Search results for: electronic exchange of information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13280

Search results for: electronic exchange of information

11720 Risk Factors for Postoperative Fever in Patients Undergoing Lumbar Fusion

Authors: Bang Haeyong

Abstract:

Purpose: The objectives of this study were to determine the prevalence, incidence, and risk factors for postoperative fever after lumbar fusion. Methods: This study was a retrospective chart review of 291 patients who underwent lumbar fusion between March 2015 and February 2016 at the Asan Medical Center. Information was extracted from electronic medical records. Postoperative fever was measured at Tmax > 37.7 ℃ and Tmax > 38.3 ℃. The presence of postoperative fever, blood culture, urinary excretion, and/or chest x-ray were evaluated. Patients were evaluated for infection after lumbar fusion. Results: We found 222 patients (76.3%) had a postoperative temperature of 37.7 ℃, and 162 patients (55.7%) had a postoperative temperature of 38.3 ℃ or higher. The percentage of febrile patients trended down following the mean 1.8days (from the first postoperative day to seventh postoperative day). Infection rate was 9 patients (3.1%), respiratory virus (1.7%), urinary tract infection (0.3%), phlebitis (0.3%), and surgical site infection (1.4%). There was no correlation between Tmax > 37.7℃ or Tmax > 38.3℃, and timing of fever, positive blood or urine cultures, pneumonia, or surgical site infection. Risk factors for increased postoperative fever following surgery were confirmed to be delay of defecation (OR=1.37, p=.046), and shorten of remove drainage (OR=0.66, p=.037). Conclusions: The incidence of fever was 76.3% after lumbar fusion and the drainage time was faster in the case of fever. It was thought that the bleeding was absorbed at the operation site and fever occurred. The prevalence of febrile septicemia was higher in patients with long bowel movements before surgery than after surgery. Clinical symptoms should be considered because postoperative fever cannot be determined by fever alone because fever and infection are not significant.

Keywords: lumbar surgery, fever, postoperative, risk factor

Procedia PDF Downloads 249
11719 Synthesis and Characterization of the Carbon Spheres Built Up from Reduced Graphene Oxide

Authors: Takahiro Saida, Takahiro Kogiso, Takahiro Maruyama

Abstract:

The ordered structural carbon (OSC) material is expected to apply to the electrode of secondary batteries, the catalyst supports, and the biomaterials because it shows the low substance-diffusion resistance by its uniform pore size. In general, the OSC material is synthesized using the template material. Changing size and shape of this template provides the pore size of OSC material according to the purpose. Depositing the oxide nanosheets on the polymer sphere template by the layer by layer (LbL) method was reported as one of the preparation methods of OSC material. The LbL method can provide the controlling thickness of structural wall without the surface modification. When the preparation of the uniform carbon sphere prepared by the LbL method which composed of the graphene oxide wall and the polymethyl-methacrylate (PMMA) core, the reduction treatment will be the important object. Since the graphene oxide has poor electron conductivity due to forming a lot of functional groups on the surface, it could be hard to apply to the electrode of secondary batteries and the catalyst support of fuel cells. In this study, the graphene oxide wall of carbon sphere was reduced by the thermal treatment under the vacuum conditions, and its crystalline structure and electronic state were characterized. Scanning electron microscope images of the carbon sphere after the heat treatment at 300ºC showed maintaining sphere shape, but its shape was collapsed with increasing the heating temperature. In this time, the dissolution rate of PMMA core and the reduction rate of graphene oxide were proportionate to heating temperature. In contrast, extending the heating time was conducive to the conservation of the sphere shape. From results of X-ray photoelectron spectroscopy analysis, its electronic state of the surface was indicated mainly sp² carbon. From the above results, we succeeded in the synthesis of the sphere structure composed by the reduction graphene oxide.

Keywords: carbon sphere, graphene oxide, reduction, layer by layer

Procedia PDF Downloads 141
11718 Motor Vehicle Accidents During Pregnancy: Analysis of Maternal and Fetal Outcome at a University Hospital

Authors: Manjunath Attibele, Alsawafi Manal, Al Dughaishi Tamima

Abstract:

Introduction: The purpose of this study was to describe the clinical characteristics and types of mechanisms of injuries caused by Motor vehicle accidents (MVA) during pregnancy. To analyze the patterns of accidents during pregnancy and its adverse consequences on both maternal and fetal outcome. Methods: This was a retrospective cohort study on pregnant patients who met with MVAs The study period was from January 1, 2010, to December 31, 2019. All relevant data were retrieved from electronic patients’ records from the hospital information system and from the antenatal ward admission register Results: Out of 168 women who had motor vehicle accidents during the study period, of which, 39 (23.2%) women during pregnancy. Twenty-one (53.8%) women were over 30 years old. Thirty-five (89.7%) women were Omanis, and 27 (69.2%) were in their third trimester. Twenty-three (59%) of accidents happened at night, and 31 (79.5%) of them happened on a weekday. Twenty-two (56.4%) of women were driving themselves, and 24 (61.5%) of them were not using any seatbelt. Accident related abdominal & back pain was seen in 23(59%) women. Regarding the outcome of pregnancy, 23 (74.2%) had a normal vaginal delivery. The mean accident to delivery interval was 7 weeks. Thirty (96.7%) of involved newborns were relatively healthy. One woman (3.2%) had a ruptured uterusleading to fetal death (3.2%). Conclusion: This study showed that the incidence of motor vehicle accidents during pregnancy is around 23.2% . Majority had trauma-associated pain. One serious injury to a woman causing a ruptured uterus which lead to fetal death. Majority of involved newborns were relatively healthy. No reported maternal death.

Keywords: motor vehicle accidents, pregnancy, maternal outcome, fetal outcome

Procedia PDF Downloads 92
11717 Gender Analysis of the Influence of Sources of Information on the Adoption of Tenera Oil Palm Technology among Smallholder Farmers in Edo State, Nigeria

Authors: Cornelius Michael Ekenta

Abstract:

The research made a gender comparative analysis of the influence of sources of information on the adoption of tenera improved oil palm technology. Purposive, stratified and random sampling techniques were used to sample a total of 292 farmers (155 males and 137 females) for the study. Structured questionnaire was used to obtain primary data used for analysis. Obtained data were analyzed with descriptive statistics and Logit regressions analysis. Findings revealed that radio, extension office, television and farmers’ group were the most preferred sources of information by the farmers both male and female. Also, males perceived information from radio (92%) and farmers’ group (84%) to be available and information from Research Institutes as credible (95%). Similarly, the female perceived information from Research Institutes to be reliable (70%). The study showed that 38% of men adopted the variety, 25% of the women adopted the variety while 32% of both men and women adopted the variety in the study area. Regressions analysis indicated that radio, extension office, television, farmers’ group and research institute were significant at 0.5% of probability for men and female farmers. The study concluded that the adoption of tenera improved oil palm technology was low among male and female farmers though men adopted more than the women. It was recommended therefore that Agricultural Development Programme (ADP) in other states of the country should partner with their state radio and television stations to broadcast agricultural programmes periodically to ensure efficient dissemination of agricultural information to the farmers.

Keywords: analysis, Edo, gender, influence, information, sources, tenera

Procedia PDF Downloads 111
11716 Developing Motorized Spectroscopy System for Tissue Scanning

Authors: Tuba Denkceken, Ayse Nur Sarı, Volkan Ihsan Tore, Mahmut Denkceken

Abstract:

The aim of the presented study was to develop a newly motorized spectroscopy system. Our system is composed of probe and motor parts. The probe part consists of bioimpedance and fiber optic components that include two platinum wires (each 25 micrometer in diameter) and two fiber cables (each 50 micrometers in diameter) respectively. Probe was examined on tissue phantom (polystyrene microspheres with different diameters). In the bioimpedance part of the probe current was transferred to the phantom and conductivity information was obtained. Adjacent two fiber cables were used in the fiber optic part of the system. Light was transferred to the phantom by fiber that was connected to the light source and backscattered light was collected with the other adjacent fiber for analysis. It is known that the nucleus expands and the nucleus-cytoplasm ratio increases during the cancer progression in the cell and this situation is one of the most important criteria for evaluating the tissue for pathologists. The sensitivity of the probe to particle (nucleus) size in phantom was tested during the study. Spectroscopic data obtained from our system on phantom was evaluated by multivariate statistical analysis. Thus the information about the particle size in the phantom was obtained. Bioimpedance and fiber optic experiments results which were obtained from polystyrene microspheres showed that the impedance value and the oscillation amplitude were increasing while the size of particle was enlarging. These results were compatible with the previous studies. In order to motorize the system within the motor part, three driver electronic circuits were designed primarily. In this part, supply capacitors were placed symmetrically near to the supply inputs which were used for balancing the oscillation. Female capacitors were connected to the control pin. Optic and mechanic switches were made. Drivers were structurally designed as they could command highly calibrated motors. It was considered important to keep the drivers’ dimension as small as we could (4.4x4.4x1.4 cm). Then three miniature step motors were connected to each other along with three drivers. Since spectroscopic techniques are quantitative methods, they yield more objective results than traditional ones. In the future part of this study, it is planning to get spectroscopic data that have optic and impedance information from the cell culture which is normal, low metastatic and high metastatic breast cancer. In case of getting high sensitivity in differentiated cells, it might be possible to scan large surface tissue areas in a short time with small steps. By means of motorize feature of the system, any region of the tissue will not be missed, in this manner we are going to be able to diagnose cancerous parts of the tissue meticulously. This work is supported by The Scientific and Technological Research Council of Turkey (TÜBİTAK) through 3001 project (115E662).

Keywords: motorized spectroscopy, phantom, scanning system, tissue scanning

Procedia PDF Downloads 191
11715 Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance

Authors: Kehinde Agbele, Longe Olumide, Daniel Ekong, Dele Seluwa, Akintoye Onamade

Abstract:

One major problem of most existing information retrieval systems (IRS) is that they provide even access and retrieval results to individual users specially based on the query terms user issued to the system. When using IRS, users often present search queries made of ad-hoc keywords. It is then up to IRS to obtain a precise representation of user’s information need, and the context of the information. In effect, the volume and range of the Internet documents is growing exponentially and consequently causes difficulties for a user to obtain information that precisely matches the user interest. Diverse combination techniques are used to achieve the specific goal. This is due, firstly, to the fact that users often do not present queries to IRS that optimally represent the information they want, and secondly, the measure of a document's relevance is highly subjective between diverse users. In this paper, we address the problem by investigating the optimization of IRS to individual information needs in order of relevance. The paper addressed the development of algorithms that optimize the ranking of documents retrieved from IRS. This paper addresses this problem with a two-fold approach in order to retrieve domain-specific documents. Firstly, the design of context of information. The context of a query determines retrieved information relevance using personalization and context-awareness. Thus, executing the same query in diverse contexts often leads to diverse result rankings based on the user preferences. Secondly, the relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. In this paper, the use of evolutionary algorithms is incorporated to improve the effectiveness of IRS. A context-based information retrieval system that learns individual needs from user-provided relevance feedback is developed whose retrieval effectiveness is evaluated using precision and recall metrics. The results demonstrate how to use attributes from user interaction behavior to improve the IR effectiveness.

Keywords: context, document relevance, information retrieval, personalization, user search behaviors

Procedia PDF Downloads 463
11714 Re-Defining Academic Literacy: An Information Literacy Approach to Helping Chinese International Students Succeed in American Colleges

Authors: Yi Ding

Abstract:

With the upsurge of Chinese international students in American higher education, serious academic problems Chinese international students are suffering from are also striking. While most practices and research in higher education focus on the role of professors, writing centers, and tutoring centers to help international students succeed in college, this research study focuses on a more fundamental skill that is neglected in most conversations: information literacy, which is usually addressed by academic librarians. Transitioning from an East-Asian, developing educational system that values authority, set knowledge more than independent thinking, scholarly conversation, Chinese international students need support from academic librarians to acquire information literacy, which is crucial to understand expectations of a Western academic setting and thus to succeed in college. This research study illustrates how academic librarians can play an integral role in helping Chinese international students acclimate to the expectations of American higher education by teaching information literacy as academic literacy unique to the Western academic setting. Six keys of information literacy put forward by Association of College and Research Libraries, which are 'Authority Is Constructed and Contextual', 'Information Creation as a Process', 'Information Has Value', 'Research as Inquiry', 'Scholarship as Conversation', and 'Searching as Strategic Exploration', are analyzed through the lens of Chinese educational system and students’ backgrounds. Based on the analysis as well as results from surveys and interviews among academic librarians, professors, and international students, this research further examines current practices from a wide range of academic libraries and finally, provides evidence-based recommendations for academic librarians to use information literacy instruction to help Chinese international students succeed in American higher education.

Keywords: academic librarians, Chinese international students, information literacy, student success

Procedia PDF Downloads 243
11713 TiO₂ Deactivation Process during Photocatalytic Ethanol Degradation in the Gas Phase

Authors: W. El-Alami, J. Araña, O. González Díaz, J. M. Doña Rodríguez

Abstract:

The efficiency of the semiconductor TiO₂ needs to be improved to be an effective tool for pollutant removal. To improve the efficiency of this semiconductor, it is necessary to deepen the knowledge of the processes that take place on its surface. In this sense, the deactivation of the catalyst is one of the aspects considered relevant. In order to study this point, the processes of deactivation of TiO₂ during the gas phase degradation of ethanol have been studied. For this, catalysts with only the anatase phase (SA and PC100) and catalysts with anatase and rutile phases (P25 and P90) have been selected. In order to force the deactivation processes, different cycles have been performed, adding ethanol gas but avoiding the degradation of acetates to determine their effect on the process. The surface concentration of fluorine on the catalysts was semi-quantitatively determined by EDAX analysis. The photocatalytic experiments were done with four commercial catalysts (P25, SA, P90, and PC100) and the two fluoride catalysts indicated above. The interaction and photocatalytic degradation of ethanol were followed by Fourier transform infrared spectroscopy (FTIR). EDAX analysis has revealed the presence of sodium on the surface of fluorinated catalysts. In FTIR studies, it has been observed that the acetates adsorbed on the anatase phase in P25 and P90 give rise to electron transfer to surface traps that modify the electronic states of the semiconductor. These deactivation studies have also been carried out with fluorinated P25 and SA catalysts (F-P25 and F-SA) which have observed similar electron transfers but in the opposite direction during illumination. In these materials, it has been observed that the electrons present in the surface traps, as a consequence of the interaction Ti-F, react with the holes, causing a change in the electronic states of the semiconductor. In this way, deactivated states of these materials have been detected by different electron transfer routes. It has been identified that acetates produced from the degradation of ethanol in P25 and P90 are probably hydrated on the surface of the rutile phase. In the catalysts with only the anatase phase (SA and PC100), the deactivation is immediate if the acetates are not removed before adsorbing ethanol again. In F-P25 and F-SA has been observed that the acetates formed react with the sodium ions present on the surface and not with the Ti atoms because they are interacting with the fluorine.

Keywords: photocatalytic degradation, ethanol, TiO₂, deactivation process, F-P25

Procedia PDF Downloads 74
11712 AI and the Future of Misinformation: Opportunities and Challenges

Authors: Noor Azwa Azreen Binti Abd. Aziz, Muhamad Zaim Bin Mohd Rozi

Abstract:

Moving towards the 4th Industrial Revolution, artificial intelligence (AI) is now more popular than ever. This subject is gaining significance every day and is continually expanding, often merging with other fields. Instead of merely being passive observers, there are benefits to understanding modern technology by delving into its inner workings. However, in a world teeming with digital information, the impact of AI on the spread of disinformation has garnered significant attention. The dissemination of inaccurate or misleading information is referred to as misinformation, posing a serious threat to democratic society, public debate, and individual decision-making. This article delves deep into the connection between AI and the dissemination of false information, exploring its potential, risks, and ethical issues as AI technology advances. The rise of AI has ushered in a new era in the dissemination of misinformation as AI-driven technologies are increasingly responsible for curating, recommending, and amplifying information on online platforms. While AI holds the potential to enhance the detection and mitigation of misinformation through natural language processing and machine learning, it also raises concerns about the amplification and propagation of false information. AI-powered deepfake technology, for instance, can generate hyper-realistic videos and audio recordings, making it increasingly challenging to discern fact from fiction.

Keywords: artificial intelligence, digital information, disinformation, ethical issues, misinformation

Procedia PDF Downloads 92
11711 A Corpus-Based Analysis of "MeToo" Discourse in South Korea: Coverage Representation in Korean Newspapers

Authors: Sun-Hee Lee, Amanda Kraley

Abstract:

The “MeToo” movement is a social movement against sexual abuse and harassment. Though the hashtag went viral in 2017 following different cultural flashpoints in different countries, the initial response was quiet in South Korea. This radically changed in January 2018, when a high-ranking senior prosecutor, Seo Ji-hyun, gave a televised interview discussing being sexually assaulted by a colleague. Acknowledging public anger, particularly among women, on the long-existing problems of sexual harassment and abuse, the South Korean media have focused on several high-profile cases. Analyzing the media representation of these cases is a window into the evolving South Korean discourse around “MeToo.” This study presents a linguistic analysis of “MeToo” discourse in South Korea by utilizing a corpus-based approach. The term corpus (pl. corpora) is used to refer to electronic language data, that is, any collection of recorded instances of spoken or written language. A “MeToo” corpus has been collected by extracting newspaper articles containing the keyword “MeToo” from BIGKinds, big data analysis, and service and Nexis Uni, an online academic database search engine, to conduct this language analysis. The corpus analysis explores how Korean media represent accusers and the accused, victims and perpetrators. The extracted data includes 5,885 articles from four broadsheet newspapers (Chosun, JoongAng, Hangyore, and Kyunghyang) and 88 articles from two Korea-based English newspapers (Korea Times and Korea Herald) between January 2017 and November 2020. The information includes basic data analysis with respect to keyword frequency and network analysis and adds refined examinations of select corpus samples through naming strategies, semantic relations, and pragmatic properties. Along with the exponential increase of the number of articles containing the keyword “MeToo” from 104 articles in 2017 to 3,546 articles in 2018, the network and keyword analysis highlights ‘US,’ ‘Harvey Weinstein’, and ‘Hollywood,’ as keywords for 2017, with articles in 2018 highlighting ‘Seo Ji-Hyun, ‘politics,’ ‘President Moon,’ ‘An Ui-Jeong, ‘Lee Yoon-taek’ (the names of perpetrators), and ‘(Korean) society.’ This outcome demonstrates the shift of media focus from international affairs to domestic cases. Another crucial finding is that word ‘defamation’ is widely distributed in the “MeToo” corpus. This relates to the South Korean legal system, in which a person who defames another by publicly alleging information detrimental to their reputation—factual or fabricated—is punishable by law (Article 307 of the Criminal Act of Korea). If the defamation occurs on the internet, it is subject to aggravated punishment under the Act on Promotion of Information and Communications Network Utilization and Information Protection. These laws, in particular, have been used against accusers who have publicly come forward in the wake of “MeToo” in South Korea, adding an extra dimension of risk. This corpus analysis of “MeToo” newspaper articles contributes to the analysis of the media representation of the “MeToo” movement and sheds light on the shifting landscape of gender relations in the public sphere in South Korea.

Keywords: corpus linguistics, MeToo, newspapers, South Korea

Procedia PDF Downloads 223
11710 Information Communication Technology (ICT) Using Management in Nursing College under the Praboromarajchanok Institute

Authors: Suphaphon Udomluck, Pannathorn Chachvarat

Abstract:

Information Communication Technology (ICT) using management is essential for effective decision making in organization. The Concerns Based Adoption Model (CBAM) was employed as the conceptual framework. The purposes of the study were to assess the situation of Information Communication Technology (ICT) using management in College of Nursing under the Praboromarajchanok Institute. The samples were multi – stage sampling of 10 colleges of nursing that participated include directors, vice directors, head of learning groups, teachers, system administrator and responsible for ICT. The total participants were 280; the instrument used were questionnaires that include 4 parts, general information, Information Communication Technology (ICT) using management, the Stage of concern Questionnaires (SoC), and the Levels of Use (LoU) ICT Questionnaires respectively. Reliability coefficients were tested; alpha coefficients were 0.967for Information Communication Technology (ICT) using management, 0.884 for SoC and 0.945 for LoU. The data were analyzed by frequency, percentage, mean, standard deviation, Pearson Product Moment Correlation and Multiple Regression. They were founded as follows: The high level overall score of Information Communication Technology (ICT) using management and issue were administration, hardware, software, and people. The overall score of the Stage of concern (SoC)ICTis at high level and the overall score of the Levels of Use (LoU) ICTis at moderate. The Information Communication Technology (ICT) using management had the positive relationship with the Stage of concern (SoC)ICTand the Levels of Use (LoU) ICT(p < .01). The results of Multiple Regression revealed that administration hardwear, software and people ware could predict SoC of ICT (18.5%) and LoU of ICT (20.8%).The factors that were significantly influenced by SoCs were people ware. The factors that were significantly influenced by LoU of ICT were administration hardware and people ware.

Keywords: information communication technology (ICT), management, the concerns-based adoption model (CBAM), stage of concern(SoC), the levels of use(LoU)

Procedia PDF Downloads 318
11709 The Role of Social Media on Political Behaviour in Malaysia

Authors: Ismail Sualman, Mohd Khairuddin Othman

Abstract:

General Election has been the backbone of democracy that permits people to choose their representatives as they deem fit. The support preferences of the voter differ from one to another, particularly in a plural society like Malaysia. The turning up of high numbers of young voters during the Malaysia 14th General Election has been said to have been caused by social media including Facebook, Twitter, WhatsApp, Instagram, YouTube and Telegram, WeChat and SMS/MMs. It has been observed that, besides using social media as an interaction tool among social friends, it is also an important source of information to know about issues, politics and politicians. This paper exhibits the role of social media in providing political information to young voters, before an election and during the election campaign. This study examines how this information is being translated into election support. A total of 799 Malay young respondents in Selangor have been surveyed and interviewed. This study revealed that social media has become the source of political information among Malay young voters. This research suggested that social media had a significant effect on the support during the election. Social media plays an important role in carrying information such as current issues, voting trends, candidate imagery and matters that may influence the view of young voters. The information obtained from social media has been translated into a voting decision.

Keywords: social media, political behaviour, voters’ choice, election.

Procedia PDF Downloads 146
11708 The Association between ABO-Rh Blood Groups and the Risk of COVID-19 Infection

Authors: Abbas Sedighinejad, Hossein Khoshrang, Mohammad Haghighi, Ali Ashraf, Mostafa Saeedinia, Gelareh Biazar, Zahra Atrkarroushan, Mahdi Ajdadi

Abstract:

Background: Coronavirus disease 2019 (COVID-19) as an alarming attack broke out in China and spread rapidly worldwide. Objectives: Based on a theory indicating the correlation between some viral diseases and blood types, we investigated the relationship between blood groups and coronavirus infection risk in Guilan Province, Iran. Methods: Retrospectively, all the files of the admitted patients with suspected COVID-19, in peak conditions of the disease between March 1 and May 30, 2020, were reviewed using the Census method. The required data, including epidemiological and clinical information and outcomes, were obtained from electronic records. Results: A total of 249 cases were analyzed, of whom 109 were collected from governmental centers, and the rest were collected from private hospitals. The most common co-morbidity was diabetes with 71 (37.6%) cases and the main symptom at the admission time was dyspnea with 170 (24.5%) cases. Of the total patients, 155 (62.2%) were discharged, and the rest died. The most common blood group among our patients was O Rh-positive with 91 (36.5%) cases. No meaningful correlation was found between outcomes and blood groups in terms of ABO types (P = 0.89) or Rh factor (P = 0.456). The Rh-positive proportion was significantly higher in the COVID-19 cases than in the general population (P = 0.038). Conclusions: We found that the Rh-positive proportion was significantly higher in the COVID-19 cases than in the healthy individuals. However, no correlation was observed between the groups regarding ABO typing.

Keywords: ABO blood group, COVID 19, association, personal protection

Procedia PDF Downloads 66
11707 Efficient GIS Based Public Health System for Disease Prevention

Authors: K. M. G. T. R. Waidyarathna, S. M. Vidanagamachchi

Abstract:

Public Health System exists in Sri Lanka has a satisfactory complete information flow when compared to other systems in developing countries. The availability of a good health information system contributed immensely to achieve health indices that are in line with the developed countries like US and UK. The health information flow at the moment is completely paper based. In Sri Lanka, the fields like banking, accounting and engineering have incorporated information and communication technology to the same extent that can be observed in any other country. The field of medicine has behind those fields throughout the world mainly due to its complexity, issues like privacy, confidentially and lack of people with knowledge in both fields of Information Technology (IT) and Medicine. Sri Lanka’s situation is much worse and the gap is rapidly increasing with huge IT initiatives by private-public partnerships in all other countries. The major goal of the framework is to support minimizing the spreading diseases. To achieve that a web based framework should be implemented for this application domain with web mapping. The aim of this GIS based public health system is a secure, flexible, easy to maintain environment for creating and maintaining public health records and easy to interact with relevant parties.

Keywords: DHIS2, GIS, public health, Sri Lanka

Procedia PDF Downloads 563
11706 Evaluating the Satisfaction of Chinese Consumers toward Influencers at TikTok

Authors: Noriyuki Suyama

Abstract:

The progress and spread of digitalization have led to the provision of a variety of new services. The recent progress in digitization can be attributed to rapid developments in science and technology. First, the research and diffusion of artificial intelligence (AI) has made dramatic progress. Around 2000, the third wave of AI research, which had been underway for about 50 years, arrived. Specifically, machine learning and deep learning were made possible in AI, and the ability of AI to acquire knowledge, define the knowledge, and update its own knowledge in a quantitative manner made the use of big data practical even for commercial PCs. On the other hand, with the spread of social media, information exchange has become more common in our daily lives, and the lending and borrowing of goods and services, in other words, the sharing economy, has become widespread. The scope of this trend is not limited to any industry, and its momentum is growing as the SDGs take root. In addition, the Social Network Service (SNS), a part of social media, has brought about the evolution of the retail business. In the past few years, social network services (SNS) involving users or companies have especially flourished. The People's Republic of China (hereinafter referred to as "China") is a country that is stimulating enormous consumption through its own unique SNS, which is different from the SNS used in developed countries around the world. This paper focuses on the effectiveness and challenges of influencer marketing by focusing on the influence of influencers on users' behavior and satisfaction with Chinese SNSs. Specifically, Conducted was the quantitative survey of Tik Tok users living in China, with the aim of gaining new insights from the analysis and discussions. As a result, we found several important findings and knowledge.

Keywords: customer satisfaction, social networking services, influencer marketing, Chinese consumers’ behavior

Procedia PDF Downloads 89
11705 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 292
11704 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 288
11703 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 266
11702 The Impact of Political Leadership on Cameroon’s Economic Development From 2000 to 2023

Authors: Okpu Enoh Ndip Nkongho

Abstract:

The type of political leadership in place impacts a state's economic development or underdevelopment directly and indirectly. One of the main challenges to Cameroon's economic development may be ineffective or misguided political leadership. The economy of the Cameroon state has declined significantly due to a number of factors, including a lack of effective and feasible economic policies, a reliance on crude oil that is excessive, tribal politics, the threat of insurgency, bribery, and corruption, violations of human rights, neglect of other sectors like science, technology, education, and transportation, and a careless attitude on the part of the administrators toward the general public. As a result, the standard of living has decreased, foreign exchange has decreased, and the value of the Cameroonian currency has depreciated. Therefore, from 2000 to 2023, this paper focused on the relationship between political leadership and economic development in Cameroon and offered suggestions for improving political leadership that will, in turn, lead to the country's economy getting back on track. The study employed a qualitative technique, with the framework for the investigation derived from the trait theory of leadership. According to the information provided above, the paper was able to conclude that there is a lack of cooperation between the three branches of government in Cameroon. This is shown in situations when one branch operates independently of the others and refuses to function as a backup when needed. The study recommended that the Executive collaborate closely with the National Assembly to speed action on some key legislation required to stimulate economic development. On the other hand, there is a need for more clarity and consistency in the government's policy orientation. There is no doubt that our current economic troubles are at least partially the result of a lack of economic policy leadership and confidence.

Keywords: politics, leadership, economic, development, Cameroon

Procedia PDF Downloads 53
11701 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information

Authors: H. Moalla, A. Frikha

Abstract:

Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.

Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method

Procedia PDF Downloads 166
11700 Hand in Hand with Indigenous People Worldwide through the Discovery of Indigenous Entrepreneurial Models: A Systematic Literature Review of International Indigenous Entrepreneurship

Authors: Francesca Croce

Abstract:

Governmental development strategies aimed at entrepreneurship as a major resource for economic development and poverty reduction of indigenous people. As initiatives and programs are local based, there is a need to better understand the contextual factors of indigenous entrepreneurial models. The purpose of this paper is, therefore, to analyze and integrated the indigenous entrepreneurship literature in order to identify the main models of indigenous entrepreneurship. To answer this need, a systematic literature review was conducted. Relevant articles were identified in selected electronic databases (ABI/Inform Global, Business Source Premier, Web of Science; International Bibliography of the Social Sciences, Academic Search, Sociological Abstract, Entrepreneurial Studies Sources and Bibliography of Native North America) and in selected electronic review. Beginning to 1st January 1995 (first International Day of the World’s Indigenous People), 59 academic articles were selected from 1411. Through systematic analysis of the cultural, social and organizational variables, the paper highlights that a typology of indigenous entrepreneurial models is possible thought the concept of entrepreneurial ecosystem, which includes the geographical position and the environment of the indigenous communities. The results show three models of indigenous entrepreneurship: the urban indigenous entrepreneurship, the semi-urban indigenous entrepreneurship, and rural indigenous entrepreneurship. After the introduction, the paper is organized as follows. In the first part theoretical and practical needs of a systematic literature review on indigenous entrepreneurship are provided. In the second part, the methodology, the selection process and evaluation of the articles are explained. In the third part, findings are presented and each indigenous entrepreneurial model characteristics are discussed. The results of this study bring a new theorization about indigenous entrepreneurship and may be useful for scientists in the field in search of overcoming the cognitive border of Indigenous business models still too little known. Also, the study is addressed to policy makers in charge of indigenous entrepreneurial development strategies more focused on contextual factors studies.

Keywords: community development, entrepreneurial ecosystem, indigenous entrepreneurship model, indigenous people, systematic literature review

Procedia PDF Downloads 280
11699 The Impact of Audit Committee Industry Expertise on Internal Audit Function

Authors: Abdulaziz Alzeban

Abstract:

This study examines whether internal audit function is indeed greater when audit committee members have industry expertise combined with auditing expertise. Data from a survey of 64 chief internal auditors from companies registered on the Saudi Stock Exchange TADAWL, provides results that suggest that when audit committee members possess both industry expertise and auditing expertise, the committee’s role in improving the quality of internal audit is enhanced. This outcome is concluded as one that can be generalized beyond the Saudi Arabian context.

Keywords: internal audit, audit committee, industry expertise, function

Procedia PDF Downloads 357
11698 Financial Information Transparency on Investor Behavior in the Private Company in Dusit Area

Authors: Yosapon Kidsuntad

Abstract:

The purpose of this dissertation was to explore the relationship between financial transparency and investor behavior. In carrying out this inquiry, the researcher used a questionnaire was utilized as a tool to collect data. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. The results revealed that there are significant differences investor perceptions of the different dimensions of financial information transparency. These differences correspond to demographical variables with the exception of the educational level variable. It was also found that there are relationships between investor perceptions of the dimensions of financial information transparency and investor behavior in the private company in Dusit Area. Finally, the researcher also found that there are differences in investor behavior corresponding to different categories of investor experience.

Keywords: financial information transparency, investor behavior, private company, Dusit Area

Procedia PDF Downloads 330
11697 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 259
11696 A Vehicle Monitoring System Based on the LoRa Technique

Authors: Chao-Linag Hsieh, Zheng-Wei Ye, Chen-Kang Huang, Yeun-Chung Lee, Chih-Hong Sun, Tzai-Hung Wen, Jehn-Yih Juang, Joe-Air Jiang

Abstract:

Air pollution and climate warming become more and more intensified in many areas, especially in urban areas. Environmental parameters are critical information to air pollution and weather monitoring. Thus, it is necessary to develop a suitable air pollution and weather monitoring system for urban areas. In this study, a vehicle monitoring system (VMS) based on the IoT technique is developed. Cars are selected as the research tool because it can reach a greater number of streets to collect data. The VMS can monitor different environmental parameters, including ambient temperature and humidity, and air quality parameters, including PM2.5, NO2, CO, and O3. The VMS can provide other information, including GPS signals and the vibration information through driving a car on the street. Different sensor modules are used to measure the parameters and collect the measured data and transmit them to a cloud server through the LoRa protocol. A user interface is used to show the sensing data storing at the cloud server. To examine the performance of the system, a researcher drove a Nissan x-trail 1998 to the area close to the Da’an District office in Taipei to collect monitoring data. The collected data are instantly shown on the user interface. The four kinds of information are provided by the interface: GPS positions, weather parameters, vehicle information, and air quality information. With the VMS, users can obtain the information regarding air quality and weather conditions when they drive their car to an urban area. Also, government agencies can make decisions on traffic planning based on the information provided by the proposed VMS.

Keywords: LoRa, monitoring system, smart city, vehicle

Procedia PDF Downloads 416
11695 Evaluation of Published Materials in Meeting the Information Needs of Students in Three Selected College Libraries in Oyo State, Nigeria

Authors: Rafiat Olasumbo Akande

Abstract:

Most college libraries in Oyo State show signs of unhealthy collection practices like the preponderance of non-recent collections and indiscriminate acquisition of sub-standard books from hawkers. The objective of this study, therefore, is to determine the extent at which available published materials in those college libraries are able to meet both knowledge and information needs of students in those institutions. A descriptive survey was conducted among 18 librarians and 21 library officers in three colleges purposively selected for the exercise using simple sampling technique. In all, 279 questionnaires were administered and out of those 279 administered, 265 were returned and analyzed using Statistical Package for Social Science (SPSS). Three College Librarian were also interviewed. Findings from the study showed that due to the paucity of funds, obsolete materials, and sub-standard materials being procured from roadside book hawkers hinders the college libraries in meeting the information needs of the students in these college libraries. It then concluded that only when there is standard procedure for collection management and acquisition of library materials that the knowledge and information needs of the students could be met. The study recommends that students and curriculum review committee members from various departments should always be involved in determining materials needed by the library to meet students information needs and that institution authority must fund, monitor and ensure compliance with the acquisition policy in place in the college libraries.

Keywords: libraries, published materials, information needs, college, evaluation, students

Procedia PDF Downloads 167
11694 A Comparative Study of Approaches in User-Centred Health Information Retrieval

Authors: Harsh Thakkar, Ganesh Iyer

Abstract:

In this paper, we survey various user-centered or context-based biomedical health information retrieval systems. We present and discuss the performance of systems submitted in CLEF eHealth 2014 Task 3 for this purpose. We classify and focus on comparing the two most prevalent retrieval models in biomedical information retrieval namely: Language Model (LM) and Vector Space Model (VSM). We also report on the effectiveness of using external medical resources and ontologies like MeSH, Metamap, UMLS, etc. We observed that the LM based retrieval systems outperform VSM based systems on various fronts. From the results we conclude that the state-of-art system scores for MAP was 0.4146, P@10 was 0.7560 and NDCG@10 was 0.7445, respectively. All of these score were reported by systems built on language modeling approaches.

Keywords: clinical document retrieval, concept-based information retrieval, query expansion, language models, vector space models

Procedia PDF Downloads 320
11693 Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System

Authors: June-Jei Kuo, Yi-Chuan Hsieh

Abstract:

Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users.

Keywords: web-scale discovery system, discovery system, information system success model, flow theory, academic library

Procedia PDF Downloads 103
11692 Production of Human BMP-7 with Recombinant E. coli and B. subtilis

Authors: Jong Il Rhee

Abstract:

The polypeptide representing the mature part of human BMP-7 was cloned and efficiently expressed in Escherichia coli and Bacillus subtilis, which had a clear band for hBMP-7, a homodimeric protein with an apparent molecular weight of 15.4 kDa. Recombinant E.coli produced 111 pg hBMP-7/mg of protein hBMP-7 through IPTG induction. Recombinant B. subtilis also produced 350 pg hBMP-7/ml of culture medium. The hBMP-7 was purified in 2 steps using an FPLC system with an ion exchange column and a gel filtration column. The hBMP-7 produced in this work also stimulated the alkaline phosphatase (ALP) activity in a dose-dependent manner, i.e. 2.5- and 8.9-fold at 100 and 300 ng hBMP-7/ml, respectively, and showed intact biological activity.

Keywords: B. subtilis, E. coli, fermentation, hBMP-7

Procedia PDF Downloads 441
11691 Efficient Utilization of Biomass for Bioenergy in Environmental Control

Authors: Subir Kundu, Sukhendra Singh, Sumedha Ojha, Kanika Kundu

Abstract:

The continuous decline of petroleum and natural gas reserves and non linear rise of oil price has brought about a realisation of the need for a change in our perpetual dependence on the fossil fuel. A day to day increased consumption of crude and petroleum products has made a considerable impact on our foreign exchange reserves. Hence, an alternate resource for the conversion of energy (both liquid and gas) is essential for the substitution of conventional fuels. Biomass is the alternate solution for the present scenario. Biomass can be converted into both liquid as well as gaseous fuels and other feedstocks for the industries.

Keywords: bioenergy, biomass conversion, biorefining, efficient utilisation of night soil

Procedia PDF Downloads 406