analyze the consequences that a range of hazards may have upon a community, assess evacuation and shelter-in-place decisions in the context of specified evacuation and response plans, and predict outcomes based on community compliance with orders and the capacity of the regional (to include extra-jurisdictional) transportation and shelter networks. The intention is to use this model to aid evacuation planning and decision-making. Applications for the model include developing a science-driven risk communication strategy and, ultimately, in the case of evacuation, the shortest possible travel distance and clearance times for evacuees within the regional boundary conditions.

Keywords: agent-based modeling for evacuation, decision-support for evacuation planning, evacuation planning, human behavior in evacuation

Procedia PDF Downloads 235
11854 Artificial Intelligence and Cybernetics in Bertrand Russell’s Philosophy

Authors: Djoudi Ali

Abstract:

In this article, we shall expose some of the more interesting interactions of philosophy and cybernetics, some philosophical issues arising in cybernetic systems, and some questions in philosophy of our daily life related to the artificial intelligence. Many of these are fruitfully explored in the article..This article will shed light also on the importance of science and technology in our life and what are the main problems of misusing the latest technologies known under artificial intelligence and cybernatics acoording to Bertrand Russell’s point of view; then to analyse his project of reforms inculding science progress risks , the article show also the whole aspect of the impact of technology on peace , nature and on individual daily behavior, we shall discuss all issues and defies imposing by this new era , The article will invest in showing what Russell will suggest to eliminate or to slow down the dangers of these changes and what are the main solutions to protect the indiviual’s rights and responsiblities In this article, We followed a different methodology, like analysis method and sometimes the historical or descriptive method, without forgetting criticizing some conclusions when it is logically needed In the end, we mentioned what is supposed to be solutions suggested by Bertrand Russell that should be taken into considerations during the next decades and how to protect our ennvironement and the human being of any risk of disappearing

Keywords: artificial intelligence, technology, cybernetics, sience

Procedia PDF Downloads 125
11853 Culture and Commodification: A Study of William Gibson's the Bridge Trilogy

Authors: Aruna Bhat

Abstract:

Culture can be placed within the social structure that embodies both the creation of social groups, and the manner in which they interact with each other. As many critics have pointed out, culture in the Postmodern context has often been considered a commodity, and indeed it shares many attributes with commercial products. Popular culture follows many patterns of behavior derived from Economics, from the simple principle of supply and demand, to the creation of marketable demographics which fit certain criterion. This trend is exemplary visible in contemporary fiction, especially in contemporary science fiction; Cyberpunk fiction in particular which is an off shoot of pure science fiction. William Gibson is one such author who in his works portrays such a scenario, and in his The Bridge Trilogy he adds another level of interpretation to this state of affairs, by describing a world that is centered on industrialization of a new kind – that focuses around data in the cyberspace. In this new world, data has become the most important commodity, and man has become nothing but a nodal point in a vast ocean of raw data resulting into commodification of each thing including Culture. This paper will attempt to study the presence of above mentioned elements in William Gibson’s The Bridge Trilogy. The theories applied will be Postmodernism and Cultural studies.

Keywords: culture, commodity, cyberpunk, data, postmodern

Procedia PDF Downloads 505
11852 Parallel Fuzzy Rough Support Vector Machine for Data Classification in Cloud Environment

Authors: Arindam Chaudhuri

Abstract:

Classification of data has been actively used for most effective and efficient means of conveying knowledge and information to users. The prima face has always been upon techniques for extracting useful knowledge from data such that returns are maximized. With emergence of huge datasets the existing classification techniques often fail to produce desirable results. The challenge lies in analyzing and understanding characteristics of massive data sets by retrieving useful geometric and statistical patterns. We propose a supervised parallel fuzzy rough support vector machine (PFRSVM) for data classification in cloud environment. The classification is performed by PFRSVM using hyperbolic tangent kernel. The fuzzy rough set model takes care of sensitiveness of noisy samples and handles impreciseness in training samples bringing robustness to results. The membership function is function of center and radius of each class in feature space and is represented with kernel. It plays an important role towards sampling the decision surface. The success of PFRSVM is governed by choosing appropriate parameter values. The training samples are either linear or nonlinear separable. The different input points make unique contributions to decision surface. The algorithm is parallelized with a view to reduce training times. The system is built on support vector machine library using Hadoop implementation of MapReduce. The algorithm is tested on large data sets to check its feasibility and convergence. The performance of classifier is also assessed in terms of number of support vectors. The challenges encountered towards implementing big data classification in machine learning frameworks are also discussed. The experiments are done on the cloud environment available at University of Technology and Management, India. The results are illustrated for Gaussian RBF and Bayesian kernels. The effect of variability in prediction and generalization of PFRSVM is examined with respect to values of parameter C. It effectively resolves outliers’ effects, imbalance and overlapping class problems, normalizes to unseen data and relaxes dependency between features and labels. The average classification accuracy for PFRSVM is better than other classifiers for both Gaussian RBF and Bayesian kernels. The experimental results on both synthetic and real data sets clearly demonstrate the superiority of the proposed technique.

Keywords: FRSVM, Hadoop, MapReduce, PFRSVM

Procedia PDF Downloads 490
11851 The Image of Future Spouse in Indonesian Folktale: Man's Acceptance of Woman and vice Versa

Authors: Titik Wahyuningsih

Abstract:

The folktale to discuss is Ande-Ande Lumut, a story that is believed to be a history of two kingdoms in East Java, Indonesia. The title refers to the main male character in the story. This research is a library research which aims to know the patriarchal values in Indonesia. The data for the research is the song in the story that is actually the conversation between Ande-Ande Lumut and a mom who adopts him. It is told in the lines that many beautiful girls come to propose Ande-Ande Lumut but he does not want to accept them and keeps on staying in his upstairs room. Finally, he says yes for Klething Kuning to whom his mom describes as a girl with ugly face. Ande-Ande Lumut's decision is taken as Klething Kuning is the only girl who doesn't let Yuyu Kangkang help her. Yuyu Kangkang is described as a very big crab that helps the girls to cross the river but ask them to kiss him. Through the lense of feminist approach, Ande-Ande Lumut shows the men’s preference and dominance to make final decision over women. Even though the girls are actively propose their future husband, but they do it without giving any requirements. Meanwhile, the future husband chooses a girl with a criterion that no male has ever touched her, although the male is a crab.

Keywords: future spouse, Indonesian folktale, acceptance, patriarchal

Procedia PDF Downloads 293
11850 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 311
11849 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 30
11848 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand

Authors: Thossaporn Thossansin

Abstract:

This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.

Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices

Procedia PDF Downloads 325
11847 Clinical Features, Diagnosis and Treatment Outcomes in Necrotising Autoimmune Myopathy: A Rare Entity in the Spectrum of Inflammatory Myopathies

Authors: Tamphasana Wairokpam

Abstract:

Inflammatory myopathies (IMs) have long been recognised as a heterogenous family of myopathies with acute, subacute, and sometimes chronic presentation and are potentially treatable. Necrotizing autoimmune myopathies (NAM) are a relatively new subset of myopathies. Patients generally present with subacute onset of proximal myopathy and significantly elevated creatinine kinase (CK) levels. It is being increasingly recognised that there are limitations to the independent diagnostic utility of muscle biopsy. Immunohistochemistry tests may reveal important information in these cases. The traditional classification of IMs failed to recognise NAM as a separate entity and did not adequately emphasize the diversity of IMs. This review and case report on NAM aims to highlight the heterogeneity of this entity and focus on the distinct clinical presentation, biopsy findings, specific auto-antibodies implicated, and available treatment options with prognosis. This article is a meta-analysis of literatures on NAM and a case report illustrating the clinical course, investigation and biopsy findings, antibodies implicated, and management of a patient with NAM. The main databases used for the search were Pubmed, Google Scholar, and Cochrane Library. Altogether, 67 publications have been taken as references. Two biomarkers, anti-signal recognition protein (SRP) and anti- hydroxyl methylglutaryl-coenzyme A reductase (HMGCR) Abs, have been found to have an association with NAM in about 2/3rd of cases. Interestingly, anti-SRP associated NAM appears to be more aggressive in its clinical course when compared to its anti-HMGCR associated counterpart. Biopsy shows muscle fibre necrosis without inflammation. There are reports of statin-induced NAM where progression of myopathy has been seen even after discontinuation of statins, pointing towards an underlying immune mechanism. Diagnosisng NAM is essential as it requires more aggressive immunotherapy than other types of IMs. Most cases are refractory to corticosteroid monotherapy. Immunosuppressive therapy with other immunotherapeutic agents such as IVIg, rituximab, mycophenolate mofetil, azathioprine has been explored and found to have a role in the treatment of NAM. In conclusion,given the heterogeneity of NAM, it appears that NAM is not just a single entity but consists of many different forms, despite the similarities in presentation and its classification remains an evolving field. A thorough understanding of underlying mechanism and the clinical correlation with antibodies associated with NAM is essential for efficacious management and disease prognostication.

Keywords: inflammatory myopathies, necrotising autoimmune myopathies, anti-SRP antibody, anti-HMGCR antibody, statin induced myopathy

Procedia PDF Downloads 103
11846 Making Food Science Education and Research Activities More Attractive for University Students and Food Enterprises by Utilizing Open Innovative Space-Approach

Authors: Anna-Maria Saarela

Abstract:

At the Savonia University of Applied Sciences (UAS), curriculum and studies have been improved by applying an Open Innovation Space approach (OIS). It is based on multidisciplinary action learning. The key elements of OIS-ideology are work-life orientation, and student-centric communal learning. In this approach, every participant can learn from each other and innovations will be created. In this social innovation educational approach, all practices are carried out in close collaboration with enterprises in real-life settings, not in classrooms. As an example, in this paper, Savonia UAS’s Future Food RDI hub (FF) shows how OIS practices are implemented by providing food product development and consumer research services for enterprises in close collaboration with academicians, students and consumers. In particular one example of OIS experimentation in the field is provided by a consumer research carried out utilizing verbal analysis protocol combined with audio-visual observation (VAP-WAVO). In this case, all co-learners were acting together in supermarket settings to collect the relevant data for a product development and the marketing department of a company. The company benefitted from the results obtained, students were more satisfied with their studies, educators and academicians were able to obtain good evidence for further collaboration as well as renewing curriculum contents based on the requirements of working life. In addition, society will benefit over time as young university adults find careers more easily through their OIS related food science studies. Also this knowledge interaction model re-news education practices and brings working-life closer to educational research institutes.

Keywords: collaboration, education, food science, industry, knowledge transfer, RDI, student

Procedia PDF Downloads 373
11845 The Development of Sports Medicine and Physical Fitness in China from Reviewing Their Studies from the Journal of China Sports Science

Authors: Dong Zhan

Abstract:

China sports science is the core periodical of scientific research in the field of sports in China at present. It is the first academic periodical ranked in China. The author has studied the characteristics and trends of articles on sports medicine and physical fitness published in the journal since it founded. Now, the articles on sports medicine and physical fitness published in the Journal of Sports Science from 2013 to 2017 are reviewed. The results show that 1) The characteristics of previous sports medicine articles showed that there were more articles on the basis of sports medicine than that on the application. The research on animal experiments was far more than that on the human body. Moreover, the trend was getting worse and worse as time goes on. But in the past five years, there had been a marked improvement. The basic/application has been improved from 2.1/1 to 1.3/1. This shows that sports medicine researchers have been paid more attention to the application research in sports medicine. 2) There are few articles on sports injury, because the state put the sports injury specialty into the medical colleges, and the research scope of sports research institutes does not include sports injury. It cannot meet the need for the development of sports medicine, and it should change sooner or later. 3) In the past, researchers’ effort was on athletes' physical health, not on ordinary people. Now, there is a great change, they not only research on the sportsmen’s health but also research on the health of the ordinary people. 4) Researchers mainly studied on the young people’s physical fitness in the past; now, it has been greatly improved. Researchers study on the physical health of the elderly, especially those over the age of 60. Numbers of paper researching on the young were much more than those on the old. In the past 10 years, the ratio of number of paper researching on the young to the old people was (young/old) 16.6/1, while in the past 5 years, this ratio was 6.3/1. However, this is not enough. China has a large population and needs to focus on promoting the health of the people. Conclusion: It is important to pay more attention to the application research on sports medicine and on the physical fitness, and it is also important to make a research on physical health of the elderly.

Keywords: sports medicine, people's health, the young, the old

Procedia PDF Downloads 152
11844 Hemocompatible Thin-Film Materials Recreating the Structure of the Cell Niches with High Potential for Endothelialization

Authors: Roman Major, Klaudia Trembecka- Wojciga, Juergen Markus Lackner, Boguslaw Major

Abstract:

The future and the development of science is therefore seen in interdisciplinary areas such as bio medical engineering. Self-assembled structures, similar to stem cell niches would inhibit fast division process and subsequently capture the stem cells from the blood flow. By means of surface topography and the stiffness as well as micro structure progenitor cells should be differentiated towards the formation of endothelial cells monolayer which effectively will inhibit activation of the coagulation cascade. The idea of the material surface development met the interest of the clinical institutions, which support the development of science in this area and are waiting for scientific solutions that could contribute to the development of heart assist systems. This would improve the efficiency of the treatment of patients with myocardial failure, supported with artificial heart assist systems. Innovative materials would enable the redesign, in the post project activity, construction of ventricular heart assist.

Keywords: bio-inspired materials, electron microscopy, haemocompatibility, niche-like structures, thin coatings

Procedia PDF Downloads 478
11843 Effects of Pulsed Electromagnetic and Static Magnetic Fields on Musculoskeletal Low Back Pain: A Systematic Review Approach

Authors: Mohammad Javaherian, Siamak Bashardoust Tajali, Monavvar Hadizadeh

Abstract:

Objective: This systematic review study was conducted to evaluate the effects of Pulsed Electromagnetic (PEMF) and Static Magnetic Fields (SMG) on pain relief and functional improvement in patients with musculoskeletal Low Back Pain (LBP). Methods: Seven electronic databases were searched by two researchers independently to identify the published Randomized Controlled Trials (RCTs) on the efficacy of pulsed electromagnetic, static magnetic, and therapeutic nuclear magnetic fields. The identified databases for systematic search were Ovid Medline®, Ovid Cochrane RCTs and Reviews, PubMed, Web of Science, Cochrane Library, CINAHL, and EMBASE from 1968 to February 2016. The relevant keywords were selected by Mesh. After initial search and finding relevant manuscripts, all references in selected studies were searched to identify second hand possible manuscripts. The published RCTs in English would be included to the study if they reported changes on pain and/or functional disability following application of magnetic fields on chronic musculoskeletal low back pain. All studies with surgical patients, patients with pelvic pain, and combination of other treatment techniques such as acupuncture or diathermy were excluded. The identified studies were critically appraised and the data were extracted independently by two raters (M.J and S.B.T). Probable disagreements were resolved through discussion between raters. Results: In total, 1505 abstracts were found following the initial electronic search. The abstracts were reviewed to identify potentially relevant manuscripts. Seventeen possibly appropriate studies were retrieved in full-text of which 48 were excluded after reviewing their full-texts. Ten selected articles were categorized into three subgroups: PEMF (6 articles), SMF (3 articles), and therapeutic nuclear magnetic fields (tNMF) (1 article). Since one study evaluated tNMF, we had to exclude it. In the PEMF group, one study of acute LBP did not show significant positive results and the majority of the other five studies on Chronic Low Back Pain (CLBP) indicated its efficacy on pain relief and functional improvement, but one study with the lowest sessions (6 sessions during 2 weeks) did not report a significant difference between treatment and control groups. In the SMF subgroup, two articles reported near significant pain reduction without any functional improvement although more studies are needed. Conclusion: The PEMFs with a strength of 5 to 150 G or 0.1 to 0.3 G and a frequency of 5 to 64 Hz or sweep 7 to 7KHz can be considered as an effective modality in pain relief and functional improvement in patients with chronic low back pain, but there is not enough evidence to confirm their effectiveness in acute low back pain. To achieve the appropriate effectiveness, it is suggested to perform this treatment modality 20 minutes per day for at least 9 sessions. SMFs have not been reported to be substantially effective in decreasing pain or improving the function in chronic low back pain. More studies are necessary to achieve more reliable results.

Keywords: pulsed electromagnetic field, static magnetic field, magnetotherapy, low back pain

Procedia PDF Downloads 205
11842 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 94
11841 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 478
11840 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice

Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese

Abstract:

Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.

Keywords: documentation, knowledge, patient care, patient’s information, training

Procedia PDF Downloads 190
11839 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 400
11838 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 134
11837 A Data Science Pipeline for Algorithmic Trading: A Comparative Study in Applications to Finance and Cryptoeconomics

Authors: Luyao Zhang, Tianyu Wu, Jiayi Li, Carlos-Gustavo Salas-Flores, Saad Lahrichi

Abstract:

Recent advances in AI have made algorithmic trading a central role in finance. However, current research and applications are disconnected information islands. We propose a generally applicable pipeline for designing, programming, and evaluating algorithmic trading of stock and crypto tokens. Moreover, we provide comparative case studies for four conventional algorithms, including moving average crossover, volume-weighted average price, sentiment analysis, and statistical arbitrage. Our study offers a systematic way to program and compare different trading strategies. Moreover, we implement our algorithms by object-oriented programming in Python3, which serves as open-source software for future academic research and applications.

Keywords: algorithmic trading, AI for finance, fintech, machine learning, moving average crossover, volume weighted average price, sentiment analysis, statistical arbitrage, pair trading, object-oriented programming, python3

Procedia PDF Downloads 147
11836 Development of a Technology Assessment Model by Patents and Customers' Review Data

Authors: Kisik Song, Sungjoo Lee

Abstract:

Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.

Keywords: technology assessment, patents, citation information, opinion mining

Procedia PDF Downloads 466