Search results for: information literacy-lawyers-KP
9076 Identifying the Factors Influencing the Success of the Centers for Distance Knowledge Sharing in Iran
Authors: Abdolreza Noroozi Chakoli
Abstract:
This study aims to examine the impact of five effective factors on the success of the managers of distance knowledge sharing centers in Iran. To conduct it, 3 centers, including the National Library and Archives of Iran (NLAI), Scientific Information Database Center (SID), and Islamic World Science Citation Center (ISC), were selected to study the effect of five factors 'infrastructure of information technology', 'experienced staff', 'specialized staff', 'employee public relations' and 'the geographical location of the establishment' on the success of the centers. ANOVA test, Scheffe test, and Pearson's correlation test were used to analyze the data. The findings confirmed the effect of all 5 factors on the success of these centers. However, their effects are not the same on each factor. The results show each of these factors is not only individually but also together affect the success of centers for distance knowledge sharing. Moreover, it was demonstrated that there is a correlation between these factors. The results of this study show what factors determine the success of the centers and their efficiency in distance knowledge sharing in Iran.Keywords: distance knowledge sharing centers, Iran’s knowledge centers, knowledge sharing centers, staff success
Procedia PDF Downloads 1459075 The Extent of Big Data Analysis by the External Auditors
Authors: Iyad Ismail, Fathilatul Abdul Hamid
Abstract:
This research was mainly investigated to recognize the extent of big data analysis by external auditors. This paper adopts grounded theory as a framework for conducting a series of semi-structured interviews with eighteen external auditors. The research findings comprised the availability extent of big data and big data analysis usage by the external auditors in Palestine, Gaza Strip. Considering the study's outcomes leads to a series of auditing procedures in order to improve the external auditing techniques, which leads to high-quality audit process. Also, this research is crucial for auditing firms by giving an insight into the mechanisms of auditing firms to identify the most important strategies that help in achieving competitive audit quality. These results are aims to instruct the auditing academic and professional institutions in developing techniques for external auditors in order to the big data analysis. This paper provides appropriate information for the decision-making process and a source of future information which affects technological auditing.Keywords: big data analysis, external auditors, audit reliance, internal audit function
Procedia PDF Downloads 709074 Interaction Issues at Patan Stepwell in Western India
Authors: Shekhar Chatterjee
Abstract:
Architectural marvels of the Patan stepwell in Gujarat state in India were studied, to look into the cultural and design attributes in them. Direct observation, photography and interviewing the local people (especially senior citizens) were the methodology adopted. The aim was to look for clues into how culture and design affected architectural marvels of a building and convey that to the tourists. These interpretations from this building can offer many ideas to the contemporary design world in the form of design of modern day garments for various occasions, ornaments or accessory products for daily usage like bags, shoes and similar products. These monuments currently lack proper information system for guiding a tourist. Absence of any qualified tourist guides at the site compounds the problem further. This project investigates the feasibility of making the space more interactive for the tourist through proper digital information design and installations at places. Along with this, illumination and sound are also being used to narrate the history of these ancient monuments so that tourists get a flavor of the medieval past. Most importantly, all these digital interventions are low cost and done with easily available throw-away materials and can be replicated for other monuments as well.Keywords: interaction, well, building, context
Procedia PDF Downloads 2729073 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 2999072 Local Tax Map Software System Development
Authors: Smithinun Thairoongrojana
Abstract:
This research is a qualitative research with three main purposes: (1) to develop the local tax map software system to be linked to the main Local Tax Map System (LTAX3000) system; (2) to design and develop a program for tax data fieldwork on wireless devices and link it to LTAX3000 database of Surat Thani Municipality; (3) to develop the human resource responsible for the fieldwork to be able to use the program and maintain the system and also to be able to work with the dynamic of technologies. In-depth interviews with the two groups of samples, the board of Surat Thani Municipality and operation staff responsible for observing and taxing fieldworks were conducted. The result of this study demonstrates the new developed fieldworks system that can be used both stand-alone usage and networking usage. The fieldworks system to collect and store the variety of taxing information within Surat Thani Municipality will be explained. Then the fieldwork operation process development and the replacement of transferring and storing the information via the network communication.Keywords: Local tax map, software system development, wireless devices, human resource
Procedia PDF Downloads 1929071 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 1689070 Competitive Intelligence within the Maritime Security Intelligence
Authors: Dicky R. Munaf, Ayu Bulan Tisna
Abstract:
Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology
Procedia PDF Downloads 5009069 Point-of-Interest Recommender Systems for Location-Based Social Network Services
Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim
Abstract:
Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.Keywords: location-based social network services, point-of-interest, recommender systems, business analytics
Procedia PDF Downloads 2299068 DocPro: A Framework for Processing Semantic and Layout Information in Business Documents
Authors: Ming-Jen Huang, Chun-Fang Huang, Chiching Wei
Abstract:
With the recent advance of the deep neural network, we observe new applications of NLP (natural language processing) and CV (computer vision) powered by deep neural networks for processing business documents. However, creating a real-world document processing system needs to integrate several NLP and CV tasks, rather than treating them separately. There is a need to have a unified approach for processing documents containing textual and graphical elements with rich formats, diverse layout arrangement, and distinct semantics. In this paper, a framework that fulfills this unified approach is presented. The framework includes a representation model definition for holding the information generated by various tasks and specifications defining the coordination between these tasks. The framework is a blueprint for building a system that can process documents with rich formats, styles, and multiple types of elements. The flexible and lightweight design of the framework can help build a system for diverse business scenarios, such as contract monitoring and reviewing.Keywords: document processing, framework, formal definition, machine learning
Procedia PDF Downloads 2189067 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms
Authors: Volkan Kaya, Ersin Elbasi
Abstract:
Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.Keywords: watermarking, medical image, frequency domain, least significant bits, security
Procedia PDF Downloads 2889066 Predictors of Post-marketing Regulatory Actions Concerning Hepatotoxicity
Authors: Salwa M. Almomen, Mona A. Almaghrabi, Saja M. Alhabardi, Adel A. Alrwisan
Abstract:
Background: Hepatotoxicity is a major reason for medication withdrawal from the markets. Unfortunately, serious adverse hepatic effects can occur after marketing with limited indicators during clinical development. Therefore, finding possible predictors for hepatotoxicity might guide the monitoring program of various stakeholders. Methods: We examined the clinical review documents for drugs approved in the US from 2011 to 2016 to evaluate their hepatic safety profile. Predictors: we assessed whether these medications meet Hy’s Law with hepatotoxicity grade ≥ 3, labeled hepatic adverse effects at approval, or accelerated approval status. Outcome: post-marketing regulatory action related to hepatotoxicity, including product withdrawal or updates to warning, precaution, or adverse effects sections. Statistical analysis: drugs were included in the analysis from the time of approval until the end of 2019 or the first post-marketing regulatory action related to hepatotoxicity, whichever occurred first. The hazard ratio (HR) was estimated using Cox-regression analysis. Results: We included 192 medications in the study. We classified 48 drugs as having grade ≥ 3 hepatotoxicities, 43 had accelerated approval status, and 74 had labeled information about hepatotoxicity prior to marketing. The adjusted HRs for post-marketing regulatory action for products with grade ≥ 3 hepatotoxicity was 0.61 (95% confidence interval [CI], 0.17-2.23), 0.92 (95%CI, 0.29-2.93) for a drug approved via accelerated approval program, and was 0.91 (95%CI, 0.33-2.56) for drugs with labeled hepatotoxicity information at approval time. Conclusion: This study does not provide conclusive evidence on the association between post-marketing regulatory action and grade ≥ 3 hepatotoxicity, accelerated approval status, or availability of labeled information at approval due to sampling size and channeling bias.Keywords: accelerated approvals, hepatic adverse effects, drug-induced liver injury, hepatotoxicity predictors, post-marketing withdrawal
Procedia PDF Downloads 1529065 Financial Instruments Disclosure: A Review of the Literature
Authors: Y. Tahat, T. Dunne, S. Fifield, D. Power
Abstract:
Information about a firm’s usage of Financial Instruments (FIs) plays a very important role in determining its financial position and performance. Yet accounting standard-setters have encountered problems when deciding on the FI-related disclosures which firms must make. The primary objective of this paper is to review the extant literature on FI disclosure. This objective is achieved by surveying the literature on: the corporate usage of FIs; the different accounting standards adopted concerning FIs; and empirical studies on FI disclosure. This review concludes that the current research on FI disclosure has generated a number of useful insights. In particular, the paper reports that: FIs are a very important risk management mechanism in ensuring that companies have the cash available to make value-enhancing investments, however, without a clear set of risk management objectives, using such instruments can be dangerous; accounting standards concerning FIs have resulted in enhanced transparency about the usage of these instruments; and FI-related information is a key input into investors’ decision-making processes. Finally, the paper provides a number of suggestions for future research in the area.Keywords: financial instruments, financial reporting, accounting standards, value relevance, corporate disclosure
Procedia PDF Downloads 4129064 Educating Children with the Child-Friendly Smartphone Operation System
Authors: Wildan Maulana Wildan, Siti Annisa Rahmayani Icha
Abstract:
Nowadays advances in information technology are needed by all the inhabitants of the earth for the sake of ease all their work, but it is worth to introduced the technological advances in the world of children. Before the technology is growing rapidly, children busy with various of traditional games and have high socialization. Moreover, after it presence, almost all of children spend more their time for playing gadget, It can affect the education of children and will change the character and personality children. However, children also can not be separated with the technology. Because the technology insight knowledge of children will be more extensive. Because the world can not be separated with advances in technology as well as with children, there should be developed a smartphone operating system that is child-friendly. The operating system is able to filter contents that do not deserve children, even in this system there is a reminder of a time study, prayer time and play time for children and there are interactive contents that will help the development of education and children's character. Children need technology, and there are some ways to introduce it to children. We must look at the characteristics of children in different environments. Thus advances in technology can be beneficial to the world children and their parents, and educators do not have to worry about advances in technology. We should be able to take advantage of advances in technology best possible.Keywords: information technology, smartphone operating system, education, character
Procedia PDF Downloads 5139063 Integrated Models of Reading Comprehension: Understanding to Impact Teaching—The Teacher’s Central Role
Authors: Sally A. Brown
Abstract:
Over the last 30 years, researchers have developed models or frameworks to provide a more structured understanding of the reading comprehension process. Cognitive information processing models and social cognitive theories both provide frameworks to inform reading comprehension instruction. The purpose of this paper is to (a) provide an overview of the historical development of reading comprehension theory, (b) review the literature framed by cognitive information processing, social cognitive, and integrated reading comprehension theories, and (c) demonstrate how these frameworks inform instruction. As integrated models of reading can guide the interpretation of various factors related to student learning, an integrated framework designed by the researcher will be presented. Results indicated that features of cognitive processing and social cognitivism theory—represented in the integrated framework—highlight the importance of the role of the teacher. This model can aid teachers in not only improving reading comprehension instruction but in identifying areas of challenge for students.Keywords: explicit instruction, integrated models of reading comprehension, reading comprehension, teacher’s role
Procedia PDF Downloads 979062 The Public Law Studies: Relationship Between Accountability, Environmental Education and Smart Cities
Authors: Aline Alves Bandeira, Luís Pedro Lima, Maria Cecília de Paula Silva, Paulo Henrique de Viveiros Tavares
Abstract:
Nowadays, the study of public policies regarding management efficiency is essential. Public policies are about what governments do or do not do, being an area that has grown worldwide, contributing through the knowledge of technologies and methodologies that monitor and evaluate the performance of public administrators. The information published on official government websites needs to provide for transparency and responsiveness of managers. Thus, transparency is a primordial factor for the execution of Accountability, providing, in this way, services to the citizen with the expansion of transparent, efficient, democratic information and that value administrative eco-efficiency. The ecologically balanced management of a Smart City must optimize environmental education, building a fairer society, which brings about equality in the use of quality environmental resources. Smart Cities add value in the construction of public management, enabling interaction between people, enhancing environmental education and the practical applicability of administrative eco-efficiency, fostering economic development and improving the quality of life.Keywords: accountability, environmental education, new public administration, smart cities
Procedia PDF Downloads 1289061 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area
Authors: Niyi Adegoke, Saanumi Jimmy Omolou
Abstract:
The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology
Procedia PDF Downloads 2289060 Sentiment Analysis of Fake Health News Using Naive Bayes Classification Models
Authors: Danielle Shackley, Yetunde Folajimi
Abstract:
As more people turn to the internet seeking health-related information, there is more risk of finding false, inaccurate, or dangerous information. Sentiment analysis is a natural language processing technique that assigns polarity scores to text, ranging from positive, neutral, and negative. In this research, we evaluate the weight of a sentiment analysis feature added to fake health news classification models. The dataset consists of existing reliably labeled health article headlines that were supplemented with health information collected about COVID-19 from social media sources. We started with data preprocessing and tested out various vectorization methods such as Count and TFIDF vectorization. We implemented 3 Naive Bayes classifier models, including Bernoulli, Multinomial, and Complement. To test the weight of the sentiment analysis feature on the dataset, we created benchmark Naive Bayes classification models without sentiment analysis, and those same models were reproduced, and the feature was added. We evaluated using the precision and accuracy scores. The Bernoulli initial model performed with 90% precision and 75.2% accuracy, while the model supplemented with sentiment labels performed with 90.4% precision and stayed constant at 75.2% accuracy. Our results show that the addition of sentiment analysis did not improve model precision by a wide margin; while there was no evidence of improvement in accuracy, we had a 1.9% improvement margin of the precision score with the Complement model. Future expansion of this work could include replicating the experiment process and substituting the Naive Bayes for a deep learning neural network model.Keywords: sentiment analysis, Naive Bayes model, natural language processing, topic analysis, fake health news classification model
Procedia PDF Downloads 979059 Application of Life Cycle Assessment “LCA” Approach for a Sustainable Building Design under Specific Climate Conditions
Authors: Djeffal Asma, Zemmouri Noureddine
Abstract:
In order for building designer to be able to balance environmental concerns with other performance requirements, they need clear and concise information. For certain decisions during the design process, qualitative guidance, such as design checklists or guidelines information may not be sufficient for evaluating the environmental benefits between different building materials, products and designs. In this case, quantitative information, such as that generated through a life cycle assessment, provides the most value. LCA provides a systematic approach to evaluating the environmental impacts of a product or system over its entire life. In the case of buildings life cycle includes the extraction of raw materials, manufacturing, transporting and installing building components or products, operating and maintaining the building. By integrating LCA into building design process, designers can evaluate the life cycle impacts of building design, materials, components and systems and choose the combinations that reduce the building life cycle environmental impact. This article attempts to give an overview of the integration of LCA methodology in the context of building design, and focuses on the use of this methodology for environmental considerations concerning process design and optimization. A multiple case study was conducted in order to assess the benefits of the LCA as a decision making aid tool during the first stages of the building design under specific climate conditions of the North East region of Algeria. It is clear that the LCA methodology can help to assess and reduce the impact of a building design and components on the environment even if the process implementation is rather long and complicated and lacks of global approach including human factors. It is also demonstrated that using LCA as a multi objective optimization of building process will certainly facilitates the improvement in design and decision making for both new design and retrofit projects.Keywords: life cycle assessment, buildings, sustainability, elementary schools, environmental impacts
Procedia PDF Downloads 5469058 Lexical Based Method for Opinion Detection on Tripadvisor Collection
Authors: Faiza Belbachir, Thibault Schienhinski
Abstract:
The massive development of online social networks allows users to post and share their opinions on various topics. With this huge volume of opinion, it is interesting to extract and interpret these information for different domains, e.g., product and service benchmarking, politic, system of recommendation. This is why opinion detection is one of the most important research tasks. It consists on differentiating between opinion data and factual data. The difficulty of this task is to determine an approach which returns opinionated document. Generally, there are two approaches used for opinion detection i.e. Lexical based approaches and Machine Learning based approaches. In Lexical based approaches, a dictionary of sentimental words is used, words are associated with weights. The opinion score of document is derived by the occurrence of words from this dictionary. In Machine learning approaches, usually a classifier is trained using a set of annotated document containing sentiment, and features such as n-grams of words, part-of-speech tags, and logical forms. Majority of these works are based on documents text to determine opinion score but dont take into account if these texts are really correct. Thus, it is interesting to exploit other information to improve opinion detection. In our work, we will develop a new way to consider the opinion score. We introduce the notion of trust score. We determine opinionated documents but also if these opinions are really trustable information in relation with topics. For that we use lexical SentiWordNet to calculate opinion and trust scores, we compute different features about users like (numbers of their comments, numbers of their useful comments, Average useful review). After that, we combine opinion score and trust score to obtain a final score. We applied our method to detect trust opinions in TRIPADVISOR collection. Our experimental results report that the combination between opinion score and trust score improves opinion detection.Keywords: Tripadvisor, opinion detection, SentiWordNet, trust score
Procedia PDF Downloads 1989057 Thermodynamic Analyses of Information Dissipation along the Passive Dendritic Trees and Active Action Potential
Authors: Bahar Hazal Yalçınkaya, Bayram Yılmaz, Mustafa Özilgen
Abstract:
Brain information transmission in the neuronal network occurs in the form of electrical signals. Neural work transmits information between the neurons or neurons and target cells by moving charged particles in a voltage field; a fraction of the energy utilized in this process is dissipated via entropy generation. Exergy loss and entropy generation models demonstrate the inefficiencies of the communication along the dendritic trees. In this study, neurons of 4 different animals were analyzed with one dimensional cable model with N=6 identical dendritic trees and M=3 order of symmetrical branching. Each branch symmetrically bifurcates in accordance with the 3/2 power law in an infinitely long cylinder with the usual core conductor assumptions, where membrane potential is conserved in the core conductor at all branching points. In the model, exergy loss and entropy generation rates are calculated for each branch of equivalent cylinders of electrotonic length (L) ranging from 0.1 to 1.5 for four different dendritic branches, input branch (BI), and sister branch (BS) and two cousin branches (BC-1 & BC-2). Thermodynamic analysis with the data coming from two different cat motoneuron studies show that in both experiments nearly the same amount of exergy is lost while generating nearly the same amount of entropy. Guinea pig vagal motoneuron loses twofold more exergy compared to the cat models and the squid exergy loss and entropy generation were nearly tenfold compared to the guinea pig vagal motoneuron model. Thermodynamic analysis show that the dissipated energy in the dendritic tress is directly proportional with the electrotonic length, exergy loss and entropy generation. Entropy generation and exergy loss show variability not only between the vertebrate and invertebrates but also within the same class. Concurrently, single action potential Na+ ion load, metabolic energy utilization and its thermodynamic aspect contributed for squid giant axon and mammalian motoneuron model. Energy demand is supplied to the neurons in the form of Adenosine triphosphate (ATP). Exergy destruction and entropy generation upon ATP hydrolysis are calculated. ATP utilization, exergy destruction and entropy generation showed differences in each model depending on the variations in the ion transport along the channels.Keywords: ATP utilization, entropy generation, exergy loss, neuronal information transmittance
Procedia PDF Downloads 3939056 Reverse Engineering of a Secondary Structure of a Helicopter: A Study Case
Authors: Jose Daniel Giraldo Arias, Camilo Rojas Gomez, David Villegas Delgado, Gullermo Idarraga Alarcon, Juan Meza Meza
Abstract:
The reverse engineering processes are widely used in the industry with the main goal to determine the materials and the manufacture used to produce a component. There are a lot of characterization techniques and computational tools that are used in order to get this information. A study case of a reverse engineering applied to a secondary sandwich- hybrid type structure used in a helicopter is presented. The methodology used consists of five main steps, which can be applied to any other similar component: Collect information about the service conditions of the part, disassembly and dimensional characterization, functional characterization, material properties characterization and manufacturing processes characterization, allowing to obtain all the supports of the traceability of the materials and processes of the aeronautical products that ensure their airworthiness. A detailed explanation of each step is covered. Criticality and comprehend the functionalities of each part, information of the state of the art and information obtained from interviews with the technical groups of the helicopter’s operators were analyzed,3D optical scanning technique, standard and advanced materials characterization techniques and finite element simulation allow to obtain all the characteristics of the materials used in the manufacture of the component. It was found that most of the materials are quite common in the aeronautical industry, including Kevlar, carbon, and glass fibers, aluminum honeycomb core, epoxy resin and epoxy adhesive. The stacking sequence and volumetric fiber fraction are a critical issue for the mechanical behavior; a digestion acid method was used for this purpose. This also helps in the determination of the manufacture technique which for this case was Vacuum Bagging. Samples of the material were manufactured and submitted to mechanical and environmental tests. These results were compared with those obtained during reverse engineering, which allows concluding that the materials and manufacture were correctly determined. Tooling for the manufacture was designed and manufactured according to the geometry and manufacture process requisites. The part was manufactured and the mechanical, and environmental tests required were also performed. Finally, a geometric characterization and non-destructive techniques allow verifying the quality of the part.Keywords: reverse engineering, sandwich-structured composite parts, helicopter, mechanical properties, prototype
Procedia PDF Downloads 4189055 Political Views and Information and Communication Technology (ICT) in Tertiary Institutions in Achieving the Millennium Development Goals (MDGS)
Authors: Perpetual Nwakaego Ibe
Abstract:
The Millennium Development Goals (MDGs), were an integrated project formed to eradicate many unnatural situations the citizens of the third world country may found themselves in. The MDGs, to be a sustainable project for the future depends 100% on the actions of governments, multilateral institutions and civil society. This paper first looks at the political views on the MDGs and relates it to the current electoral situations around the country by underlining the drastic changes over the few months. The second part of the paper presents ICT in tertiary institutions as one of the solutions in terms of the success of the MDGs. ICT is vital in all phases of educational process and development of the cloud connectivity is an added advantage of Information and Communication Technology (ICT) for sharing a common data bank for research purposes among UNICEF, RED CROSS, NPS, INEC, NMIC, and WHO. Finally, the paper concludes with areas that needs twigging and recommendations for the tertiary institutions committed to delivering an ambitious set of goals. A combination of observation, and document materials for data gathering was employed as the methodology for carrying out this research.Keywords: MDG, ICT, data bank, database
Procedia PDF Downloads 2009054 Machine Learning Approach for Yield Prediction in Semiconductor Production
Authors: Heramb Somthankar, Anujoy Chakraborty
Abstract:
This paper presents a classification study on yield prediction in semiconductor production using machine learning approaches. A complicated semiconductor production process is generally monitored continuously by signals acquired from sensors and measurement sites. A monitoring system contains a variety of signals, all of which contain useful information, irrelevant information, and noise. In the case of each signal being considered a feature, "Feature Selection" is used to find the most relevant signals. The open-source UCI SECOM Dataset provides 1567 such samples, out of which 104 fail in quality assurance. Feature extraction and selection are performed on the dataset, and useful signals were considered for further study. Afterward, common machine learning algorithms were employed to predict whether the signal yields pass or fail. The most relevant algorithm is selected for prediction based on the accuracy and loss of the ML model.Keywords: deep learning, feature extraction, feature selection, machine learning classification algorithms, semiconductor production monitoring, signal processing, time-series analysis
Procedia PDF Downloads 1099053 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon
Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez
Abstract:
Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.Keywords: biotope mapping, GIS, remote sensing, wetlands
Procedia PDF Downloads 3949052 Factors Affecting the Effective Management of the Employee Welfare Fund at the Department of Labour Protection and Welfare
Authors: Nareerut Rodwring
Abstract:
The purposes of this research were to study the current problems of the management of welfare fund at the department of labor protection and welfare, to study important factors affecting the management of welfare fund at the department of labor protection and welfare, to study major influences of the management of welfare fund at the department of labor protection and welfare, and finally to propose the proper guidelines for the management of welfare fund at the department of labor protection and welfare. This research study utilized the information from document, laws, rules, and regulations of the government, handbook for welfare, and government policy in the past. Moreover, the qualitative research was conducted by retrieving insight information from key informants, 15 persons for the committee of welfare employees, and 10 persons from a high level of management in the welfare area, academics, and experts. In terms of quantitative method, the study covers all 76 provinces and 10 areas of Bangkok. Independent variables included strategy, structure, shared value, system, whereas the dependent variables included the management factors such as speed, punctuation, and quality of work.Keywords: strategy, welfare, labor protection, management
Procedia PDF Downloads 1799051 Digital Maturity Framework: A Tool to Manage the Information Technologies and Develop Activities of Innovation in Companies
Authors: Paulina Solórzano Salgado, Luis Rodrigo Valencia Pérez, Alberto de Jesús Pastrana Palma
Abstract:
In this research, it is presented a digital maturity framework, which contributes to the development of small and medium-sized enterprises (SMEs) in the commercial sector. This proposal is based on three important concepts: Marketing activities in the enterprise, information and communication technologies ICT, as well as Innovation. Prior to the development of this framework, was formulated a quantitative assessment tool through a literature review, and was validated with a method used by experts, and which determines the relationship of digital marketing and innovation activities in companies. The instrument was applied to 64 Mexican companies from the Made in Mexico database, which allowed both descriptive results and correlation results. These contributed to the development of the methodology, and confirming that the management of digital marketing has a positive relation with innovation activities of companies. Also, that analytics in digital marketing is a source for its development. In this paper, the management stages and activities are presented to be developed by companies in order to generate knowledge, which will allow them to reach its digital maturity.Keywords: digital marketing, digital maturity, innovation, SMEs
Procedia PDF Downloads 4699050 Identification of Shocks from Unconventional Monetary Policy Measures
Authors: Margarita Grushanina
Abstract:
After several prominent central banks including European Central Bank (ECB), Federal Reserve System (Fed), Bank of Japan and Bank of England employed unconventional monetary policies in the aftermath of the financial crisis of 2008-2009 the problem of identification of the effects from such policies became of great interest. One of the main difficulties in identification of shocks from unconventional monetary policy measures in structural VAR analysis is that they often are anticipated, which leads to a non-fundamental MA representation of the VAR model. Moreover, the unconventional monetary policy actions may indirectly transmit to markets information about the future stance of the interest rate, which raises a question of the plausibility of the assumption of orthogonality between shocks from unconventional and conventional policy measures. This paper offers a method of identification that takes into account the abovementioned issues. The author uses factor-augmented VARs to increase the information set and identification through heteroskedasticity of error terms and rank restrictions on the errors’ second moments’ matrix to deal with the cross-correlation of the structural shocks.Keywords: factor-augmented VARs, identification through heteroskedasticity, monetary policy, structural VARs
Procedia PDF Downloads 3489049 Keeping under the Hat or Taking off the Lid: Determinants of Social Enterprise Transparency
Abstract:
Transparency could be defined as the voluntary release of information by institutions that is relevant to their own evaluation. Transparency based on information disclosure is recognised to be vital for the Third Sector, as civil society organisations are under pressure to become more transparent to answer the call for accountability. The growing importance of social enterprises as hybrid organisations emerging from the nexus of the public, the private and the Third Sector makes their transparency a topic worth exploring. However, transparency for social enterprises has not yet been studied: as a new form of organisation that combines non-profit missions with commercial means, it is unclear to both the practical and the academic world if the shift in operational logics from non-profit motives to for-profit pursuits has significantly altered their transparency. This is especially so in China, where informational governance and practices of information disclosure by local governments, industries and civil society are notably different from other countries. This study investigates the transparency-seeking behaviour of social enterprises in Greater China to understand what factors at the organisational level may affect their transparency, measured by their willingness to disclose financial information. We make use of the Survey on the Models and Development Status of Social Enterprises in the Greater China Region (MDSSGCR) conducted in 2015-2016. The sample consists of more than 300 social enterprises from the Mainland, Hong Kong and Taiwan. While most respondents have provided complete answers to most of the questions, there is tremendous variation in the respondents’ demonstrated level of transparency in answering those questions related to the financial aspects of their organisations, such as total revenue, net profit, source of revenue and expense. This has led to a lot of missing data on such variables. In this study, we take missing data as data. Specifically, we use missing values as a proxy for an organisation’s level of transparency. Our dependent variables are constructed from missing data on total revenue, net profit, source of revenue and cost breakdown. In addition, we also take into consideration the quality of answers in coding the dependent variables. For example, to be coded as being transparent, an organization must report the sources of at least 50% of its revenue. We have four groups of predictors of transparency, namely nature of organization, decision making body, funding channel and field of concentration. Furthermore, we control for an organisation’s stage of development, self-identity and region. The results show that social enterprises that are at their later stages of organisational development and are funded by financial means are significantly more transparent than others. There is also some evidence that social enterprises located in the Northeast region in China are less transparent than those located in other regions probably because of local political economy features. On the other hand, the nature of the organisation, the decision-making body and field of concentration do not systematically affect the level of transparency. This study provides in-depth empirical insights into the information disclosure behaviour of social enterprises under specific social context. It does not only reveal important characteristics of Third Sector development in China, but also contributes to the general understanding of hybrid institutions.Keywords: China, information transparency, organisational behaviour, social enterprise
Procedia PDF Downloads 1849048 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System
Authors: Vuk M. Popovic, Dunja D. Popovic
Abstract:
Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs
Procedia PDF Downloads 3589047 The Impact of the Business Process Reengineering on the Practices of the Human Resources Management in the Franco Tunisian Company-Network
Authors: Nesrine Bougarech, Habib Affes
Abstract:
This research lays the emphasis on the business process reengineering (BPR) which consists in radically altering the organizational processes through the optimal use of information technology (IT) to attain major enhancements in terms of quality, performance and productivity. A survey of the business process reengineering (BPR) was carried out in three French groups and their subsidiaries in Tunisia. The data collected were qualitatively analyzed in an attempt to test the main indicators of the success of a business process reengineering project (BPR) and to compare the importance of these indicators in the context of France versus Tunisia. The study corroborates that the respect of the inherent principles of the business process reengineering (BPR) and the diversity of the human resources involved in the project can lead to better productivity, higher quality of the goods or services and lower cost. Additionally, our results mirror the extent to which the respect of the principles and the diversity of resources are more important in the French companies than in their Tunisian subsidiaries.Keywords: business process reengineering (BPR), human resources management (HRM), information technology (IT), management
Procedia PDF Downloads 408