Search results for: data to action
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26936

Search results for: data to action

25076 Climate-Smart Agriculture Technologies and Determinants of Farmers’ Adoption Decisions in the Great Rift Valley of Ethiopia

Authors: Theodrose Sisay, Kindie Tesfaye, Mengistu Ketema, Nigussie Dechassa, Mezegebu Getnet

Abstract:

Agriculture is a sector that is very vulnerable to the effects of climate change and contributes to anthropogenic greenhouse gas (GHG) emissions in the atmosphere. By lowering emissions and adjusting to the change, it can also help to reduce climate change. Utilizing Climate-Smart Agriculture (CSA) technology that can sustainably boost productivity, improve resilience, and lower GHG emissions is crucial. This study sought to identify the CSA technologies used by farmers and assess adoption levels and factors that influence them. In order to gather information from 384 smallholder farmers in the Great Rift Valley (GRV) of Ethiopia, a cross-sectional survey was carried out. Data were analysed using percentage, chi-square test, t-test, and multivariate probit model. Results showed that crop diversification, agroforestry, and integrated soil fertility management were the most widely practiced technologies. The results of the Chi-square and t-tests showed that there are differences and significant and positive connections between adopters and non-adopters based on various attributes. The chi-square and t-test results confirmed that households who were older had higher incomes, greater credit access, knowledge of the climate, better training, better education, larger farms, higher incomes, and more frequent interactions with extension specialists had a positive and significant association with CSA technology adopters. The model result showed that age, sex, and education of the head, farmland size, livestock ownership, income, access to credit, climate information, training, and extension contact influenced the selection of CSA technologies. Therefore, effective action must be taken to remove barriers to the adoption of CSA technologies, and taking these adoption factors into account in policy and practice is anticipated to support smallholder farmers in adapting to climate change while lowering emissions.

Keywords: climate change, climate-smart agriculture, smallholder farmers, multivariate probit model

Procedia PDF Downloads 127
25075 A Proposal of Ontology about Brazilian Government Transparency Portal

Authors: Estela Mayra de Moura Vianna, Thiago José Tavares Ávila, Bruno Morais Silva, Diego Henrique Bezerra, Paulo Henrique Gomes Silva, Alan Pedro da Silva

Abstract:

The Brazilian Federal Constitution defines the access to information as a crucial right of the citizen and the Law on Access to Public Information, which regulates this right. Accordingly, the Fiscal Responsibility Act, 2000, amended in 2009 by the “Law of Transparency”, began demanding a wider disclosure of public accounts for the society, including electronic media for public access. Thus, public entities began to create "Transparency Portals," which aim to gather a diversity of data and information. However, this information, in general, is still published in formats that do not simplify understanding of the data by citizens and that could be better especially available for audit purposes. In this context, a proposal of ontology about Brazilian Transparency Portal can play a key role in how these data will be better available. This study aims to identify and implement in ontology, the data model about Transparency Portal ecosystem, with emphasis in activities that use these data for some applications, like audits, press activities, social government control, and others.

Keywords: audit, government transparency, ontology, public sector

Procedia PDF Downloads 506
25074 Evaluating Antimicrobial Activity of Selenium Nanoparticles Against Food-Borne Bacteria

Authors: Qunying Yuan, Manjula Bomma, Adrian Rhoden, Zhigang Xiao

Abstract:

Selenium is an essential micronutrient for all mammals and plays an important role in maintaining human physiological functions. The potential applications of selenium as food supplements, cancer-prevention, antimicrobial and anti-inflammatory agents have been investigated in biomedicine and food sciences. Nanoscale of selenium is of particular interest due to its better biocompatibility, higher bioavailability, lower toxicity, more homogeneous distribution, and presumptive controlled release of substances. The objective of this study is to explore whether selenium nanoparticle (SeNP) has the potential to be used as a food preservative to reduce food spoilage. SeNPs were synthesized through ascorbic acid reduction of sodium selenite using the bovine serum albumin (BSA) as capping and stabilizing agent. The chemically synthesized SeNPs had a spherical conformation and a size of 22.8 ± 4.7 nm. FTIR analysis confirmed that the nanoparticles were covered with BSA. We further tested the antimicrobial activity of these SeNPs against common food-borne bacteria. Colony forming unit assay showed that SeNPs exhibited good inhibition on the growth of Listeria Monocytogens (ATCC15313), Staphylococcus epidermidis (ATCC 700583) starting at 0.5µg/mL, but only a moderate inhibitory effect on the growth of Staphylococcus aureus (ATCC12600) and Vibrio alginolyticus (ATCC 33787) at a concentration higher than 10µg/mL and 2.5µg/mL, respectively. There was a mild effect against the growth Salmonella enterica (ATCC19585) when the concentration reached 15µg/mL. No inhibition was observed in the growth of Enterococcus faecalis (ATCC 19433). Surprisingly, SeNPs appeared to promote the growth of Vibrio parahaemolyticus (ATCC43996) and Salmonella enterica (ATCC49284) at 30 µg/mL and above. Our preliminary data suggested that the chemically synthesized SeNPs may be able to inhibit some food-borne bacteria, and SeNP as a food preservative should be used with caution. We will explore the mechanisms of the inhibitory action of chemically synthesized SeNPs on bacterial growth and whether the SeNPs are able to inhibit the development of biofilm and antibiotic resistance.

Keywords: antimicrobial, food-borne bacteria, nanoparticles, selenium

Procedia PDF Downloads 94
25073 Design and Development of Data Mining Application for Medical Centers in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: data mining, medical record system, systems programming, computing

Procedia PDF Downloads 209
25072 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism

Authors: Allan Munyao Mukuki

Abstract:

The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 403
25071 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
25070 Evaluation of Top-down and Bottom-up Leadership Development Programs in a Finnish Company

Authors: Kati Skarp, Keijo Varis, Juha Kettunen

Abstract:

The purpose of this paper is to examine and evaluate the top-down and bottom-up leadership development programs focused on human capital that improve the performance of a company. This study reports on the external top-down leadership development program supported by a consulting company and the internal participatory action research of the bottom-up program. The sickness rate and the lost time incident failure rate decreased and the ideas produced for cost savings improved, leading to increased earnings during the top-down program. The estimated cost savings potential of the bottom-up program was 3.8 million euro based on the cost savings of meeting habits, maintenance practices and the way of working in production. The results of this study are useful for those who plan and evaluate leadership development and human capital productivity consultation programs to improve the performance of a company.

Keywords: leadership, development, human resources, company, indicators, evaluation

Procedia PDF Downloads 326
25069 Using AI for Analysing Political Leaders

Authors: Shuai Zhao, Shalendra D. Sharma, Jin Xu

Abstract:

This research uses advanced machine learning models to learn a number of hypotheses regarding political executives. Specifically, it analyses the impact these powerful leaders have on economic growth by using leaders’ data from the Archigos database from 1835 to the end of 2015. The data is processed by the AutoGluon, which was developed by Amazon. Automated Machine Learning (AutoML) and AutoGluon can automatically extract features from the data and then use multiple classifiers to train the data. Use a linear regression model and classification model to establish the relationship between leaders and economic growth (GDP per capita growth), and to clarify the relationship between their characteristics and economic growth from a machine learning perspective. Our work may show as a model or signal for collaboration between the fields of statistics and artificial intelligence (AI) that can light up the way for political researchers and economists.

Keywords: comparative politics, political executives, leaders’ characteristics, artificial intelligence

Procedia PDF Downloads 86
25068 Data Quality on Regular Immunization Programme at Birkod District: Somali Region, Ethiopia

Authors: Eyob Seife, Tesfalem Teshome, Bereket Seyoum, Behailu Getachew, Yohans Demis

Abstract:

Developing countries continue to face preventable communicable diseases, such as vaccine-preventable diseases. The Expanded Programme on Immunization (EPI) was established by the World Health Organization in 1974 to control these diseases. Health data use is crucial in decision-making, but ensuring data quality remains challenging. The study aimed to assess the accuracy ratio, timeliness, and quality index of regular immunization programme data in the Birkod district of the Somali Region, Ethiopia. For poor data quality, technical, contextual, behavioral, and organizational factors are among contributors. The study used a quantitative cross-sectional design conducted in September 2022GC using WHO-recommended data quality self-assessment tools. The accuracy ratio and timeliness of reports on regular immunization programmes were assessed for two health centers and three health posts in the district for one fiscal year. Moreover, the quality index assessment was conducted at the district level and health facilities by trained assessors. The study found poor data quality in the accuracy ratio and timeliness of reports at all health units, which includes zeros. Overreporting was observed for most facilities, particularly at the health post level. Health centers showed a relatively better accuracy ratio than health posts. The quality index assessment revealed poor quality at all levels. The study recommends that responsible bodies at different levels improve data quality using various approaches, such as the capacitation of health professionals and strengthening the quality index components. The study highlighted the need for attention to data quality in general, specifically at the health post level, and improving the quality index at all levels, which is essential.

Keywords: Birkod District, data quality, quality index, regular immunization programme, Somali Region-Ethiopia

Procedia PDF Downloads 90
25067 The Results of Longitudinal Water Quality Monitoring of the Brandywine River, Chester County, Pennsylvania by High School Students

Authors: Dina L. DiSantis

Abstract:

Strengthening a sense of responsibility while relating global sustainability concepts such as water quality and pollution to a local water system can be achieved by teaching students to conduct and interpret water quality monitoring tests. When students conduct their own research, they become better stewards of the environment. Providing outdoor learning and place-based opportunities for students helps connect them to the natural world. By conducting stream studies and collecting data, students are able to better understand how the natural environment is a place where everything is connected. Students have been collecting physical, chemical and biological data along the West and East Branches of the Brandywine River, in Pennsylvania for over ten years. The stream studies are part of the advanced placement environmental science and aquatic science courses that are offered as electives to juniors and seniors at the Downingtown High School West Campus in Downingtown, Pennsylvania. Physical data collected includes: temperature, turbidity, width, depth, velocity, and volume of flow or discharge. The chemical tests conducted are: dissolved oxygen, carbon dioxide, pH, nitrates, alkalinity and phosphates. Macroinvertebrates are collected with a kick net, identified and then released. Students collect the data from several locations while traveling by canoe. In the classroom, students prepare a water quality data analysis and interpretation report based on their collected data. The summary of the results from longitudinal water quality data collection by students, as well as the strengths and weaknesses of student data collection will be presented.

Keywords: place-based, student data collection, sustainability, water quality monitoring

Procedia PDF Downloads 156
25066 Study on Moisture-Induced-Damage of Semi-Rigid Base under Hydrodynamic Pressure

Authors: Baofeng Pan, Heng Liu

Abstract:

Because of the high strength and large carrying capacity, the semi-rigid base is widely used in modern road engineering. However, hydrodynamic pressure, which is one of the main factors to cause early damage of semi-rigid base, cannot be avoided in the nature environment when pavement is subjected to some loadings such as the passing vehicles. In order to investigating how moisture-induced-damage of semi-rigid base influenced by hydrodynamic pressure, a new and effective experimental research method is provided in this paper. The results show that: (a) The washing action of high hydrodynamic pressure is the direct cause of strength reducing of road semi-rigid base. (b) The damage of high hydrodynamic pressure mainly occurs at the beginning of the scoring test and with the increasing of testing time the influence reduces. (c) Under the same hydrodynamic pressure, the longer the specimen health age, the stronger ability to resist moisture induced damage.

Keywords: semi-rigid base, hydrodynamic pressure, moisture-induced-damage, experimental research

Procedia PDF Downloads 318
25065 Meaningful General Education Reform: Integrating Core Curricula and Institutional Values

Authors: Michael W. Markowitz

Abstract:

A central element of higher education today is the “core” or “general education” curriculum: that configuration of courses that often encompasses the essence of liberal arts education. Ensuring that such offerings reflect the mission and values of the institution is a challenge faced by most college and universities, often more than once. This paper presents an action model of program planning designed to structure the processes of developing, implementing and revising core curricula in a manner consistent with key institutional goals and objectives. Through presentation of a case study from a university in the United States, the elements of needs assessment, stakeholder investment and collaborative compromise are shown as key components of a planning strategy that can produce a general education program that is comprehensive, academically rigorous, assessable and mission consistent. The paper concludes with recommendations for both the implementation and evaluation of such programs in practice.

Keywords: academic assessment, academic program planning, curriculum development, general education reform

Procedia PDF Downloads 320
25064 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 402
25063 Self-Supervised Pretraining on Sequences of Functional Magnetic Resonance Imaging Data for Transfer Learning to Brain Decoding Tasks

Authors: Sean Paulsen, Michael Casey

Abstract:

In this work we present a self-supervised pretraining framework for transformers on functional Magnetic Resonance Imaging (fMRI) data. First, we pretrain our architecture on two self-supervised tasks simultaneously to teach the model a general understanding of the temporal and spatial dynamics of human auditory cortex during music listening. Our pretraining results are the first to suggest a synergistic effect of multitask training on fMRI data. Second, we finetune the pretrained models and train additional fresh models on a supervised fMRI classification task. We observe significantly improved accuracy on held-out runs with the finetuned models, which demonstrates the ability of our pretraining tasks to facilitate transfer learning. This work contributes to the growing body of literature on transformer architectures for pretraining and transfer learning with fMRI data, and serves as a proof of concept for our pretraining tasks and multitask pretraining on fMRI data.

Keywords: transfer learning, fMRI, self-supervised, brain decoding, transformer, multitask training

Procedia PDF Downloads 90
25062 Competency Based Talent Acquisition: Concept, Practice, and Model, with Reference to Indian Industries

Authors: Manasi V. Shah

Abstract:

Organizations, in the competitive era, are participating in the competency act. They have discerned that, strategically researched and defined competencies when put up on the shelf, can help in achieving business goals. The research focuses on critical elements of competency-based talent acquisition process from practical vantage, with significant experience in a variety of business settings. The research is exploratory and descriptive in nature. The research conduct and outcome is the hinge on with reference to Indian Industries. It elaborates about the concept, practice and a brief model that human resource practitioner can use for effective talent acquisition process, which in turn would be in alignment with business performance. The research helps to present a prudent understanding of recruiting and selecting apt human capital, that can fit in a given job role and has action oriented competency based assessment approach for measuring the probable success of a job incumbent in a given job role.

Keywords: competency based talent acquisition, competency model, talent acquisition concept, talent acquisition practice

Procedia PDF Downloads 312
25061 City Management Transformation: Urban Renewal Empowered by Chinese City Culture in the New Era

Authors: Hong Chen, Li Heping

Abstract:

China's urbanization rate has exceeded 60%, and in the long term, China's urbanization development will enter a new stage of transformation and development focusing on quality improvement, and urban renewal has become an important part of China's urban development. In the past, many cities in the process of renewal in order to maximize the pursuit of economic interests, large-scale demolition of the old to build new, accelerating the disappearance of regional history and culture, aggravating the homogenization of the city. With the changes in the economic and social development environment, urban renewal requires a more comprehensive perspective of action. Starting from the perspective of the core of urban management theory, this paper is oriented to culture-enabled urban renewal and takes the urban renewal of Changbin Road Area in Yuzhong District of Chongqing as an example to expound the problems and renewal strategies in its urban renewal, so as to provide references for the urban renewal of other Chinese cities in the new period.

Keywords: Urban management, Urban culture, Urban renewal in mountainous areas, urban renewal

Procedia PDF Downloads 95
25060 Stigma Impacts the Quality of Life of People Living with Diabetes Mellitus in Switzerland: Challenges for Social Work

Authors: Daniel Gredig, Annabelle Bartelsen-Raemy

Abstract:

Social work services offered to people living with diabetes tend to be moulded by the prevailing understanding that social work is to support people living with diabetes in their adherence to medical prescription and/or life style changes. As diabetes has been conceived as a condition facing no stigma, discrimination of people living with diabetes has not been considered. However, there is growing evidence of stigma. To our knowledge, nevertheless, there have been no comprehensive, in-depth studies of stigma and its impact. Against this background and challenging the present layout of services for people living with diabetes, the present study aimed to establish whether: -people living with diabetes in Switzerland experience stigma, and if so, in what context and to what extent; -experiencing stigma impacts the quality of life of those affected. It was hypothesized that stigma would impact on their quality of life. It was further hypothesized that low self-esteem, psychological distress, depression, and a lack of social support would be mediating factors. For data collection an anonymous paper-and-pencil self-administered questionnaire was used which drew on a qualitative elicitation study. Data were analysed using descriptive statistics and structural equation modelling. To generate a large and diverse convenience sample the questionnaire was distributed to the readers of journal destined to diabetics living in Switzerland issued in German and French. The sample included 3347 people with type 1 and 2 diabetes, aged 16–96, living in diverse living conditions in the German- and French-speaking areas of Switzerland. Respondents reported experiences of discrimination in various contexts and stereotyping based on the belief that diabetics have a low work performance; are inefficient in the workplace; inferior; weak-willed in their ability to manage health-related issues; take advantage of their condition and are viewed as pitiful or sick people. Respondents who reported higher levels of perceived stigma reported higher levels of psychological distress (β = .37), more pronounced depressive symptoms (β=.33), and less social support (β = -.22). Higher psychological distress (β = -.29) and more pronounced depressive symptoms (β = -.28), in turn, predicted lower quality of life. These research findings challenge the prevailing understanding of social work services for people living with diabetes in Switzerland and beyond. They call for a less individualistic approach, the consideration of the social context service users are placed in their everyday life, and addressing stigma. So, social work could partner with people living with diabetes in order to fight against discrimination and stereotypes. This could include identifying and designing educational and public awareness strategies. In direct social work with people living with diabetes, this could include broaching experiences of stigma and modes of coping with. This study was carried out in collaboration with the Swiss Diabetes Association. The association accepted the challenging conclusions from this study. It connected to the results and is currently discussing the priorities and courses of action to be taken.

Keywords: diabetes, discrimination, quality of life, services, stigma

Procedia PDF Downloads 230
25059 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 195
25058 Analysis of Cross-Sectional and Retrograde Data on the Prevalence of Marginal Gingivitis

Authors: Ilma Robo, Saimir Heta, Nedja Hysi, Vera Ostreni

Abstract:

Introduction: Marginal gingivitis is a disease with considerable frequency among patients who present routinely for periodontal control and treatment. In fact, this disease may not have alarming symptoms in patients and may go unnoticed by themselves when personal hygiene conditions are optimal. The aim of this study was to collect retrograde data on the prevalence of marginal gingiva in the respective group of patients, evaluated according to specific periodontal diagnostic tools. Materials and methods: The study was conducted in two patient groups. The first group was with 34 patients, during December 2019-January 2020, and the second group was with 64 patients during 2010-2018 (each year in the mentioned monthly period). Bacterial plaque index, hemorrhage index, amount of gingival fluid, presence of xerostomia and candidiasis were recorded in patients. Results: Analysis of the collected data showed that susceptibility to marginal gingivitis shows higher values according to retrograde data, compared to cross-sectional ones. Susceptibility to candidiasis and the occurrence of xerostomia, even in the combination of both pathologies, as risk factors for the occurrence of marginal gingivitis, show higher values ​​according to retrograde data. The female are presented with a reduced bacterial plaque index than the males, but more importantly, this index in the females is also associated with a reduced index of gingival hemorrhage, in contrast to the males. Conclusions: Cross-sectional data show that the prevalence of marginal gingivitis is more reduced, compared to retrograde data, based on the hemorrhage index and the bacterial plaque index together. Changes in production in the amount of gingival fluid show a higher prevalence of marginal gingivitis in cross-sectional data than in retrograde data; this is based on the sophistication of the way data are recorded, which evolves over time and also based on professional sensitivity to this phenomenon.

Keywords: marginal gingivitis, cross-sectional, retrograde, prevalence

Procedia PDF Downloads 161
25057 Why Do We Need Hierachical Linear Models?

Authors: Mustafa Aydın, Ali Murat Sunbul

Abstract:

Hierarchical or nested data structures usually are seen in many research areas. Especially, in the field of education, if we examine most of the studies, we can see the nested structures. Students in classes, classes in schools, schools in cities and cities in regions are similar nested structures. In a hierarchical structure, students being in the same class, sharing the same physical conditions and similar experiences and learning from the same teachers, they demonstrate similar behaviors between them rather than the students in other classes.

Keywords: hierarchical linear modeling, nested data, hierarchical structure, data structure

Procedia PDF Downloads 652
25056 Descriptive Analysis: New Media Influence on Decision Makers

Authors: Bashaiar Alsanaa

Abstract:

The process of decision making requires environment surveillance and public opinion monitoring, both of which can be attained through effective use of social media. This study aims to investigate the extent to which new media influence the decision making process by the Kuwaiti government. The research explores how unprecedented access to information as well as dynamic user-interaction made possible by new technologies play a significant role in all aspects of decision making whether on the end of the public or decision makers themselves. The research analyzes two case studies where public opinion was forceful on social media in order to explore how such media create interactive and liberal environments for individuals to participate in the process of taking action with regards to political, economic and social issues. The findings of this descriptive study indicate the overwhelming extent to which social media are being used in Kuwait to create new social reform by the government based on citizen interaction with current topics.

Keywords: communication, descriptive, new media technologies, social media.

Procedia PDF Downloads 118
25055 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 218
25054 Implementing Universal Design for Learning in Social Work Education

Authors: Kaycee Bills

Abstract:

Action research is a method of inquiry useful in solving social problems in social work. This study seeks to address a significant problem: higher education’s use of traditional instructional methods in social work education. Ineffective techniques, such as lecturing, fail to account for students’ variable learning needs. In contrast to traditional pedagogy, universal design for learning (UDL) is a robust framework that '[improves] and [optimizes] teaching and learning for all people' (CAST, 2018), including students with disabilities. For this project, the research team interviewed the UDL and Accessibility Specialist at their institution for two reasons: (1) to learn how to implement UDL practices in their classrooms, and in turn, (2) to motivate other faculty members at their institution to consider enacting UDL principles. A thematic analysis of the interview’s transcript reveals themes relevant to practicing UDL. Implications for future practice, as well as the researcher’s reflections on the research process, are shared in the discussion section.

Keywords: disabilities, higher education, inclusive education, universal design for learning

Procedia PDF Downloads 128
25053 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 789
25052 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 44
25051 Comparison of the Thermal Behavior of Different Crystal Forms of Manganese(II) Oxalate

Authors: B. Donkova, M. Nedyalkova, D. Mehandjiev

Abstract:

Sparingly soluble manganese oxalate is an appropriate precursor for the preparation of nanosized manganese oxides, which have a wide range of technological application. During the precipitation of manganese oxalate, three crystal forms could be obtained – α-MnC₂O₄.2H₂O (SG C2/c), γ-MnC₂O₄.2H₂O (SG P212121) and orthorhombic MnC₂O₄.3H₂O (SG Pcca). The thermolysis of α-MnC₂O₄.2H₂O has been extensively studied during the years, while the literature data for the other two forms has been quite scarce. The aim of the present communication is to highlight the influence of the initial crystal structure on the decomposition mechanism of these three forms, their magnetic properties, the structure of the anhydrous oxalates, as well as the nature of the obtained oxides. For the characterization of the samples XRD, SEM, DTA, TG, DSC, nitrogen adsorption, and in situ magnetic measurements were used. The dehydration proceeds in one step with α-MnC₂O₄.2H2O and γ-MnC₂O₄.2H₂O, and in three steps with MnC₂O₄.3H2O. The values of dehydration enthalpy are 97, 149 and 132 kJ/mol, respectively, and the last two were reported for the first time, best to our knowledge. The magnetic measurements show that at room temperature all samples are antiferomagnetic, however during the dehydration of α-MnC₂O₄.2H₂O the exchange interaction is preserved, for MnC₂O₄.3H₂O it changes to ferromagnetic above 35°C, and for γ-MnC₂O₄.2H₂O it changes twice from antiferomagnetic to ferromagnetic above 70°C. The experimental results for magnetic properties are in accordance with the computational results obtained with Wien2k code. The difference in the initial crystal structure of the forms used determines different changes in the specific surface area during dehydration and different extent of Mn(II) oxidation during decomposition in the air; both being highest at α-MnC₂O₄.2H₂O. The isothermal decomposition of the different oxalate forms shows that the type and physicochemical properties of the oxides, obtained at the same annealing temperature depend on the precursor used. Based on the results from the non-isothermal and isothermal experiments, and from different methods used for characterization of the sample, a comparison of the nature, mechanism and peculiarities of the thermolysis of the different crystal forms of manganese oxalate was made, which clearly reveals the influence of the initial crystal structure. Acknowledgment: 'Science and Education for Smart Growth', project BG05M2OP001-2.009-0028, COST Action MP1306 'Modern Tools for Spectroscopy on Advanced Materials', and project DCOST-01/18 (Bulgarian Science Fund).

Keywords: crystal structure, magnetic properties, manganese oxalate, thermal behavior

Procedia PDF Downloads 171
25050 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 58
25049 Glossematics and Textual Structure

Authors: Abdelhadi Nadjer

Abstract:

The structure of the text to the systemic school -(glossématique-Helmslev). At the beginning of the note we have a cursory look around the concepts of general linguistics The science that studies scientific study of human language based on the description and preview the facts away from the trend of education than we gave a detailed overview the founder of systemic school and most important customers and more methods and curriculum theory and analysis they extend to all humanities, practical action each offset by a theoretical and the procedure can be analyzed through the elements that pose as another method we talked to its links with other language schools where they are based on the sharp criticism of the language before and deflected into consideration for the field of language and its erection has outside or language network and its participation in the actions (non-linguistic) and after that we started our Valglosamatik analytical structure of the text is ejected text terminal or all of the words to was put for expression. This text Negotiable divided into types in turn are divided into classes and class should not be carrying a contradiction and be inclusive. It is on the same materials as described relationships that combine language and seeks to describe their relations and identified.

Keywords: text, language schools, linguistics, human language

Procedia PDF Downloads 459
25048 The Effect of Data Integration to the Smart City

Authors: Richard Byrne, Emma Mulliner

Abstract:

Smart cities are a vision for the future that is increasingly becoming a reality. While a key concept of the smart city is the ability to capture, communicate, and process data that has long been produced through day-to-day activities of the city, much of the assessment models in place neglect this fact to focus on ‘smartness’ concepts. Although it is true technology often provides the opportunity to capture and communicate data in more effective ways, there are also human processes involved that are just as important. The growing importance with regards to the use and ownership of data in society can be seen by all with companies such as Facebook and Google increasingly coming under the microscope, however, why is the same scrutiny not applied to cities? The research area is therefore of great importance to the future of our cities here and now, while the findings will be of just as great importance to our children in the future. This research aims to understand the influence data is having on organisations operating throughout the smart cities sector and employs a mixed-method research approach in order to best answer the following question: Would a data-based evaluation model for smart cities be more appropriate than a smart-based model in assessing the development of the smart city? A fully comprehensive literature review concluded that there was a requirement for a data-driven assessment model for smart cities. This was followed by a documentary analysis to understand the root source of data integration to the smart city. A content analysis of city data platforms enquired as to the alternative approaches employed by cities throughout the UK and draws on best practice from New York to compare and contrast. Grounded in theory, the research findings to this point formulated a qualitative analysis framework comprised of: the changing environment influenced by data, the value of data in the smart city, the data ecosystem of the smart city and organisational response to the data orientated environment. The framework was applied to analyse primary data collected through the form of interviews with both public and private organisations operating throughout the smart cities sector. The work to date represents the first stage of data collection that will be built upon by a quantitative research investigation into the feasibility of data network effects in the smart city. An analysis into the benefits of data interoperability supporting services to the smart city in the areas of health and transport will conclude the research to achieve the aim of inductively forming a framework that can be applied to future smart city policy. To conclude, the research recognises the influence of technological perspectives in the development of smart cities to date and highlights this as a challenge to introduce theory applied with a planning dimension. The primary researcher has utilised their experience working in the public sector throughout the investigation to reflect upon what is perceived as a gap in practice of where we are today, to where we need to be tomorrow.

Keywords: data, planning, policy development, smart cities

Procedia PDF Downloads 310
25047 Investigation of Delivery of Triple Play Service in GE-PON Fiber to the Home Network

Authors: Anurag Sharma, Dinesh Kumar, Rahul Malhotra, Manoj Kumar

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 734