Search results for: emergency medical services information system (EMSIS)
28200 Evaluating the Characteristics of Paediatric Accidental Poisonings
Authors: Grace Fangmin Tan, Elaine Yiling Tay, Elizabeth Huiwen Tham, Andrea Wei Ching Yeo
Abstract:
Background: While accidental poisonings in children may seem unavoidable, knowledge of circumstances surrounding such incidents and identification of risk factors is important in the development of secondary prevention strategies. Some risk factors include age of the child, lack of adequate supervision and improper storage of substances. The aim of this study is to assess risk factors and circumstances influencing outcomes in these children. Methodology: A retrospective medical record review of all accidental poisoning cases presenting to the Children’s Emergency at National University Hospital (NUH), Singapore between January 2014 and December 2015 was conducted. Information on demographics, poisoning circumstances and clinical outcomes were collected. Results: Ninety-nine of a total of 186 poisoning cases were accidental ingestions, with a mean age of 4.7 (range 0.4 to 18.3 years). The gender distribution is rather equal with 52(52.5%) females and 47(47.5%) males. Seventy-nine (79.8%) were self-administered by the child and in 20 cases (20.2%), the substance was administered erroneously by caregivers 12/20 (60.0%) of whom were given the wrong drug dose while 8/20 (40.0%) were given the wrong substance. Self-administration was associated with presentation to the ED within 12 hours (p=0.027, OR 6.65, 95% CI 1.24-35.72). Notably, 94.9% of the cases involved substances kept within reach of the child. Sixty-nine (82.1%) had the substance kept in the original container, 3(3.6%) in food containers, 8(9.5%) in other containers and 4(4.8%) without a container. Of the 50 cases with information on labelling, 40/50(80.0%) were accurately labelled, 2/50 (4.0%) wrongly labelled, and 8/50 (16.0%) were unlabelled. Implicated substances included personal care products (11.1%), household cleaning products (3.0%), and different classes of drugs such as paracetamol (22.2%), antihistamines (17.2%) and sympathomimetics (8.1%). Children < 3 years of age were 4.8 times more likely to be poisoned by household substances than children >3 years of age (p=0.009, 95% CI 1.48-15.77). Prehospital interventions were more likely to have been done in poisoning with household substances (p=0.005, OR 6.12 95% CI 1.73-21.68). Fifty-nine (59.6%) were asymptomatic, 34 (34.3%) had a Poisoning Severity Score (PSS) grade of 1 (minor) and 6 (6.1%) grade 2 (moderate). Older children were 9.3 times more likely to be symptomatic (p<0.001, 95% CI 3.15-27.25). Thirty (32%) required admission. Conclusion: A significant proportion of accidental poisoning cases were due to medication administration errors by caregivers, which should be preventable. Risk factors for accidental poisoning included lack of adequate caregiver supervision, improper labelling and young age of the child. There is an urgent need to improve caregiver counselling during medication dispensing as well as to educate caregivers on basic child safety measures in the home to prevent future accidental poisonings.Keywords: accidental, caregiver, paediatrics, poisoning
Procedia PDF Downloads 21728199 Way to Successful Enterprise Resource Planning System Implementation in Developing Countries: Case of Public Sector Unit
Authors: Suraj Kumar Mukti
Abstract:
Enterprise Resource Planning (ERP) system is a management tool to integrate all departments in an organization. It integrates business processes, manages resources efficiently and provides an appropriate decision support system to management. ERP system implementation is a typical and time taking process as well as money consuming process. Articles related to key success factors of ERP system implementation are available in the literature, but rare authors have focused on roadmap of successful ERP system implementation. Postponement is better if the organization is not ready to implement ERP system in better way; hence checking of organization’s preparation to adopt new system is an important prerequisite to ensure the success of ERP system implementation in an organization. Then comes what will be called as success of ERP system implementation. Benefits achieved by ERP system may be categorized into two categories; viz. tangible and intangible benefits. This research article presents a roadmap to ensure the success of ERP system implementation and benefits achieved through the new system as in success indicator. A case study is presented to evaluate the success and benefit achieved through the new system. The article gives a comprehensive approach to academicians and a roadmap to the organizations seeking to implement the ERP system.Keywords: ERP system, decision support system, tangible, intangible
Procedia PDF Downloads 33828198 The Covid Pandemic at a Level III Trauma Center: Challenges in the Management of the Spine Trauma.
Authors: Joana PaScoa Pinheiro, David Goncalves Ferreira, Filipe Ramos, Joaquim Soares Do Brito, Samuel Martins, Marco Sarmento
Abstract:
Introduction: The SARS-CoV-2 (COVID-19) pandemic was identified in January 2020 in China, in the city of Wuhan. The increase in the number of cases over the following months was responsible for the restructuring of hospitals and departments in order to accommodate admissions related to COVID-19. Essential services, such as trauma, had to readapt to maintain their functionality and thus guarantee quick and safe access in case of an emergency. Objectives: This study describes the impact of COVID-19 on a Level III Trauma Center and particularly on the clinical management of hospitalized patients with spine injuries. Study Design & Methods: This is a retrospective cohort study whose results were obtained through the medical records of patients with spine injuries who underwent surgical intervention in the years 2019 and 2020 (period from March 1st to December 31st). A comparison between the two groups was made. In the study patients with injuries in the context of trauma were included who underwent surgery in the periods previously described. Patients hospitalized with a spine injury in a non-traumatic context and/or were not surgically treated were excluded. Results: In total, 137 patients underwent trauma spine surgery of which 71 in 2019 (51.8%) were without significant differences in intergroup comparisons. The most frequent injury mechanism in 2019 was motor vehicle crash (47.9%) compared to 2020 which was of a person falling from a height between 2-4 meters (37.9%). Cervical trauma was reported to be the most frequent spine injury in both years. There was a significant decrease in the need for intensive care in 2020, 51.4% vs 30.3%, p = .015 and the number of complications was also lower in 2020 (1.35% vs 0.98%), including the number of deaths, being the difference marginally significant. There were no significant differences regarding time for presentation to surgery or in the total days of hospitalization. Conclusions: The restructuring made in the trauma unit at a Level III Trauma Center in the context of the current COVID-19 pandemic was effective, with no significant differences between the years of 2019 vs 2020 when compared with the time for presentation to surgery or the number of days of hospitalization. It was also found that lockdown rules in 2020 were probably responsible for the decrease in the number of road traffic accidents, which justifies a significant decrease in the need for intensive care as well as in the number of complications in patients hospitalized in the context of spine trauma.Keywords: trauma, spine, impact, covid-19
Procedia PDF Downloads 25928197 Improvment Efficiency of Fitness Clubs Operation
Authors: E. V. Kuzmicheva
Abstract:
An attention is concentrated on a service quality estimation of sport services. A typical mathematical model was developed at the base of the «general economic theory of mass service» accounting pedagogical requirements of fitness services. Also it took into account a dependence of the club member number versus on a value of square of sport facilities. Final recommendations were applied to the fitness club resulted in some improvement of the quality sport service, an increasing of the revenue from club members and profit of clubs.Keywords: fitness club, efficiency of operation, facilities, service quality, mass service
Procedia PDF Downloads 51428196 System Response of a Variable-Rate Aerial Application System
Authors: Daniel E. Martin, Chenghai Yang
Abstract:
Variable-rate aerial application systems are becoming more readily available; however, aerial applicators typically only use the systems for constant-rate application of materials, allowing the systems to compensate for upwind and downwind ground speed variations. Much of the resistance to variable-rate aerial application system adoption in the U.S. pertains to applicator’s trust in the systems to turn on and off automatically as desired. The objectives of this study were to evaluate a commercially available variable-rate aerial application system under field conditions to demonstrate both the response and accuracy of the system to desired application rate inputs. This study involved planting oats in a 35-acre fallow field during the winter months to establish a uniform green backdrop in early spring. A binary (on/off) prescription application map was generated and a variable-rate aerial application of glyphosate was made to the field. Airborne multispectral imagery taken before and two weeks after the application documented actual field deposition and efficacy of the glyphosate. When compared to the prescription application map, these data provided application system response and accuracy information. The results of this study will be useful for quantifying and documenting the response and accuracy of a commercially available variable-rate aerial application system so that aerial applicators can be more confident in their capabilities and the use of these systems can increase, taking advantage of all that aerial variable-rate technologies have to offer.Keywords: variable-rate, aerial application, remote sensing, precision application
Procedia PDF Downloads 47728195 A Long Range Wide Area Network-Based Smart Pest Monitoring System
Authors: Yun-Chung Yu, Yan-Wen Wang, Min-Sheng Liao, Joe-Air Jiang, Yuen-Chung Lee
Abstract:
This paper proposes to use a Long Range Wide Area Network (LoRaWAN) for a smart pest monitoring system which aims at the oriental fruit fly (Bactrocera dorsalis) to improve the communication efficiency of the system. The oriental fruit fly is one of the main pests in Southeast Asia and the Pacific Rim. Different smart pest monitoring systems based on the Internet of Things (IoT) architecture have been developed to solve problems of employing manual measurement. These systems often use Octopus II, a communication module following the 2.4GHz IEEE 802.15.4 ZigBee specification, as sensor nodes. The Octopus II is commonly used in low-power and short-distance communication. However, the energy consumption increase as the logical topology becomes more complicate to have enough coverage in the large area. By comparison, LoRaWAN follows the Low Power Wide Area Network (LPWAN) specification, which targets the key requirements of the IoT technology, such as secure bi-directional communication, mobility, and localization services. The LoRaWAN network has advantages of long range communication, high stability, and low energy consumption. The 433MHz LoRaWAN model has two superiorities over the 2.4GHz ZigBee model: greater diffraction and less interference. In this paper, The Octopus II module is replaced by a LoRa model to increase the coverage of the monitoring system, improve the communication performance, and prolong the network lifetime. The performance of the LoRa-based system is compared with a ZigBee-based system using three indexes: the packet receiving rate, delay time, and energy consumption, and the experiments are done in different settings (e.g. distances and environmental conditions). In the distance experiment, a pest monitoring system using the two communication specifications is deployed in an area with various obstacles, such as buildings and living creatures, and the performance of employing the two communication specifications is examined. The experiment results show that the packet receiving the rate of the LoRa-based system is 96% , which is much higher than that of the ZigBee system when the distance between any two modules is about 500m. These results indicate the capability of a LoRaWAN-based monitoring system in long range transmission and ensure the stability of the system.Keywords: LoRaWan, oriental fruit fly, IoT, Octopus II
Procedia PDF Downloads 35628194 The Study of Dengue Fever Outbreak in Thailand Using Geospatial Techniques, Satellite Remote Sensing Data and Big Data
Authors: Tanapat Chongkamunkong
Abstract:
The objective of this paper is to present a practical use of Geographic Information System (GIS) to the public health from spatial correlation between multiple factors and dengue fever outbreak. Meteorological factors, demographic factors and environmental factors are compiled using GIS techniques along with the Global Satellite Mapping Remote Sensing (RS) data. We use monthly dengue fever cases, population density, precipitation, Digital Elevation Model (DEM) data. The scope cover study area under climate change of the El Niño–Southern Oscillation (ENSO) indicated by sea surface temperature (SST) and study area in 12 provinces of Thailand as remote sensing (RS) data from January 2007 to December 2014.Keywords: dengue fever, sea surface temperature, Geographic Information System (GIS), remote sensing
Procedia PDF Downloads 20428193 Decision Making in Medicine and Treatment Strategies
Authors: Kamran Yazdanbakhsh, Somayeh Mahmoudi
Abstract:
Three reasons make good use of the decision theory in medicine: 1. Increased medical knowledge and their complexity makes it difficult treatment information effectively without resorting to sophisticated analytical methods, especially when it comes to detecting errors and identify opportunities for treatment from databases of large size. 2. There is a wide geographic variability of medical practice. In a context where medical costs are, at least in part, by the patient, these changes raise doubts about the relevance of the choices made by physicians. These differences are generally attributed to differences in estimates of probabilities of success of treatment involved, and differing assessments of the results on success or failure. Without explicit criteria for decision, it is difficult to identify precisely the sources of these variations in treatment. 3. Beyond the principle of informed consent, patients need to be involved in decision-making. For this, the decision process should be explained and broken down. A decision problem is to select the best option among a set of choices. The problem is what is meant by "best option ", or know what criteria guide the choice. The purpose of decision theory is to answer this question. The systematic use of decision models allows us to better understand the differences in medical practices, and facilitates the search for consensus. About this, there are three types of situations: situations certain, risky situations, and uncertain situations: 1. In certain situations, the consequence of each decision are certain. 2. In risky situations, every decision can have several consequences, the probability of each of these consequences is known. 3. In uncertain situations, each decision can have several consequences, the probability is not known. Our aim in this article is to show how decision theory can usefully be mobilized to meet the needs of physicians. The decision theory can make decisions more transparent: first, by clarifying the data systematically considered the problem and secondly by asking a few basic principles should guide the choice. Once the problem and clarified the decision theory provides operational tools to represent the available information and determine patient preferences, and thus assist the patient and doctor in their choices.Keywords: decision making, medicine, treatment strategies, patient
Procedia PDF Downloads 58128192 Visual Text Analytics Technologies for Real-Time Big Data: Chronological Evolution and Issues
Authors: Siti Azrina B. A. Aziz, Siti Hafizah A. Hamid
Abstract:
New approaches to analyze and visualize data stream in real-time basis is important in making a prompt decision by the decision maker. Financial market trading and surveillance, large-scale emergency response and crowd control are some example scenarios that require real-time analytic and data visualization. This situation has led to the development of techniques and tools that support humans in analyzing the source data. With the emergence of Big Data and social media, new techniques and tools are required in order to process the streaming data. Today, ranges of tools which implement some of these functionalities are available. In this paper, we present chronological evolution evaluation of technologies for supporting of real-time analytic and visualization of the data stream. Based on the past research papers published from 2002 to 2014, we gathered the general information, main techniques, challenges and open issues. The techniques for streaming text visualization are identified based on Text Visualization Browser in chronological order. This paper aims to review the evolution of streaming text visualization techniques and tools, as well as to discuss the problems and challenges for each of identified tools.Keywords: information visualization, visual analytics, text mining, visual text analytics tools, big data visualization
Procedia PDF Downloads 40528191 Extension Services' Needs of Small Farmers in Biliran Province, Philippines
Authors: Mario C. Nierras
Abstract:
This study aimed to determine the extension services’ needs of small farmers in Biliran province, Philippines. It also sought to find out other issues/concerns of the small farmers. Extension services’ needs of small farmers were gathered through personal interviewing and observational analysis of randomly-selected small farmers in Biliran, Philippines. Biliran small farmers extension services’ needs include: raising fruits, raising legumes, raising vegetables, raising swine, raising cattle, and raising chicken (as priority broad skills). For the specific skills, diagnosing symptoms on fertilizer deficiencies, controlling plant pests and diseases, diagnosing signs on specific pest and disease damage, controlling animal pests and diseases, and doing artificial insemination were the priority skills. They considered an on-farm trial of new technology as most needed to be coupled with industry and quality-orientedness, as positive behaviors needed in farming success. The farmers still adhere to the so-called wait-and-see attitude, thus they are more convinced to follow a particular technology if they see a concrete result of the introduced changes. Technical needs prioritization of Biliran small farmers showed that they have a real need for crop and animal production skills to include the other issues/concerns. Extension service program planning for small farmers should be patterned after their technical needs giving due attention to some issues/concerns so that extension work could deliver the right skills for the right needs of the farmers.Keywords: extension, extension service, extension service needs, extension service program, farmers, small farmers, marginal farmers
Procedia PDF Downloads 44128190 The Recommended Summary Plan for Emergency Care and Treatment (ReSPECT) Process: An Audit of Its Utilisation on a UK Tertiary Specialist Intensive Care Unit
Authors: Gokulan Vethanayakam, Daniel Aston
Abstract:
Introduction: The ReSPECT process supports healthcare professionals when making patient-centered decisions in the event of an emergency. It has been widely adopted by the NHS in England and allows patients to express thoughts and wishes about treatments and outcomes that they consider acceptable. It includes (but is not limited to) cardiopulmonary resuscitation decisions. ReSPECT conversations should ideally occur prior to ICU admission and should be documented in the eight sections of the nationally-standardised ReSPECT form. This audit evaluated the use of ReSPECT on a busy cardiothoracic ICU in an NHS Trust where established policies advocating its use exist. Methods: This audit was a retrospective review of ReSPECT forms for a sample of high-risk patients admitted to ICU at the Royal Papworth Hospital between January 2021 and March 2022. Patients all received one of the following interventions: Veno-Venous Extra-Corporeal Membrane Oxygenation (VV-ECMO) for severe respiratory failure (retrieved via the national ECMO service); cardiac or pulmonary transplantation-related surgical procedures (including organ transplants and Ventricular Assist Device (VAD) implantation); or elective non-transplant cardiac surgery. The quality of documentation on ReSPECT forms was evaluated using national standards and a graded ranking tool devised by the authors which was used to assess narrative aspects of the forms. Quality was ranked as A (excellent) to D (poor). Results: Of 230 patients (74 VV-ECMO, 104 transplant, 52 elective non-transplant surgery), 43 (18.7%) had a ReSPECT form and only one (0.43%) patient had a ReSPECT form completed prior to ICU admission. Of the 43 forms completed, 38 (88.4%) were completed due to the commencement of End of Life (EoL) care. No non-transplant surgical patients included in the audit had a ReSPECT form. There was documentation of balance of care (section 4a), CPR status (section 4c), capacity assessment (section 5), and patient involvement in completing the form (section 6a) on all 43 forms. Of the 34 patients assessed as lacking capacity to make decisions, only 22 (64.7%) had reasons documented. Other sections were variably completed; 29 (67.4%) forms had relevant background information included to a good standard (section 2a). Clinical guidance for the patient (section 4b) was given in 25 (58.1%), of which 11 stated the rationale that underpinned it. Seven forms (16.3%) contained information in an inappropriate section. In a comparison of ReSPECT forms completed ahead of an EoL trigger with those completed when EoL care began, there was a higher number of entries in section 3 (considering patient’s values/fears) that were assessed at grades A-B in the former group (p = 0.014), suggesting higher quality. Similarly, forms from the transplant group contained higher quality information in section 3 than those from the VV-ECMO group (p = 0.0005). Conclusions: Utilisation of the ReSPECT process in high-risk patients is yet to be well-adopted in this trust. Teams who meet patients before hospital admission for transplant or high-risk surgery should be encouraged to engage with the ReSPECT process at this point in the patient's journey. VV-ECMO retrieval teams should consider ReSPECT conversations with patients’ relatives at the time of retrieval.Keywords: audit, critical care, end of life, ICU, ReSPECT, resuscitation
Procedia PDF Downloads 7228189 Managing the Cognitive Load of Medical Students during Anatomy Lecture
Authors: Siti Nurma Hanim Hadie, Asma’ Hassan, Zul Izhar Ismail, Ahmad Fuad Abdul Rahim, Mohd. Zarawi Mat Nor, Hairul Nizam Ismail
Abstract:
Anatomy is a medical subject, which contributes to high cognitive load during learning. Despite its complexity, anatomy remains as the most important basic sciences subject with high clinical relevancy. Although anatomy knowledge is required for safe practice, many medical students graduated without having sufficient knowledge. In fact, anatomy knowledge among the medical graduates was reported to be declining and this had led to various medico-legal problems. Applying cognitive load theory (CLT) in anatomy teaching particularly lecture would be able to address this issue since anatomy information is often perceived as cognitively challenging material. CLT identifies three types of loads which are intrinsic, extraneous and germane loads, which combine to form the total cognitive load. CLT describe that learning can only occur when the total cognitive load does not exceed human working memory capacity. Hence, managing these three types of loads with the aim of optimizing the working memory capacity would be beneficial to the students in learning anatomy and retaining the knowledge for future application.Keywords: cognitive load theory, intrinsic load, extraneous load, germane load
Procedia PDF Downloads 46928188 Inclusion and Equity in Higher Education: Case of a Higher Education Institution in Portugal
Authors: Mariana Fernandes
Abstract:
Instituto Politécnico de Viana do Castelo (IPVC) has adopted a policy of inclusion and equity and the promotion of health and academic well-being, reinforcing measures already implemented in previous years, but also with the inclusion of new inclusion and equity policies that allow access, throughout all students, to Higher Education (ES). The Inclusive School project, the Plan for Equality, the IPVC's own Regulations for students with Special Educational Needs (SEN), and the support guaranteed by the Health and Wellbeing Office, Academic Services, and teaching staff are some of the examples of the varied strategies that IPVC undertakes to guarantee effective conditions so that students with disabilities can enter ES and experience a positive academic experience. This study's main objective is to reflect and disseminate the inclusion practices that IPVC practices with regard to Students with SEN. To this, a consultation and documentary analysis of internal documentation was carried out, consultation of the IPVC Quality Management System (QMS) process and, also, using the report referring to the ENEE questionnaire implemented in the year 2023, this report which presents the opinion of IPVC students with SEN, whether with support throughout the ENEE application submission process, with response deadlines, with the Individual Support Plan, as well as with physical and technological accessibility and communication. The results obtained show IPVC's effective commitment to this topic, in addition to the entire circuit created to guarantee equitable access for these students from the moment they join IPVC, a circuit that involves various human resources and( s) its sensitivity to this topic, it also promoted, through the Health and Wellbeing Office, the restructuring of the IPVC ENEE Regulation itself based on the needs and challenges felt in monitoring these students, the innovation of the services themselves of health and consequent awareness of all surrounding resources and services (from the Management, to the teaching staff and academic services). Currently, there is already an Individual Pedagogical Support Plan (PIAP), frequent meetings with the Reception Group, Psychology consultations – both clinically and educationally – and a growing concern in listening to the student community to improve the process. Based on these results, it is concluded that IPVC is an institution sensitive to promoting a positive, equitable, and, above all, inclusive higher education path.Keywords: special educational needs, inclusion, equity, equality
Procedia PDF Downloads 4528187 Intelligent Indoor Localization Using WLAN Fingerprinting
Authors: Gideon C. Joseph
Abstract:
The ability to localize mobile devices is quite important, as some applications may require location information of these devices to operate or deliver better services to the users. Although there are several ways of acquiring location data of mobile devices, the WLAN fingerprinting approach has been considered in this work. This approach uses the Received Signal Strength Indicator (RSSI) measurement as a function of the position of the mobile device. RSSI is a quantitative technique of describing the radio frequency power carried by a signal. RSSI may be used to determine RF link quality and is very useful in dense traffic scenarios where interference is of major concern, for example, indoor environments. This research aims to design a system that can predict the location of a mobile device, when supplied with the mobile’s RSSIs. The developed system takes as input the RSSIs relating to the mobile device, and outputs parameters that describe the location of the device such as the longitude, latitude, floor, and building. The relationship between the Received Signal Strengths (RSSs) of mobile devices and their corresponding locations is meant to be modelled; hence, subsequent locations of mobile devices can be predicted using the developed model. It is obvious that describing mathematical relationships between the RSSIs measurements and localization parameters is one option to modelling the problem, but the complexity of such an approach is a serious turn-off. In contrast, we propose an intelligent system that can learn the mapping of such RSSIs measurements to the localization parameters to be predicted. The system is capable of upgrading its performance as more experiential knowledge is acquired. The most appealing consideration to using such a system for this task is that complicated mathematical analysis and theoretical frameworks are excluded or not needed; the intelligent system on its own learns the underlying relationship in the supplied data (RSSI levels) that corresponds to the localization parameters. These localization parameters to be predicted are of two different tasks: Longitude and latitude of mobile devices are real values (regression problem), while the floor and building of the mobile devices are of integer values or categorical (classification problem). This research work presents artificial neural network based intelligent systems to model the relationship between the RSSIs predictors and the mobile device localization parameters. The designed systems were trained and validated on the collected WLAN fingerprint database. The trained networks were then tested with another supplied database to obtain the performance of trained systems on achieved Mean Absolute Error (MAE) and error rates for the regression and classification tasks involved therein.Keywords: indoor localization, WLAN fingerprinting, neural networks, classification, regression
Procedia PDF Downloads 35428186 Developing an Online Library for Faster Retrieval of Mold Base and Standard Parts of Injection Molding
Authors: Alan C. Lin, Ricky N. Joevan
Abstract:
This paper focuses on developing a system to transfer mold base plates and standard parts faster during the stage of injection mold design. This system not only provides a way to compare the file version, but also it utilizes Siemens NX 10 to isolate the updated information into a single executable file (.dll), and then, the file can be transferred without the need of transferring the whole file. By this way, the system can help the user to download only necessary mold base plates and standard parts, and those parts downloaded are only the updated portions.Keywords: CAD, injection molding, mold base, data retrieval
Procedia PDF Downloads 30428185 Information Technologies in Automotive Assembly Industry in Thailand
Authors: Jirarat Teeravaraprug, Usawadee Inklay
Abstract:
This paper gave an attempt in prioritizing information technologies that organizations should give concentration. The case study was organizations in the automotive assembly industry in Thailand. Data were first collected to gather all information technologies known and used in the automotive assembly industry in Thailand. Five experts from the industries were surveyed based on the concept of fuzzy DEMATEL. The information technologies were categorized into six groups, which were communication, transaction, planning, organization management, warehouse management, and transportation. The cause groups of information technologies for each group were analysed and presented. Moreover, the relationship between the used and the significant information technologies was given. Discussions based on the used information technologies and the research results are given.Keywords: information technology, automotive assembly industry, fuzzy DEMATEL
Procedia PDF Downloads 35128184 Forecasting Future Society to Explore Promising Security Technologies
Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim
Abstract:
Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.Keywords: future society, information and communication technology, security technology, technology forecasting
Procedia PDF Downloads 47028183 Introducing Global Navigation Satellite System Capabilities into IoT Field-Sensing Infrastructures for Advanced Precision Agriculture Services
Authors: Savvas Rogotis, Nikolaos Kalatzis, Stergios Dimou-Sakellariou, Nikolaos Marianos
Abstract:
As precision holds the key for the introduction of distinct benefits in agriculture (e.g., energy savings, reduced labor costs, optimal application of inputs, improved products, and yields), it steadily becomes evident that new initiatives should focus on rendering Precision Agriculture (PA) more accessible to the average farmer. PA leverages on technologies such as the Internet of Things (IoT), earth observation, robotics and positioning systems (e.g., the Global Navigation Satellite System – GNSS - as well as individual positioning systems like GPS, Glonass, Galileo) that allow: from simple data georeferencing to optimal navigation of agricultural machinery to even more complex tasks like Variable Rate Applications. An identified customer pain point is that, from one hand, typical triangulation-based positioning systems are not accurate enough (with errors up to several meters), while on the other hand, high precision positioning systems reaching centimeter-level accuracy, are very costly (up to thousands of euros). Within this paper, a Ground-Based Augmentation System (GBAS) is introduced, that can be adapted to any existing IoT field-sensing station infrastructure. The latter should cover a minimum set of requirements, and in particular, each station should operate as a fixed, obstruction-free towards the sky, energy supplying unit. Station augmentation will allow them to function in pairs with GNSS rovers following the differential GNSS base-rover paradigm. This constitutes a key innovation element for the proposed solution that encompasses differential GNSS capabilities into an IoT field-sensing infrastructure. Integrating this kind of information supports the provision of several additional PA beneficial services such as spatial mapping, route planning, and automatic field navigation of unmanned vehicles (UVs). Right at the heart of the designed system, there is a high-end GNSS toolkit with base-rover variants and Real-Time Kinematic (RTK) capabilities. The GNSS toolkit had to tackle all availability, performance, interfacing, and energy-related challenges that are faced for a real-time, low-power, and reliable in the field operation. Specifically, in terms of performance, preliminary findings exhibit a high rover positioning precision that can even reach less than 10-centimeters. As this precision is propagated to the full dataset collection, it enables tractors, UVs, Android-powered devices, and measuring units to deal with challenging real-world scenarios. The system is validated with the help of Gaiatrons, a mature network of agro-climatic telemetry stations with presence all over Greece and beyond ( > 60.000ha of agricultural land covered) that constitutes part of “gaiasense” (www.gaiasense.gr) smart farming (SF) solution. Gaiatrons constantly monitor atmospheric and soil parameters, thus, providing exact fit to operational requirements asked from modern SF infrastructures. Gaiatrons are ultra-low-cost, compact, and energy-autonomous stations with a modular design that enables the integration of advanced GNSS base station capabilities on top of them. A set of demanding pilot demonstrations has been initiated in Stimagka, Greece, an area with a diverse geomorphological landscape where grape cultivation is particularly popular. Pilot demonstrations are in the course of validating the preliminary system findings in its intended environment, tackle all technical challenges, and effectively highlight the added-value offered by the system in action.Keywords: GNSS, GBAS, precision agriculture, RTK, smart farming
Procedia PDF Downloads 11928182 Use of a Laparoscopic Approach in Urgent Adhesive Small Bowel Obstructions
Authors: Nuhi Arslani, Aleks Brumec
Abstract:
Adhesive small bowel obstruction (ASBO) accounts for 20% of emergency surgical procedures and intraabdominal adhesions account for 65% of such cases. In a 10-year post-operative period of abdominal surgery patients, around 35% of them will be readmitted because of ASBO. The first step in approaching ASBOs is using the Bologna guidelines, which include a thorough initial evaluation to diagnose or rule out an ASBO and then proceed with either further imaging studies or emergency surgery, which can be either open or laparoscopic. The contraindications for a laparoscopic approach include hemodynamic instability of the patient and infections in the peritoneum or port sites. Studies have shown that a laparoscopic approach to adhesiolysis is linked with a significantly smaller risk of readmissions and reoperations as well as with faster recovery time and fewer postoperative infections, but has a higher risk of bowel injuries, so a careful selection of patients is required. Although studies favor a laparoscopic approach, many countries still prefer a laparotomy, often because a laparoscopic approach requires surgeons to be highly skilled in the procedure. In the US and UK, between 50 and 60% of surgeons would approach an ASBO with laparoscopy, while in Italy, this number is around 15% and it is most likely similar in Slovenia. We believe that in the right cases and in the right patients, a laparoscopic approach can be equally feasible for treating ASBOs and is associated with fewer intraoperative and postoperative complications.Keywords: adhesive small bowel obstruction, laparoscopy, adhesions, adhesiolysis
Procedia PDF Downloads 9028181 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 12328180 Human Resource Information System: Role in HRM Practices and Organizational Performance
Authors: Ejaz Ali M. Phil
Abstract:
Enterprise Resource Planning (ERP) systems are playing a vital role in effective management of business functions in large and complex organizations. Human Resource Information System (HRIS) is a core module of ERP, providing concrete solutions to implement Human Resource Management (HRM) Practices in an innovative and efficient manner. Over the last decade, there has been considerable increase in the studies on HRIS. Nevertheless, previous studies relatively lacked to examine the moderating role of HRIS in performing HRM practices that may affect the firms’ performance. The current study was carried out to examine the impact of HRM practices (training, performance appraisal) on perceived organizational performance, with moderating role of HRIS, where the system is in place. The study based on Resource Based View (RBV) and Ability Motivation Opportunity (AMO) Theories, advocating that strengthening of human capital enables an organization to achieve and sustain competitive advantage which leads to improved organizational performance. Data were collected through structured questionnaire based upon adopted instruments after establishing reliability and validity. The structural equation modeling (SEM) were used to assess the model fitness, hypotheses testing and to establish validity of the instruments through Confirmatory Factor Analysis (CFA). A total 220 employees of 25 firms in corporate sector were sampled through non-probability sampling technique. Path analysis revealing that HRM practices and HRIS have significant positive impact on organizational performance. The results further showed that the HRIS moderated the relationships between training, performance appraisal and organizational performance. The interpretation of the findings and limitations, theoretical and managerial implications are discussed.Keywords: enterprise resource planning, human resource, information system, human capital
Procedia PDF Downloads 39928179 Information Extraction for Short-Answer Question for the University of the Cordilleras
Authors: Thelma Palaoag, Melanie Basa, Jezreel Mark Panilo
Abstract:
Checking short-answer questions and essays, whether it may be paper or electronic in form, is a tiring and tedious task for teachers. Evaluating a student’s output require wide array of domains. Scoring the work is often a critical task. Several attempts in the past few years to create an automated writing assessment software but only have received negative results from teachers and students alike due to unreliability in scoring, does not provide feedback and others. The study aims to create an application that will be able to check short-answer questions which incorporate information extraction. Information extraction is a subfield of Natural Language Processing (NLP) where a chunk of text (technically known as unstructured text) is being broken down to gather necessary bits of data and/or keywords (structured text) to be further analyzed or rather be utilized by query tools. The proposed system shall be able to extract keywords or phrases from the individual’s answers to match it into a corpora of words (as defined by the instructor), which shall be the basis of evaluation of the individual’s answer. The proposed system shall also enable the teacher to provide feedback and re-evaluate the output of the student for some writing elements in which the computer cannot fully evaluate such as creativity and logic. Teachers can formulate, design, and check short answer questions efficiently by defining keywords or phrases as parameters by assigning weights for checking answers. With the proposed system, teacher’s time in checking and evaluating students output shall be lessened, thus, making the teacher more productive and easier.Keywords: information extraction, short-answer question, natural language processing, application
Procedia PDF Downloads 43128178 Computer Network Applications, Practical Implementations and Structural Control System Representations
Authors: El Miloudi Djelloul
Abstract:
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software
Procedia PDF Downloads 36728177 Enabling Participation of Deaf People in the Co-Production of Services: An Example in Service Design, Commissioning and Delivery in a London Borough
Authors: Stephen Bahooshy
Abstract:
Co-producing services with the people that access them is considered best practice in the United Kingdom, with the Care Act 2014 arguing that people who access services and their carers should be involved in the design, commissioning and delivery of services. Co-production is a way of working with the community, breaking down barriers of access and providing meaningful opportunity for people to engage. Unfortunately, owing to a number of reported factors such as time constraints, practitioner experience and departmental budget restraints, this process is not always followed. In 2019, in a south London borough, d/Deaf people who access services were engaged in the design, commissioning and delivery of an information and advice service that would support their community to access local government services. To do this, sensory impairment social workers and commissioners collaborated to host a series of engagement events with the d/Deaf community. Interpreters were used to enable communication between the commissioners and d/Deaf participants. Initially, the community’s opinions, ideas and requirements were noted. This was then summarized and fed back to the community to ensure accuracy. Subsequently, a service specification was developed which included performance metrics, inclusive of qualitative and quantitative indicators, such as ‘I statements’, whereby participants respond on an adapted Likert scale how much they agree or disagree with a particular statement in relation to their experience of the service. The service specification was reviewed by a smaller group of d/Deaf residents and social workers, to ensure that it met the community’s requirements. The service was then tendered using the local authority’s e-tender process. Bids were evaluated and scored in two parts; part one was by commissioners and social workers and part two was a presentation by prospective providers to an evaluation panel formed of four d/Deaf residents. The internal evaluation panel formed 75% of the overall score, whilst the d/Deaf resident evaluation panel formed 25% of the overall tender score. Co-producing the evaluation panel with social workers and the d/Deaf community meant that commissioners were able to meet the requirements of this community by developing evaluation questions and tools that were easily understood and use by this community. For example, the wording of questions were reviewed and the scoring mechanism consisted of three faces to reflect the d/Deaf residents’ scores instead of traditional numbering. These faces were a happy face, a neutral face and a sad face. By making simple changes to the commissioning and tender evaluation process, d/Deaf people were able to have meaningful involvement in the design and commissioning process for a service that would benefit their community. Co-produced performance metrics means that it is incumbent on the successful provider to continue to engage with people accessing the service and ensure that the feedback is utilized. d/Deaf residents were grateful to have been involved in this process as this was not an opportunity that they had previously been afforded. In recognition of their time, each d/Deaf resident evaluator received a £40 gift voucher, bringing the total cost of this co-production to £160.Keywords: co-production, community engagement, deaf and hearing impaired, service design
Procedia PDF Downloads 27528176 A Study on the Impact of Artificial Intelligence on Human Society and the Necessity for Setting up the Boundaries on AI Intrusion
Authors: Swarna Pundir, Prabuddha Hans
Abstract:
As AI has already stepped into the daily life of human society, one cannot be ignorant about the data it collects and used it to provide a quality of services depending up on the individuals’ choices. It also helps in giving option for making decision Vs choice selection with a calculation based on the history of our search criteria. Over the past decade or so, the way Artificial Intelligence (AI) has impacted society is undoubtedly large.AI has changed the way we shop, the way we entertain and challenge ourselves, the way information is handled, and has automated some sections of our life. We have answered as to what AI is, but not why one may see it as useful. AI is useful because it is capable of learning and predicting outcomes, using Machine Learning (ML) and Deep Learning (DL) with the help of Artificial Neural Networks (ANN). AI can also be a system that can act like humans. One of the major impacts be Joblessness through automation via AI which is seen mostly in manufacturing sectors, especially in the routine manual and blue-collar occupations and those without a college degree. It raises some serious concerns about AI in regards of less employment, ethics in making moral decisions, Individuals privacy, human judgement’s, natural emotions, biased decisions, discrimination. So, the question is if an error occurs who will be responsible, or it will be just waved off as a “Machine Error”, with no one taking the responsibility of any wrongdoing, it is essential to form some rules for using the AI where both machines and humans are involved. Procedia PDF Downloads 10228175 Exploring Affordable Care Practs in Nigeria’s Health Insurance Discourse
Authors: Emmanuel Chinaguh, Kehinde Adeosun
Abstract:
Nigerians die untimely, with 55.75 years of life expectancy, which is 17.45 below the world average of 73.2 (Worldometer, 2020). This is due, among other factors, to the country's limited access to high-quality healthcare. To increase access to good and affordable healthcare services, the National Health Insurance Authority (NHIA) Bill 2022 – which repealed the National Health Insurance Scheme Act 2004 – was passed into law. Applying Jacob Mey’s (2001) pragmatics act (pract) theory, this study explores how NHIA seeks to actualise these healthcare goals by characterising the general situational prototype or pragmemes and pragmatic acts in institutional communications. Data was sourced from the NHIA operational guidelines, which has 147 pages and four sections, and shared posters on NHIA Nigeria Twitter Handle with 14,200 followers. Digital humanities tools, like AntConc and Voyant, were engaged in the data analysis for text encoding and data visualisation. This study identifies these discourse tokens in the data: advertisement and programmes, standards and accreditation, records and information, and offences and penalties. Advertisement and programmes pract facilitating, propagating, prospecting, advising and informing; standards and accreditation, and records and information pract stating, informing and instructing; and offences and penalties pract stating and sanctioning. These practs combined to advance the goals of affordable care and universal accessibility to quality healthcare services. The pragmatic acts were marked by these pragmatic tools: shared situational knowledge (SSK), relevance (REL), reference (REF) and inference (INF). This paper adds to the understanding of health insurance discourse in Nigeria as a mediated social practice that promotes the health of Nigerians.Keywords: affordable care, NHIA, Nigeria’s health insurance discourse, pragmatic acts.
Procedia PDF Downloads 8928174 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users
Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar
Abstract:
This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation
Procedia PDF Downloads 4328173 Exploring the Carer Gender Support Gap: Results from Freedom of Information Requests to Adult Social Services in England
Authors: Stephen Bahooshy
Abstract:
Our understanding of gender inequality has advanced in recent years. Differences in pay and societal gendered behaviour expectations have been emphasized. It is acknowledged globally that gender shapes everyone’s experiences of health and social care, including access to care, use of services and products, and the interaction with care providers. NHS Digital in England collects data from local authorities on the number of carers and people with support needs and the services they access. This data does not provide a gender breakdown. Caring can have many positive and negative impacts on carers’ health and wellbeing. For example, caring can improve physical health, provide a sense of pride and purpose, and reduced stress levels for those who undertake a caring role by choice. Negatives of caring include financial concerns, social isolation, a reduction in earnings, and not being recognized as a carer or involved and consulted by health and social care professionals. Treating male and female carers differently is by definition unequitable and precludes one gender from receiving the benefits of caring whilst potentially overburdening the other with the negatives of caring. In order to explore the issue on a preliminary basis, five local authorities who provide statutory adult social care services in England were sent Freedom of Information requests in 2019. The authorities were selected to include county councils and London boroughs. The authorities were asked to provide data on the amount of money spent on care at home packages to people over 65 years, broken down by gender and carer gender for each financial year between 2013 and 2019. Results indicated that in each financial year, female carers supporting someone over 65 years received less financial support for care at home support packages than male carers. Over the six-year period, this difference equated to a £9.5k deficit in financial support received on average per female carer when compared to male carers. An example of a London borough with the highest disparity presented an average weekly spend on care at home for people over 65 with a carer of £261.35 for male carers and £165.46 for female carers. Consequently, female carers in this borough received on average £95.89 less per week in care at home support than male carers. This highlights a real and potentially detrimental disparity in the care support received to female carers in order to support them to continue to care in parts of England. More research should be undertaken in this area to better explore this issue and to understand if these findings are unique to these social care providers or part of a wider phenomenon. NHS Digital should request local authorities collect data on gender in the same way that large employers in the United Kingdom are required by law to provide data on staff salaries by gender. People who allocate social care packages of support should consider the impact of gender when allocating support packages to people with support needs and who have carers to reduce any potential impact of gender bias on their decision-making.Keywords: caregivers, carers, gender equality, social care
Procedia PDF Downloads 16828172 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 24228171 Relationship between ICTs Application with Production and Protection Technology: Lesson from Rural Punjab-Pakistan
Authors: Tahir Munir Butt, Gao Qijie, Babar Shahbaz, Muhammad Zakaria Yousaf Hassan, Zhnag Chuanhong
Abstract:
The main objective of this paper is to identify the relationship between Information Communication Technology (ICTs) applications with Agricultural development in the process of communication at rural Punjab-Pakistan. The authors analyzed the relationship of ICTs applications with the most prominent factor for the Agricultural Information Services (AIS) in the Agricultural Extension Approaches (AEA). The data collection procedure was started from Jan. 2015 and completed in July 2015. It is the one of the part in PhD studies at China Agriculture, University Hadian-Beijng China. It was observed that on major constraint in the AIS disseminated was the limited number of farmers especially and unknown the farmers about new ICTs technology for Agriculture at rural areas. Majority of ICTs application e.g. Toll free number; Robo Calls; Text message was highly significances in the AIS approach. The recommendation is communication and capacity building one of the indispensable elements for sustainable and agricultural development and Agricultural extension should be provided training to farmer about new ICTs technologies to access and use of it for Sustainable Agriculture Development (SAD) and update the scenario of flow of information also with try to established ICTs hub at the village level.Keywords: ICTs, AEA, AIS, SAD, rural farmers
Procedia PDF Downloads 303