Search results for: information security competencies
11557 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads
Authors: Gaurav Kumar Sinha
Abstract:
In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies
Procedia PDF Downloads 6811556 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction
Authors: Koichi Kurita
Abstract:
In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.Keywords: human walking motion, access control, electrostatic induction, alarm monitoring
Procedia PDF Downloads 35711555 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Authors: Alec Wells, Aminu Bello Usman, Justin McKeown
Abstract:
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.Keywords: direct voice input, risk, security, technology, trust
Procedia PDF Downloads 19111554 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria
Authors: J. O. Ayinde, S. O. Olatunji
Abstract:
This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security
Procedia PDF Downloads 20711553 Bridging the Digital Divide in India: Issus and Challenges
Authors: Parveen Kumar
Abstract:
The cope the rapid change of technology and to control the ephemeral rate of information generation, librarians along with their professional colleagues need to equip themselves as per the requirement of the electronic information society. E-learning is purely based on computer and communication technologies. The terminologies like computer based learning. It is the delivery of content via all electronic media through internet, internet, Extranets television broadcast, CD-Rom documents, etc. E-learning poses lot of issues in the transformation of literature or knowledge from the conventional medium to ICT based format and web based services.Keywords: e-learning, digital libraries, online learning, electronic information society
Procedia PDF Downloads 51011552 Social Media as a Tool for Medication Adherence and Personal Health Management
Authors: Huang Wei-Chi, Li Wei, Yu Tien-Chieh
Abstract:
Medication adherence is crucial for treatment success. Adherence problem is common in patients with polypharmacy, especially in the geriatric population who are vulnerable to multiple chronic conditions but averagely less knowledgeable about diseases and medications. In order to help patients take medications appropriately and enhance the understanding of diseases or medications, a Line official account named e-Pharmacist was designed. The line is a popular freeware app with the highest penetration rate (95.7%) in Taiwan. The interface of e-Pharmacist is user-friendly for easy-to-read and convenient operating. Differ from other medication adherence apps, users just added e-Pharmacist as a LINE friend without installing any more apps and the drug lists were automatically downloaded from the personal electronic medical records with security permission. Over and above medication reminder, several additional capabilities were set up and engaged in the platform of e-Pharmacist including prescription refill reservation, laboratory examination consultation, medical appointment registration, and “Daily Health Log” where patients can record and track data of blood pressure/blood sugar and daily meals for self-health management as well as can share the important information to clinical professionals when seeking medical help. Additionally, a Line chatbot was utilized to provide tailored medicine information for the individual user. From July 2020 to March 2022, around 3000 patients added e-pharmacist as Line friends. Every day more than 1500 patients receive messages from e-pharmacist to notify them to take medicine. Thanks to the e-pharmacist alert system and Chatbot, the low-compliance patients (defined by Program on Adherence to Medication, PAM) significantly dropped from 36% to 6%, whereas the high-compliance patients dramatically increased from 13% to 77%. The user satisfaction is 98%. In brief, an e-pharmacist is not only a medication reminder but also a tailored personal assistant with value-added service for health management.Keywords: e-pharmacist, self-health management, medication reminder, value-added service
Procedia PDF Downloads 16011551 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 3011550 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 16211549 Information Construction of Higher Education in Teaching Practice
Authors: Yang Meng, James L. Patnao
Abstract:
With the rapid development of information technology and the impact of the epidemic environment, the traditional teaching model can’t longer meet the requirements of the development of the times. The development of teaching mechanism is the inevitable trend of the future development of higher education. We must further promote the informatization of higher education in teaching practice, let modern information technology penetrate and practice in classroom teaching, and provide promising opportunities for the high-quality development of higher education. This article mainly through the distribution of questionnaires to teachers of colleges and universities, so as to understand the degree of informatization in the teaching of colleges and universities. And on the basis of domestic and foreign scholars' research on higher education informatization, it analyzes the existing problems, and finds the optimal solution based on the needs of education and teaching development. According to the survey results, most college teachers will use information technology in teaching practice, but the information technology teaching tools used by teachers are relatively simple, and most of them only use slides. In addition, backward informatization infrastructure and less informatization training are the main challenges facing the current teaching informatization construction. If colleges and universities can make good use of information technology and multimedia technology and combine it with traditional teaching, it will definitely promote the development of college education and further promote the modernization and informatization of higher education.Keywords: higher education, teaching practice, informatization construction, e-education
Procedia PDF Downloads 12211548 Materialized View Effect on Query Performance
Authors: Yusuf Ziya Ayık, Ferhat Kahveci
Abstract:
Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.Keywords: cost of query, database management systems, materialized view, query performance
Procedia PDF Downloads 28011547 Philosophical Foundations of Education at the Kazakh Languages by Aiding Communicative Methods
Authors: Duisenova Marzhan
Abstract:
This paper considers the looking from a philosophical point of view the interactive technology and tiered developing Kazakh language teaching primary school pupils through the method of linguistic communication, content and teaching methods formed in the education system. The values determined by the formation of new practical ways that could lead to a novel qualitative level and solving the problem. In the formation of the communicative competence of elementary school students would be to pay attention to other competencies. It helps to understand the motives and needs socialization of students, the development of their cognitive abilities and participate in language relations arising from different situations. Communicative competence is the potential of its own in pupils creative language activity. In this article, the Kazakh language teaching in primary school communicative method is presented. The purpose of learning communicative method, personal development, effective psychological development of the child, himself-education, expansion and growth of language skills and vocabulary, socialization of children, the adoption of the laws of life in the social environment, analyzed the development of vocabulary richness of the language that forms the erudition to ensure continued improvement of education of the child.Keywords: communicative, culture, training, process, method, primary, competence
Procedia PDF Downloads 33911546 Multi-Stream Graph Attention Network for Recommendation with Knowledge Graph
Abstract:
In recent years, Graph neural network has been widely used in knowledge graph recommendation. The existing recommendation methods based on graph neural network extract information from knowledge graph through entity and relation, which may not be efficient in the way of information extraction. In order to better propose useful entity information for the current recommendation task in the knowledge graph, we propose an end-to-end Neural network Model based on multi-stream graph attentional Mechanism (MSGAT), which can effectively integrate the knowledge graph into the recommendation system by evaluating the importance of entities from both users and items. Specifically, we use the attention mechanism from the user's perspective to distil the domain nodes information of the predicted item in the knowledge graph, to enhance the user's information on items, and generate the feature representation of the predicted item. Due to user history, click items can reflect the user's interest distribution, we propose a multi-stream attention mechanism, based on the user's preference for entities and relationships, and the similarity between items to be predicted and entities, aggregate user history click item's neighborhood entity information in the knowledge graph and generate the user's feature representation. We evaluate our model on three real recommendation datasets: Movielens-1M (ML-1M), LFM-1B 2015 (LFM-1B), and Amazon-Book (AZ-book). Experimental results show that compared with the most advanced models, our proposed model can better capture the entity information in the knowledge graph, which proves the validity and accuracy of the model.Keywords: graph attention network, knowledge graph, recommendation, information propagation
Procedia PDF Downloads 11711545 Restriction on the Freedom of Economic Activity in the Polish Energy Law
Authors: Zofia Romanowska
Abstract:
Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.Keywords: license, energy law, energy market, public goods, regulator
Procedia PDF Downloads 24611544 Doing More with Less: Passion for Entrepreneurship in the Research-Constraint Contexts of Developing and Emerging Economies
Authors: Marcel Hechler
Abstract:
Since passion is considered one of the most important motivating factors for entrepreneurship, we examined the influence of the availability of resources and information on the emergence of a harmonious passion for entrepreneurship (HPE). Drawing on self-determination theory and a cross-cultural sample of 1,085 entrepreneurs from seven developing countries, we argue that the availability of resources and information increases an entrepreneur's autonomy and, thus, promotes the emergence of HPE.Keywords: harmonious passion, access to resources and information, developing and emerging countries, self-determination theory
Procedia PDF Downloads 16411543 Maintenance Management Practice for Building
Authors: Harold Jideofor Nnachetam
Abstract:
Maintenance management in Nigeria Polytechnic faced many issues due to poor service delivery, inadequate finance, and poor maintenance plan and maintenance backlogs. The purpose of this study is to improve the conventional method practices which tend to be ineffective in Nigeria Polytechnic. The case study was conducted with eight Polytechnics in Nigeria. The selected Polytechnic is based on conventional method practices and its major problems, attempt to implement computerized technology and the willingness of staff to share their experiences. All feedbacks from respondents through semi-structured interview were recorded using video camera and transcribed verbatim. The overall findings of this research indicated; poor service delivery, inadequate financial, poor maintenance planning and maintenance backlogs. There is also need to overcome less man power competencies of maintenance management practices which existed with all eight Polytechnics. In addition, the study also found that the Polytechnics still use conventional maintenance management processes in managing building facility condition. As a result, the maintenance management staff was not able to improve the maintenance management performance at the Polytechnics. The findings are intended to be used for maintenance management practices at Nigeria Polytechnics in order to provide high-quality of building facility with safe and healthy environments.Keywords: maintenance management, conventional method, maintenance management system, Nigeria polytechnic
Procedia PDF Downloads 32211542 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth
Authors: Hui-Chuan Lu
Abstract:
In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster
Procedia PDF Downloads 36211541 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 33911540 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 38711539 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle
Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang
Abstract:
The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids
Procedia PDF Downloads 26911538 Geographic Information System Using Google Fusion Table Technology for the Delivery of Disease Data Information
Authors: I. Nyoman Mahayasa Adiputra
Abstract:
Data in the field of health can be useful for the purposes of data analysis, one example of health data is disease data. Disease data is usually in a geographical plot in accordance with the area. Where the data was collected, in the city of Denpasar, Bali. Disease data report is still published in tabular form, disease information has not been mapped in GIS form. In this research, disease information in Denpasar city will be digitized in the form of a geographic information system with the smallest administrative area in the form of district. Denpasar City consists of 4 districts of North Denpasar, East Denpasar, West Denpasar and South Denpasar. In this research, we use Google fusion table technology for map digitization process, where this technology can facilitate from the administrator and from the recipient information. From the administrator side of the input disease, data can be done easily and quickly. From the receiving end of the information, the resulting GIS application can be published in a website-based application so that it can be accessed anywhere and anytime. In general, the results obtained in this study, divided into two, namely: (1) Geolocation of Denpasar and all of Denpasar districts, the process of digitizing the map of Denpasar city produces a polygon geolocation of each - district of Denpasar city. These results can be utilized in subsequent GIS studies if you want to use the same administrative area. (2) Dengue fever mapping in 2014 and 2015. Disease data used in this study is dengue fever case data taken in 2014 and 2015. Data taken from the profile report Denpasar Health Department 2015 and 2016. This mapping can be useful for the analysis of the spread of dengue hemorrhagic fever in the city of Denpasar.Keywords: geographic information system, Google fusion table technology, delivery of disease data information, Denpasar city
Procedia PDF Downloads 12911537 Information Literacy Among Faculty Members in the Medical Colleges of Khyber Pakhtunkhwa-Pakistan
Authors: Saeed Ullah Jan, Waheed Ullah Kha
Abstract:
Purpose of the study: This study aims to assess faculty members' information literacy skills in public sector medical colleges in Khyber Pakhtunkhwa. Design/Methodology/approach: The descriptive research design was used to conduct and accomplish the study's objectives. The research population consisted of faculty members at public sector medical colleges in Khyber Pakhtunkhwa southern region. Professors, Associate Professors, Assistant Professors, Lecturers, and demonstrators comprise the faculty. The adapted questionnaires were modified and used as data collection instruments. Key findings: The majority of the public sector medical college faculty recognizes the various sources of information, and they use both printed and online materials to identify needed information. The majority of faculty at these medical colleges consults monographs/textbooks regularly, preceded by online journals/medical databases. A good number of medical faculty members opted to use the HEC digital library to locate and access their contents. Delimitations of the study: This study is delimited to three public sector medical colleges operate in southern districts: Khyber Medical University Institute of Medical Sciences (KIMS) in Kohat, the Gomal Medical College (GMC) in Dera Ismail Khan, and the Bannu Medical College (BMC) in Bannu. Practical implication(s): The findings of the study will motivate the policymakers and authorities of these three medical colleges in the southern region of Khyber Pakhtunkhwa to enhance the information literacy skills of medical faculty. This practice will result in an effective medical education in the province. Contribution to the knowledge: No significant work has been done on the Faculty's Information literacy skills at public sector medical colleges in Khyber Pakhtunkhwa. This study will add valuable literature to the literary world.Keywords: information literacy skills-Khyber Pakhtunkhwa, information literacy skills-medical faculty-Khyber Pakhtunkhwa, medical sciences, information literacy, information-literacy-Pakistan
Procedia PDF Downloads 10511536 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments
Authors: Claire Tranter, Coral Dando
Abstract:
Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.Keywords: applied cognition, persuasion, social media, virtual reality
Procedia PDF Downloads 14411535 The Impact of the Covid-19 Crisis on the Information Behavior in the B2B Buying Process
Authors: Stehr Melanie
Abstract:
The availability of apposite information is essential for the decision-making process of organizational buyers. Due to the constraints of the Covid-19 crisis, information channels that emphasize face-to-face contact (e.g. sales visits, trade shows) have been unavailable, and usage of digitally-driven information channels (e.g. videoconferencing, platforms) has skyrocketed. This paper explores the question in which areas the pandemic induced shift in the use of information channels could be sustainable and in which areas it is a temporary phenomenon. While information and buying behavior in B2C purchases has been regularly studied in the last decade, the last fundamental model of organizational buying behavior in B2B was introduced by Johnston and Lewin (1996) in times before the advent of the internet. Subsequently, research efforts in B2B marketing shifted from organizational buyers and their decision and information behavior to the business relationships between sellers and buyers. This study builds on the extensive literature on situational factors influencing organizational buying and information behavior and uses the economics of information theory as a theoretical framework. The research focuses on the German woodworking industry, which before the Covid-19 crisis was characterized by a rather low level of digitization of information channels. By focusing on an industry with traditional communication structures, a shift in information behavior induced by an exogenous shock is considered a ripe research setting. The study is exploratory in nature. The primary data source is 40 in-depth interviews based on the repertory-grid method. Thus, 120 typical buying situations in the woodworking industry and the information and channels relevant to them are identified. The results are combined into clusters, each of which shows similar information behavior in the procurement process. In the next step, the clusters are analyzed in terms of the post and pre-Covid-19 crisis’ behavior identifying stable and dynamic information behavior aspects. Initial results show that, for example, clusters representing search goods with low risk and complexity suggest a sustainable rise in the use of digitally-driven information channels. However, in clusters containing trust goods with high significance and novelty, an increased return to face-to-face information channels can be expected after the Covid-19 crisis. The results are interesting from both a scientific and a practical point of view. This study is one of the first to apply the economics of information theory to organizational buyers and their decision and information behavior in the digital information age. Especially the focus on the dynamic aspects of information behavior after an exogenous shock might contribute new impulses to theoretical debates related to the economics of information theory. For practitioners - especially suppliers’ marketing managers and intermediaries such as publishers or trade show organizers from the woodworking industry - the study shows wide-ranging starting points for a future-oriented segmentation of their marketing program by highlighting the dynamic and stable preferences of elaborated clusters in the choice of their information channels.Keywords: B2B buying process, crisis, economics of information theory, information channel
Procedia PDF Downloads 18411534 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry
Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa
Abstract:
This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge
Procedia PDF Downloads 50111533 A Location-Based Search Approach According to Users’ Application Scenario
Authors: Shih-Ting Yang, Chih-Yun Lin, Ming-Yu Li, Jhong-Ting Syue, Wei-Ming Huang
Abstract:
Global positioning system (GPS) has become increasing precise in recent years, and the location-based service (LBS) has developed rapidly. Take the example of finding a parking lot (such as Parking apps). The location-based service can offer immediate information about a nearby parking lot, including the information about remaining parking spaces. However, it cannot provide expected search results according to the requirement situations of users. For that reason, this paper develops a “Location-based Search Approach according to Users’ Application Scenario” according to the location-based search and demand determination to help users obtain the information consistent with their requirements. The “Location-based Search Approach based on Users’ Application Scenario” of this paper consists of one mechanism and three kernel modules. First, in the Information Pre-processing Mechanism (IPM), this paper uses the cosine theorem to categorize the locations of users. Then, in the Information Category Evaluation Module (ICEM), the kNN (k-Nearest Neighbor) is employed to classify the browsing records of users. After that, in the Information Volume Level Determination Module (IVLDM), this paper makes a comparison between the number of users’ clicking the information at different locations and the average number of users’ clicking the information at a specific location, so as to evaluate the urgency of demand; then, the two-dimensional space is used to estimate the application situations of users. For the last step, in the Location-based Search Module (LBSM), this paper compares all search results and the average number of characters of the search results, categorizes the search results with the Manhattan Distance, and selects the results according to the application scenario of users. Additionally, this paper develops a Web-based system according to the methodology to demonstrate practical application of this paper. The application scenario-based estimate and the location-based search are used to evaluate the type and abundance of the information expected by the public at specific location, so that information demanders can obtain the information consistent with their application situations at specific location.Keywords: data mining, knowledge management, location-based service, user application scenario
Procedia PDF Downloads 12311532 A Spatial Information Network Traffic Prediction Method Based on Hybrid Model
Authors: Jingling Li, Yi Zhang, Wei Liang, Tao Cui, Jun Li
Abstract:
Compared with terrestrial network, the traffic of spatial information network has both self-similarity and short correlation characteristics. By studying its traffic prediction method, the resource utilization of spatial information network can be improved, and the method can provide an important basis for traffic planning of a spatial information network. In this paper, considering the accuracy and complexity of the algorithm, the spatial information network traffic is decomposed into approximate component with long correlation and detail component with short correlation, and a time series hybrid prediction model based on wavelet decomposition is proposed to predict the spatial network traffic. Firstly, the original traffic data are decomposed to approximate components and detail components by using wavelet decomposition algorithm. According to the autocorrelation and partial correlation smearing and truncation characteristics of each component, the corresponding model (AR/MA/ARMA) of each detail component can be directly established, while the type of approximate component modeling can be established by ARIMA model after smoothing. Finally, the prediction results of the multiple models are fitted to obtain the prediction results of the original data. The method not only considers the self-similarity of a spatial information network, but also takes into account the short correlation caused by network burst information, which is verified by using the measured data of a certain back bone network released by the MAWI working group in 2018. Compared with the typical time series model, the predicted data of hybrid model is closer to the real traffic data and has a smaller relative root means square error, which is more suitable for a spatial information network.Keywords: spatial information network, traffic prediction, wavelet decomposition, time series model
Procedia PDF Downloads 14711531 Continuance Intention to Use E-administration Information Portal by Non-teaching Staff in Selected Universities, Southwest, Nigeria
Authors: Adebayo Muritala Adegbore
Abstract:
The e-administration is increasingly being recognized as an important phenomenon in this 21st century and its place in society both at the public and private levels cannot be downplayed. Of close attention is how these platforms are adopted and used in academia due to academia’s role in shaping the overall development of the society, particularly the administrative activities of the non-teaching staff in universities since much has not been done to find out the continuance intention to use e-administration information portal by non-teaching staff in universities. This study, therefore, investigates the continuance intention to use e-administration of information portals of senior non-teaching staff in selected universities in southwest Nigeria. The study’s design was a correlational survey using simple random sampling to select three hundred and fifty-two (352) senior non-teaching staff in the selected universities. A standardized questionnaire was used for data capturing while data were analyzed using the descriptive statistics of frequency counts, percentages, means, and standard deviation for the research questions and the Pearson Product Moment Correlation was used for the hypothesis. Findings revealed that the continuance intention of senior non-teaching staff to use e-administration information portal is positive (x = 3.13), the university portal is one of the most utilized e-administration tools (83.4%), while there was an inversely significant relationship between continuance intention to use and use of e-administration information portal (r = -.254; p< 0.05; N = 320).Keywords: e-administration, e-portal, non-teaching staff, information systems, continuance intention, use of e-administration portals
Procedia PDF Downloads 19711530 PLC Based Automatic Railway Crossing System for India
Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan
Abstract:
Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.Keywords: level crossing, PLC, sensors, SCADA
Procedia PDF Downloads 42711529 External Retinal Prosthesis Image Processing System Used One-Cue Saliency Map Based on DSP
Authors: Yili Chen, Jixiang Fu, Zhihua Liu, Zhicheng Zhang, Rongmao Li, Nan Fu, Yaoqin Xie
Abstract:
Retinal prothesis is designed to help the blind to get some sight.It is made up of internal part and external part.In external part ,there is made up of camera, image processing, and RF transmitter.In internal part, there is RF receiver, implant chip,micro-electrode.The image got from the camera should be processed by suitable stragies to corresponds to stimulus the electrode.Nowadays, the number of the micro-electrode is hundreds and we don’t know the mechanism how the elctrode stimulus the optic nerve, an easy way to the hypothesis is that the pixel in the image is correspondence to the electrode.So it is a question how to get the important information of the image captured from the picture.There are many strategies to experimented to get the most important information as soon as possible, due to the real time system.ROI is a useful algorithem to extract the region of the interest.Our paper will explain the details of the orinciples and functions of the ROI.And based on this, we simplified the ROI algrithem,and used it in outside image prcessing DSP system of the retinal prothesis.Results show that our image processing stratiges is suitable for real-time retinal prothesis and can cut redundant information and help useful information to express in the low-size image.Keywords: image processing, region of interest, saliency map, low-size image, useful information express, cut redundant information in image
Procedia PDF Downloads 28211528 Understanding Informal Settlements: The Role of Geo-Information Tools
Authors: Musyimi Mbathi
Abstract:
Information regarding social, political, demographic, economic and other attributes of human settlement is important for decision makers at all levels of planning, as they have to grapple with dynamic environments often associated with settlements. At the local level, it is particularly important for both communities and urban managers to have accurate and reliable information regarding all planning attributes. Settlement mapping, in particular, informal settlements mapping in Kenya, has over the past few years been carried out using modern tools like Geographic information systems (GIS) and remote sensing for spatial data analysis and planning. GIS tools offer a platform for integration of spatial and non-spatial data as well as visualisation of the settlements. The capabilities offered by these tools have enabled communities to participate especially in the planning and management of new infrastructure as well as settlement upgrading. Land tenure based projects within informal settlements have also relied on GIS and related tools with considerable success. Additionally, the adoption of participatory approaches and use of geo-information tools helped to provide a basis for all inclusive planning thus promoting accountability, transparency, legitimacy, and other dimensions of governance within human settlement planning. The paper examines the context and application of geo-information tools for planning within low-income settlements of Kenya. A case study of Kiambiu settlement will be used to demonstrate how the tools have been applied for planning and decision-making purposes.Keywords: informal settlements, GIS, governance, modern tools
Procedia PDF Downloads 500