Search results for: information and communication technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15742

Search results for: information and communication technologies

14092 Redundancy in Malay Morphology: School Grammar versus Corpus Grammar

Authors: Zaharani Ahmad, Nor Hashimah Jalaluddin

Abstract:

The aim of this paper is to examine and identify the issue of linguistic redundancy in two competing grammars of Malay, namely the school grammar and the corpus grammar. The former is a normative grammar which is formally and prescriptively taught in the classroom, whereas the latter is a descriptive grammar that is informally acquired and mastered by the students as native speakers of the language outside the classroom. Corpus grammar is depicted based on its actual used in natural occurring texts, as attested in the corpus. It is observed that the grammar taught in schools is incompatible with the grammar used in the corpus. For instance, a noun phrase containing nominal reduplicated form which denotes plurality (i.e. murid-murid ‘students’ which is derived from murid ‘student’) and a modifier categorized as quantifiers (i.e. semua ‘all’, seluruh ‘entire’, and kebanyakan ‘most’) is not acceptable in the school grammar because the formation (i.e. semua murid-murid ‘all the students’ kebanyakan pelajar-pelajar ‘most of the students’) is claimed to be redundant, and redundancy is prohibited in the grammar. Redundancy is generally construed as the property of speech and language by which more information is provided than is precisely required for the message to be understood, so that, if some information is omitted, the remaining information will still be sufficient for the message to be comprehended. Thus, the correct construction to be used is strictly the reduplicated form (i.e. murid-murid ‘students’) or the quantifier plus the root (i.e. semua murid ‘all the students’) with the intention that the grammatical meaning of plural is not repeated. Nevertheless, the so-called redundant form (i.e. kebanyakan pelajar-pelajar ‘most of the students’) is frequently used in the corpus grammar. This study shows that there are a number of redundant forms occur in the morphology of the language, particularly in affixation, reduplication and combination of both. Apparently, the so-called redundancy has grammatical and socio-cultural functions in communication that is to give emphasis and to stress the importance of the information delivered by the speakers or writers.

Keywords: corpus grammar, morphology, redundancy, school grammar

Procedia PDF Downloads 335
14091 Information Society-Education Space

Authors: Monica Lia

Abstract:

This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. Second step was to identify how information space intersects the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school). Interrelationship between the above-mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support for the family space, education and institutional space. In addition, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. However, this paper demonstrates that Informational space can be an enemy of the educational system or be support systems if we know the internal structure and mechanisms. We can make the Informational Space to work for accomplish the educational objectives.

Keywords: informational space, education, educational tool, social diagram, information, information structure, lessons

Procedia PDF Downloads 331
14090 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network

Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz

Abstract:

Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.

Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle

Procedia PDF Downloads 232
14089 Modeling the Impact of Controls on Information System Risks

Authors: M. Ndaw, G. Mendy, S. Ouya

Abstract:

Information system risk management helps to reduce or eliminate risk by implementing appropriate controls. In this paper, we propose a quantification model of controls impact on information system risks by automatizing the residual criticality estimation step of FMECA which is based on a inductive reasoning. For this, we defined three equations based on type and maturity of controls. For testing, the values obtained with the model were compared to estimated values given by interlocutors during different working sessions and the result is satisfactory. This model allows an optimal assessment of controls maturity and facilitates risk analysis of information system.

Keywords: information system, risk, control, FMECA method

Procedia PDF Downloads 348
14088 Social Aspects and Successfully Funding a Crowd-Funding Project: The Impact of Social Information

Authors: Peggy S. C. van Teunenbroek

Abstract:

Recently, philanthropic crowd-funding -the raising of external funding from a large audience via social networks or social media- emerged as a new funding instrument for the Dutch cultural sector. However, such philanthropic crowdfunding in the US and the Netherlands is less successful than any other form of crowdfunding. We argue that social aspects are an important stimulus in philanthropic crowd-funding since previous research has shown that crowdfunding is stimulated by something beyond financial merits. Put simply, crowd-funding seems to be a socially motivated activity. In this paper we focus on the effect of social information, described as information about the donation behavior of previous donors. Using a classroom experiment we demonstrated a positive effect of social information on the donation behavior in crowdfunding campaigns. Our study extends previous research by showing who is affected by social information and why, and highlights how social information can be used to stimulate individuals to donate more to crowdfunding projects.

Keywords: online donation behavior, philanthropic crowdfunding, social information, social influence, social motivation

Procedia PDF Downloads 400
14087 Sustainable Development of Adsorption Solar Cooling Machine

Authors: N. Allouache, W. Elgahri, A. Gahfif, M. Belmedani

Abstract:

Solar radiation is by far the largest and the most world’s abundant, clean and permanent energy source. The amount of solar radiation intercepted by the Earth is much higher than annual global energy use. The energy available from the sun is greater than about 5200 times the global world’s need in 2006. In recent years, many promising technologies have been developed to harness the sun's energy. These technologies help in environmental protection, economizing energy, and sustainable development, which are the major issues of the world in the 21st century. One of these important technologies is the solar cooling systems that make use of either absorption or adsorption technologies. The solar adsorption cooling systems are a good alternative since they operate with environmentally benign refrigerants that are natural, free from CFCs, and therefore they have a zero ozone depleting potential (ODP). A numerical analysis of thermal and solar performances of an adsorption solar refrigerating system using different adsorbent/adsorbate pairs, such as activated carbon AC35 and activated carbon BPL/Ammoniac; is undertaken in this study. The modeling of the adsorption cooling machine requires the resolution of the equation describing the energy and mass transfer in the tubular adsorber, that is the most important component of the machine. The Wilson and Dubinin- Astakhov models of the solid-adsorbat equilibrium are used to calculate the adsorbed quantity. The porous medium is contained in the annular space, and the adsorber is heated by solar energy. Effect of key parameters on the adsorbed quantity and on the thermal and solar performances are analysed and discussed. The performances of the system that depends on the incident global irradiance during a whole day depends on the weather conditions: the condenser temperature and the evaporator temperature. The AC35/methanol pair is the best pair comparing to the BPL/Ammoniac in terms of system performances.

Keywords: activated carbon-methanol pair, activated carbon-ammoniac pair, adsorption, performance coefficients, numerical analysis, solar cooling system

Procedia PDF Downloads 69
14086 Perception of Risks of the Telecommunication Towers in Malaysia: A Qualitative Inquiry

Authors: Y. Kamarulzaman, A. Madun, F. D. Yusop, N. Abdullah, N. K. Hoong

Abstract:

In 2011, the Malaysian Government has initiated a nationwide project called 1BestariNet which will adopt the using of technology in teaching and learning, resulting in the construction of telecommunication towers inside the public schools’ premise. Using qualitative approach, this study investigated public perception of risks associated with the project, particularly the telecommunication towers. Data collection involved observation and in-depth interviews with 22 individuals consist of a segment of public that was anxious about the risks of radio frequency electromagnetic field (RFEMF) which include two employees of telecommunication companies (telcos) and five employees of Government agencies. Observation of the location of the towers at 10 public schools, a public forum, and media reports provide valuable information in our analysis. The study finds that the main concern is related to the health risks. This study also shows that it is not easy for the Government to manage public perception mainly because it involves public trust. We find that risk perception is related with public trust, as well as the perceived benefits and level of knowledge. Efficient communication and continuous engagement with the local communities help to build and maintain public trust, reduce public fear and anxiety, hence mitigating the risk perception among the public.

Keywords: risk perception, risk communication, trust, telecommunication tower, radio frequency electromagnetic field (RFEMF)

Procedia PDF Downloads 316
14085 The Gasification of Fructose in Supercritical Water

Authors: Shyh-Ming Chern, H. Y. Cheng

Abstract:

Biomass is renewable and sustainable. As an energy source, it will not release extra carbon dioxide into the atmosphere. Hence, tremendous efforts have been made to develop technologies capable of transforming biomass into suitable forms of bio-fuel. One of the viable technologies is gasifying biomass in supercritical water (SCW), a green medium for reactions. While previous studies overwhelmingly selected glucose as a model compound for biomass, the present study adopted fructose for the sake of comparison. The gasification of fructose in SCW was investigated experimentally to evaluate the applicability of supercritical water processes to biomass gasification. Experiments were conducted with an autoclave reactor. Gaseous product mainly consists of H2, CO, CO2, CH4 and C2H6. The effect of two major operating parameters, the reaction temperature (673-873 K) and the dosage of oxidizing agent (0-0.5 stoichiometric oxygen), on the product gas composition, yield and heating value was also examined, with the reaction pressure fixed at 25 MPa.

Keywords: biomass, fructose, gasification, supercritical water

Procedia PDF Downloads 348
14084 Extending Theory of Planned Behavior to Modelling Chronic Patients’ Acceptance of Health Information: An Information Overload Perspective

Authors: Shu-Lien Chou, Chung-Feng Liu

Abstract:

Self-health management of chronic illnesses plays an important part in chronic illness treatments. However, various kinds of health information (health education materials) which government or healthcare institutions provide for patients may not achieve the expected outcome. One of the critical reasons affecting patients’ use intention could be patients’ perceived Information overload regarding the health information. This study proposed an extended model of Theory of Planned Behavior, which integrating perceived information overload as another construct to explore patients’ use intention of the health information for self-health management. The independent variables are attitude, subject norm, perceived behavior control and perceived information overload while the dependent variable is behavior intention to use the health information. The cross-sectional study used a structured questionnaire for data collection, focusing on the chronic patients with coronary artery disease (CAD), who are the potential users of the health information, in a medical center in Taiwan. Data were analyzed using descriptive statistics of the basic information distribution of the questionnaire respondents, and the Partial Least Squares (PLS) structural equation model to study the reliability and construct validity for testing our hypotheses. A total of 110 patients were enrolled in this study and 106 valid questionnaires were collected. The PLS analysis result indicates that the patients’ perceived information overload of health information contributes the most critical factor influencing the behavioral intention. Subjective norm and perceived behavioral control of TPB constructs had significant effects on patients’ intentions to use health information also, whereas the attitude construct did not. This study demonstrated a comprehensive framework, which extending perceived information overload into TPB model to predict patients’ behavioral intention of using heath information. We expect that the results of this study will provide useful insights for studying health information from the perspectives of academia, governments, and healthcare providers.

Keywords: chronic patients, health information, information overload, theory of planned behavior

Procedia PDF Downloads 432
14083 Cognition and Communication Disorders Effect on Death Penalty Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: cognitive impairments, communication disorders, death penalty, executive function

Procedia PDF Downloads 150
14082 Mobile Health Programs by Government: A Content Analysis of Online Consumer Reviews

Authors: Ge Zhan

Abstract:

Mobile health (mHealth) concerns the use of mobile technologies to deliver health care and improve wellness. In this paper, we ask the question of what are the drivers of positive consumer attitude toward mHealth programs. Answers to this question are important to consumer health, but existing marketing and health care service literature does not provide sufficient empirical conclusions on the use of mobile technologies for consumer health. This study aims to fill the knowledge gap by investigating mHealth use and consumer attitude. A content analysis was conducted with sample mHealth programs and online consumer reviews in Hong Kong, UK, US, and India. The research findings will contribute to marketing and health services literature.

Keywords: mobile health, consumer attitude, content analysis, online marketing

Procedia PDF Downloads 384
14081 Combination of Topology and Rough Set for Analysis of Power System Control

Authors: M. Kamel El-Sayed

Abstract:

In this research, we have linked the concept of rough set and topological structure to the creation of a new topological structure that assists in the analysis of the information systems of some electrical engineering issues. We used non-specific information whose boundaries do not have an empty set in the top topological structure is rough set. It is characterized by the fact that it does not contain a large number of elements and facilitates the establishment of rules. We used this structure in reducing the specifications of electrical information systems. We have provided a detailed example of this method illustrating the steps used. This method opens the door to obtaining multiple topologies, each of which uses one of the non-defined groups (rough set) in the overall information system.

Keywords: electrical engineering, information system, rough set, rough topology, topology

Procedia PDF Downloads 450
14080 The Antecedents of Facebook Check in Adoption Intention: The Perspective of Social Influence

Authors: Hsiu-Hua Cheng

Abstract:

Recently, the competition between websites becomes intense. How to make users “adopt” their websites is an issue of urgent importance for online communities companies. Social procedures (such as social influence) can possibly explain how and why users’ technologies usage behaviors affect other people to use the technologies. This study proposes two types of social influences on the initial usage of Facebook Check In-friends and group members. Besides, this study indicates that Facebook friends’ previous usage of Facebook Check In and Facebook group members’ previous usage of Facebook Check In will positively influence focal actors’ Facebook Check In adoption intention. The article concludes with contributions to academic research and practice.

Keywords: social influence, adoption intention, facebook check in, previous usage behavior

Procedia PDF Downloads 441
14079 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management

Authors: Bency Ann Massinello, Nancy Day, Janet Fellini

Abstract:

Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.

Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care

Procedia PDF Downloads 194
14078 Paradigms of Sustainability: Roles and Impact of Communication in the Fashion System

Authors: Elena Pucci, Margherita Tufarelli, Leonardo Giliberti

Abstract:

As central for human and social development of the future, sustainability is becoming a recurring theme also in the fashion industry, where the need to explore new possible directions aimed at achieving sustainability goals and their communication is rising. Scholars have been devoted to the overall environmental impact of the textile and fashion industry, which, emerging as one of the world’s most polluting, today concretely assumes the need to take the path of sustainability in both products and production processes. Every day we witness the impact of our consumption, showing that the sustainability concept is as vast as complex: with a sometimes ambiguous definition, sustainability can concern projects, products, companies, sales, packagings, supply chains in relation to the actors proximity as well as traceability, raw materials procurement, and disposal. However, in its primary meaning, sustainability is the ability to maintain specific values and resources for future generations. The contribution aims to address sustainability in the fashion system as a layered problem that requires substantial changes at different levels: in the fashion product (materials, production processes, timing, distribution, and disposal), in the functioning of the system (life cycle, impact, needs, communication) and last but not least in the practice of fashion design which should conceive durable, low obsolescence and possibly demountable products. Moreover, consumers play a central role for the growing awareness, together with an increasingly strong sensitivity towards the environment and sustainable clothing. Since it is also a market demand, undertaking significant efforts to achieve total transparency and sustainability in all production and distribution processes is becoming fundamental for the fashion system. Sustainability is not to be understood as purely environmental but as the pursuit of collective well-being in relation to conscious production, human rights, and social dignity with the aim to achieve intelligent, resource, and environmentally friendly production and consumption patterns. Assuming sustainability as a layered problem makes the role of communication crucial to convey scientific or production specific content so that people can obtain and interpret information to make related decisions. Hence, if it is true that “what designers make becomes the future we inhabit'', design is facing great and challenging responsibility. The fashion industry needs a system of rules able to assess the sustainability of products, which is transparent and easily interpreted by consumers, identifying and enhancing virtuous practices. There are still complex and fragmented value chains that make it extremely difficult for brands and manufacturers to know the history of their products, to identify exactly where the risks lie, and to respond to the growing demand from consumers and civil society for responsible and sustainable production practices in the fashion industry.

Keywords: fashion design, fashion system, sustainability, communication, complexity

Procedia PDF Downloads 120
14077 The Study of Information Uses Behaviour of Tourists in Songkhla Province, Thailand

Authors: Patraporn Kaewkhanitarak, Suchada Srichuar, Narawat Kanjanapan

Abstract:

This research is the survey research. The purpose of this research is to study information uses behavior and problem of tourists in Songkhla Province. The tool used in this study include structure questioner standardize in 5 levels rating scale. The 400 participants selected by convenience sampling (allowable error 5%) by Taro Yamane method. The collecting data period is 6 months from January-June 2014. The result of this study found that the type of information that the tourists often use to plan their trip is internet (x̅ = 3.81) and the most popular text is restaurant (x̅ = 3.77). The tourists found that booking or buying service from internet provided more affordable price and they could select appropriate plan by themselves. The most convenience source of information that the tourists often use is internet and website (x̅ = 3.69). Nevertheless, they explained that most of tourist information source in Songkhla province are lack and insufficient of tourist organization that provide information and service related to tourism.

Keywords: information, behavior, tourists, Thailand

Procedia PDF Downloads 245
14076 Building Climate Resilience in the Health Sector in Developing Countries: Experience from Tanzania

Authors: Hussein Lujuo Mohamed

Abstract:

Introduction: Public health has always been influenced by climate and weather. Changes in climate and climate variability, particularly changes in weather extremes affect the environment that provides people with clean air, food, water, shelter, and security. Tanzania is not an exception to the threats of climate change. The health sector is mostly affected due to emergence and proliferation of infectious diseases, thereby affecting health of the population and thus impacting achievement of sustainable development goals. Methodology: A desk review on documented issues pertaining to climate change and health in Tanzania was done using Google search engine. Keywords included climate change, link, health, climate initiatives. In cases where information was not available, documents from Ministry of Health, Vice Presidents Office-Environment, Local Government Authority, Ministry of Water, WHO, research, and training institutions were reviewed. Some of the reviewed documents from these institutions include policy brief papers, fieldwork activity reports, training manuals, and guidelines. Results: Six main climate resilience activities were identified in Tanzania. These were development and implementation of climate resilient water safety plans guidelines both for rural and urban water authorities, capacity building of rural and urban water authorities on implementation of climate-resilient water safety plans, and capacity strengthening of local environmental health practitioners on mainstreaming climate change and health into comprehensive council health plans. Others were vulnerability and adaptation assessment for the health sector, mainstreaming climate change in the National Health Policy, and development of risk communication strategy on climate. In addition information, education, and communication materials on climate change and to create awareness were developed aiming to sensitize and create awareness among communities on climate change issues and its effect on public health. Conclusion: Proper implementation of these interventions will help the country become resilient to many impacts of climate change in the health sector and become a good example for other least developed countries.

Keywords: climate, change, Tanzania, health

Procedia PDF Downloads 115
14075 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 434
14074 Barriers and Enablers to Public Innovation in the Central Region of Colombia: A Characterization from Measurement through the Item Response Methodology and Comparative Analysis

Authors: Yessenia Parrado, Ana Barbosa, Daniela Mahe, Sebastian Toro, Jhon Garcia

Abstract:

The purpose of this work is to present the identification and characterization of the barriers and enablers to public innovation in the Central Region of Colombia from a mixed methodology in a research carried out in 2020 by the Laboratory of Innovation, Creativity and New Technologies of the National University of Colombia in alliance with the National Planning Department. Based on the research, the index of barriers to regional and departmental public innovation was built, which reflects the level of difficulty of the territorial entities to overcome the barriers present around three dimensions: organizational structure of the entity, generation of public value, and governance processes. The index was built from the item response methodology and the multiple correspondence analysis from the application of an institutional information form for public entities and a perception form for public servants. This investigation had the participation of 36 entities and 1038 servers and servants from the departments of Huila, Meta, Boyacá, Cundinamarca, Tolima, and the Capital District. In this exercise, it was identified that the departmental indices range between 13 and 44 and that the regional index was 30 out of 100. From the analysis of the information, it was possible to establish that the main barriers are the lack of specialized agencies for public innovation exercises, lack of qualified personnel and work methodologies for public innovation, inadequate information management, lack of feedback between the learning from governmental and non-governmental entities, the inability of the initiatives to generate binding participation mechanisms and the lack of qualification of citizens to participate in these processes.

Keywords: item response, public innovation, quantitative analysis, compared analysis

Procedia PDF Downloads 119
14073 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 48
14072 An Overview of the SIAFIM Connected Resources

Authors: Tiberiu Boros, Angela Ionita, Maria Visan

Abstract:

Wildfires are one of the frequent and uncontrollable phenomena that currently affect large areas of the world where the climate, geographic and social conditions make it impossible to prevent and control such events. In this paper we introduce the ground concepts that lie behind the SIAFIM (Satellite Image Analysis for Fire Monitoring) project in order to create a context and we introduce a set of newly created tools that are external to the project but inherently in interventions and complex decision making based on geospatial information and spatial data infrastructures.

Keywords: wildfire, forest fire, natural language processing, mobile applications, communication, GPS

Procedia PDF Downloads 575
14071 Information and Communication Technology Learning between Parents and High School Students

Authors: Yu-Mei Tseng, Chih-Chun Wu

Abstract:

As information and communication technology (ICT) has become a part of people’s lives, most teenagers born after the 1980s and grew up in internet generation are called digital natives. Meanwhile, those teenagers’ parents are called digital immigrants. They need to keep learning new skills of ICT. This study investigated that high school students helped their parents set up social network services (SNS) and taught them how to use ICT. This study applied paper and pencil anonymous questionnaires that asked the ICT learning and ICT products using in high school students’ parents. The sample size was 2,621 high school students, including 1,360 (51.9%) males and 1,261 (48.1%) females. The sample was from 12 high school and vocational high school in central Taiwan. Results from paired sample t-tests demonstrated regardless genders, both male and female high school students help mothers set up Facebook and LINE more often than fathers. In addition, both male and female high school students taught mothers to use ICT more often than fathers. Meanwhile, both male and female high school students teach mothers to use SNS more often than fathers. The results showed that intergenerational ICT teaching occurred more often between mothers and her children than fathers. It could imply that mothers play a more important role in family ICT learning than fathers, or it could be that mothers need more help regarding ICT than fathers. As for gender differences, results from the independent t-tests showed that female high school students were more likely than male ones to help their parents setup Facebook and LINE. In addition, compared to male high school students, female ones were more likely to teach their parents to use smartphone, Facebook and LINE. However, no gender differences were detected in teaching mothers. The gender differences results suggested that female teenagers offer more helps to their parents regarding ICT learning than their male counterparts. As for area differences, results from the independent t-tests showed that the high school in remote area students were more likely than metropolitan ones to teach parents to use computer, search engine and download files of audio and video. The area differences results might indicate that remote area students were more likely to teach their parents how to use ICT. The results from this study encourage children to help and teach their parents with ICT products.

Keywords: adult ICT learning, family ICT learning, ICT learning, urban-rural gap

Procedia PDF Downloads 176
14070 Performance Evaluation of Adsorption Refrigerating Systems

Authors: Nadia Allouache, Omar Rahli

Abstract:

Many promising technologies have been developed to harness the sun's energy. These technologies help in economizing energy and environmental protection. The solar refrigerating systems are one of these important technologies. In addition to environmental benefits and energy saving, adsorption refrigerating systems have many advantages such as lack of moving parts, simplicity of construction and low operating costs. The work aimed to establish the main factors that affect the performances of an adsorption refrigerating system using different geometries of adsorbers and different adsorbent-adsorbate pairs. The numerical modeling of the heat and mass transfer in the system, using various working pairs, such as: activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol, show that the adsorber design can influence the system performances; The thermal performances of system are better in the annular configuration case. An optimal value of generating temperature is observed in annular adsorber case for which the thermal performance of the cooling system is maximal. While in the plate adsorber, above a certain value of generating temperature, the performance of the system remains almost constant. The environmental conditions such as solar radiation and pressure have a great influence in the system efficiency, and the choice of the working pair depends on the environmental conditions and the geometry of the adsorber.

Keywords: adsorber geometry, numerical modeling, optimal environmental conditions, working pairs.

Procedia PDF Downloads 75
14069 Examining How Youth Use Mobile Devices for Health Information: Preliminary Findings of a Survey Study with High School Students in Croatia

Authors: Sung Un Kim, Ivana Martinović, Snježana Stanarević Katavić

Abstract:

As more and more youth use mobile devices, such as tablets and smartphones, for information seeking in their everyday lives, the purpose of this study is to understand the behaviors of youth seeking health information on mobile devices. The specific objective of this study is to examine 1) for what health issues youth use mobile devices, 2) for what reasons youth use mobile devices to obtain health information, 3) in what ways youth use mobile devices for health information, and 4) the features of health applications that youth find useful. The researchers devised a questionnaire for this study. Four hundred eight students from two high schools, located in Osijek, Croatia, participated by answering the questionnaire (281 girls and 127 boys). The collected data were analyzed using descriptive statistics and content analysis. The results show that among all participants, about 85 percent (n = 344) reported having used mobile devices for health information. The most frequent health topic for which they had been using mobile devices is physical activity (n = 273), followed by eating issues and nutrition (n = 224), mental health (n = 160), sexual health (n = 157), alcohol, drugs, and tobacco (n = 125), safety (n = 96) and particular diseases (n = 62). They use mobile devices to obtain health information due to the ease of use (n = 342), the ease of sharing health information (n = 281), portability (n = 215), timeliness (n = 162), and the ease of tracking/recording/monitoring health status (n = 147). Of those who have used mobile devices for health information, three-quarters (n = 261) use mobile devices to search health information, while 32.8% (n =113) use applications and 31.7% (n =109) browse information. Those who have used applications for health information (n = 113) consider the alert feature (n=107) as the most useful, followed by the tracking/recording/monitoring feature (n =92), the customized information feature (n = 86), the video feature (n = 58), and the sharing feature (n =39). It is notable that although health applications have been actively developed and studied, a majority of the participants search for or browse information on mobile devices, instead of using applications. The researchers will discuss reasons that some of them did not use mobile devices to obtain health information, students’ concerns about using health applications, and features that they wish to have in health applications.

Keywords: Croatia, health information, information seeking behaviors, mobile devices, youth

Procedia PDF Downloads 395
14068 Building an Ontology for Researchers: An Application of Topic Maps and Social Information

Authors: Yu Hung Chiang, Hei Chia Wang

Abstract:

In the academic area, it is important for research to find proper research domain. Many researchers may refer to conference issues to find their interesting or new topics. Furthermore, conferences issues can help researchers realize current research trends in their field and learn about cutting-edge developments in their specialty. However, online published conference information may widely be distributed; it is not easy to be concluded. Many researchers use search engine of journals or conference issues to filter information in order to get what they want. However, this search engine has its limitation. There will still be some issues should be considered; i.e. researchers cannot find the associated topics which may be useful information for them. Hence, use Knowledge Management (KM) could be a way to resolve these issues. In KM, ontology is widely adopted; but most existed ontology construction methods do not consider social information between target users. To effective in academic KM, this study proposes a method of constructing research Topic Maps using Open Directory Project (ODP) and Social Information Processing (SIP). Through catching of social information in conference website: i.e. the information of co-authorship or collaborator, research topics can be associated among related researchers. Finally, the experiments show Topic Maps successfully help researchers to find the information they need more easily and quickly as well as construct associations between research topics.

Keywords: knowledge management, topic map, social information processing, ontology extraction

Procedia PDF Downloads 287
14067 Movie and Theater Marketing Using the Potentials of Social Networks

Authors: Seyed Reza Naghibulsadat

Abstract:

The nature of communication includes various forms of media productions, which include film and theater. In the current situation, since social networks have emerged, they have brought their own communication capabilities and have features that show speed, public access, lack of media organization and the production of extensive content, and the development of critical thinking; Also, they contain capabilities to develop access to all kinds of media productions, including movies and theater shows; Of course, this works differently in different conditions and communities. In terms of the scale of exploitation, the film has a more general audience, and the theater has a special audience. The film industry is more developed based on more modern technologies, but the theater, based on the older ways of communication, contains more intimate and emotional aspects. ; But in general, the main focus is the development of access to movies and theater shows, which is emphasized by those involved in this field due to the capabilities of social networks. In this research, we will look at these 2 areas and the relevant components for both areas through social networks and also the common points of both types of media production. The main goal of this research is to know the strengths and weaknesses of using social networks for the marketing of movies and theater shows and, at the same time are, also considered the opportunities and threats of this field. The attractions of these two types of media production, with the emergence of social networks, and the ability to change positions, can provide the opportunity to become a media with greater exploitation and higher profitability; But the main consideration is the opinions about these capabilities and the ability to use them for film and theater marketing. The main question of the research is, what are the marketing components for movies and theaters using social media capabilities? What are its strengths and weaknesses? And what opportunities and threats are facing this market? This research has been done with two methods SWOT and meta-analysis. Non-probability sampling has been used with purposeful technique. The results show that a recent approach is an approach based on eliminating threats and weaknesses and emphasizing strengths, and exploiting opportunities in the direction of developing film and theater marketing based on the capabilities of social networks within the framework of local cultural values and presenting achievements on an international scale or It is universal. This introduction leads to the introduction of authentic Iranian culture and foreign enthusiasts in the framework of movies and theater art. Therefore, for this issue, the model for using the capabilities of social networks for movie or theater marketing, according to the results obtained from Respondents, is a model based on SO strategies and, in other words, offensive strategies so that it can take advantage of the internal strengths and made maximum use of foreign situations and opportunities to develop the use of movies and theater performances.

Keywords: marketing, movies, theatrical show, social network potentials

Procedia PDF Downloads 70
14066 Customers’ Priority to Implement SSTs Using AHP Analysis

Authors: Mohammad Jafariahangari, Marjan Habibi, Miresmaeil Mirnabibaboli, Mirza Hassan Hosseini

Abstract:

Self-service technologies (SSTs) make an important contribution to the daily life of people nowadays. However, the introduction of SST does not lead to its usage. Thereby, this paper was an attempt on discovery of the most preferred SST in the customers’ point of view. To fulfill this aim, the Analytical Hierarchy Process (AHP) was applied based on Saaty’s questionnaire which was administered to the customers of e-banking services located in Golestan providence, north of Iran. This study used qualitative factors in association with the intention of consumers’ usage of SSTs to rank three SSTs: ATM, mobile banking, and internet banking. The results showed that mobile banking get the highest weight in consumers’ point of view. This research can be useful both for managers and service providers and also for customers who intend to use e-banking.

Keywords: analytical hierarchy process, decision-making, e-banking, self-service technologies, Iran

Procedia PDF Downloads 309
14065 Soliton Solutions in (3+1)-Dimensions

Authors: Magdy G. Asaad

Abstract:

Solitons are among the most beneficial solutions for science and technology for their applicability in physical applications including plasma, energy transport along protein molecules, wave transport along poly-acetylene molecules, ocean waves, constructing optical communication systems, transmission of information through optical fibers and Josephson junctions. In this talk, we will apply the bilinear technique to generate a class of soliton solutions to the (3+1)-dimensional nonlinear soliton equation of Jimbo-Miwa type. Examples of the resulting soliton solutions are computed and a few solutions are plotted.

Keywords: Pfaffian solutions, N-soliton solutions, soliton equations, Jimbo-Miwa

Procedia PDF Downloads 447
14064 Spatio-Temporal Data Mining with Association Rules for Lake Van

Authors: Tolga Aydin, M. Fatih Alaeddinoğlu

Abstract:

People, throughout the history, have made estimates and inferences about the future by using their past experiences. Developing information technologies and the improvements in the database management systems make it possible to extract useful information from knowledge in hand for the strategic decisions. Therefore, different methods have been developed. Data mining by association rules learning is one of such methods. Apriori algorithm, one of the well-known association rules learning algorithms, is not commonly used in spatio-temporal data sets. However, it is possible to embed time and space features into the data sets and make Apriori algorithm a suitable data mining technique for learning spatio-temporal association rules. Lake Van, the largest lake of Turkey, is a closed basin. This feature causes the volume of the lake to increase or decrease as a result of change in water amount it holds. In this study, evaporation, humidity, lake altitude, amount of rainfall and temperature parameters recorded in Lake Van region throughout the years are used by the Apriori algorithm and a spatio-temporal data mining application is developed to identify overflows and newly-formed soil regions (underflows) occurring in the coastal parts of Lake Van. Identifying possible reasons of overflows and underflows may be used to alert the experts to take precautions and make the necessary investments.

Keywords: apriori algorithm, association rules, data mining, spatio-temporal data

Procedia PDF Downloads 367
14063 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 335