Search results for: navigation information visualization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11162

Search results for: navigation information visualization

9272 Factors Affecting Online Health Seeking Behaviors in Middle-Income Class Filipino Adults

Authors: Reinzo Vittorio B. Cardenas, Heather Venice L. Abogado, Andrea Therese V. Afable, Rhea D. Avillanoza, Marie Abegail P. Ayagan, Catherine D. Bantayan

Abstract:

As the Internet provides fast and reliable health-related information, the tendency to self-diagnose increases to further understand medical jargon in a diagnosis with a physician and decreases costly consultation fees. The study aimed to explore and understand the factors affecting online health-seeking behaviors in middle-income class adults in Metro Manila. The study was conducted from March to April of 2021 with a sample size of 200 individuals aged 20 to 49 years old. The study was delivered via an online survey that used a questionnaire adapted from the research of Lee et al. (2015). Specifically, the survey consisted of three sections: assessing web-based health-seeking behaviors, consultation with health professionals, and participants' hesitancy to consult with physicians, which used a mix of a 5-point Likert-type scale with multiple responses and multiple-choice options. The results showed that the age and educational attainment of the respondents had a negative effect while presenting a positive effect of socio-economic status on health-seeking behavior. Lastly, there was a significant effect of participant’s hesitancy for professional consultation on their health-seeking behavior. The results gleaned from the study indicated that various individual and socio-economic factors might significantly affect one’s health-seeking behaviors. Although hesitancy had a significant effect on the spectrum of health-seeking behaviors, this does not imply that certain factors are specifically related to an individual’s tendency to seek health information. This information instead becomes essential in understanding the patient-physician relationship and giving patients a more holistic treatment.

Keywords: health-seeking behavior, health information, Internet, physician consultation

Procedia PDF Downloads 206
9271 The Impact of Information and Communication Technology on Bilateral Trade in Goods

Authors: Christina Tay

Abstract:

This paper investigates the impact of Information and Communication Technology (ICT) on bilateral trade in goods. Empirical analysis is performed on the United States and 34 partnering countries from 2000 to 2013. Our econometric model fits the data well, explaining 52% of the variation in trade flows for goods trade, 53.2% of the variation in trade flows for goods export and 48% of the variation in trade flows for goods import. For every 10% increase in fixed broadband Internet subscribers per 100 people increases, goods trade by 7.9% and for every 5% increase in fixed broadband Internet subscribers per 100 people, goods export increases by 11%. For every 1% increase in fixed telephone line penetration per 100 people, goods trade increases by 26.3%, goods export increases by 24.4% and goods import increases by 24.8%. For every 1% increase in mobile-cellular telephone subscriptions, goods trade decreases by 29.6% and goods export decreases by 27.1%, whilst for every 0.01% increase in mobile-cellular telephone subscriptions, goods import decreases by 34.3%. For every 1% increase in the percentage of population who used the Internet from any location in the last 12 months Internet, goods trade increases by 32.5%, goods export increases by 38.9%, goods import increases by 33%. All our trade determinants as well as our ICT variables have significances on goods exports for the US. We can also draw from our study that the US relies more rather heavily on ICT for its goods export compared to goods import.

Keywords: bilateral trade, fixed broadband, fixed telephone, goods trade, information and communicative technologies, Internet, mobile-cellular phone

Procedia PDF Downloads 275
9270 Avatar Creation for E-Learning

Authors: M. Najib Osman, Hanafizan Hussain, Sri Kusuma Wati Mohd Daud

Abstract:

Avatar was used as user’s symbol of identity in online communications such as Facebook, Twitter, online game, and portal community between unknown people. The development of this symbol is the use of animated character or avatar, which can engage learners in a way that draws them into the e-Learning experience. Immersive learning is one of the most effective learning techniques, and animated characters can help create an immersive environment. E-learning is an ideal learning environment using modern means of information technology, through the effective integration of information technology and the curriculum to achieve, a new learning style which can fully reflect the main role of the students to reform the traditional teaching structure thoroughly. Essential in any e-learning is the degree of interactivity for the learner, and whether the learner is able to study at any time, or whether there is a need for the learner to be online or in a classroom with other learners at the same time (synchronous learning). Ideally, e-learning should engage the learners, allowing them to interact with the course materials, obtaining feedback on their progress and assistance whenever it is required. However, the degree of interactivity in e-learning depends on how the course has been developed and is dependent on the software used for its development, and the way the material is delivered to the learner. Therefore, users’ accessibility that allows access to information at any time and places and their positive attitude towards e-learning such as having interacting with a good teacher and the creation of a more natural and friendly environment for e-learning should be enhanced. This is to motivate their learning enthusiasm and it has been the responsibility of educators to incorporate new technology into their ways of teaching.

Keywords: avatar, e-learning, higher education, students' perception

Procedia PDF Downloads 397
9269 Morpheme Based Parts of Speech Tagger for Kannada Language

Authors: M. C. Padma, R. J. Prathibha

Abstract:

Parts of speech tagging is the process of assigning appropriate parts of speech tags to the words in a given text. The critical or crucial information needed for tagging a word come from its internal structure rather from its neighboring words. The internal structure of a word comprises of its morphological features and grammatical information. This paper presents a morpheme based parts of speech tagger for Kannada language. This proposed work uses hierarchical tag set for assigning tags. The system is tested on some Kannada words taken from EMILLE corpus. Experimental result shows that the performance of the proposed system is above 90%.

Keywords: hierarchical tag set, morphological analyzer, natural language processing, paradigms, parts of speech

Procedia PDF Downloads 277
9268 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 351
9267 Issue Reorganization Using the Measure of Relevance

Authors: William Wong Xiu Shun, Yoonjin Hyun, Mingyu Kim, Seongi Choi, Namgyu Kim

Abstract:

Recently, the demand of extracting the R&D keywords from the issues and using them in retrieving R&D information is increasing rapidly. But it is hard to identify the related issues or to distinguish them. Although the similarity between the issues cannot be identified, but with the R&D lexicon, the issues that always shared the same R&D keywords can be determined. In details, the R&D keywords that associated with particular issue is implied the key technology elements that needed to solve the problem of the particular issue. Furthermore, the related issues that sharing the same R&D keywords can be showed in a more systematic way through the issue clustering constructed from the perspective of R&D. Thus, sharing of the R&D result and reusable of the R&D technology can be facilitated. Indirectly, the redundancy of investment on the same R&D can be reduce as the R&D information can be shared between those corresponding issues and reusability of the related R&D can be improved. Therefore, a methodology of constructing an issue clustering from the perspective of common R&D keywords is proposed to satisfy the demands mentioned.

Keywords: clustering, social network analysis, text mining, topic analysis

Procedia PDF Downloads 562
9266 Three Tier Indoor Localization System for Digital Forensics

Authors: Dennis L. Owuor, Okuthe P. Kogeda, Johnson I. Agbinya

Abstract:

Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the implementation of a robust system that is capable of locating, tracking mobile device users and store location information for both indoor and partially outdoor the cloud. The system can be used during disaster to track and locate mobile phone users. The developed system is a mobile application built based on Android, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), JavaScript and MATLAB for the Android mobile users. Using Waterfall model of software development, we have implemented a three level system that is able to track, locate and store mobile device information in secure database (cloud) on almost a real time basis. The outcome of the study showed that the developed system is efficient with regard to the tracking and locating mobile devices. The system is also flexible, i.e. can be used in any building with fewer adjustments. Finally, the system is accurate for both indoor and outdoor in terms of locating and tracking mobile devices.

Keywords: indoor localization, digital forensics, fingerprinting, tracking and cloud

Procedia PDF Downloads 317
9265 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 453
9264 Impact of Mass Customization for 3D Geographic Information Systems under Turbulent Environments

Authors: Abdo Shabah

Abstract:

Mass customization aims to produce customized goods (allowing economies of scope) at lower cost (to achieve economies of scale) using multiple strategies (modularization and postponement). Through a simulation experiment of organizations under turbulent environment, we aim to compare standardization and mass customization of services and assess the impact of different forms of mass customization (early and late postponement) on performance, quality and consumer satisfaction, on the use of modular dynamic 3D Geographic Information System. Our hypothesis is that mass customization performs better and achieves better quality in turbulent environment than standardization, but only when using early postponement strategies. Using mixed methods study, we try to confirm our hypothesis.

Keywords: mass customization, postponement, experiment, performance, quality, satisfaction, 3D GIS

Procedia PDF Downloads 441
9263 Information Communication Technologies and Renewable Technologies' Impact on Irish People's Lifestyle: A Constructivist Grounded Theory Study

Authors: Hamilton V. Niculescu

Abstract:

This paper discusses findings relating to people's engagement with mobile communication technologies and remote automated systems. This interdisciplinary study employs a constructivist grounded theory methodology, with qualitative data that was generated following in-depth semi-structured interviews with 18 people living in Ireland being corroborated with participants' observations and quantitative data. Additional data was collected following participants' remote interaction with six custom-built automated enclosures, located at six different sites around Dublin, Republic of Ireland. This paper argues that ownership and education play a vital role in people engaging with and adoption of new technologies. Analysis of participants' behavior and attitude towards Information Communication Technologies (ICT) suggests that innovations do not always improve peoples' social inclusion. Technological innovations are sometimes perceived as destroying communities and create a dysfunctional society. Moreover, the findings indicate that a lack of public information and support from Irish governmental institutions, as well as limited off-the-shelves availability, has led to low trust and adoption of renewable technologies. A limited variation in participants' behavior and interaction patterns with technologies was observed during the study. This suggests that people will eventually adopt new technologies according to their needs and experience, even though they initially rejected the idea of changing their lifestyle.

Keywords: automation, communication, ICT, renewables

Procedia PDF Downloads 94
9262 Quick Response Codes in Physio: A Simple Click to Long-Term Oxygen Therapy Education

Authors: K. W. Lee, C. M. Choi, H. C. Tsang, W. K. Fong, Y. K. Cheng, L. Y. Chan, C. K. Yuen, P. W. Lau, Y. L. To, K. C. Chow

Abstract:

QR (Quick Response) Code is a matrix barcode. It enables users to open websites, photos and other information with mobile devices by just snapping the code. In usual Long Term Oxygen Therapy arrangement, piles of LTOT related information like leaflets from different oxygen service providers are given to patients to choose an appropriate plan according to their needs. If these printed materials are transformed into electronic format (QR Code), it would be more environmentally-friendly. More importantly, electronic materials including LTOT equipment operation and dyspnoea relieving techniques also empower patients in long-term disease management. The objective to this study is to investigate the effect of QR code in patient education on new LTOT users. This study was carried out in medical wards of North District Hospital. Adult patients and relatives who followed commands, were able to use smartphones with internet services and required LTOT arrangement on hospital discharge were recruited. In LTOT arrangement, apart from the usual LTOT education booklets which included patients’ personal information (e.g. oxygen titration and six-minute walk test results etc.), extra leaflets consisted of 1. QR codes of LTOT plans from different oxygen service providers, 2. Education materials of dyspnoea management and 3. Instructions on LTOT equipment operation were given. Upon completion of LTOT arrangement, a questionnaire about the use of QR code on patient education was filled in by patients or relatives. A total of 10 new LTOT users were recruited from November 2017 to January 2018. Initially, 70% of them did not know anything about the QR code, but all of them understood its operation after a simple demonstration. 70% of them agreed that it was convenient to use (20% strongly agree, 40% agree, 10% somewhat agree). 80% of them agreed that QR code could facilitate the retrieval of more LTOT related information (10% strongly agree, 70% agree) while 90% agreed that we should continue delivering QR code leaflets to new LTOT users in the future (30% strongly agree, 40% agree, 20% somewhat agree). It is proven that QR code is a convenient and environmentally-friendly tool to deliver information. It is also relatively easy to be introduced to new users. It has received welcoming feedbacks from current users.

Keywords: long-term oxygen therapy, physiotherapy, patient education, QR code

Procedia PDF Downloads 133
9261 Open Education Resources a Gateway for Accessing Hospitality and Tourism Learning Materials

Authors: Isiya Shinkafi Salihu

Abstract:

Open education resources (OER) are open learning materials in different formats, course content and context to support learning globally. This study investigated the level of awareness of Hospitality and Tourism OER among students in the Department of Tourism and Hotel Management in a University. Specifically, it investigated students’ awareness, use and accessibility of OER in learning. The research design method used was the quantitative approach, using an online questionnaire. The thesis research shows that respondents frequently use OER but with little knowledge of the content and context of the material. Most of the respondents’ have little knowledge about the concept even though they use it. Information and communication technologies are tools for information gathering, social networking and knowledge sharing and transfer. OER are open education materials accessible online such as curriculum, maps, course materials, and videos that users create, adapt, reuse for learning and research. Few of the respondents that used OER in learning faced some challenges such as high cost of data, poor connectivity and lack of proper guidance. The results suggest a lack of awareness of OER among students in the faculty of tourism and the need for support from the teachers in the utilization of OER. The thesis also reveals that some of the international students are accessing the internet as beginners in their studies which require guidance. The research, however, recommends that further studies should be conducted to other faculties.

Keywords: creative commons, open education resources, open licenses, information and communication technology

Procedia PDF Downloads 166
9260 EWMA and MEWMA Control Charts for Monitoring Mean and Variance in Industrial Processes

Authors: L. A. Toro, N. Prieto, J. J. Vargas

Abstract:

There are many control charts for monitoring mean and variance. Among these, the X y R, X y S, S2 Hotteling and Shewhart control charts, for mentioning some, are widely used for monitoring mean a variance in industrial processes. In particular, the Shewhart charts are based on the information about the process contained in the current observation only and ignore any information given by the entire sequence of points. Moreover, that the Shewhart chart is a control chart without memory. Consequently, Shewhart control charts are found to be less sensitive in detecting smaller shifts, particularly smaller than 1.5 times of the standard deviation. These kind of small shifts are important in many industrial applications. In this study and effective alternative to Shewhart control chart was implemented. In case of univariate process an Exponentially Moving Average (EWMA) control chart was developed and Multivariate Exponentially Moving Average (MEWMA) control chart in case of multivariate process. Both of these charts were based on memory and perform better that Shewhart chart while detecting smaller shifts. In these charts, information the past sample is cumulated up the current sample and then the decision about the process control is taken. The mentioned characteristic of EWMA and MEWMA charts, are of the paramount importance when it is necessary to control industrial process, because it is possible to correct or predict problems in the processes before they come to a dangerous limit.

Keywords: control charts, multivariate exponentially moving average (MEWMA), exponentially moving average (EWMA), industrial control process

Procedia PDF Downloads 341
9259 Social Media's Roles in the Change of Vietnamese Society: Emerging Public Sphere for Citizens

Authors: Ly Thi Hai Yen

Abstract:

The Internet in Vietnam has developed significantly over the last 20 years and made impressive advances, permeating into every part of daily life, changing people's habits as well as the way people's communication. Under this situation, social media have become useful tools for the citizen to get and share information. About 10 years ago, most Vietnamese people got the information through state media, but thanks to the development of the Internet, nowadays, social media have been giving them rich sources of information at any area of society. By using case study research methods, documentary research method and in-depth interviews conducted with social media users, NGO activists, and Vietnamese scholars in 2017, the paper found that social media has been bringing a cyber public sphere to whom wish to discuss social and political issues. And, more importantly, it gives them a chance to connect with the government and policy makers quickly and effectively. Moreover, people use social media to supervise activities in society to prevent social evils and corruption in Vietnam. However, besides these positive points, people also have to cope with the rising situation of fake news which causing consequences for the society, such as pulling off crimes or cheating money and others. The paper concluded that social media plays important roles in the change of Vietnamese society, giving citizens a cyber public sphere unrestrictedly to discuss social and political issues but also bringing many bad risks to citizens.

Keywords: Vietnamese, social media, politics-society

Procedia PDF Downloads 127
9258 Automatic Identification and Monitoring of Wildlife via Computer Vision and IoT

Authors: Bilal Arshad, Johan Barthelemy, Elliott Pilton, Pascal Perez

Abstract:

Getting reliable, informative, and up-to-date information about the location, mobility, and behavioural patterns of animals will enhance our ability to research and preserve biodiversity. The fusion of infra-red sensors and camera traps offers an inexpensive way to collect wildlife data in the form of images. However, extracting useful data from these images, such as the identification and counting of animals remains a manual, time-consuming, and costly process. In this paper, we demonstrate that such information can be automatically retrieved by using state-of-the-art deep learning methods. Another major challenge that ecologists are facing is the recounting of one single animal multiple times due to that animal reappearing in other images taken by the same or other camera traps. Nonetheless, such information can be extremely useful for tracking wildlife and understanding its behaviour. To tackle the multiple count problem, we have designed a meshed network of camera traps, so they can share the captured images along with timestamps, cumulative counts, and dimensions of the animal. The proposed method takes leverage of edge computing to support real-time tracking and monitoring of wildlife. This method has been validated in the field and can be easily extended to other applications focusing on wildlife monitoring and management, where the traditional way of monitoring is expensive and time-consuming.

Keywords: computer vision, ecology, internet of things, invasive species management, wildlife management

Procedia PDF Downloads 124
9257 A Neural Approach for Color-Textured Images Segmentation

Authors: Khalid Salhi, El Miloud Jaara, Mohammed Talibi Alaoui

Abstract:

In this paper, we present a neural approach for unsupervised natural color-texture image segmentation, which is based on both Kohonen maps and mathematical morphology, using a combination of the texture and the image color information of the image, namely, the fractal features based on fractal dimension are selected to present the information texture, and the color features presented in RGB color space. These features are then used to train the network Kohonen, which will be represented by the underlying probability density function, the segmentation of this map is made by morphological watershed transformation. The performance of our color-texture segmentation approach is compared first, to color-based methods or texture-based methods only, and then to k-means method.

Keywords: segmentation, color-texture, neural networks, fractal, watershed

Procedia PDF Downloads 326
9256 3D Guided Image Filtering to Improve Quality of Short-Time Binned Dynamic PET Images Using MRI Images

Authors: Tabassum Husain, Shen Peng Li, Zhaolin Chen

Abstract:

This paper evaluates the usability of 3D Guided Image Filtering to enhance the quality of short-time binned dynamic PET images by using MRI images. Guided image filtering is an edge-preserving filter proposed to enhance 2D images. The 3D filter is applied on 1 and 5-minute binned images. The results are compared with 15-minute binned images and the Gaussian filtering. The guided image filter enhances the quality of dynamic PET images while also preserving important information of the voxels.

Keywords: dynamic PET images, guided image filter, image enhancement, information preservation filtering

Procedia PDF Downloads 122
9255 Development of Algorithms for the Study of the Image in Digital Form for Satellite Applications: Extraction of a Road Network and Its Nodes

Authors: Zineb Nougrara

Abstract:

In this paper, we propose a novel methodology for extracting a road network and its nodes from satellite images of Algeria country. This developed technique is a progress of our previous research works. It is founded on the information theory and the mathematical morphology; the information theory and the mathematical morphology are combined together to extract and link the road segments to form a road network and its nodes. We, therefore, have to define objects as sets of pixels and to study the shape of these objects and the relations that exist between them. In this approach, geometric and radiometric features of roads are integrated by a cost function and a set of selected points of a crossing road. Its performances were tested on satellite images of Algeria country.

Keywords: satellite image, road network, nodes, image analysis and processing

Procedia PDF Downloads 258
9254 Socioeconomic Status and Use of Web-Based Information Resources by Public Polytechnic Students in Southwestern Nigeria

Authors: John Adeboye Oyeboade, Pius Olatunji Olaojo, Kuburay Folashade Yusuf, John Oluwaseye Adebayo

Abstract:

Web-based Information Resources (WBIR) are increasingly becoming essential tools for students to accomplish academic tasks. Preliminary observation revealed that many polytechnic libraries in Southwestern Nigeria do not subscribe or renew subscriptions to WBIR academic databases, and students use free-based electronic resources. Hence, this study was carried out to investigate socioeconomic status and use of WBIR by public polytechnic students in Southwestern Nigeria. Six public polytechnics out of the 16 offerings of Higher National Diploma (HND) programs were selected by stratified random sampling to reflect federal and state polytechnics. A proportionate size sampling technique was used to select 1,463 HND students. The instruments used were Socioeconomic status (SeS) (α=0.81) and WBIR used for Academic Tasks (α=0.98) scales. Data were analyzed using descriptive statistics and Pearson’s product-moment correlation at a 0.05 level of significance. Students’ SeS ( =79.10) was moderate. Online reference sources ( =3.97), Web 2.0 ( =3.50), and social media ( =3.00) were regularly used WBIR. WBIR use ( =53.34) was moderate. The students used WBIR for project writing ( =3.46) and class assignments ( =3.42). The Students’ SeS (r=0.59) had significant relationships with WBIR use. Socioeconomic status directly influenced the use of WBIR for academic tasks. Management of polytechnics should provide WBIR subscriptions for students’ use in the polytechnic e-libraries.

Keywords: public polytechnic students, polytechnic libraries, socioeconomic status, Web-based information resources

Procedia PDF Downloads 50
9253 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 148
9252 New Media Impact on Newspaper Readership

Authors: Umar Lawal Maradun

Abstract:

Newspapers are very important sources of information and are trusted by majority of populations in America, Latin America, Europe and many parts of the world. In the mid-1950s newspapers were at the forefront of providing people with information. However, in the 1970s television took over, while in the 1980s cable satellites became popular and in the 1990s the Internet and World Wide Web became major sources of media content and also major threats to the print media form. This paper looks at how newspaper readership has been affected by new media technology, especially the Internet. It uses empirical data by reviewing available literature within the context of change that is likely to threaten conventional media. It discovers that there is a growing decline in newspaper readership as a result of widespread use of the Internet. The decline in readership has been discovered to be a global phenomenon. The paper suggests strategies for the survival and revenue generation for print-based newspapers.

Keywords: Internet, media, newspaper, press

Procedia PDF Downloads 235
9251 The Importance of Electronic Medical Record Systems in Health Care Economics

Authors: Mutaz Shurahabeel Ahmed Ombada

Abstract:

This paper investigates potential health and financial settlement of health information technology, this paper evaluates health care with the use of IT and other associated industries. It assesses prospective savings and costs of extensive acceptance of Electronic Medical Record Systems (EMRS), models significant to health as well as safety remuneration, and conclude that efficient EMRS execution and networking could ultimately save more than US $55 billion annually through recuperating health care effectiveness and that Health Information Technology -enabled prevention and administration of chronic disease could eventually double those savings while rising health and other social remuneration. On the contrary, this is improbable to be realized without related to significant modifications to the health care system.

Keywords: electronic medical record systems, health care economics, EMRS

Procedia PDF Downloads 545
9250 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 484
9249 Web-Based Tools to Increase Public Understanding of Nuclear Technology and Food Irradiation

Authors: Denise Levy, Anna Lucia C. H. Villavicencio

Abstract:

Food irradiation is a processing and preservation technique to eliminate insects and parasites and reduce disease-causing microorganisms. Moreover, the process helps to inhibit sprouting and delay ripening, extending fresh fruits and vegetables shelf-life. Nevertheless, most Brazilian consumers seem to misunderstand the difference between irradiated food and radioactive food and the general public has major concerns about the negative health effects and environmental contamination. Society´s judgment and decision making are directly linked to perceived benefits and risks. The web-based project entitled ‘Scientific information about food irradiation: Internet as a tool to approach science and society’ was created by the Nuclear and Energetic Research Institute (IPEN), in order to offer an interdisciplinary approach to science education, integrating economic, ethical, social and political aspects of food irradiation. This project takes into account that, misinformation and unfounded preconceived ideas impact heavily on the acceptance of irradiated food and purchase intention by the Brazilian consumer. Taking advantage of the potential value of the Internet to enhance communication and education among general public, a research study was carried out regarding the possibilities and trends of Information and Communication Technologies among the Brazilian population. The content includes concepts, definitions and Frequently Asked Questions (FAQ) about processes, safety, advantages, limitations and the possibilities of food irradiation, including health issues, as well as its impacts on the environment. The project counts on eight self-instructional interactive web courses, situating scientific content in relevant social contexts in order to encourage self-learning and further reflections. Communication is a must to improve public understanding of science. The use of information technology for quality scientific divulgation shall contribute greatly to provide information throughout the country, spreading information to as many people as possible, minimizing geographic distances and stimulating communication and development.

Keywords: food irradiation, multimedia learning tools, nuclear science, society and education

Procedia PDF Downloads 237
9248 Diversity Indices as a Tool for Evaluating Quality of Water Ways

Authors: Khadra Ahmed, Khaled Kheireldin

Abstract:

In this paper, we present a pedestrian detection descriptor called Fused Structure and Texture (FST) features based on the combination of the local phase information with the texture features. Since the phase of the signal conveys more structural information than the magnitude, the phase congruency concept is used to capture the structural features. On the other hand, the Center-Symmetric Local Binary Pattern (CSLBP) approach is used to capture the texture information of the image. The dimension less quantity of the phase congruency and the robustness of the CSLBP operator on the flat images, as well as the blur and illumination changes, lead the proposed descriptor to be more robust and less sensitive to the light variations. The proposed descriptor can be formed by extracting the phase congruency and the CSLBP values of each pixel of the image with respect to its neighborhood. The histogram of the oriented phase and the histogram of the CSLBP values for the local regions in the image are computed and concatenated to construct the FST descriptor. Several experiments were conducted on INRIA and the low resolution DaimlerChrysler datasets to evaluate the detection performance of the pedestrian detection system that is based on the FST descriptor. A linear Support Vector Machine (SVM) is used to train the pedestrian classifier. These experiments showed that the proposed FST descriptor has better detection performance over a set of state of the art feature extraction methodologies.

Keywords: planktons, diversity indices, water quality index, water ways

Procedia PDF Downloads 501
9247 Feasibility Study of Particle Image Velocimetry in the Muzzle Flow Fields during the Intermediate Ballistic Phase

Authors: Moumen Abdelhafidh, Stribu Bogdan, Laboureur Delphine, Gallant Johan, Hendrick Patrick

Abstract:

This study is part of an ongoing effort to improve the understanding of phenomena occurring during the intermediate ballistic phase, such as muzzle flows. A thorough comprehension of muzzle flow fields is essential for optimizing muzzle device and projectile design. This flow characterization has heretofore been almost entirely limited to local and intrusive measurement techniques such as pressure measurements using pencil probes. Consequently, the body of quantitative experimental data is limited, so is the number of numerical codes validated in this field. The objective of the work presented here is to demonstrate the applicability of the Particle Image Velocimetry (PIV) technique in the challenging environment of the propellant flow of a .300 blackout weapon to provide accurate velocity measurements. The key points of a successful PIV measurement are the selection of the particle tracer, their seeding technique, and their tracking characteristics. We have experimentally investigated the aforementioned points by evaluating the resistance, gas dispersion, laser light reflection as well as the response to a step change across the Mach disk for five different solid tracers using two seeding methods. To this end, an experimental setup has been performed and consisted of a PIV system, the combustion chamber pressure measurement, classical high-speed schlieren visualization, and an aerosol spectrometer. The latter is used to determine the particle size distribution in the muzzle flow. The experimental results demonstrated the ability of PIV to accurately resolve the salient features of the propellant flow, such as the under the expanded jet and vortex rings, as well as the instantaneous velocity field with maximum centreline velocities of more than 1000 m/s. Besides, naturally present unburned particles in the gas and solid ZrO₂ particles with a nominal size of 100 nm, when coated on the propellant powder, are suitable as tracers. However, the TiO₂ particles intended to act as a tracer, surprisingly not only melted but also functioned as a combustion accelerator and decreased the number of particles in the propellant gas.

Keywords: intermediate ballistic, muzzle flow fields, particle image velocimetry, propellant gas, particle size distribution, under expanded jet, solid particle tracers

Procedia PDF Downloads 147
9246 Role of Information and Communication Technology in Pharmaceutical Innovation: Case of Firms in Developing Countries

Authors: Ilham Benali, Nasser Hajji, Nawfel Acha

Abstract:

The pharmaceutical sector is ongoing different constraints related to the Research and Development (R&D) costs, the patents extinction, the demand pressing, the regulatory requirement and the generics development, which drive leading firms in the sector to undergo technological change and to shift to biotechnological paradigm. Based on a large literature review, we present a background of innovation trajectory in pharmaceutical industry and reasons behind this technological transformation. Then we investigate the role that Information and Communication Technology (ICT) is playing in this revolution. In order to situate pharmaceutical firms in developing countries in this trajectory, and to examine the degree of their involvement in the innovation process, we did not find any previous empirical work or sources generating gathered data that allow us to analyze this phenomenon. Therefore, and for the case of Morocco, we tried to do it from scratch by gathering relevant data of the last five years from different sources. As a result, only about 4% of all innovative drugs that have access to the local market in the mentioned period are made locally which substantiates that the industrial model in pharmaceutical sector in developing countries is based on the 'license model'. Finally, we present another alternative, based on ICT use and big data tools that can allow developing countries to shift from status of simple consumers to active actors in the innovation process.

Keywords: biotechnologies, developing countries, innovation, information and communication technology, pharmaceutical firms

Procedia PDF Downloads 140
9245 Nearest Neighbor Investigate Using R+ Tree

Authors: Rutuja Desai

Abstract:

Search engine is fundamentally a framework used to search the data which is pertinent to the client via WWW. Looking close-by spot identified with the keywords is an imperative concept in developing web advances. For such kind of searching, extent pursuit or closest neighbor is utilized. In range search the forecast is made whether the objects meet to query object. Nearest neighbor is the forecast of the focuses close to the query set by the client. Here, the nearest neighbor methodology is utilized where Data recovery R+ tree is utilized rather than IR2 tree. The disadvantages of IR2 tree is: The false hit number can surpass the limit and the mark in Information Retrieval R-tree must have Voice over IP bit for each one of a kind word in W set is recouped by Data recovery R+ tree. The inquiry is fundamentally subordinate upon the key words and the geometric directions.

Keywords: information retrieval, nearest neighbor search, keyword search, R+ tree

Procedia PDF Downloads 273
9244 The Emergence of Information and Communication Technologies Acting as a Challenge for Media Literacy

Authors: Geetu Gahlawat, Manisha Singh

Abstract:

In the recent years, the concept of media literacy is being extended from its traditional focus on print and audio-visual media to encompass the internet and other new media within academic and policy discourses. This article throws revolves around three significant queries which are to be dealt by the academia, general public and the policy-makers: What is media literacy? How is it changing? And what is the significance of media literacy? At the beginning of the article, the definition 'media literacy' is the ability to access, analyse, evaluate and create messages across a variety of contexts are given and then this is further being tested in connection with the internet and other information and communication technologies.Having advocated this skills-based approach to media literacy in relation to the internet, the article identifies some outstanding issues for new media literacy crucial to any policy of promoting media literacy among the population. The outcome is better understanding of media literacy and also the impact of ICT on media literacy by the public as well as media literate people.

Keywords: media literacy, ICT, internet, education

Procedia PDF Downloads 587
9243 Efficiency of Maritime Simulator Training in Oil Spill Response Competence Development

Authors: Antti Lanki, Justiina Halonen, Juuso Punnonen, Emmi Rantavuo

Abstract:

Marine oil spill response operation requires extensive vessel maneuvering and navigation skills. At-sea oil containment and recovery include both single vessel and multi-vessel operations. Towing long oil containment booms that are several hundreds of meters in length, is a challenge in itself. Boom deployment and towing in multi-vessel configurations is an added challenge that requires precise coordination and control of the vessels. Efficient communication, as a prerequisite for shared situational awareness, is needed in order to execute the response task effectively. To gain and maintain adequate maritime skills, practical training is needed. Field exercises are the most effective way of learning, but especially the related vessel operations are resource-intensive and costly. Field exercises may also be affected by environmental limitations such as high sea-state or other adverse weather conditions. In Finland, the seasonal ice-coverage also limits the training period to summer seasons only. In addition, environmental sensitiveness of the sea area restricts the use of real oil or other target substances. This paper examines, whether maritime simulator training can offer a complementary method to overcome the training challenges related to field exercises. The objective is to assess the efficiency and the learning impact of simulator training, and the specific skills that can be trained most effectively in simulators. This paper provides an overview of learning results from two oil spill response pilot courses, in which maritime navigational bridge simulators were used to train the oil spill response authorities. The simulators were equipped with an oil spill functionality module. The courses were targeted at coastal Fire and Rescue Services responsible for near shore oil spill response in Finland. The competence levels of the participants were surveyed before and after the course in order to measure potential shifts in competencies due to the simulator training. In addition to the quantitative analysis, the efficiency of the simulator training is evaluated qualitatively through feedback from the participants. The results indicate that simulator training is a valid and effective method for developing marine oil spill response competencies that complement traditional field exercises. Simulator training provides a safe environment for assessing various oil containment and recovery tactics. One of the main benefits of the simulator training was found to be the immediate feedback the spill modelling software provides on the oil spill behaviour as a reaction to response measures.

Keywords: maritime training, oil spill response, simulation, vessel manoeuvring

Procedia PDF Downloads 152