Search results for: information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14811

Search results for: information theory

12951 Investigation of Physical Properties of W-Doped CeO₂ and Mo-Doped CeO₂: A Density Functional Theory Study

Authors: Aicha Bouhlala, Sabah Chettibi

Abstract:

A systematic investigation on structural, electronic, and magnetic properties of Ce₀.₇₅A₀.₂₅O₂ (A = W, Mo) is performed using first-principles calculations within the framework Full-Potential Linear Augmented Plane Wave (FP-LAPW) method based on the Density Functional Theory (DFT). The exchange-correlation potential has been treated using the generalized gradient approximation (WC-GGA) developed by Wu-Cohen. The host compound CeO2 was doped with transition metal atoms W and Mo in the doping concentration of 25% to replace the Ce atom. In structural properties, the equilibrium lattice constant is observed for the W-doped CeO₂ compound which exists within the value of 5.314 A° and the value of 5.317 A° for Mo-doped CeO2. The present results show that Ce₀.₇₅A₀.₂₅O₂ (A=W, Mo) systems exhibit semiconducting behavior in both spin channels. Although undoped CeO₂ is a non-magnetic semiconductor. The band structure of these doped compounds was plotted and they exhibit direct band gap at the Fermi level (EF) in the majority and minority spin channels. In the magnetic properties, the doped atoms W and Mo play a vital role in increasing the magnetic moments of the supercell and the values of the total magnetic moment are found to be 1.998 μB for Ce₀.₇₅W₀.₂₅O₂ and to be 2.002 μB for Ce₀.₇₅Mo₀.₂₅O₂ compounds. Calculated results indicate that the magneto-electronic properties of the Ce₁₋ₓAₓO₂(A= W, Mo) oxides supply a new way to the experimentalist for the potential applications in spintronics devices.

Keywords: FP-LAPW, DFT, CeO₂, properties

Procedia PDF Downloads 216
12950 Effects of Transformational Leadership and Political Competition on Corporate Performance of Nigeria National Petroleum Corporation

Authors: Justine Ugochukwu Osuagwu, Sazali Abd Wahab

Abstract:

The performance and operation of NNPC have faced series of attacks by all stakeholders as many have observed lots of inefficiency not only on the part of the management but the staff. This has raised questions of whether their operations and performance are being seriously affected by lack of transformational leadership, and the political competition prevalent in the country. The author has applied the administrative leadership theory and institutional theory as a guide to this study and empirically relates such theories to the study. The study also has utilized the quantitative approach where questionnaires were distributed to 370 participants, and the correctly filled and returned questionnaires were used for the analysis using structural equation modeling. The path coefficient of transformational leadership to performance is strong and positive with β = 0.672; t-value = 14.245; p-value = 0.000. Also, the result found that political competition does not mediate the relationship between transformational leadership and performance of NNPC. (β = -0.008; t-value = -0.600; p- value > 0.05). However, the indirect path is all insignificant, meaning that transformational leadership has relationship with corporate performance.The study found that,while political competition does not serve as a mediator in the relationship between transformational leadership and corporate performance, these styles of leadership have a direct and positive impact on corporate performance. The direct relationship between transformational leadership and political competition was not discovered, despite the fact that political competition has a direct and significant impact, both positive and negative, on corporate performance. As a result, both political competition and transformational leadership have the potential to significantly alter corporate performance.

Keywords: performance, transformational leadership, political competition, corporation performance, Nigeria national petroleum corporation

Procedia PDF Downloads 117
12949 An Exploratory Study in Nursing Education: Factors Influencing Nursing Students’ Acceptance of Mobile Learning

Authors: R. Abdulrahman, A. Eardley, A. Soliman

Abstract:

The proliferation in the development of mobile learning (m-learning) has played a vital role in the rapidly growing electronic learning market. This relatively new technology can help to encourage the development of in learning and to aid knowledge transfer a number of areas, by familiarizing students with innovative information and communications technologies (ICT). M-learning plays a substantial role in the deployment of learning methods for nursing students by using the Internet and portable devices to access learning resources ‘anytime and anywhere’. However, acceptance of m-learning by students is critical to the successful use of m-learning systems. Thus, there is a need to study the factors that influence student’s intention to use m-learning. This paper addresses this issue. It outlines the outcomes of a study that evaluates the unified theory of acceptance and use of technology (UTAUT) model as applied to the subject of user acceptance in relation to m-learning activity in nurse education. The model integrates the significant components across eight prominent user acceptance models. Therefore, a standard measure is introduced with core determinants of user behavioural intention. The research model extends the UTAUT in the context of m-learning acceptance by modifying and adding individual innovativeness (II) and quality of service (QoS) to the original structure of UTAUT. The paper goes on to add the factors of previous experience (of using mobile devices in similar applications) and the nursing students’ readiness (to use the technology) to influence their behavioural intentions to use m-learning. This study uses a technique called ‘convenience sampling’ which involves student volunteers as participants in order to collect numerical data. A quantitative method of data collection was selected and involves an online survey using a questionnaire form. This form contains 33 questions to measure the six constructs, using a 5-point Likert scale. A total of 42 respondents participated, all from the Nursing Institute at the Armed Forces Hospital in Saudi Arabia. The gathered data were then tested using a research model that employs the structural equation modelling (SEM), including confirmatory factor analysis (CFA). The results of the CFA show that the UTAUT model has the ability to predict student behavioural intention and to adapt m-learning activity to the specific learning activities. It also demonstrates satisfactory, dependable and valid scales of the model constructs. This suggests further analysis to confirm the model as a valuable instrument in order to evaluate the user acceptance of m-learning activity.

Keywords: mobile learning, nursing institute students’ acceptance of m-learning activity in Saudi Arabia, unified theory of acceptance and use of technology model (UTAUT), structural equation modelling (SEM)

Procedia PDF Downloads 188
12948 A Study on Children's Literature for Multiracial Asian American Children

Authors: Kaori Mori Want

Abstract:

American society is a racially diverse society and there are children books that tell the importance of respecting racial differences. Through reading books, children understand the world around them little by little along with their direct interaction with the world in reality. They find role models in books, strive to be like role models, and grow confidence in who they are. Books thus nurture the mind of children. On the other hand, because of their small presence, children books for multiracial Asian American children are scarce. Multiracial Asian American population is increasing but they are still minority in number. The lack of children’s books for these children may deprive the opportunities of them to embrace their multiraciality positively because they cannot find someone like them in any books. Children books for multiracial Asian American are still not that many, but a few have been being published recently. This paper introduces children books for multiracial Asian American children, and examines how they address issues pertaining to these children, and how they could nurture their self-esteem. Many states of the US used to ban interracial marriages and interracial families and their children once were discriminated against in American society. There was even a theory called the hybrid degeneracy theory which claimed that mixed race children were inferior mentally and physically. In this negative social environment, some multiracial Asian American people report that they had trouble embracing their multiracial identity positively. Yet, children books for these children are full of positive messages. This paper will argue the importance of children books for the mental growth of multiracial Asian American children, and how these books can contribute to the development of multiculturalism in the US in general.

Keywords: critical mixed race studies in the US, hapa children literature, interracial marriage, multiraciality

Procedia PDF Downloads 360
12947 Natural Frequency Analysis of Spinning Functionally Graded Cylindrical Shells Subjected to Thermal Loads

Authors: Esmaeil Bahmyari

Abstract:

The natural frequency analysis of the functionally graded (FG) rotating cylindrical shells subjected to thermal loads is studied based on the three-dimensional elasticity theory. The temperature-dependent assumption of the material properties is graded in the thickness direction, which varies based on the simple power law distribution. The governing equations and the appropriate boundary conditions, which include the effects of initial thermal stresses, are derived employing Hamilton’s principle. The initial thermo-mechanical stresses are obtained by the thermo-elastic equilibrium equation’s solution. As an efficient and accurate numerical tool, the differential quadrature method (DQM) is adopted to solve the thermo-elastic equilibrium equations, free vibration equations and natural frequencies are obtained. The high accuracy of the method is demonstrated by comparison studies with those existing solutions in the literature. Ultimately, the parametric studies are performed to demonstrate the effects of boundary conditions, temperature rise, material graded index, the thickness-to-length and the aspect ratios for the rotating cylindrical shells on the natural frequency.

Keywords: free vibration, DQM, elasticity theory, FG shell, rotating cylindrical shell

Procedia PDF Downloads 84
12946 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 174
12945 Conformity and Differentiation in CSR Practices on Capital Market Performance: Empirical Evidence from Stock Liquidity and Price Crash Risk

Authors: Jie Zhang, Chaomin Zhang, Jihua Zhang, Haitong Li

Abstract:

Using the theory of optimal distinctiveness, this study examines the effects of conformity and differentiation within corporate social responsibility (CSR) practices on capital market performance. Analysing data from Chinese A-share listed firms from 2007 to 2022, this paper demonstrates that when firms conform to the expected scope of CSR, such behaviour enhances investor attention and market acceptance, thereby boosting stock liquidity. Conversely, emphasising differentiation in CSR practices more effectively mitigates stock price crash risk by addressing principal–agent problems and decreasing information asymmetry. This paper also investigates how organisational and environmental factors moderate the relationship between conformity and differentiation in CSR practices and their impact on capital market performance. The results also show that the influence of conformity on stock liquidity is accentuated in smaller firms and environments with stringent legal oversight. By contrast, the benefits of differentiation in reducing stock price crash risk are amplified in firms with robust corporate governance and markets characterised by high uncertainty.

Keywords: corporate social responsibility, social responsibility practices, capital market performance, optimal distinctiveness

Procedia PDF Downloads 20
12944 Geographic Information Systems and Remotely Sensed Data for the Hydrological Modelling of Mazowe Dam

Authors: Ellen Nhedzi Gozo

Abstract:

Unavailability of adequate hydro-meteorological data has always limited the analysis and understanding of hydrological behaviour of several dam catchments including Mazowe Dam in Zimbabwe. The problem of insufficient data for Mazowe Dam catchment analysis was solved by extracting catchment characteristics and aerial hydro-meteorological data from ASTER, LANDSAT, Shuttle Radar Topographic Mission SRTM remote sensing (RS) images using ILWIS, ArcGIS and ERDAS Imagine geographic information systems (GIS) software. Available observed hydrological as well as meteorological data complemented the use of the remotely sensed information. Ground truth land cover was mapped using a Garmin Etrex global positioning system (GPS) system. This information was then used to validate land cover classification detail that was obtained from remote sensing images. A bathymetry survey was conducted using a SONAR system connected to GPS. Hydrological modelling using the HBV model was then performed to simulate the hydrological process of the catchment in an effort to verify the reliability of the derived parameters. The model output shows a high Nash-Sutcliffe Coefficient that is close to 1 indicating that the parameters derived from remote sensing and GIS can be applied with confidence in the analysis of Mazowe Dam catchment.

Keywords: geographic information systems, hydrological modelling, remote sensing, water resources management

Procedia PDF Downloads 336
12943 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis

Authors: Hromada Martin

Abstract:

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.

Keywords: critical infrastructure, protection, resilience, risk analysis

Procedia PDF Downloads 638
12942 4-DOFs Parallel Mechanism for Minimally Invasive Robotic Surgery

Authors: Khalil Ibrahim, Ahmed Ramadan, Mohamed Fanni, Yo Kobayashi, Ahmed Abo-Ismail, Masakatus G. Fujie

Abstract:

This paper deals with the design process and the dynamic control simulation of a new type of 4-DOFs parallel mechanism that can be used as an endoscopic surgical manipulator. The proposed mechanism, 2-PUU_2-PUS, is designed based on the screw theory and the parallel virtual chain type synthesis method. Based on the structure analysis of the 4-DOF parallel mechanism, the inverse position equation is studied using the inverse analysis theory of kinematics. The design and the stress analysis of the mechanism are investigated using SolidWorks software. The virtual prototype of the parallel mechanism is constructed, and the dynamic simulation is performed using ADAMS TM software. The system model utilizing PID and PI controllers has been built using MATLAB software. A more realistic simulation in accordance with a given bending angle and point to point control is implemented by the use of both ADAMS/MATLAB software. The simulation results showed that this control method has solved the coordinate control for the 4-DOF parallel manipulator so that each output is feedback to the four driving rods. From the results, the tracking performance is achieved. Other control techniques, such as intelligent ones, are recommended to improve the tracking performance and reduce the numerical truncation error.

Keywords: parallel mechanisms, medical robotics, tracjectory control, virtual chain type synthesis method

Procedia PDF Downloads 468
12941 Information Technology and Professional Behavior: An Empirical Examination of Auditing and Accounting Tasks

Authors: Michael C. Nwaohia

Abstract:

Whereas anecdotal evidence supports the notion that increase in information technology (IT) know-how may enhance output of professionals in the accounting sector, this has not been systematically explored in the Nigerian context. Against this background, this paper examines the correlation between knowledgeability of IT and level of performance at everyday auditing and accounting tasks. It utilizes primary and secondary data from selected business organizations in Lagos, Nigeria. Accounting staff were administered structured questionnaires which, amongst other things, sought to examine knowledge and exposure to information technology prior to joining the firms and current level of performance based on self-reporting and supervisor comments. In addition, exposure to on-the-job IT training and current level of performance was examined. The statistical analysis of the data was done using the SPSS package. The results strongly suggest that prior exposure to IT skills enabled accounting professionals to better flexibly fit into the dynamic environment in which contemporary business takes place. Ultimately, the paper attempts to explicate some of the implications of these findings for individuals and business firms.

Keywords: accounting, firms, information technology, professional behavior

Procedia PDF Downloads 235
12940 Corporate Governance of Intellectual Capital: The Impact of Intellectual Capital Reporting

Authors: Cesar Julio Recalde

Abstract:

Background: The role of intangible assets in today´s society is undeniable and continuously growing. More than 80% of corporate market is related to intellectual capital(IC). However, corporate governance principles and practices seem strongly based and oriented towards tangible assets. The impact of intangible assets on corporate governance might require prevention and adaptative actions. Adherence to voluntary mechanisms of intellectual capital reporting (ICR) seems to be a gateway towards adapting corporate governance to intangible assets influence and a conceptual cornerstone. The impact of adherence to intellectual capital reporting on corporate governance and performance needs to be evaluated. Purposes: This work has a sequential two folded purpose: (1) exploring the influences exerted by IC on corporate governance theory and practice, and within that context (2) analyzing the impact of adherence to voluntary mechanisms of ICR on corporate governance. Design and summary: This work employs the theory of the firm and agency theory in order to conceptually explore the effects of each dimension of IC on key corporate governance issues, namely property rights and control by shareholders and residual claims by stakeholders, fiduciary duties of management and the board, opportunistic behavior and transparency. A comprehensive IC taxonomy and map is presented. Within the resulting context, internal and external impact of ICR on corporate governance and performance is conceptually analyzed. IRC constraint and barriers are identified. Intellectual liabilities are presented within the context of IRC. Finally, IRC regulatory framework is surveyed. Findings: Relevant conclusions were rendered on the influence of intellectual capital on corporate governance. Sufficient evidence of a positive impact of IRC on corporate governance and performance was found. Additionally, it was found that IRC exerts a leveraging effect on IC itself. Intellectual liabilities are insufficiently researched and seem to have a relevant importance on IC measuring. IRC regulatory framework was found to be insufficiently developed to capture the essence of intangible assets and to meet corporate governance challenges facing IC. Originality: This work develops a progressive approach to conceptually analyze the mutual influences between IC and corporate governance. An epistemic ideogram represents the intersection of analyzed theories. An IC map is presented. The relatively new topic of intellectual liabilities is conceptually analyzed in the context of IRC. Social liabilities and client liabilities are presented.

Keywords: corporate governance, intellectual capital, intellectual capital reporting, intellectual assets, intellectual liabilities, voluntary mechanisms, regulatory framework

Procedia PDF Downloads 386
12939 Information Needs of Cassava Processors on Small-Scale Cassava Processing in Oyo State, Nigeria

Authors: Rafiat Bolanle Fasasi-Hammed

Abstract:

Cassava is an important food crop in rural households of Nigeria. It has a high potential for product diversification, because it can be processed into various products forms for human consumption and can be made into chips for farm animals, and also starch and starch derivatives. However, cassava roots are highly perishable and contain potentially toxic cyanogenic glycosides which necessitate its processing. Therefore, this study was carried out to assess information needs of cassava processors on food safety practices in Oyo State, Nigeria. Simple random sampling technique was used in the selection of 110 respondents for this study. Descriptive statistics and chi-square were used to analyze the data collected. Results of this study showed that the mean age of the respondents was 39.4 years, majority (78.7%) of the respondents was married, 51.9% had secondary education; 45.8% of the respondents have spent more than 12 years in cassava processing. The mean income realized was ₦26,347.50/month from cassava processing. Information on cassava processing got to the respondents through friends, family and relations (73.6%) and fellow cassava processors (58.6%). Serious constraints identified were ineffective extension agents (93.9%), food safety regulatory agencies (88.1%) and inadequate processing and storage facilities (67.8%). Chi-square results showed that significant relationship existed between socio-economic characteristics of the respondents (χ2 = 29.80, df = 2,), knowledge level (χ2 = 9.26, df = 4), constraints (χ2 = 13.11, df = 2) and information needs at p < 0.05 level of significance. The study recommends that there should be regular training on improved cassava processing methods for the cassava processors in the study area.

Keywords: information, needs, cassava, Oyo State, processing

Procedia PDF Downloads 302
12938 Corpus-Assisted Study of Gender Related Tiger Metaphors in the Chinese Context

Authors: Na Xiao

Abstract:

Animal metaphors have many different connotations, ranging from loving emotions to derogatory epithets, but gender expressions using animal metaphors are often imbalanced. Generally, animal metaphors related to females tend to be negative. Little known about the reasons for the negative expressions of animal female metaphors in Chinese contexts still have not been quantified. The Modern Chinese Corpus at the Center for Chinese Linguistics at Peking University (CCL Corpus) provided the data for this research, which aims to identify the influencing variables of gender differences in the description of animal metaphors mapping humans in Chinese by observing the percentage of "tiger" metaphor, which is based on the conceptual metaphor theory. A quantitative research method was used in this study to statistically examine the gender attitude percentage of the "tiger" metaphor using corpus data. This study has proved that the tiger metaphors associated with humans in the Chinese context tend to be negative. Importantly, this study has also shown that the high proportion of tiger metaphorical idioms is what causes the high proportion of negative tiger metaphors that are related to women. This finding can be used as crucial information for future studies on other gender-related animal metaphorical idioms and can offer additional insights for understanding trends in other animal metaphors.

Keywords: Chinese, CCL corpus, gender differences, metaphorical idioms, tigers

Procedia PDF Downloads 109
12937 Development of People's Participation in Environmental Development in Pathumthani Province

Authors: Sakapas Saengchai

Abstract:

Study on the development of people's participation in environmental development was a qualitative research method. Data were collected by participant observation, in-depth interview and discussion group in Pathumthani province. The study indicated that 1) People should be aware of environmental information from government agencies. 2) People in the community should be able to brainstorm information, exchange information about community environment development. 3) People should have a role with community leaders. 4) People in the community should have a role to play in the implementation of projects and activities in the development of the environment and 5) citizens, community leaders, village committee have directed the development of the area. Maintaining a community environment with a shared decision. By emphasizing the process of participation, self-reliance, mutual help, and responsibility for one's own community. Community empowerment strengthens the sustainable spatial development of the environment.

Keywords: people, participation, community, environment

Procedia PDF Downloads 280
12936 Poland and the Dawn of the Right to Education and Development: Moving Back in Time

Authors: Magdalena Zabrocka

Abstract:

The terror of women throughout the governance of the current populist ruling party in Poland, PiS, has been a subject of a heated debate alongside the issues of minorities’ rights, the rule of law, and democracy in the country. The challenges that women and other vulnerable groups are currently facing, however, come down to more than just a lack of comprehensive equality laws, severely limited reproductive rights, hateful slogans, and messages propagated by the central authority and its sympathisers, or a common disregard for women’s fundamental rights. Many sources and media reports are available only in Polish, while international rapporteurs fail to acknowledge the whole picture of the tragedy happening in the country and the variety of factors affecting it. Starting with the authorities’ and Polish catholic church’s propaganda concerning CEDAW and the Istanbul Convention Action against Violence against Women and Domestic Violence by spreading strategic disinformation that it codifies ‘gender ideology’ and ‘anti-Christian values’ in order to convince the electorate that the legal instruments should be ‘abandoned’. Alongside severely restricted abortion rights, bullying medical professionals helping women exercise their reproductive rights, violating women’s privacy by introducing a mandatory registry of pregnancies (so that one’s pregnancy or its ‘loss’ can be tracked and traced), restricting access to the ‘day after pill’ and real sex education at schools (most schools have a subject of ‘knowledge of living in a family’), introducing prison punishment for teachers accused of spreading ‘sex education’, and many other, the current tyrant government, has now decided to target the youngest with its misinformation and indoctrination, via strategically designed textbooks and curriculum. Biology books have seen a big restriction on the size of the chapters devoted to evolution, reproductive system, and sexual health. Approved religion books (which are taught 2-3 times a week as compared to 1 a week sciences) now cover false information about Darwin’s theory and arguments ‘against it’. Most recently, however, the public spoke up against the absurd messages contained in the politically rewritten history books, where the material about some figures not liked by the governing party has already been manipulated. In the recently approved changes to the history textbook, one can find a variety of strongly biased and politically-charged views representative of the conservatives in the states, most notably, equating the ‘gender ideology’ and feminism with Nazism. Thus, this work, by employing a human rights approach, would focus on the right to education and development as well as the considerate obstacles to access to scientific information by the youth.

Keywords: Poland, right to education, right to development, authoritarianism, access to information

Procedia PDF Downloads 105
12935 Adopted Method of Information System Strategy for Knowledge Management System: A Literature Review

Authors: Elin Cahyaningsih, Dana Indra Sensuse, Wahyu Catur Wibowo, Sofiyanti Indriasari

Abstract:

Bureaucracy reform program drives Indonesian government to change their management and supporting unit in order to enhance their organization performance. Information technology as one of supporting unit became one of strategic plan that organization tried to improve, because IT can automate and speed up process, reduce business process life cycle become more effective and efficient. Knowledge management system is a technology application for supporting knowledge management implementation in government which is requirement based on problem and potential functionality of each knowledge management process. Define knowledge management that suitable for each organization it is difficult, that why we should make the knowledge management system strategy as an alignment of knowledge management process in the organization. Knowledge management system is one of information system development in people perspective, because this system has high dependency in human interaction and participation. Strategic plan for developing knowledge management system can be determine using some of information system strategic methods. This research conducted to define type of strategic method of information system, stage of activity each method, the strategic method strength and weakness. The author use literature review methods for identify and classify strategic methods of information system for differentiate method type, categorize common activities, strength and weakness. Result of this research are determine and compare six strategic information system methods, there are Balanced Scorecard, Five Force Porter, SWOT analysis, Value Chain Analysis, Risk Analysis and Gap Analysis. Balanced Scorecard and Risk Analysis believe as common strategic method that usually used and have the highest excellence strength.

Keywords: knowledge management system, balanced scorecard, five force, risk analysis, gap analysis, value chain analysis, SWOT analysis

Procedia PDF Downloads 478
12934 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 437
12933 Digital Literacy Transformation and Implications in Institutions of Higher Learning in Kenya

Authors: Emily Cherono Sawe, Elisha Ondieki Makori

Abstract:

Knowledge and digital economies have brought challenges and potential opportunities for universities to innovate and improve the quality of learning. Disruption technologies and information dynamics continue to transform and change the landscape in teaching, scholarship, and research activities across universities. Digital literacy is a fundamental and imperative element in higher education and training, as witnessed during the new norm. COVID-19 caused unprecedented disruption in universities, where teaching and learning depended on digital innovations and applications. Academic services and activities were provided online, including library information services. Information professionals were forced to adopt various digital platforms in order to provide information services to patrons. University libraries’ roles in fulfilling educational responsibilities continue to evolve in response to changes in pedagogy, technology, economy, society, policies, and strategies of parent institutions. Libraries are currently undergoing considerable transformational change as a result of the inclusion of a digital environment. Academic libraries have been at the forefront of providing online learning resources and online information services, as well as supporting students and staff to develop digital literacy skills via online courses, tutorials, and workshops. Digital literacy transformation and information staff are crucial elements reminiscent of the prioritization of skills and knowledge for lifelong learning. The purpose of this baseline research is to assess the implications of digital literacy transformation in institutions of higher learning in Kenya and share appropriate strategies to leverage and sustain teaching and research. Objectives include examining the leverage and preparedness of the digital literacy environment in streamlining learning in the universities, exploring and benchmarking imperative digital competence for information professionals, establishing the perception of information professionals towards digital literacy skills, and determining lessons, best practices, and strategies to accelerate digital literacy transformation for effective research and learning in the universities. The study will adopt a descriptive research design using questionnaires and document analysis as the instruments for data collection. The targeted population is librarians and information professionals, as well as academics in public and private universities teaching information literacy programmes. Data and information are to be collected through an online structured questionnaire and digital face-to-face interviews. Findings and results will provide promising lessons together with best practices and strategies to transform and change digital literacies in university libraries in Kenya.

Keywords: digital literacy, digital innovations, information professionals, librarians, higher education, university libraries, digital information literacy

Procedia PDF Downloads 96
12932 The Construction of the Meaning of Beauty by the Representation of Wardah Halal Beauty

Authors: Indhie Febrianti Herlina, Riri Akadafi, Alna Hanana

Abstract:

This research describes the constructivism of the Halal beauty of Wardah commercials that present hijab women as the advertising models and shows the sign of Halal in each promotion. There are differences of the concept of beauty between wardah and other beauty ads. When today’s ads describe that beautiful women are who have bright skin, sharp nose and long hair, wardah describes that beautiful women are the hijab women and wear Halal beauty product. This research is interesting because it is so rare when the beauty is presented by hijab women. By using the constructivism paradigm and combining it with reception theory, the author wants to reveal whether women are constructed by these commercials. Reception theory is about how public accept the content of a media. The informants are the women who wear hijab, wear Wardah products and join ‘Wardah Goes to Campus’, a roadshow event conducted by Wardah in Universities all around Indonesia. By interviewing the informants, a statement can be inferred that informants A, B, C, and D assumed that beauty is a physical beauty. However, after they have learned about the true meaning of beauty and watched Wardah commercials, those informants understand that beauty is reflected by the women who wear hijab and wear Halal Cosmetics. Meanwhile, the informant E assumes that beauty is relative, inner, and good-looking. The conclusion of this research is that the informants are constructed by the halal beauty described by Wardah commercials. By presenting the models wearing hijab and wear natural-looking cosmetics, Wardah successfully influences the informants to be more confident to look good by wearing hijab.

Keywords: ad, commercial, construction, halal beauty, wardah

Procedia PDF Downloads 269
12931 Chaos Analysis of a 3D Finance System and Generalized Synchronization for N-Dimension

Authors: Muhammad Fiaz

Abstract:

The article in hand is the study of complex features like Zero Hopf Bifurcation, Chaos and Synchronization of integer and fractional order version of a new 3D finance system. Trusted tools of averaging theory and active control method are utilized for investigation of Zero Hopf bifurcation and synchronization for both versions respectively. Inventiveness of the paper is to find the answer of a question that is it possible to find a chaotic system which can be synchronized with any other of the same dimension? Based on different examples we categorically develop a theory that if a couple of master and slave chaotic dynamical system is synchronized by selecting a suitable gain matrix with special conditions then the master system is synchronized with any chaotic dynamical system of the same dimension. With the help of this study we developed generalized theorems for synchronization of n-dimension dynamical systems for integer as well as fractional versions. it proposed that this investigation will contribute a lot to control dynamical systems and only a suitable gain matrix with special conditions is enough to synchronize the system under consideration with any other chaotic system of the same dimension. Chaotic properties of fractional version of the new finance system are also analyzed at fractional order q=0.87. Simulations results, where required, also provided for authenticity of analytical study.

Keywords: complex analysis, chaos, generalized synchronization, control dynamics, fractional order analysis

Procedia PDF Downloads 69
12930 A Schema of Building an Efficient Quality Gate throughout the Software Development with Tools

Authors: Le Chen

Abstract:

This paper presents an efficient tool platform scheme to ensure quality protection throughout the software development process. The main principle is to manage the information of requirements, design, development, testing, operation and maintenance process with proper tools, and to set up the quality standards of each process. Through the tools’ display and summary of quality standards, the quality standards can be visualizad and ready for policy decision, which is called Quality Gate in this paper. In addition, the tools are also integrated to achieve the exchange and relation of information which highly improving operational efficiency. In this paper, the feasibility of the scheme is verified by practical application of development projects, and the overall information display and data mining are proposed to be further improved.

Keywords: efficiency, quality gate, software process, tools

Procedia PDF Downloads 359
12929 INCIPIT-CRIS: A Research Information System Combining Linked Data Ontologies and Persistent Identifiers

Authors: David Nogueiras Blanco, Amir Alwash, Arnaud Gaudinat, René Schneider

Abstract:

At a time when the access to and the sharing of information are crucial in the world of research, the use of technologies such as persistent identifiers (PIDs), Current Research Information Systems (CRIS), and ontologies may create platforms for information sharing if they respond to the need of disambiguation of their data by assuring interoperability inside and between other systems. INCIPIT-CRIS is a continuation of the former INCIPIT project, whose goal was to set up an infrastructure for a low-cost attribution of PIDs with high granularity based on Archival Resource Keys (ARKs). INCIPIT-CRIS can be interpreted as a logical consequence and propose a research information management system developed from scratch. The system has been created on and around the Schema.org ontology with a further articulation of the use of ARKs. It is thus built upon the infrastructure previously implemented (i.e., INCIPIT) in order to enhance the persistence of URIs. As a consequence, INCIPIT-CRIS aims to be the hinge between previously separated aspects such as CRIS, ontologies and PIDs in order to produce a powerful system allowing the resolution of disambiguation problems using a combination of an ontology such as Schema.org and unique persistent identifiers such as ARK, allowing the sharing of information through a dedicated platform, but also the interoperability of the system by representing the entirety of the data as RDF triplets. This paper aims to present the implemented solution as well as its simulation in real life. We will describe the underlying ideas and inspirations while going through the logic and the different functionalities implemented and their links with ARKs and Schema.org. Finally, we will discuss the tests performed with our project partner, the Swiss Institute of Bioinformatics (SIB), by the use of large and real-world data sets.

Keywords: current research information systems, linked data, ontologies, persistent identifier, schema.org, semantic web

Procedia PDF Downloads 135
12928 An Experimental Study on Heat and Flow Characteristics of Water Flow in Microtube

Authors: Zeynep Küçükakça, Nezaket Parlak, Mesut Gür, Tahsin Engin, Hasan Küçük

Abstract:

In the current research, the single phase fluid flow and heat transfer characteristics are experimentally investigated. The experiments are conducted to cover transition zone for the Reynolds numbers ranging from 100 to 4800 by fused silica and stainless steel microtubes having diameters of 103-180 µm. The applicability of the Logarithmic Mean Temperature Difference (LMTD) method is revealed and an experimental method is developed to calculate the heat transfer coefficient. Heat transfer is supplied by a water jacket surrounding the microtubes and heat transfer coefficients are obtained by LMTD method. The results are compared with data obtained by the correlations available in the literature in the study. The experimental results indicate that the Nusselt numbers of microtube flows do not accord with the conventional results when the Reynolds number is lower than 1000. After that, the Nusselt number approaches the conventional theory prediction. Moreover, the scaling effects in micro scale such as axial conduction, viscous heating and entrance effects are discussed. On the aspect of fluid characteristics, the friction factor is well predicted with conventional theory and the conventional friction prediction is valid for water flow through microtube with a relative surface roughness less than about 4 %.

Keywords: microtube, laminar flow, friction factor, heat transfer, LMTD method

Procedia PDF Downloads 460
12927 Promoting Authenticity in Employer Brands to Address the Global-Local Problem in Complex Organisations: The Case of a Developing Country

Authors: Saud Al Taj

Abstract:

Employer branding is considered as a useful tool for addressing the global-local problem facing complex organisations that have operations scattered across the globe and face challenges of dealing with the local environment alongside. Despite being an established field of study within the Western developed world, there is little empirical evidence concerning the relevance of employer branding to global companies that operate in the under-developed economies. This paper fills this gap by gaining rich insight into the implementation of employer branding programs in a foreign multinational operating in Pakistan dealing with the global-local problem. The study is qualitative in nature and employs semi-structured and focus group interviews with senior/middle managers and local frontline employees to deeply examine the phenomenon in case organisation. Findings suggest that authenticity is required in employer brands to enable them to respond to the local needs thereby leading to the resolution of the global-local problem. However, the role of signaling theory is key to the development of authentic employer brands as it stresses on the need to establish an efficient and effective signaling environment wherein signals travel in both directions (from signal designers to receivers and backwards) and facilitate firms with the global-local problem. The paper also identifies future avenues of research for the employer branding field.

Keywords: authenticity, counter-signals, employer branding, global-local problem, signaling theory

Procedia PDF Downloads 368
12926 Data Mining to Capture User-Experience: A Case Study in Notebook Product Appearance Design

Authors: Rhoann Kerh, Chen-Fu Chien, Kuo-Yi Lin

Abstract:

In the era of rapidly increasing notebook market, consumer electronics manufacturers are facing a highly dynamic and competitive environment. In particular, the product appearance is the first part for user to distinguish the product from the product of other brands. Notebook product should differ in its appearance to engage users and contribute to the user experience (UX). The UX evaluates various product concepts to find the design for user needs; in addition, help the designer to further understand the product appearance preference of different market segment. However, few studies have been done for exploring the relationship between consumer background and the reaction of product appearance. This study aims to propose a data mining framework to capture the user’s information and the important relation between product appearance factors. The proposed framework consists of problem definition and structuring, data preparation, rules generation, and results evaluation and interpretation. An empirical study has been done in Taiwan that recruited 168 subjects from different background to experience the appearance performance of 11 different portable computers. The results assist the designers to develop product strategies based on the characteristics of consumers and the product concept that related to the UX, which help to launch the products to the right customers and increase the market shares. The results have shown the practical feasibility of the proposed framework.

Keywords: consumers decision making, product design, rough set theory, user experience

Procedia PDF Downloads 313
12925 A Cross-Sectional Study on Clinical Self-Efficacy of Final Year School of Nursing Students among Universities of Tigray Region, Northern Ethiopia

Authors: Awole Seid, Yosef Zenebe, Hadgu Gerensea, Kebede Haile Misgina

Abstract:

Background: Clinical competence is one of the ultimate goals of nursing education. Clinical skills are more than successfully performing tasks; it incorporates client assessment, identification of deficits and the ability to critically think to provide solutions. Assessment of clinical competence, particularly identifying gaps that need improvement and determining the educational needs of nursing students have great importance in nursing education. Thus this study aims determining clinical self-efficacy of final year school of nursing students in three universities of Tigray Region. Methods: A cross-sectional study was conducted on 224 final year school of nursing students from department of nursing, psychiatric nursing, and midwifery on three universities of Tigray region. Anonymous self-administered questionnaire was administered to generate data collected on June, 2017. The data were analyzed using SPSS version 20. The result is described using tables and charts as required. Logistic regression was employed to test associations. Result: The mean age of students was 22.94 + 1.44. Generally, 21% of students have been graduated in the department in which they are not interested. The study demonstrated 28.6% had poor and 71.4% had good perceived clinical self-efficacy. Beside this, 43.8% of psychiatric nursing and 32.6% of comprehensive nursing students have poor clinical self-efficacy. Among the four domains, 39.3% and 37.9% have poor clinical self- efficacy with regard to ‘Professional development’ and ‘Management of care’. Place of the institution [AOR=3.480 (1.333 - 9.088), p=0.011], interest during department selection [AOR=2.202 (1.045 - 4.642), p=.038], and theory-practice gap [AOR=0.224 (0.110 - 0.457), p=0.000] were significantly associated with perceived clinical self-efficacy. Conclusion: The magnitude of students with poor clinically self efficacy was high. Place of institution, theory-practice gap, students interest to the discipline were the significant predictors of clinical self-efficacy. Students from youngest universities have good clinical self-efficacy. During department selection, student’s interest should be respected. The universities and other stakeholders should improve the capacity of surrounding affiliate teaching hospitals to set and improve care standards in order to narrow the theory-practice gap. School faculties should provide trainings to hospital staffs and monitor standards of clinical procedures.

Keywords: clinical self-efficacy, nursing students, Tigray, northern Ethiopia

Procedia PDF Downloads 172
12924 Building Information Modeling-Based Information Exchange to Support Facilities Management Systems

Authors: Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell

Abstract:

Today’s facilities are ever more sophisticated and the need for available and reliable information for operation and maintenance activities is vital. The key challenge for facilities managers is to have real-time accurate and complete information to perform their day-to-day activities and to provide their senior management with accurate information for decision-making process. Currently, there are various technology platforms, data repositories, or database systems such as Computer-Aided Facility Management (CAFM) that are used for these purposes in different facilities. In most current practices, the data is extracted from paper construction documents and is re-entered manually in one of these computerized information systems. Construction Operations Building information exchange (COBie), is a non-proprietary data format that contains the asset non-geometric data which was captured and collected during the design and construction phases for owners and facility managers use. Recently software vendors developed add-in applications to generate COBie spreadsheet automatically. However, most of these add-in applications are capable of generating a limited amount of COBie data, in which considerable time is still required to enter the remaining data manually to complete the COBie spreadsheet. Some of the data which cannot be generated by these COBie add-ins is essential for facilities manager’s day-to-day activities such as job sheet which includes preventive maintenance schedules. To facilitate a seamless data transfer between BIM models and facilities management systems, we developed a framework that enables automated data generation using the data extracted directly from BIM models to external web database, and then enabling different stakeholders to access to the external web database to enter the required asset data directly to generate a rich COBie spreadsheet that contains most of the required asset data for efficient facilities management operations. The proposed framework is a part of ongoing research and will be demonstrated and validated on a typical university building. Moreover, the proposed framework supplements the existing body of knowledge in facilities management domain by providing a novel framework that facilitates seamless data transfer between BIM models and facilities management systems.

Keywords: building information modeling, BIM, facilities management systems, interoperability, information management

Procedia PDF Downloads 116
12923 Designing Mobile Application to Motivate Young People to Visit Cultural Heritage Sites

Authors: Yuko Hiramatsu, Fumihiro Sato, Atsushi Ito, Hiroyuki Hatano, Mie Sato, Yu Watanabe, Akira Sasaki

Abstract:

This paper presents a mobile phone application developed for sightseeing in Nikko, one of the cultural world heritages in Japan, using the BLE (Bluetooth Low Energy) beacon. Based on our pre-research, we decided to design our application for young people who walk around the area actively, but know little about the tradition and culture of Nikko. One solution is to construct many information boards to explain; however, it is difficult to construct new guide plates in cultural world heritage sites. The smartphone is a good solution to send such information to such visitors. This application was designed using a combination of the smartphone and beacons, set in the area, so that when a tourist passes near a beacon, the application displays information about the area including a map, historical or cultural information about the temples and shrines, and local shops nearby as well as a bus timetable. It is useful for foreigners, too. In addition, we developed quizzes relating to the culture and tradition of Nikko to provide information based on the Zeigarnik effect, a psychological effect. According to the results of our trials, tourists positively evaluated the basic information and young people who used the quiz function were able to learn the historical and cultural points. This application helped young visitors at Nikko to understand the cultural elements of the site. In addition, this application has a function to send notifications. This function is designed to provide information about the local community such as shops, local transportation companies and information office. The application hopes to also encourage people living in the area, and such cooperation from the local people will make this application vivid and inspire young visitors to feel that the cultural heritage site is still alive today. This is a gateway for young people to learn about a traditional place and understand the gravity of preserving such areas.

Keywords: BLE beacon, smartphone application, Zeigarnik effect, world heritage site, school trip

Procedia PDF Downloads 324
12922 Implementing Text Using Political and Current Issues to Create Choreography: “The Pledge 2.0”

Authors: Muhammad Fairul Azreen bin Mohd Zahid, Melissa Querk, Aimi Nabila bt Anizaim

Abstract:

For this particular research, the focus is based on the practice as research which will produce a choreography as the outcome. The ideas organically develop as an “epiphany” from the meeting, brainstorming, or situation that revolves around surroundings. In this study, the researchers are approaching the national pillar of Malaysia known as ‘Rukun Negara’ to develop a choreographic idea. The concept theory of Speech Act by J.L Austin is used to compose the choreography alongside with national pillar ‘Rukun Negara’ as a guideline for a contemporary work titled, The Pledge 2.0, besides fostering the spirit of unity. These approaches will offer flexibility in creating a choreography piece. The pledge has crossed the boundaries by using texts and heavy issues in choreography developments. It will emphasize the concept of delivering the speech via verbal and nonverbal body language. Besides using the Theory of Speech Acts, the development process of creating this piece will lay the bare normative structure implicit in performance practice. Converging current issues into the final choreographic piece for this research is vital as this research will explore a few choreography methods from different perspectives. Hence, the audience will be able to see the world of dance that always revolves in line with the diachronic process in many ways. The method used in this research is qualitative, which will be used in finding the movement that fits the given facts.

Keywords: performing arts, speech act, performative, nationalism, choreography, politic in dance

Procedia PDF Downloads 84