Search results for: oblivious information exchange
10375 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis
Authors: Michael Lognoul
Abstract:
In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements
Procedia PDF Downloads 31910374 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning
Authors: Kuliya Muhammed
Abstract:
This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.Keywords: electronic, ICT, institution, internet, learning, technology
Procedia PDF Downloads 38810373 Rumour Containment Using Monitor Placement and Truth Propagation
Authors: Amrah Maryam
Abstract:
The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation
Procedia PDF Downloads 16110372 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China
Authors: Lan Luo
Abstract:
In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects
Procedia PDF Downloads 34310371 Effect of Ti+ Irradiation on the Photoluminescence of TiO2 Nanofibers
Authors: L. Chetibi, D. Hamana, T. O. Busko, M. P. Kulish, S. Achour
Abstract:
TiO2 nanostructures have attracted much attention due to their optical, dielectric and photocatalytic properties as well as applications including optical coating, photocatalysis and photoelectrochemical solar cells. This work aims to prepare TiO2 nanofibers (NFs) on titanium substrate (Ti) by in situ oxidation of Ti foils in a mixture solution of concentrated H2O2 and NaOH followed by proton exchange and calcinations. Scanning Electron microscopy (SEM) revealed an obvious network of TiO2 nanofibers. The photoluminescence (PL) spectra of these nanostructures revealed a broad intense band in the visible light range with a reduced near edge band emission. The PL bands in the visible region, mainly, results from surface oxygen vacancies and others defects. After irradiation with Ti+ ions (the irradiation energy was E = 140 keV with doses of 1013 ions/cm2), the intensity of the PL spectrum decreased as a consequence of the radiation treatment. The irradiation with Ti+ leads to a reduction of defects and generation of non irradiative defects near to the level of the conduction band as evidenced by the PL results. On the other hand, reducing the surface defects on TiO2 nanostructures may improve photocatalytic and optoelectronic properties of this nanostructure.Keywords: TiO2, nanofibers, photoluminescence, irradiation
Procedia PDF Downloads 24410370 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela
Authors: Maria Antonieta Erna Castillo Holly
Abstract:
During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela
Procedia PDF Downloads 13110369 Biomass Carbon Credit Estimation for Sustainable Urban Planning and Micro-climate Assessment
Authors: R. Niranchana, K. Meena Alias Jeyanthi
Abstract:
As a result of the present climate change dilemma, the energy balancing strategy is to construct a sustainable environment has become a top concern for researchers worldwide. The environment itself has always been a solution from the earliest days of human evolution. Carbon capture begins with its accurate estimation and monitoring credit inventories, and its efficient use. Sustainable urban planning with deliverables of re-use energy models might benefit from assessment methods like biomass carbon credit ranking. The term "biomass energy" refers to the various ways in which living organisms can potentially be converted into a source of energy. The approaches that can be applied to biomass and an algorithm for evaluating carbon credits are presented in this paper. The micro-climate evaluation using Computational Fluid dynamics was carried out across the location (1 km x1 km) at Dindigul, India (10°24'58.68" North, 77°54.1.80 East). Sustainable Urban design must be carried out considering environmental and physiological convection, conduction, radiation and evaporative heat exchange due to proceeding solar access and wind intensities.Keywords: biomass, climate assessment, urban planning, multi-regression, carbon estimation algorithm
Procedia PDF Downloads 9510368 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables
Authors: Agah Tugrul Korucu
Abstract:
Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers
Procedia PDF Downloads 35310367 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 9610366 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 22010365 Inverted Umbrella-type Chiral Non-coplanar Ferrimagnetic Structure in Co(NO₃)₂
Authors: O. Maximova, I. L. Danilovich, E. B. Deeva, K. Y. Bukhteev, A. A. Vorobyova, I. V. Morozov, O. S. Volkova, E. A. Zvereva, I. V. Solovyev, S. A. Nikolaev, D. Phuyal, M. Abdel-Hafiez, Y. C. Wang, J. Y. Lin, J. M. Chen, D. I. Gorbunov, K. Puzniak, B. Lake, A. N. Vasiliev
Abstract:
The low-dimensional magnetic systems tend to reveal exotic spin liquid ground states or form peculiar types of long-range order. Among systems of vivid interest are those characterized by the triangular motif in two dimensions. The realization of either ordered or disordered ground state in a triangular, honeycomb, or kagome lattices is are dictated by the competition of exchange interactions, also being sensitive to anisotropy and the spin value of magnetic ions. While the low-spin Heisenberg systems may arrive at a spin liquid long-range entangled quantum state with emergent gauge structures, the high-spin Ising systems may establish the rigid non-collinear structures. This study presents the case of chiral non-coplanar inverted umbrella-type ferrimagnet formed in cobalt nitrate Co(NO₃)₂ below TKeywords: chiral magnetic structures, low dimensional magnetic systems, umbrella-type ferrimagnets, chiral non-coplanar magnetic structures
Procedia PDF Downloads 12510364 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 41910363 Language as an Instrument of Manipulation and Political Control in Nigeria: The 2015 Presidential Election in Perspective
Authors: Abdulmalik Adamu
Abstract:
This study is premised on the assumption that language, particularly, English plays a significant role in the acquisition of power in Nigeria. This is against the backdrop of the fact that for the first time in the political history of Nigeria, an opposition party succeeded in dethroning an incumbent President and ruling political party in an election. Therefore the main objective was to investigate the role of language, particularly English in the acquisition of political power in Nigeria. The corpus generated for this study consisted of excerpts from the media exchange between the spokespersons of the two dominant political parties at the time of the elections in 2015; Olisa Metuh of the Peoples Democratic Party (PDP) and Lai Mohammed of the All Progressive Party (APC). The excerpts were analysed using Critical Discourse Analysis (CDA) as a research tool. The findings revealed the acceptance of the first proposition that English facilitates the acquisition of political power in Nigeria and the rejection of the second proposition that English is an instrument for the exclusion of the populist from political events in Nigeria. The study, therefore, concluded that language, particularly English played a significant role in the acquisition of political power in Nigeria.Keywords: language, power, politics, Critical Discourse Analysis (CDA)
Procedia PDF Downloads 39610362 Information Technology Impacts on the Supply Chain Performance: Case Study Approach
Authors: Kajal Zarei
Abstract:
Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification
Procedia PDF Downloads 28110361 Using Machine Learning Techniques to Extract Useful Information from Dark Data
Authors: Nigar Hussain
Abstract:
It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%.Keywords: big data, dark data, machine learning, heatmap, random forest
Procedia PDF Downloads 3010360 Accumulation and Distribution of Soil Organic Carbon in Oxisols, Tshivhase Estate, Limpopo Province
Authors: M. Rose Ntsewa, P. E. Dlamini, V. E. Mbanjwa, R. Chauke
Abstract:
Land-use change from undisturbed forest to tea plantation may lead to accumulation or loss of soil organic carbon (SOC). So far, the factors controlling the vertical distribution of SOC under the long-term establishment of tea plantation remain poorly understood, especially in oxisols. In this study, we quantified the vertical distribution of SOC under tea plantation compared to adjacent undisturbed forest Oxisols sited at different topographic positions and also determined controlling edaphic factors. SOC was greater in the 30-year-old tea plantation compared to undisturbed forest oxisols and declined with depth across all topographic positions. Most of the SOC was found in the downslope position due to erosion and deposition. In the topsoil, SOC was positively correlated with heavy metals; manganese (r=0.62-0.83; P<0.05) and copper (r=0.45-0.69), effective cation exchange capacity (ECEC) (r=0.72) and mean weight diameter (MWD) (r=0.72-0.73), while in the subsoil SOC was positively correlated with copper (r=0.89-0.92) and zinc (r=0.86), ECEC (r=0.56-0.69) and MWD (r=0.48). These relationships suggest that SOC in the tea plantation, oxisols is chemically stabilized via complexation with heavy metals, and physically stabilized by soil aggregates.Keywords: oxisols, tea plantation, topography, undisturbed forest
Procedia PDF Downloads 15010359 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 4710358 Intellectual Capital and Transparency in Universities: An Empirical Study
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
This paper shows the general perceptions of Spanish university stakeholders in relation to the university’s annual reports and the adequacy and potential of intellectual capital reporting. To this end, a questionnaire was designed and sent to every member of the Social Councils of Spanish public universities. It was thought that these participants would provide a good example of the attitude of university stakeholders since they represent the different social groups connected with universities. From the results of this study we are in the position of confirming the need for universities to offer information on intellectual capital in their accounting information model.Keywords: intellectual capital, disclosure, stakeholders, universities, annual report
Procedia PDF Downloads 50010357 Experimental Investigation of Heat Transfer and Scale Growth Characteristics of Crystallisation Scale in Agitation Tank
Authors: Prasanjit Das, M .M. K. Khan, M. G. Rasul, Jie Wu, I. Youn
Abstract:
Crystallisation scale occurs when dissolved minerals precipitate from an aqueous solution. To investigate the crystallisation scale growth of normal solubility salt, a lab-scale agitation tank with and without baffles were used as a benchmark using potassium nitrate as the test fluid. Potassium nitrate (KNO3) solution in this test leads to crystallisation scale on heat transfer surfaces. This experimental investigation has focused on the effect of surface crystallisation of potassium nitrate on the low-temperature heat exchange surfaces on the wall of the agitation tank. The impeller agitation rate affects the scaling rate at the low-temperature agitation wall and it shows a decreasing scaling rate with an increasing agitation rate. It was observed that there was a significant variation of heat transfer coefficients and scaling resistance coefficients with different agitation rate as well as with varying impeller size, tank with and without baffles and solution concentration.Keywords: crystallisation, heat transfer coefficient, scale, resistance
Procedia PDF Downloads 18410356 Preferred Character Size for Oblique Angles
Authors: Photjanat Phimnom, Haruetai Lohasiriwat
Abstract:
In today’s world, the LED display has been used for presenting visual information under various circumstances. Such information is an important intermediary in the human information processing. Researchers have been investigated diverse factors that influence this process effectiveness. The letter size is undoubtedly one major factor that has been tested and recommended by many standards and guidelines. However, viewing information on the display from direct perpendicular position is a typical assumption whereas many actual events are required viewing from the angles. This current research aims to study the effect of oblique viewing angle and viewing distance on ability to recognize alphabet, number, and English word. The total of ten participants was volunteered to our 3 x 4 x 4 within subject study. Independent variables include three distance levels (2, 6, and 12 m), four oblique angle (0, 45, 60, 75 degree), and four target types (alphabet, number, short words, and long words). Following the method of constant stimuli we found that the larger oblique angle, ranging from 0 to 75 degree from the line of sight, results in significant higher legibility threshold or larger font size required (p-value < 0.05). Viewing distance factor also shows to have significant effect on the threshold (p-value < 0.05). However, the effect from distance factor is expected to be confounded by the quality of the screen we used in our experiment. Lastly, our results show that single alphabet as well as single number are recognized at significant lower threshold (smaller font size) as compared to both short and long words (p-value < 0.05). Therefore, it is recommended that when designs information to be presented on LED display, understanding of all possible ranges of oblique angle should be taken into account in order to specify the preferred letter size. Additionally, the recommendation of letter size for 100 % readability in our tested conditions is provided in the paper.Keywords: letter size, oblique angle, viewing distance, legibility threshold
Procedia PDF Downloads 39410355 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 26810354 Towards Understanding the Notions of Quality Education among Internationally-Accredited Christian Schools in Southeast Asia
Authors: Selaphares Jatico Tajale
Abstract:
This research aims to understand the notions of quality education by conducting case studies among internationally-accredited Christian schools in Southeast Asia. Five internationally-accredited Christian schools from Cambodia, Indonesia, Malaysia, The Philippines, and Singapore will be chosen as cases for this study. This study will utilize the processes of interviews, filling up of questionnaires, and writing of reflections in order to obtain data and relevant information. These processes will be conducted through multi-sectoral respondents such as administrators, academic heads, and faculty. This study employs five aspects within the realm of education as guides in the formulation of questionnaire and guide questions in the interview, namely: a) school context, b) classroom, c) quality assurance, d) stakeholders, e) faculty and staff. Guide interview questions and questions in the questionnaires are formulated to uncover information on how those five aspects were managed to achieve desired student learning outcomes and uncover other information useful for the study.Keywords: internationally-accredited, notions of quality education, quality education, quality education in Southeast Asia
Procedia PDF Downloads 24010353 The Use of Information and Communication Technology within and between Emergency Medical Teams during a Disaster: A Qualitative study
Authors: Badryah Alshehri, Kevin Gormley, Gillian Prue, Karen McCutcheon
Abstract:
In a disaster event, sharing patient information between the pre-hospital Emergency Medical Services (EMS) and Emergency Department (ED) hospitals is a complex process during which important information may be altered or lost due to poor communication. The aim of this study was to critically discuss the current evidence base in relation to communication between pre- EMS hospital and ED hospital professionals by the use of Information and Communication Systems (ICT). This study followed the systematic approach; six electronic databases were searched: CINAHL, Medline, Embase, PubMed, Web of Science, and IEEE Xplore Digital Library were comprehensively searched in January 2018 and a second search was completed in April 2020 to capture more recent publications. The study selection process was undertaken independently by the study authors. Both qualitative and quantitative studies were chosen that focused on factors that are positively or negatively associated with coordinated communication between pre-hospital EMS and ED teams in a disaster event. These studies were assessed for quality, and the data were analyzed according to the key screening themes which emerged from the literature search. Twenty-two studies were included. Eleven studies employed quantitative methods, seven studies used qualitative methods, and four studies used mixed methods. Four themes emerged on communication between EMTs (pre-hospital EMS and ED staff) in a disaster event using the ICT. (1) Disaster preparedness plans and coordination. This theme reported that disaster plans are in place in hospitals, and in some cases, there are interagency agreements with pre-hospital and relevant stakeholders. However, the findings showed that the disaster plans highlighted in these studies lacked information regarding coordinated communications within and between the pre-hospital and hospital. (2) Communication systems used in the disaster. This theme highlighted that although various communication systems are used between and within hospitals and pre-hospitals, technical issues have influenced communication between teams during disasters. (3) Integrated information management systems. This theme suggested the need for an integrated health information system that can help pre-hospital and hospital staff to record patient data and ensure the data is shared. (4) Disaster training and drills. While some studies analyzed disaster drills and training, the majority of these studies were focused on hospital departments other than EMTs. These studies suggest the need for simulation disaster training and drills, including EMTs. This review demonstrates that considerable gaps remain in the understanding of the communication between the EMS and ED hospital staff in relation to response in disasters. The review shows that although different types of ICTs are used, various issues remain which affect coordinated communication among the relevant professionals.Keywords: emergency medical teams, communication, information and communication technologies, disaster
Procedia PDF Downloads 12610352 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony
Authors: Lev Bertovsky
Abstract:
The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning
Procedia PDF Downloads 18510351 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System
Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari
Abstract:
For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)
Procedia PDF Downloads 17010350 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 32810349 Regulation and Transparency: The Case of Corporate Governance Disclosure on the Internet in the United Arab Emirates
Authors: Peter Oyelere, Fernando Zanella
Abstract:
Corporate governance is one of the most discussed and researched issues in recent times in countries around the world, with different countries developing and adopting different governance structures, models and mechanisms. While the Codes of corporate governance have been weaved into the regulatory fabrics of most countries, it is equally critically important that their mechanisms, procedures and practices be transparent, and be transparently communicated to all stakeholders. The Internet can be a very useful and cost-effective tool for the timely and voluntary communication of corporate governance matters to stakeholders. The current paper details the results of an investigation on the extent of which companies listed in the UAE are using the Internet for communicating corporate governance issues, matters and procedures. We surveyed the websites of companies listed on the two UAE Stock Exchanges – the Abu Dhabi Stock Exchange (ADX) and the Dubai Financial Market (DFM) – to find out their level and nature of usage of the Internet for corporate governance disclosures. Regulatory and policy implications of the results of our investigation, as well as other areas for further studies, are also presented in the paper.Keywords: corporate governance, internet financial reporting, regulation, transparency, United Arab Emirates
Procedia PDF Downloads 36510348 Advancing Trustworthy Human-robot Collaboration: Challenges and Opportunities in Diverse European Industrial Settings
Authors: Margarida Porfírio Tomás, Paula Pereira, José Manuel Palma Oliveira
Abstract:
The decline in employment rates across sectors like industry and construction is exacerbated by an aging workforce. This has far-reaching implications for the economy, including skills gaps, labour shortages, productivity challenges due to physical limitations, and workplace safety concerns. To sustain the workforce and pension systems, technology plays a pivotal role. Robots provide valuable support to human workers, and effective human-robot interaction is essential. FORTIS, a Horizon project, aims to address these challenges by creating a comprehensive Human-Robot Interaction (HRI) solution. This solution focuses on multi-modal communication and multi-aspect interaction, with a primary goal of maintaining a human-centric approach. By meeting the needs of both human workers and robots, FORTIS aims to facilitate efficient and safe collaboration. The project encompasses three key activities: 1) A Human-Centric Approach involving data collection, annotation, understanding human behavioural cognition, and contextual human-robot information exchange. 2) A Robotic-Centric Focus addressing the unique requirements of robots during the perception and evaluation of human behaviour. 3) Ensuring Human-Robot Trustworthiness through measures such as human-robot digital twins, safety protocols, and resource allocation. Factor Social, a project partner, will analyse psycho-physiological signals that influence human factors, particularly in hazardous working conditions. The analysis will be conducted using a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. However, the adoption of novel technologies, particularly those involving human-robot interaction, often faces hurdles related to acceptance. To address this challenge, FORTIS will draw upon insights from Social Sciences and Humanities (SSH), including risk perception and technology acceptance models. Throughout its lifecycle, FORTIS will uphold a human-centric approach, leveraging SSH methodologies to inform the design and development of solutions. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No 101135707 (FORTIS).Keywords: skills gaps, productivity challenges, workplace safety, human-robot interaction, human-centric approach, social sciences and humanities, risk perception
Procedia PDF Downloads 5210347 Indentifying Critical Factors Influencing Timeshare Purchases in India
Authors: Shivam Kushwaha, Veena Bansal
Abstract:
Timeshare refers to real estate that is owned simultaneously by many, for a specified time in a year, for a specified numbers of years and is maintained and managed by an agency. Timeshare falls under the umbrella of tourism and is often used for vacation. Timeshare industry has attracted significantly less number of customers in India as compared to the US and Europe. In more than 40 years of existence of timeshare industry, it has not been able to grow its roots among Indian customers. The purpose of the study: To explore perception of Indian customers towards the adoption of timeshare segment of the hospitality industry and identify the factors. Source of data: Survey has been done on existing owners of holidays memberships, resorts or those who at least tourism experience in their past purchases. Methodology: Logistic Regression is used to predict binary responses of the customers based on identified critical factors which might influence timeshare purchases. Result: The study identified four factors: discretionary income, exchange options, ownership pride, risk, and measured their influence on intention to purchases in India. It is recognized that is all four variables are statistically significant while explaining in purchase intentions of customers in India.Keywords: timeshare, holiday, tourism, customer perception, intent to use, Indian tourism
Procedia PDF Downloads 29710346 The Role of Quality Management Tools and Knowledge Sharing in Improving the Level of Academic Staff: An Empirical Investigation of the Jordanian Universities
Authors: Tasneem Alfalah, Salsabeel Alfalah, Jannat Alfalah
Abstract:
The quality of higher education as a service is fundamental to a country’s development because universities prepare the professionals who will work as managers in companies and manage public and private resources and care for the health and education of new generations. Knowledge sharing involves the interaction of all activities between individuals. Thus, the higher education institutions are aiming to improve and assist their academics in generating new ideas by encouraging them to work as a team, to simplify the exchange of the new knowledge and to further improve the learning process and achieving institutional aims. Moreover, the sources of competitive advantage in universities derive from intellectual capital and innovations in which innovation comes through knowledge sharing. Using quality tools is to define the exact requirements needed to create the concept of knowledge sharing and what are the barriers to achieve this in universities. The purpose of this research is critically evaluating the role of using quality tools to facilitate the concept of knowledge sharing and improve the academic staff level in the Jordanian universities.Keywords: higher education, knowledge sharing, quality, management tools
Procedia PDF Downloads 463