Search results for: incremental information content
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16194

Search results for: incremental information content

14394 Development and In vitro Characterization of Diclofenac-Loaded Microparticles

Authors: Prakriti Diwan, S. Saraf

Abstract:

The present study involves preparation and evaluation of microparticles of diclofenac sodium. The microparticles were prepared by the emulsion solvent evaporation techniques using ethylcellulose polymer. Four different batches of microspheres were prepared by varying the concentration of polymer from 50% to 80% w/w. The microspheres were characterized for drug content, percentage yield and encapsulation efficiency, particle size analysis and surface morphology. Microsphere prepared with high drug content produces higher percentage yield and encapsulation efficiency values. It was observed the increase in concentration of the polymer, increases the mean particle size of the microspheres. The effect of polymer concentration on the in vitro release of diclofenac from the microspheres was also studied. The production microparticles yield showed 98.74%, mean particle size 956.32µm and loading efficiency 97.15%. The results were found that microparticles prepared had slower release than microparticles (p>0.05). Therefore, it may be concluded that drug loaded microparticles are suitable delivery systems for diclofenac sodium.

Keywords: diclofenac sodium, emulsion solvent evaporation, ethylcellulose, microparticles

Procedia PDF Downloads 287
14393 Outline of a Technique for the Recommendation of Tourism Products in Cuba Using GIS

Authors: Jesse D. Cano, Marlon J. Remedios

Abstract:

Cuban tourism has developed so much in the last 30 years to the point of becoming one of the engines of the Cuban economy. With such a development, Cuban companies opting for e-tourism as a way to publicize their products and attract customers has also grown. Despite this fact, the majority of Cuban tourism-themed websites simply provide information on the different products and services they offer which results in many cases, in the user getting overwhelmed with the amount of information available which results in the user abandoning the search before he can find a product that fits his needs. Customization has been recognized as a critical factor for successful electronic tourism business and the use of recommender systems is the best approach to address the problem of personalization. This paper aims to outline a preliminary technique to obtain predictions about which products a particular user would give a better evaluation; these products would be those which the website would show in the first place. To achieve this, the theoretical elements of the Cuban tourism environment are discussed; recommendation systems and geographic information systems as tools for information representation are also discussed. Finally, for each structural component identified, we define a set of rules that allows obtaining an electronic tourism system that handles the personalization of the service provided effectively.

Keywords: geographic information system, technique, tourism products, recommendation

Procedia PDF Downloads 503
14392 Dynamics of Agricultural Information and Effect on Income of Melon Farmers in Enugu Ezike Agricultural Zone of Enugu State, Nigeria

Authors: Iwuchukwu J. C., Ekeh G. Madukwe, M. C., Asadu A. N.

Abstract:

Melon has significant importance of easy to plant, early maturing, low nutrient requirement and high yielding. Yet many melon farmers in the study area are either diversifying or abandoning this enterprise probably because of lack of agricultural knowledge/information and consequent reduction in output and income. The study was therefore carried out to asses effects of agricultural information on income of melon farmers in Enugu-Ezike Agricultural zone of Enugu state, Nigeria. Three blocks, nine circles and ninety melon farmers who were purposively selected constituted the sample for the study..Data were collected with interview schedule. Percentage and chart were used to present some of the data while some were analysed with mean score and correlation. The findings reveal that. average annual income of these respondents from melon was about seven thousand and five hundred Naira (approximately forty five Dollars). while their total average monthly income (income from melon and other sources) was about one thousand and two hundred Naira (approximately seven Dollars). About 42.% and 62% of the respondents in their respective order did not receive information on agricultural matters and melon production. Among the minority that received information on melon production, most of them sourced it from neighbours/friends/relatives. Majority of the respondents needed information on how to plant melon through interpersonal contact (face to face) using Igbo language as medium of communication and extension agent as teacher or resource person. The study also reveal a significant and positive relationship between number of times respondents received information on agriculture and their total monthly income. There was also a strong, positive and significant relationship between number of times respondents received information on melon and their annual income on melon production. The study therefore recommends that governmental and non-governmental organizations/ institutions should strengthen these farmers access to information on agriculture and melon specifically so as to boost their output and income.

Keywords: farmers, income, information, melon

Procedia PDF Downloads 246
14391 Parents of Kids with Type 1 Diabetes Sleep with Open Eyes

Authors: Samereh Abdoli, Amit Vora, Anusha Vora

Abstract:

Aim: To qualitatively investigate diabetes burnout in parents of children with Type 1 Diabetes (T1D) who shared their experiences through YouTube videos in order to inform future interventions and improve diabetes practice. Methods: A qualitative descriptive approach was used to explore YouTube videos. Of the 568 videos that were identified, only 9 videos met the inclusion criteria of the study. Results: After the videos were transcribed and analyzed using qualitative content analysis, it was revealed that parents shared common concerns and experiences and they translated into three main themes: I do not ever get a break, I am exhausted, I can’t burn out, and I just need a break Conclusion: All in all, the literature revealed that there are negative psychosocial outcomes associated with caring for a child with T1D, but there is a lack of information on diabetes burnout and how parents’ well-being are affected. Reports of self-neglect and sleep deprivation only confirm the need for intervention for parents of children with T1D. The hope with this study is that burnout can be recognized early on and appropriate interventions put in place to help parents cope with the stressors of caring for a child with a chronic disease.

Keywords: Diabetes burnout, type 1 diabetes, qualitative research, parents

Procedia PDF Downloads 175
14390 Analysis of Information Sharing and Capacity Constraint on Backlog Bullwhip Effect in Two Level Supply Chain

Authors: Matloub Hussaina

Abstract:

This paper investigates the impact of information sharing and capacity constraints on backlog bullwhip effect of Automatic Pipe Line Inventory and Order Based Production Control System (APIOBPCS). System dynamic simulation using iThink Software has been applied. It has been found that smooth ordering by Tier 1 can be achieved when Tier 1 has medium capacity constraints. Simulation experiments also show that information sharing helps to reduce 50% of backlog bullwhip effect in capacitated supply chains. This knowledge is of value per se, giving supply chain operations managers and designers a practical way in to controlling the backlog bullwhip effect. Future work should investigate the total cost implications of capacity constraints and safety stocks in multi-echelon supply chain.

Keywords: supply chain dynamics, information sharing, capacity constraints, simulation, APIOBPCS

Procedia PDF Downloads 318
14389 Design Criteria for an Internal Information Technology Cost Allocation to Support Business Information Technology Alignment

Authors: Andrea Schnabl, Mario Bernhart

Abstract:

The controlling instrument of an internal cost allocation (IT chargeback) is commonly used to make IT costs transparent and controllable. Information Technology (IT) became, especially for information industries, a central competitive factor. Consequently, the focus is not on minimizing IT costs but on the strategic aligned application of IT. Hence, an internal IT cost allocation should be designed to enhance the business-IT alignment (strategic alignment of IT) in order to support the effective application of IT from a company’s point of view. To identify design criteria for an internal cost allocation to support business alignment a case study analysis at a typical medium-sized firm in information industry is performed. Documents, Key Performance Indicators, and cost accounting data over a period of 10 years are analyzed and interviews are performed. The derived design criteria are evaluated by 6 heads of IT departments from 6 different companies, which have an internal IT cost allocation at use. By applying these design criteria an internal cost allocation serves not only for cost controlling but also as an instrument in strategic IT management.

Keywords: accounting for IT services, Business IT Alignment, internal cost allocation, IT controlling, IT governance, strategic IT management

Procedia PDF Downloads 155
14388 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 183
14387 Empowering Rangatahi: Amplifying Youth Voices on Smartphone and Social Media Use in Aotearoa New Zealand

Authors: Melissa L Gould

Abstract:

The uptick in social media users during the COVID-19 lockdowns has accelerated concerns about cellphone addiction, cyberbullying, and exposure to harmful content, particularly mis- and disinformation and extremist content. The validity of these concerns is synthesized for media technologists to expose the strategies behind social media and search platform technology and explain why they restrict their children from using it. Banning cell phones in schools, increasing age limits on social media accounts, and putting warning labels on social media are some of the solutions proposed to protect young people from smartphones and social media. Largely missing from these conversations are the voices of young people (rangatahi). Instead, their lived experiences are being told and managed by adults. This presentation will outline my research that amplified the voices and lived experiences of young people by positioning them as experts. Using The Social Dilemma as a discussion prompt, the focus groups of rangatahi in Aotearoa, New Zealand, provide a space for young people to articulate their own lived experiences and respond to the dominant narratives on their generation's use of smartphones and social media.

Keywords: social media, smart phones, young people, social dilemma

Procedia PDF Downloads 30
14386 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 154
14385 Mobile Learning: Toward Better Understanding of Compression Techniques

Authors: Farouk Lawan Gambo

Abstract:

Data compression shrinks files into fewer bits then their original presentation. It has more advantage on internet because the smaller a file, the faster it can be transferred but learning most of the concepts in data compression are abstract in nature therefore making them difficult to digest by some students (Engineers in particular). To determine the best approach toward learning data compression technique, this paper first study the learning preference of engineering students who tend to have strong active, sensing, visual and sequential learning preferences, the paper also study the advantage that mobility of learning have experienced; Learning at the point of interest, efficiency, connection, and many more. A survey is carried out with some reasonable number of students, through random sampling to see whether considering the learning preference and advantages in mobility of learning will give a promising improvement over the traditional way of learning. Evidence from data analysis using Ms-Excel as a point of concern for error-free findings shows that there is significance different in the students after using learning content provided on smart phone, also the result of the findings presented in, bar charts and pie charts interpret that mobile learning has to be promising feature of learning.

Keywords: data analysis, compression techniques, learning content, traditional learning approach

Procedia PDF Downloads 347
14384 Evaluation of Water Quality on the Strength of Simple Concrete: Case Study of Wells in Jipijapa, Manabí, Ecuador

Authors: Julio Cesar Pino Tarragó, Dunia Lisbet Domínguez Gálvez, Luis Alfonso Moreno Ponce, Jhony Julio Regalado Jalca

Abstract:

This study examines the impact of three distinct types of water on the compressive strength of plain concrete, focusing on samples from wells in Jipijapa, Manabí, Ecuador: Joa water, characterized by high sulfur content; Chade 1 water, with low sulfur content; and Chade 2 water, which is highly brackish. Compressive strength tests were conducted at 7, 14, and 28 days to assess the influence of these water types on the structural integrity of the concrete. The results indicate that both brackish and sulfur-rich water significantly reduces concrete strength, while Chade 1 water, though initially enhancing strength, displays variability in long-term performance. These outcomes underscore the importance of optimizing construction practices in regions like Jipijapa, where potable water is scarce, by exploring sustainable alternatives for using non-potable water, thereby conserving limited water resources.

Keywords: compressive strength, plain concrete, sulfur water, brackish water, water quality

Procedia PDF Downloads 35
14383 Developing a Toolkit of Undergraduate Nursing Student’ Desirable Characteristics (TNDC) : An application Item Response Theory

Authors: Parinyaporn Thanaboonpuang, Siridej Sujiva, Shotiga Pasiphul

Abstract:

The higher education reform that integration of nursing programmes into the higher education system. Learning outcomes represent one of the essential building blocks for transparency within higher education systems and qualifications. The purpose of this study is to develop a toolkit of undergraduate nursing student’desirable characteristics assessment on Thai Qualifications Framework for Higher education and to test psychometric property for this instrument. This toolkit seeks to improve on the Computer Multimedia test. There are three skills to be examined: Cognitive skill, Responsibility and Interpersonal Skill, and Information Technology Skill. The study was conduct in 4 phases. In Phase 1. Based on developed a measurement model and Computer Multimedia test. Phase 2 two round focus group were conducted, to determine the content validity of measurement model and the toolkit. In Phase 3, data were collected using a multistage random sampling of 1,156 senior undergraduate nursing student were recruited to test psychometric property. In Phase 4 data analysis was conducted by descriptive statistics, item analysis, inter-rater reliability, exploratory factor analysis and confirmatory factor analysis. The resulting TNDC consists of 74 items across the following four domains: Cognitive skill, Interpersonal Skill, Responsibility and Information Technology Skill. The value of Cronbach’ s alpha for the four domains were .781, 807, .831, and .865, respectively. The final model in confirmatory factor analysis fit quite well with empirical data. The TNDC was found to be appropriate, both theoretically and statistically. Due to these results, it is recommended that the toolkit could be used in future studies for Nursing Program in Thailand.

Keywords: toolkit, nursing student’ desirable characteristics, Thai qualifications framework

Procedia PDF Downloads 535
14382 Applications of Building Information Modeling (BIM) in Knowledge Sharing and Management in Construction

Authors: Shu-Hui Jan, Shih-Ping Ho, Hui-Ping Tserng

Abstract:

Construction knowledge can be referred to and reused among involved project managers and job-site engineers to alleviate problems on a construction job-site and reduce the time and cost of solving problems related to constructability. This paper proposes a new methodology to provide sharing of construction knowledge by using the Building Information Modeling (BIM) approach. The main characteristics of BIM include illustrating 3D CAD-based presentations and keeping information in a digital format, and facilitation of easy updating and transfer of information in the 3D BIM environment. Using the BIM approach, project managers and engineers can gain knowledge related to 3D BIM and obtain feedback provided by job-site engineers for future reference. This study addresses the application of knowledge sharing management in the construction phase of construction projects and proposes a BIM-based Knowledge Sharing Management (BIMKSM) system for project managers and engineers. The BIMKSM system is then applied in a selected case study of a construction project in Taiwan to verify the proposed methodology and demonstrate the effectiveness of sharing knowledge in the BIM environment. The combined results demonstrate that the BIMKSM system can be used as a visual BIM-based knowledge sharing management platform by utilizing the BIM approach and web technology.

Keywords: construction knowledge management, building information modeling, project management, web-based information system

Procedia PDF Downloads 352
14381 Investigation Into the Effects of Egg Shells Powder and Groundnut Husk Ash on the Properties of Concrete

Authors: Usman B.M., Basheer O. B., . Ahmed A., Amali N. U., Taufeeq O.

Abstract:

This study presents an investigation into the improvement of strength properties of concrete using egg shell powder (ESP) and groundnut husk ash (GHA) as additives so as to reduce its high cost and find alternative disposal method for agricultural waste. A standard consistency test was carried out on the egg shell powder and groundnut husk ash. A prescribed concrete mix ratio of 1:2:4 concrete cubes (150mm by 150mm) and water-cement ratio of 0.6 were casted. A total of One hundred and forty four (144) cubes were cast and cured for 3, 7 and 28 days and compressive strength subsequently determined in comparison with the relevant specifications. Consistency test on the cement paste at the various concentrations exhibited an increase in the setting time as the concentration increases with the highest value recorded at 5% egg shell powder and groundnut husk ash concentration as 219 minutes for the initial setting time and 275 minutes for the final setting time as against the control specimen of 159 minutes and 234 minutes for both initial and final setting times respectively. The results of the investigations showed that GHA was predominantly of Silicon oxide (56.73%) and a combined SiO₂, Al₂O₃ and Fe₂O₃ content of 66.75%; and the result of the investigations showed that ESP was predominantly of Calcium oxide (52.75%) and a combined SiO₂, Al₂O₃ and Fe₂O₃ content of 3.86%. The addition of GHA and ESP in concrete showed slight different in compressive strength with increase in GHA and ESP additive up to 5% and high decrease in compressive strength with further increase in GHA and ESP content. The 28 days compressive strength of the concrete cubes; compared with that of the control; showed a slight increase. Thus the use of GHA and ESP as partial replacement of cement will provide an economic use of by-product and consequently produce a cheaper concrete construction without comprising its strength

Keywords: additive, concrete, eggshell powder, groundnut husk ash compressive strength

Procedia PDF Downloads 137
14380 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 83
14379 Novel Recommender Systems Using Hybrid CF and Social Network Information

Authors: Kyoung-Jae Kim

Abstract:

Collaborative Filtering (CF) is a popular technique for the personalization in the E-commerce domain to reduce information overload. In general, CF provides recommending items list based on other similar users’ preferences from the user-item matrix and predicts the focal user’s preference for particular items by using them. Many recommender systems in real-world use CF techniques because it’s excellent accuracy and robustness. However, it has some limitations including sparsity problems and complex dimensionality in a user-item matrix. In addition, traditional CF does not consider the emotional interaction between users. In this study, we propose recommender systems using social network and singular value decomposition (SVD) to alleviate some limitations. The purpose of this study is to reduce the dimensionality of data set using SVD and to improve the performance of CF by using emotional information from social network data of the focal user. In this study, we test the usability of hybrid CF, SVD and social network information model using the real-world data. The experimental results show that the proposed model outperforms conventional CF models.

Keywords: recommender systems, collaborative filtering, social network information, singular value decomposition

Procedia PDF Downloads 289
14378 Influence of AgNO3 Treatment on the Flavonolignan Production in Cell Suspension Culture of Silybum marianum (L.) Gaertn

Authors: Anna Vildová, H. Hendrychová, J. Kubeš, L. Tůmová

Abstract:

The abiotic elicitation is one of the methods for increasing the secondary metabolites production in plant tissue cultures and it seems to be more effective than traditional strategies. This study verified the use of silver nitrate as elicitor to enhance flavonolignans and flavonoid taxifolin production in suspension culture of Sylibum marianum (L.) Gaertn. Silver nitrate in various concentrations (5.887.10-3 mol/L, 5.887.10-4 mol/L, 5.887.10-5 mol/L) was used as elicitor. The content of secondary metabolites in cell suspension cultures was determined by high performance liquid chromatography. The samples were taken after 6, 12, 24, 48, 72 and 168 hours of treatment. The highest content of taxifolin production (2.2 mg.g-1) in cell suspension culture of Silybum marianum (L.) Gaertn. was detected after silver nitrate (5.887.10-4 mol/L) treatment and 72 h application. Flavonolignans such as silybinA, silybin B, silydianin, silychristin, isosilybin A, isosilybin B were not produced by cell suspension culture of S. marianum after elicitor treatment. Our results show that the secondarymetabolites could be released from S. marianum cells into the nutrient medium by changed permeability of cell wall.

Keywords: Silybum marianum (L.) Gaertn., elicitation, silver nitrate, taxifolin

Procedia PDF Downloads 444
14377 A Three Elements Vector Valued Structure’s Ultimate Strength-Strong Motion-Intensity Measure

Authors: A. Nicknam, N. Eftekhari, A. Mazarei, M. Ganjvar

Abstract:

This article presents an alternative collapse capacity intensity measure in the three elements form which is influenced by the spectral ordinates at periods longer than that of the first mode period at near and far source sites. A parameter, denoted by β, is defined by which the spectral ordinate effects, up to the effective period (2T_1), on the intensity measure are taken into account. The methodology permits to meet the hazard-levelled target extreme event in the probabilistic and deterministic forms. A MATLAB code is developed involving OpenSees to calculate the collapse capacities of the 8 archetype RC structures having 2 to 20 stories for regression process. The incremental dynamic analysis (IDA) method is used to calculate the structure’s collapse values accounting for the element stiffness and strength deterioration. The general near field set presented by FEMA is used in a series of performing nonlinear analyses. 8 linear relationships are developed for the 8structutres leading to the correlation coefficient up to 0.93. A collapse capacity near field prediction equation is developed taking into account the results of regression processes obtained from the 8 structures. The proposed prediction equation is validated against a set of actual near field records leading to a good agreement. Implementation of the proposed equation to the four archetype RC structures demonstrated different collapse capacities at near field site compared to those of FEMA. The reasons of differences are believed to be due to accounting for the spectral shape effects.

Keywords: collapse capacity, fragility analysis, spectral shape effects, IDA method

Procedia PDF Downloads 239
14376 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 165
14375 Implications on Informed Consent of Information Available to Patients on the Internet Regarding Hip and Knee Osteoarthritis

Authors: R. W. Walker, J. M. Lynch, K. Anderson, R. G. Middleton

Abstract:

Hip and knee arthritis are two of the commonest conditions that result in elective orthopaedic outpatient referral. At clinic appointments advice given regarding lifestyle modifications or treatment options may not be fully understood by patients. The majority of patients now use the internet to research their condition and use this to inform their decision about treatments. This study assessed the quality of patient information regarding hip and knee arthritis. To assess the quality of patient information regarding knee and hip arthritis available on the internet. Two internet searches were carried out one month apart using the search terms “knee arthritis” and “hip arthritis” on Google, a search engine that accounts for over 90% or internet searches in the UK. Sites were evaluated using the DISCERN instrument, a validated tool for measuring the quality of consumer health information. The first 50 results for each search were analysed by two different observers and discrepancies in scores were reviewed by both observers together and a score was agreed upon. In total 200 search result websites were assessed, of which 84 fulfilled the inclusion criteria. 53% (n=44) were funded directly by commercial healthcare businesses and of these, 70% (n=31) were funded by a surgeon/hospital promoting end-user purchase of surgical intervention. Overall 35% (n=29) websites were “for-profit” information websites where funding was from advertising revenues from pharmaceutical and prosthesis companies. 81% (n=67) offered information about surgical treatments however only 43% (n=36) mentioned the risk of complications of surgery. 67% (n=56) did not have any reference to sources for the information they detailed and 57% (n=47) had no apparent date for the production of the information they offered. Overall 17% (n=14) of websites were judged as being of high quality, with 29% (n=24) being of moderate quality and 54% (n=45) being of low quality. The quality of health information regarding hip and knee arthritis on the internet is highly variable and the majority of websites assessed were of poor quality. A preponderance of websites were funded by a commercial surgical service offering athroplasty at consumer cost, with a further third being funded indirectly via advertising revenues from commercial businesses. The vast majority of websites only mentioned surgery as a treatment and nearly half of all websites did not mention the risks or complications of surgical intervention at all. This has implications for the consent process. As such, Clinicians should be aware of the heterogeneous nature of patient information on the internet and be prepared to advise their patients about good quality websites where further reliable information can be sought.

Keywords: hip osteoarthritis, informed consent, knee osteoarthritis, patient information

Procedia PDF Downloads 93
14374 The Developing of Teaching Materials Online for Students in Thailand

Authors: Pitimanus Bunlue

Abstract:

The objectives of this study were to identify the unique characteristics of Salaya Old market, Phutthamonthon, Nakhon Pathom and develop the effective video media to promote the homeland awareness among local people and the characteristic features of this community were collectively summarized based on historical data, community observation, and people’s interview. The acquired data were used to develop a media describing prominent features of the community. The quality of the media was later assessed by interviewing local people in the old market in terms of content accuracy, video, and narration qualities, and sense of homeland awareness after watching the video. The result shows a 6-minute video media containing historical data and outstanding features of this community was developed. Based on the interview, the content accuracy was good. The picture quality and the narration were very good. Most people developed a sense of homeland awareness after watching the video also as well.

Keywords: audio-visual, creating homeland awareness, Phutthamonthon Nakhon Pathom, research and development

Procedia PDF Downloads 291
14373 On the Optimality Assessment of Nano-Particle Size Spectrometry and Its Association to the Entropy Concept

Authors: A. Shaygani, R. Saifi, M. S. Saidi, M. Sani

Abstract:

Particle size distribution, the most important characteristics of aerosols, is obtained through electrical characterization techniques. The dynamics of charged nano-particles under the influence of electric field in electrical mobility spectrometer (EMS) reveals the size distribution of these particles. The accuracy of this measurement is influenced by flow conditions, geometry, electric field and particle charging process, therefore by the transfer function (transfer matrix) of the instrument. In this work, a wire-cylinder corona charger was designed and the combined field-diffusion charging process of injected poly-disperse aerosol particles was numerically simulated as a prerequisite for the study of a multi-channel EMS. The result, a cloud of particles with non-uniform charge distribution, was introduced to the EMS. The flow pattern and electric field in the EMS were simulated using computational fluid dynamics (CFD) to obtain particle trajectories in the device and therefore to calculate the reported signal by each electrometer. According to the output signals (resulted from bombardment of particles and transferring their charges as currents), we proposed a modification to the size of detecting rings (which are connected to electrometers) in order to evaluate particle size distributions more accurately. Based on the capability of the system to transfer information contents about size distribution of the injected particles, we proposed a benchmark for the assessment of optimality of the design. This method applies the concept of Von Neumann entropy and borrows the definition of entropy from information theory (Shannon entropy) to measure optimality. Entropy, according to the Shannon entropy, is the ''average amount of information contained in an event, sample or character extracted from a data stream''. Evaluating the responses (signals) which were obtained via various configurations of detecting rings, the best configuration which gave the best predictions about the size distributions of injected particles, was the modified configuration. It was also the one that had the maximum amount of entropy. A reasonable consistency was also observed between the accuracy of the predictions and the entropy content of each configuration. In this method, entropy is extracted from the transfer matrix of the instrument for each configuration. Ultimately, various clouds of particles were introduced to the simulations and predicted size distributions were compared to the exact size distributions.

Keywords: aerosol nano-particle, CFD, electrical mobility spectrometer, von neumann entropy

Procedia PDF Downloads 343
14372 Volunteered Geographic Information Coupled with Wildfire Fire Progression Maps: A Spatial and Temporal Tool for Incident Storytelling

Authors: Cassandra Hansen, Paul Doherty, Chris Ferner, German Whitley, Holly Torpey

Abstract:

Wildfire is a natural and inevitable occurrence, yet changing climatic conditions have increased the severity, frequency, and risk to human populations in the wildland/urban interface (WUI) of the Western United States. Rapid dissemination of accurate wildfire information is critical to both the Incident Management Team (IMT) and the affected community. With the advent of increasingly sophisticated information systems, GIS can now be used as a web platform for sharing geographic information in new and innovative ways, such as virtual story map applications. Crowdsourced information can be extraordinarily useful when coupled with authoritative information. Information abounds in the form of social media, emergency alerts, radio, and news outlets, yet many of these resources lack a spatial component when first distributed. In this study, we describe how twenty-eight volunteer GIS professionals across nine Geographic Area Coordination Centers (GACC) sourced, curated, and distributed Volunteered Geographic Information (VGI) from authoritative social media accounts focused on disseminating information about wildfires and public safety. The combination of fire progression maps with VGI incident information helps answer three critical questions about an incident, such as: where the first started. How and why the fire behaved in an extreme manner and how we can learn from the fire incident's story to respond and prepare for future fires in this area. By adding a spatial component to that shared information, this team has been able to visualize shared information about wildfire starts in an interactive map that answers three critical questions in a more intuitive way. Additionally, long-term social and technical impacts on communities are examined in relation to situational awareness of the disaster through map layers and agency links, the number of views in a particular region of a disaster, community involvement and sharing of this critical resource. Combined with a GIS platform and disaster VGI applications, this workflow and information become invaluable to communities within the WUI and bring spatial awareness for disaster preparedness, response, mitigation, and recovery. This study highlights progression maps as the ultimate storytelling mechanism through incident case studies and demonstrates the impact of VGI and sophisticated applied cartographic methodology make this an indispensable resource for authoritative information sharing.

Keywords: storytelling, wildfire progression maps, volunteered geographic information, spatial and temporal

Procedia PDF Downloads 176
14371 Education Quality Development for Excellence Performance with Higher Education by Using COBIT 5

Authors: Kemkanit Sanyanunthana

Abstract:

The purpose of this research is to study the management system of information technology which supports the education of five private universities in Thailand, according to the case studies which have been developing their qualities and standards of management and education by service provision of information technology to support the excellence performance. The concept to connect information technology with a suitable system has been created by information technology administrators for development, as a system that can be used throughout the organizations to help reach the utmost benefits of using all resources. Hence, the researcher as a person who has been performing these duties within higher education is interested to do this research by selecting the Control Objective for Information and Related Technology 5 (COBIT 5) for the Malcolm Baldrige National Quality Award (MBNQA) of America, or the National Award which applies the concept of Total Quality Management (TQM) to the organization evaluation. Such evaluation is called the Education Criteria for Performance Excellence (EdPEx) focuses on studying and comparing education quality development for excellent performance using COBIT 5 in terms of information technology to study the problems and obstacles of the investigation process for an information technology system, which is considered as an instrument to drive all organizations to reach the excellence performance of the information technology, and to be the model of evaluation and analysis of the process to be in accordance with the strategic plans of the information technology in the universities. This research is conducted in the form of descriptive and survey research according to the case studies. The data collection were carried out by using questionnaires through the administrators working related to the information technology field, and the research documents related to the change management as the main study. The research can be concluded that the performance based on the APO domain process (ALIGN, PLAN AND ORGANISE) of the COBIT 5 standard frame, which emphasizes concordant governance and management of strategic plans for the organizations, could reach only 95%. This might be because of some restrictions such as organizational cultures; therefore, the researcher has studied and analyzed the management of information technology in universities as a whole, under the organizational structures, to reach the performance in accordance with the overall APO domain which would affect the determined strategic plans to be able to develop based on the excellence performance of information technology, and to apply the risk management system at the organizational level into every performance process which would develop the work effectiveness for the resources management of information technology to reach the utmost benefits. 

Keywords: COBIT5, APO, EdPEx Criteria, MBNQA

Procedia PDF Downloads 326
14370 The Covid-19 Pandemic: Transmission, Misinformation, and Implications on Public Health

Authors: Jonathan De Rothewelle

Abstract:

A pandemic, such as that of COVID-19, can be a time of panic and stress; concerns about health supersede others such as work and leisure. With such concern comes the seeking of crucial information— information that, during a global health crisis, could mean the difference between life and death. Whether newspapers, cable news, or radio, media plays an important role in the transmission of medical information to the general public. Moreover, the news media in particular must uphold its obligation to the public to only disseminate factual, useful information. The circulation of misinformation, whether explicit or implicit, may profoundly impact global health. Using a discursive analytic framework founded in linguistics, the images and headlines of top coverage of COVID-19 from the most influential media outlets will be examined. Micro-analyses reveal what may be interpreted as evidence of sensationalism, which may be argued to a form of misinformation, and ultimately a departure from ethical media. Withdrawal from responsible reporting and publishing, expressly in times of epidemic, may cause further confusion and panic.

Keywords: public health, pandemic, public education, media

Procedia PDF Downloads 151
14369 Simultaneous Esterification and Transesterification of High FFA Jatropha Oil Using Reactive Distillation for Biodiesel Production

Authors: Ratna Dewi Kusumaningtyas, Prima Astuti Handayani, Arief Budiman

Abstract:

Reactive Distillation (RD) is a multifunctional reactor which integrates chemical reaction with in situ separation to shift the equilibrium towards the product formation. Thus, it is suitable for equilibrium limited reaction such as esterification and transesterification to enhance the reaction conversion. In this work, the application of RD for high FFA oil esterification-transterification for biodiesel production using sulphuric acid catalyst has been studied. Crude Jatropha Oil with FFA content of 30.57% was utilized as the feedstock. Effects of the catalyst concentration and molar ratio of the alcohol to oils were also investigated. It was revealed that best result was obtained with sulphuric acid catalyst (reaction conversion of 94.71% and FFA content of 1.62%) at 60C, molar ratio of methanol to FFA of 30:1, and catalyst loading of 3%. After undergoing esterification reaction, jatropha oil was then transesterified to produce biodiesel. Transesterification reaction was performed in the presence of NaOH catalyst in RD column at 60C, molar ratio of methanol to oil of 6:1, and catalyst concentration of 1%. It demonstrated that biodiesel produced in this work agreed with the Indonesian National and ASTM standard of fuel.

Keywords: reactive distillation, biodiesel, esterification, transesterification

Procedia PDF Downloads 460
14368 Privacy Preservation Concerns and Information Disclosure on Social Networks: An Ongoing Research

Authors: Aria Teimourzadeh, Marc Favier, Samaneh Kakavand

Abstract:

The emergence of social networks has revolutionized the exchange of information. Every behavior on these platforms contributes to the generation of data known as social network data that are processed, stored and published by the social network service providers. Hence, it is vital to investigate the role of these platforms in user data by considering the privacy measures, especially when we observe the increased number of individuals and organizations engaging with the current virtual platforms without being aware that the data related to their positioning, connections and behavior is uncovered and used by third parties. Performing analytics on social network datasets may result in the disclosure of confidential information about the individuals or organizations which are the members of these virtual environments. Analyzing separate datasets can reveal private information about relationships, interests and more, especially when the datasets are analyzed jointly. Intentional breaches of privacy is the result of such analysis. Addressing these privacy concerns requires an understanding of the nature of data being accumulated and relevant data privacy regulations, as well as motivations for disclosure of personal information on social network platforms. Some significant points about how user's online information is controlled by the influence of social factors and to what extent the users are concerned about future use of their personal information by the organizations, are highlighted in this paper. Firstly, this research presents a short literature review about the structure of a network and concept of privacy in Online Social Networks. Secondly, the factors of user behavior related to privacy protection and self-disclosure on these virtual communities are presented. In other words, we seek to demonstrates the impact of identified variables on user information disclosure that could be taken into account to explain the privacy preservation of individuals on social networking platforms. Thirdly, a few research directions are discussed to address this topic for new researchers.

Keywords: information disclosure, privacy measures, privacy preservation, social network analysis, user experience

Procedia PDF Downloads 281
14367 Solvent-Aided Dilution Approach for Heavy Hydrocarbon Liquid Evaluation in the Eastern Dahomey Basin, Southwestern Nigeria: Case Study of Agbabu Bitumen in Ondo State.

Authors: Adetokunbo Ademola Falade, Oluwatoyin Olakunle Akinsete, Hussein Omeiza Aliu

Abstract:

Solvent-aided dilution processes are often employed to recover bitumen by reducing its viscosity. In this study, methanol, toluene, and xylene were investigated as potential hydrocarbon solvents for solvent-aided hydrocarbon recovery of Agbabu bitumen. Solubility, Viscosity, and Saturate, Aromatic, Resin and Asphaltene (SARA) Analysis tests were carried out to determine the solubility of the bitumen in the solvents, the viscosity, and the SARA fraction of the natural bitumen and bitumen-solvent mixtures. Agbabu bitumen was found to have a high content of saturates and aromatics. Viscosity decreases as pressure increases, while solubility reduces as temperature increases. The experimental diffusivity of the sample decreases with temperature and increases with pressure, indicating that the presence of additional solvent molecules in the oil phase facilitates diffusion. Agbabu bitumen was found to be most soluble in toluene, and its viscosity was reduced most in it. Xylene exhibited a similar effect as toluene on the sample, though lesser but better than methanol. Methanol reduced the saturated content and significantly raised the asphaltene content, keeping the mixture viscosity high, a condition that, in turn, favors its colloidal stability. The colloidal instability index (CII) values, which account for the asphaltene stability of the mixture, show that the bitumen-methanol system with a CII of 0.874 will have mild asphaltene deposit issues while others are unstable. This approach of combining multiple tests with the CII can accurately predict the behavior of Agbabu bitumen in solvents and enhance the decision on the choice of bitumen recovery technology.

Keywords: asphaltene, bitumen, diffusivity, hydrocarbon solvent, SARA

Procedia PDF Downloads 36
14366 How Does Vicia faba-rhizobia Symbiosis Improve Its Performance under Low Phosphorus Availability?

Authors: B. Makoudi, R. Ghanimi, M. Mouradi, A. Kabbadj, M. Farissi, J. J. Drevon, C. Ghoulam

Abstract:

This work focuses on the responses of Vicia fabarhizobia symbiosis to phosphorus deficiency and their contribution to tolerate this constraint. The study was carried out on four faba bean varieties, Aguadulce, Alfia, Luz Otono, and Reina Mora submitted to two phosphorus treatments, deficient and sufficient and cultivated under field and greenhouse hydroaeroponic culture. Plants were harvested at flowering stage for growth, nodulation and phosphorus content assessment. Phosphatases in nodules and rhizospheric soil were analyzed. The impact of phosphorus deficiency on yield component was assessed at maturity stage. Under field conditions, phosphorus deficiency affected negatively nodule biomass and nodule phosphorus content with Alfia and Reina Mora showing the highest biomass reduction. The phosphatase activities in nodules and rhizospheric soil were increased under phosphorus deficiency. At maturity stage, under soil low available phosphorus, the pods number and 100 seeds weight were reduced. The genotypic variation was evident for almost all tested parameters.

Keywords: faba bean, phosphorus, rhizobia, yield

Procedia PDF Downloads 450
14365 Technoscience in the Information Society

Authors: A. P. Moiseeva, Z. S. Zavyalova

Abstract:

This paper focuses on the Technoscience phenomenon and its role in modern society. It gives a review of the latest research on Technoscience. Based on the works of Paul Forman, Bernadette Bensaude-Vincent, Bruno Latour, Maria Caramez Carlotto and others, the authors consider the concept of Technoscience, its specific character and prospects of its development.

Keywords: technoscience, information society, transdisciplinarity, European Technology Platforms

Procedia PDF Downloads 664