Search results for: private information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12194

Search results for: private information

10724 Modeling Activity Pattern Using XGBoost for Mining Smart Card Data

Authors: Eui-Jin Kim, Hasik Lee, Su-Jin Park, Dong-Kyu Kim

Abstract:

Smart-card data are expected to provide information on activity pattern as an alternative to conventional person trip surveys. The focus of this study is to propose a method for training the person trip surveys to supplement the smart-card data that does not contain the purpose of each trip. We selected only available features from smart card data such as spatiotemporal information on the trip and geographic information system (GIS) data near the stations to train the survey data. XGboost, which is state-of-the-art tree-based ensemble classifier, was used to train data from multiple sources. This classifier uses a more regularized model formalization to control the over-fitting and show very fast execution time with well-performance. The validation results showed that proposed method efficiently estimated the trip purpose. GIS data of station and duration of stay at the destination were significant features in modeling trip purpose.

Keywords: activity pattern, data fusion, smart-card, XGboost

Procedia PDF Downloads 246
10723 Two-Sided Information Dissemination in Takeovers: Disclosure and Media

Authors: Eda Orhun

Abstract:

Purpose: This paper analyzes a target firm’s decision to voluntarily disclose information during a takeover event and the effect of such disclosures on the outcome of the takeover. Such voluntary disclosures especially in the form of earnings forecasts made around takeover events may affect shareholders’ decisions about the target firm’s value and in return takeover result. This study aims to shed light on this question. Design/methodology/approach: The paper tries to understand the role of voluntary disclosures by target firms during a takeover event in the likelihood of takeover success both theoretically and empirically. A game-theoretical model is set up to analyze the voluntary disclosure decision of a target firm to inform the shareholders about its real worth. The empirical implication of model is tested by employing binary outcome models where the disclosure variable is obtained by identifying the target firms in the sample that provide positive news by issuing increasing management earnings forecasts. Findings: The model predicts that a voluntary disclosure of positive information by the target decreases the likelihood that the takeover succeeds. The empirical analysis confirms this prediction by showing that positive earnings forecasts by target firms during takeover events increase the probability of takeover failure. Overall, it is shown that information dissemination through voluntary disclosures by target firms is an important factor affecting takeover outcomes. Originality/Value: This study is the first to the author's knowledge that studies the impact of voluntary disclosures by the target firm during a takeover event on the likelihood of takeover success. The results contribute to information economics, corporate finance and M&As literatures.

Keywords: takeovers, target firm, voluntary disclosures, earnings forecasts, takeover success

Procedia PDF Downloads 318
10722 A Practical Model for Managing Beach Safety Focusing on Tourist Drownings in Koh Samui, Thailand

Authors: Siyathorn Khunon, Thanawit Buafai

Abstract:

This paper aims to investigate management of beach safety with a focus on tourist drownings in Samui. The data collected in this investigation will then lead to the proposal of a practical management model suitable for use in Samui. Qualitative research was conducted in the following manner: nine stakeholders from local government organizations and tourism businesses were interviewed in-depth. Additionally, a best practice case study from Phuket was applied to analyze beach safety. Twelve foreign tourists were also interviewed. Then, a focus group comprised of 32 people was used to determine practical solutions for enhancing tourists’ safety on the beach in Samui. A steering committee to coordinate between public and private organizations was proposed to manage and enhance tourists’ safety. A practical model is proposed to increase the safety level of tourists in Samui

Keywords: beach safety, drowning, tourist, Samui

Procedia PDF Downloads 274
10721 A Context-Sensitive Algorithm for Media Similarity Search

Authors: Guang-Ho Cha

Abstract:

This paper presents a context-sensitive media similarity search algorithm. One of the central problems regarding media search is the semantic gap between the low-level features computed automatically from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level abstraction but the low-level features do not sometimes reflect the human perception. Many media search algorithms have used the Minkowski metric to measure similarity between image pairs. However those functions cannot adequately capture the aspects of the characteristics of the human visual system as well as the nonlinear relationships in contextual information given by images in a collection. Our search algorithm tackles this problem by employing a similarity measure and a ranking strategy that reflect the nonlinearity of human perception and contextual information in a dataset. Similarity search in an image database based on this contextual information shows encouraging experimental results.

Keywords: context-sensitive search, image search, similarity ranking, similarity search

Procedia PDF Downloads 365
10720 The Consumer Behavior and Tourism Marketing of International Tourists Visiting Phuket in Thailand

Authors: Wipanee Maen-In

Abstract:

This research aims to study the tourism marketing and the trip behaviors profile of international tourists who visited Phuket in Thailand and study the influence of their selected demographic characters on their selected trip behaviors. The study was conducted through survey by using questionnaires asking 400 sample respondents from international tourists who visited Phuket. The result found out that type of group travel is the key variable that indicates higher and lower daily spending tourists, tourists spend more when they visit with their family. Trip arrangement is the key variables that indicate shorter and longer stay tourists. From these findings, it is recommended that both private and public sectors should make marketing to potential tourists in order to increase tourism revenue and to be a sustainable tourism, all of agencies that involves in Phuket tourism industry should coordinate to satisfy tourists to revisit and recommend Phuket to friends and relatives.

Keywords: consumer behavior, international tourists, Phuket province, tourism marketing

Procedia PDF Downloads 314
10719 Challenges in E-Government: Conceptual Views and Solutions

Authors: Rasim Alguliev, Farhad Yusifov

Abstract:

Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.

Keywords: electron government, public administration, information security, web-analytics, social networks, data mining

Procedia PDF Downloads 473
10718 Automation of Embodied Energy Calculations for Buildings through Building Information Modelling

Authors: Ahmad Odeh

Abstract:

Researchers are currently more concerned about the calculations of energy at the operational stage, mainly due to its larger environmental impact, but the fact remains, embodied energies represent a substantial contributor unaccounted for in the overall energy computation method. The calculation of materials’ embodied energy during the construction stage is complicated. This is due to the various factors involved. The equipment used, fuel needed, and electricity required for each type of materials varies with location and thus the embodied energy will differ for each project. Moreover, the method used in manufacturing, transporting and putting in place will have significant influence on the materials’ embodied energy. This anomaly has made it difficult to calculate or even bench mark the usage of such energies. This paper presents a model aimed at calculating embodied energies based on such variabilities. It presents a systematic approach that uses an efficient method of calculation to provide a new insight for the selection of construction materials. The model is developed in a BIM environment. The quantification of materials’ energy is determined over the three main stages of their lifecycle: manufacturing, transporting and placing. The model uses three major databases each of which contains set of the construction materials that are most commonly used in building projects. The first dataset holds information about the energy required to manufacture any type of materials, the second includes information about the energy required for transporting the materials while the third stores information about the energy required by machinery to place the materials in their intended locations. Through geospatial data analysis, the model automatically calculates the distances between the suppliers and construction sites and then uses dataset information for energy computations. The computational sum of all the energies is automatically calculated and then the model provides designers with a list of usable equipment along with the associated embodied energies.

Keywords: BIM, lifecycle energy assessment, building automation, energy conservation

Procedia PDF Downloads 189
10717 Tax Avoidance and Leadership Replacement: Moderating Influence of Ownership and Political Connections

Authors: Radwan Hussien Alkebsee

Abstract:

Under the argument that reputational costs deter firms from engaging in tax avoidance activities, this paper investigates the relationship between tax avoidance and forced CEO turnover. This study is based on a broad sample of Chinese listed companies spanning the period 2011 to 2018. The findings reveal that tax avoidance is positively associated with forced CEO turnover. This suggests that firms that engage in tax avoidance experience a high rate of leadership replacement. The findings also reveal that the positive association between tax avoidance and forced CEO turnover is pronounced for state-owned firms, firms with no political connections, and firms located in “more developed” regions with extensive tax enforcement action, while it is not for private firms, firms with political connections, and firms located in “less developed” regions with weak tax enforcement actions. The baseline results remain consistent and robust for endogeneity concerns.

Keywords: tax avoidance, CEO turnover, political connections, regional tax enforcement, China

Procedia PDF Downloads 152
10716 Application of Fair Value Accounting in an Emerging Market Algerian Case

Authors: Haouam Djemaa

Abstract:

This study aimed to identify the possibility for applying fair value accounting by Algerian enterprises coted in capital maket (Algiers stock exchange). To achieve the objectives of this study, we made an interview with preparers of accounting information. The results document that enterprises are aware of fair value accounting in financial reporting because of its ability to provide useful accounting, but it depends on the availability of favorable circumstances for its application and this is what is missing in the Algerian environment.

Keywords: fair value, financial reporting, accounting information, valuation method

Procedia PDF Downloads 393
10715 Incorporating Information Gain in Regular Expressions Based Classifiers

Authors: Rosa L. Figueroa, Christopher A. Flores, Qing Zeng-Treitler

Abstract:

A regular expression consists of sequence characters which allow describing a text path. Usually, in clinical research, regular expressions are manually created by programmers together with domain experts. Lately, there have been several efforts to investigate how to generate them automatically. This article presents a text classification algorithm based on regexes. The algorithm named REX was designed, and then, implemented as a simplified method to create regexes to classify Spanish text automatically. In order to classify ambiguous cases, such as, when multiple labels are assigned to a testing example, REX includes an information gain method Two sets of data were used to evaluate the algorithm’s effectiveness in clinical text classification tasks. The results indicate that the regular expression based classifier proposed in this work performs statically better regarding accuracy and F-measure than Support Vector Machine and Naïve Bayes for both datasets.

Keywords: information gain, regular expressions, smith-waterman algorithm, text classification

Procedia PDF Downloads 320
10714 Climate Impact-Minimizing Road Infrastructure Layout for Growing Cities

Authors: Stanislovas Buteliauskas, Aušrius Juozapavičius

Abstract:

City road transport contributes significantly to climate change, and the ongoing world urbanization is only increasing the problem. The paper describes a city planning concept minimizing the number of vehicles on the roads while increasing overall mobility. This becomes possible by utilizing a recently invented two-level road junction with a unique property of serving both as an intersection of uninterrupted traffic and an easily accessible transport hub capable of accumulating private vehicles, and therefore becoming an especially effective park-and-ride solution, and a logistics or business center. Optimized layouts of city road infrastructure, living and work areas, and major roads are presented. The layouts are suitable both for the development of new cities as well as for the expansion of existing ones. Costs of the infrastructure and a positive impact on climate are evaluated in comparison to current city growth patterns.

Keywords: congestion, city infrastructure, park-and-ride, road junctions

Procedia PDF Downloads 305
10713 A Reinforcement Learning Approach for Evaluation of Real-Time Disaster Relief Demand and Network Condition

Authors: Ali Nadi, Ali Edrissi

Abstract:

Relief demand and transportation links availability is the essential information that is needed for every natural disaster operation. This information is not in hand once a disaster strikes. Relief demand and network condition has been evaluated based on prediction method in related works. Nevertheless, prediction seems to be over or under estimated due to uncertainties and may lead to a failure operation. Therefore, in this paper a stochastic programming model is proposed to evaluate real-time relief demand and network condition at the onset of a natural disaster. To address the time sensitivity of the emergency response, the proposed model uses reinforcement learning for optimization of the total relief assessment time. The proposed model is tested on a real size network problem. The simulation results indicate that the proposed model performs well in the case of collecting real-time information.

Keywords: disaster management, real-time demand, reinforcement learning, relief demand

Procedia PDF Downloads 316
10712 Debunking Sexual Myths in Bangladesh through an Intervention on the Internet

Authors: E. Rommes, Els Toonen, Rahil Roodsaz, Suborna Camellia, Farhana Alam, Saad Khan, Jhalok Ranjon Talukder, Tanveer Hassan, Syeda Farjana Ahmed, Sabina Faiz Rashid

Abstract:

In Bangladesh, a country in which adults (both parents and teachers) find it particularly hard to speak with youth about sexuality, adolescents seem to struggle with various insecurities about their sexual feelings, thoughts, behavior and physical characteristics. On the basis of a large number of interviews and focus groups with rural and urban Bangla adolescent girls and boys of lower and middle class as part of the large-scale three-year project ‘Breaking the Shame’, we have identified ten sexual themes or ‘myths’ that youth struggle with most. These encompass amongst others beliefs and insecurities on masturbation, discharge, same-sex behavior and feelings, the effects of watching porn and gender norms. We argue that the Internet is a particularly suitable medium to ‘debunk’ those myths, as youth can consult it anonymously and privately and so avoid social shame. Moreover, amongst the myths, we have identified two kinds which may need different debunking techniques. One kind of myth concerns scientifically uncontested, generally biological related information, such as the effects of having sex with a pregnant woman, questions on the effects of a penile or vaginal discharge or questions on the effects of masturbation. The second kind of myths concerns more diverse information sources and deals with e.g. religious or culturally specific norms, such as on the meaning and existence of homosexuality or gender appropriate norms of behavior in Bangladesh. For addressing both kinds of myths, expert information including a wealth of references to information resources needs to be provided, which the Internet is very suitable for. For the second kind of myths, adolescents also need to learn how to deal with sometimes conflicting norms and information sources, and they need to develop and reflect on their own opinions as part of their identity formation. On the basis of a literature review, we thus distinguish general information needs from identity formation needs, which includes the need to be able to relate information and opinions to one’s own opinions and situation. Hence, we argue that youth not only need abstract expert information to be able to debunk sexual myths, but also the option to discuss this information with other adolescents and compare their own situation and opinions with other peers, who in that way serve as ‘warm experts’ for each other. In this paper, we will describe the outcomes of our qualitative study above. In addition, we will present our findings of an intervention by presenting youth with general, uncontested information on the Internet with additional peer discussion options to compare the debunking effects on different kinds of myths.

Keywords: peer discussion, intervention, sexual myths, shame

Procedia PDF Downloads 216
10711 Mechanisms for Strategic Adoption of Innovation Procurement

Authors: Carolina B. A. Morais, Antonio Bob Santos

Abstract:

In order to determine how innovation procurement can strengthen public efficiency and foster the modernization of public services, while at the same time promoting the opening of new private markets, this paper aims to present the two key instruments for the practice of innovation procurement at a European, national, and regional level – Pre-Commercial Procurement (PCP), and Public Procurement of Innovative Solutions (PPI). Thus, it starts with a theoretical framework on the emergence of this topic in the European Innovation Policy (Section 2), then continues with the identification and systematization of the main mechanisms for its effective adoption, both on the demand and supply side of the market (Section 3), as well as to expose and describe methods and tools for positioning innovation at the heart of public entities. The innovative projects best distinguished by the European Commission for their good practices in innovation procurement are identified, and the main methodology for the development and management of innovation procurement – Forward Commitment Procurement (FCP) – is applied to them in a pioneering way (Section 4). The relevance of innovation in public procurement is systematized and reflected upon in Section 5.

Keywords: innovation procurement, innovation policy, innovation, pubic procurement

Procedia PDF Downloads 120
10710 Location Privacy Preservation of Vehicle Data In Internet of Vehicles

Authors: Ying Ying Liu, Austin Cooke, Parimala Thulasiraman

Abstract:

Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor.

Keywords: differential privacy, internet of things, internet of vehicles, location privacy, privacy preservation scheme

Procedia PDF Downloads 180
10709 Well-Being and Helping Technology for Retired Population in Finland

Authors: R. Pääkkönen, L. Korpinen

Abstract:

This study aimed to evaluate parameters influencing well-being and how to maintain well-being as long as possible after retirement. There is contradictory information on the health changes after retirement in Finland. This work is based on interviews, statistics, and literature evaluation of Finland. Most often, balance, multitasking reaction time, and adaptation of vision in dim and darks areas are worsened. Slowing is one characteristic that is difficult to measure properly. The most important is try to determine ways to manage daily activities and symptoms of disease after retirement. Medicine is advancing, problems are often also on the economic side. Information of technical aids is important. It is worth planning a retirement age.

Keywords: retirement, working, aging, wellness

Procedia PDF Downloads 238
10708 Challenges and Success Factors in Introducing Information Systems for Students' Online Registration

Authors: Stanley Fore, Sharon Chipeperekwa

Abstract:

The start of the 2011 academic year in South Africa saw a number of Institutions of Higher Learning introducing online registration for their students. The efficiency and effectiveness of Information Systems are increasingly becoming a necessity and not an option for many organizations. An information system should be able to allow end users to access information easily and navigate with ease. The selected University of Technology (UoT) in this research is one of the largest public institution of higher learning in the Western Cape Province and boasts of an enrolment of more than 30000 students per academic year. An observation was made that, during registration students’ stand in long queues waiting to register or for assistance to register. The system tends to ‘freeze’ whilst students are registering and students are in most cases unfamiliar with the system interface. They constantly have to enquire what to do next when going through online registration process. A mixed method approach will be adopted which comprises of quantitative and qualitative approaches. The study uses constructs of the updated DeLone and McLean IS success model (2003) to analyse and explain the student’s perceptions of the online registration system. The research was undertaken to establish the student’s perceptions of the online registration system. This research seeks to identify and analyse the challenges and success factors of introducing an online registration system whilst highlighting the extent to which this system has been able to solve the numerous problems associated with the manual era. The study will assist management and those responsible for managing the current system to determine how well the system is working or not working to achieve user satisfaction. It will also assist them going forward on what to consider before, during and after implementation of an information system. Respondents will be informed of the objectives of the research, and their consent to participate will be sought. Ethical considerations that will be applied to this study include; informed consent and protection from harm, right to privacy and involvement of the research.

Keywords: online registration, information systems, University of Technology, end-users

Procedia PDF Downloads 258
10707 The Political Economy of Police Corruption in Nigeria

Authors: Tosin Osasona

Abstract:

The Nigeria Police Force bears the constitutional mandate as the primary policing agency for the protection of life and property within Nigeria; however, the police have an historical ill-reputation for corruption, ineptitude and impunity. Using the institutional theory of police as the framework of analysis, the paper argues that the performance of the police in Nigeria mirrors the dominant political, social and economic institutions and the structural environment of the Nigerian state. The article puts in perspective the deliberate political decision to underfund the police, leaving officers of the force the extra task of foraging for funds to undertake the duty that the Nigeria state primarily exists for; the article further explores the nexus between corruption in the police in Nigeria and the issue of funding. The article finds that the Nigerian state, by deliberately under-funding the police, while expecting the agency to perform its duties, has indirectly sanctioned the corruption of the force and approved the cooption of the institution of police and policing for private use in Nigeria.

Keywords: Police Corruption, Funding , Informal Taxation, POlice Checkpoint

Procedia PDF Downloads 160
10706 Analysis of Brownfield Soil Contamination Using Local Government Planning Data

Authors: Emma E. Hellawell, Susan J. Hughes

Abstract:

BBrownfield sites are currently being redeveloped for residential use. Information on soil contamination on these former industrial sites is collected as part of the planning process by the local government. This research project analyses this untapped resource of environmental data, using site investigation data submitted to a local Borough Council, in Surrey, UK. Over 150 site investigation reports were collected and interrogated to extract relevant information. This study involved three phases. Phase 1 was the development of a database for soil contamination information from local government reports. This database contained information on the source, history, and quality of the data together with the chemical information on the soil that was sampled. Phase 2 involved obtaining site investigation reports for development within the study area and extracting the required information for the database. Phase 3 was the data analysis and interpretation of key contaminants to evaluate typical levels of contaminants, their distribution within the study area, and relating these results to current guideline levels of risk for future site users. Preliminary results for a pilot study using a sample of the dataset have been obtained. This pilot study showed there is some inconsistency in the quality of the reports and measured data, and careful interpretation of the data is required. Analysis of the information has found high levels of lead in shallow soil samples, with mean and median levels exceeding the current guidance for residential use. The data also showed elevated (but below guidance) levels of potentially carcinogenic polyaromatic hydrocarbons. Of particular concern from the data was the high detection rate for asbestos fibers. These were found at low concentrations in 25% of the soil samples tested (however, the sample set was small). Contamination levels of the remaining chemicals tested were all below the guidance level for residential site use. These preliminary pilot study results will be expanded, and results for the whole local government area will be presented at the conference. The pilot study has demonstrated the potential for this extensive dataset to provide greater information on local contamination levels. This can help inform regulators and developers and lead to more targeted site investigations, improving risk assessments, and brownfield development.

Keywords: Brownfield development, contaminated land, local government planning data, site investigation

Procedia PDF Downloads 140
10705 Integrating Knowledge into Health Care Systems: A Case Study Investigation on UAE Health Care

Authors: Alya Al Ghufli, Kelaithim Al Tunaiji, Sara Al Ali, Khalid Samara

Abstract:

It is well known that health care systems encompass a variety of key knowledge sources that need to be integrated and shared amongst all types of users to attain higher-levels of motivation and productivity. The development of Health Integrated Systems (HIS) is often seen as a crucial step in strengthening the integration of knowledge to help serve the information needs of health care users. As an emergent economy, the United Arab Emirates (UAE) is regarded as a new arrival in the area of health information systems. As a new nation, there may be several challenges in terms of organisational climate and the sufficient skills and knowledge activities for effective use of HIS. In this regard, the lack of coordination, attitudes and practice of health-related systems can eventually result in unnecessary data and generally poor use of the system. This paper includes results from a qualitative preliminary study carried out from a case study investigation in a single large primary health care organisation in the United Arab Emirates (UAE) comprising various health care users. The study explored health care user’s perceptions about health integration and the impact it has on their practice. The main sources of information were semi-structured interviews and non-obtrusive observations. The authors conclude by presenting various recommendations for the development of HIS and knowledge activities and areas for further study.

Keywords: health integrated systems, knowledge sharing, knowledge activities, health information systems

Procedia PDF Downloads 436
10704 The Idea of Reputation in a Post-Truth Era

Authors: Karen Armstrong

Abstract:

This paper considers the importance of acquiring, cultivating, and protecting one’s personal online reputation in a post-truth era. Although the idea of the individual is essential psychological construct, the concept necessarily now includes our online reputation. The idea of this online reputation has expanded to become almost more important than any other factor in terms of our professional, social and psychological development. The discussion will first consider philosophical ideas of the self, followed by an examination of underlying concepts of perception and interpretation in a post-truth world. Then, the idea of the recent shift to a consideration of posted images, through words and photos, in the construction of self, will be discussed. Next, the relation between private personal life and exterior social life, including our reputation in a variety of realms will be addressed. This will include the adoption of specific strategies and behaviors, which facilitate accuracy, currency and necessary modifications with regard to our online reputation. Finally, specific ways in which we can negotiate the fluid dynamic between reputation, and inner and outer selves to optimum effect will conclude the discussion.

Keywords: image, post-truth, privacy, reputation, surveillance

Procedia PDF Downloads 255
10703 Health Assessment of Power Transformer Using Fuzzy Logic

Authors: Yog Raj Sood, Rajnish Shrivastava, Anchal Wadhwa

Abstract:

Power transformer is one of the electrical equipment that has a central and critical role in the power system. In order to avoid power transformer failure, information system that provides the transformer condition is needed. This paper presents an information system to know the exact situations prevailing within the transformer by declaring its health index. Health index of a transformer is decided by considering several diagnostic tools. The current work deals with UV-Vis, IFT, FP, BDV and Water Content. UV/VIS results have been pre-accessed using separate FL controller for concluding with the Furan contents. It is broadly accepted that the life of a power transformer is the life of the oil/ paper insulating system. The method relies on the use of furan analysis (insulation paper), and other oil analysis results as a means to declare health index. Fuzzy logic system is used to develop the information system. The testing is done on 5 samples of oil of transformers of rating 132/66 KV to obtain the results and results are analyzed using fuzzy logic model.

Keywords: interfacial tension analyzer (ift), flash point (fp), furfuraldehyde (fal), health index

Procedia PDF Downloads 634
10702 Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia

Authors: Wasmi Woishi

Abstract:

Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data.

Keywords: smart card technology, healthcare using smart cards, smart healthcare cards, KSA healthcare information system, cloud-based healthcare cards

Procedia PDF Downloads 162
10701 Approaching Collaborative Governance Legitimacy through Discursive Legitimation Analysis

Authors: Carlo Schick

Abstract:

Legitimacy can be regarded the very fabric of political orders. Up to this point, IR scholarship was particularly interested in the legitimacy of nation-states, international regimes and of non-governmental actors. The legitimacy of collaborative governance comprising public, private and civic actors, however, has not received much attention from an IR perspective. This is partly due to the fact that the concept of legitimacy is difficult to operationalise and measure in settings where there is no clear boundary between political authorities and those who are subject to collaborative governance. In this case, legitimacy cannot be empirically approached in its own terms, but can only be analysed in terms of dialectic legitimation processes. The author develops a three-fold analytical framework based on a dialogical understanding of legitimation. Legitimation first has to relate to public legitimacy demands and contestations of collaborative governance and second to legitimacy claims issued by collaborative governance networks themselves. Lastly, collaborative governance is dependent on constant self-legitimisation. The paper closes with suggesting a discourse analytic approach to further empirical research on the legitimacy of collaborative governance.

Keywords: legitimacy, collaborative governance, discourse analysis, dialectic legitimation

Procedia PDF Downloads 337
10700 IEP Curriculum to Include For-Credit University English Classes

Authors: Cheyne Kirkpatrick

Abstract:

In an attempt to make the university intensive English program more worthwhile for students, many English language programs are redesigning curriculum to offer for-credit English for Academic Purposes classes, sometimes marketed as “bridge” courses. These programs are designed to be accredited to national language standards, provide communicative language learning, and give students the opportunity to simultaneously earn university language credit while becoming proficient in academic English. This presentation will discuss the curriculum design of one such program in the United States at a large private university that created its own for-credit “bridge” program. The planning, development, piloting, teaching, and challenges of designing this type of curriculum will be presented along with the aspects of accreditation, communicative language learning, and integration within various university programs. Attendees will learn about how such programs are created and what types of objectives and outcomes are included in American EAP classes.

Keywords: IEP, AEP, Curriculum, CEFR, University Credit, Bridge

Procedia PDF Downloads 483
10699 Prioritizing the TQM Enablers and IT Resources in the ICT Industry: An AHP Approach

Authors: Suby Khanam, Faisal Talib, Jamshed Siddiqui

Abstract:

Total Quality Management (TQM) is a managerial approach that improves the competitiveness of the industry, meanwhile Information technology (IT) was introduced with TQM for handling the technical issues which is supported by quality experts for fulfilling the customers’ requirement. Present paper aims to utilise AHP (Analytic Hierarchy Process) methodology to priorities and rank the hierarchy levels of TQM enablers and IT resource together for its successful implementation in the Information and Communication Technology (ICT) industry. A total of 17 TQM enablers (nine) and IT resources (eight) were identified and partitioned into 3 categories and were prioritised by AHP approach. The finding indicates that the 17 sub-criteria can be grouped into three main categories namely organizing, tools and techniques, and culture and people. Further, out of 17 sub-criteria, three sub-criteria: Top management commitment and support, total employee involvement, and continuous improvement got highest priority whereas three sub-criteria such as structural equation modelling, culture change, and customer satisfaction got lowest priority. The result suggests a hierarchy model for ICT industry to prioritise the enablers and resources as well as to improve the TQM and IT performance in the ICT industry. This paper has some managerial implication which suggests the managers of ICT industry to implement TQM and IT together in their organizations to get maximum benefits and how to utilize available resources. At the end, conclusions, limitation, future scope of the study are presented.

Keywords: analytic hierarchy process, information technology, information and communication technology, prioritization, total quality management

Procedia PDF Downloads 349
10698 Image Multi-Feature Analysis by Principal Component Analysis for Visual Surface Roughness Measurement

Authors: Wei Zhang, Yan He, Yan Wang, Yufeng Li, Chuanpeng Hao

Abstract:

Surface roughness is an important index for evaluating surface quality, needs to be accurately measured to ensure the performance of the workpiece. The roughness measurement based on machine vision involves various image features, some of which are redundant. These redundant features affect the accuracy and speed of the visual approach. Previous research used correlation analysis methods to select the appropriate features. However, this feature analysis is independent and cannot fully utilize the information of data. Besides, blindly reducing features lose a lot of useful information, resulting in unreliable results. Therefore, the focus of this paper is on providing a redundant feature removal approach for visual roughness measurement. In this paper, the statistical methods and gray-level co-occurrence matrix(GLCM) are employed to extract the texture features of machined images effectively. Then, the principal component analysis(PCA) is used to fuse all extracted features into a new one, which reduces the feature dimension and maintains the integrity of the original information. Finally, the relationship between new features and roughness is established by the support vector machine(SVM). The experimental results show that the approach can effectively solve multi-feature information redundancy of machined surface images and provides a new idea for the visual evaluation of surface roughness.

Keywords: feature analysis, machine vision, PCA, surface roughness, SVM

Procedia PDF Downloads 212
10697 A Taxonomy of the Informational Content of Virtual Heritage Serious Games

Authors: Laurence C. Hanes, Robert J. Stone

Abstract:

Video games have reached a point of huge commercial success as well as wide familiarity with audiences both young and old. Much attention and research have also been directed towards serious games and their potential learning affordances. It is little surprise that the field of virtual heritage has taken a keen interest in using serious games to present cultural heritage information to users, with applications ranging from museums and cultural heritage institutions, to academia and research, to schools and education. Many researchers have already documented their efforts to develop and distribute virtual heritage serious games. Although attempts have been made to create classifications of the different types of virtual heritage games (somewhat akin to the idea of game genres), no formal taxonomy has yet been produced to define the different types of cultural heritage and historical information that can be presented through these games at a content level, and how the information can be manifested within the game. This study proposes such a taxonomy. First the informational content is categorized as heritage or historical, then further divided into tangible, intangible, natural, and analytical. Next, the characteristics of the manifestation within the game are covered. The means of manifestation, level of demonstration, tone, and focus are all defined and explained. Finally, the potential learning outcomes of the content are discussed. A demonstration of the taxonomy is then given by describing the informational content and corresponding manifestations within several examples of virtual heritage serious games as well as commercial games. It is anticipated that this taxonomy will help designers of virtual heritage serious games to think about and clearly define the information they are presenting through their games, and how they are presenting it. Another result of the taxonomy is that it will enable us to frame cultural heritage and historical information presented in commercial games with a critical lens, especially where there may not be explicit learning objectives. Finally, the results will also enable us to identify shared informational content and learning objectives between any virtual heritage serious and/or commercial games.

Keywords: informational content, serious games, taxonomy, virtual heritage

Procedia PDF Downloads 367
10696 Methods of Variance Estimation in Two-Phase Sampling

Authors: Raghunath Arnab

Abstract:

The two-phase sampling which is also known as double sampling was introduced in 1938. In two-phase sampling, samples are selected in phases. In the first phase, a relatively large sample of size is selected by some suitable sampling design and only information on the auxiliary variable is collected. During the second phase, a sample of size is selected either from, the sample selected in the first phase or from the entire population by using a suitable sampling design and information regarding the study and auxiliary variable is collected. Evidently, two phase sampling is useful if the auxiliary information is relatively easy and cheaper to collect than the study variable as well as if the strength of the relationship between the variables and is high. If the sample is selected in more than two phases, the resulting sampling design is called a multi-phase sampling. In this article we will consider how one can use data collected at the first phase sampling at the stages of estimation of the parameter, stratification, selection of sample and their combinations in the second phase in a unified setup applicable to any sampling design and wider classes of estimators. The problem of the estimation of variance will also be considered. The variance of estimator is essential for estimating precision of the survey estimates, calculation of confidence intervals, determination of the optimal sample sizes and for testing of hypotheses amongst others. Although, the variance is a non-negative quantity but its estimators may not be non-negative. If the estimator of variance is negative, then it cannot be used for estimation of confidence intervals, testing of hypothesis or measure of sampling error. The non-negativity properties of the variance estimators will also be studied in details.

Keywords: auxiliary information, two-phase sampling, varying probability sampling, unbiased estimators

Procedia PDF Downloads 588
10695 Research on Dynamic Practical Byzantine Fault Tolerance Consensus Algorithm

Authors: Cao Xiaopeng, Shi Linkai

Abstract:

The practical Byzantine fault-tolerant algorithm does not add nodes dynamically. It is limited in practical application. In order to add nodes dynamically, Dynamic Practical Byzantine Fault Tolerance Algorithm (DPBFT) was proposed. Firstly, a new node sends request information to other nodes in the network. The nodes in the network decide their identities and requests. Then the nodes in the network reverse connect to the new node and send block information of the current network. The new node updates information. Finally, the new node participates in the next round of consensus, changes the view and selects the master node. This paper abstracts the decision of nodes into the undirected connected graph. The final consistency of the graph is used to prove that the proposed algorithm can adapt to the network dynamically. Compared with the PBFT algorithm, DPBFT has better fault tolerance and lower network bandwidth.

Keywords: practical byzantine, fault tolerance, blockchain, consensus algorithm, consistency analysis

Procedia PDF Downloads 130