Search results for: malware information sharing platform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12661

Search results for: malware information sharing platform

10681 Incorporation of Hibah as a Catalyst for Channelling Profits and Compensations in Islamic Transactions

Authors: Ameen Alshugaa, Farrukh Habib

Abstract:

Shariah (the Islamic law) sanctions a plethora of profit-sharing arrangements for financial transactions. However, when it comes to the practice of Islamic banking, it is felt by the scholars and practitioners that many of these arrangements often fail to compensate different parties of a financial transaction compared to conventional banking, due to the Riba (interest / usury) element. This issue is caused by the parties inability to codify these compensations in any contract so as to avoid Riba. Here, hibah (gift) may be regarded as one of the solutions. In essence, hibah is a unilateral charity contract where a party voluntarily gives away something to another party without any counter value. This paper attempts to analyse theoretical and practical aspects of hibah from the perspective of Islamic law, enunciating its legality and detailing its allowance in Islamic banking. It also discusses several practices evaluating the role of hibah in resolving issues related to Riba. In particular, these practices demonstrate the validity of hibah as a way to distribute revenues and compensate parties in Islamic financial transactions, while achieving competitive advantage over conventional banking, and avoiding the element of Riba.

Keywords: hibah (gift), Islamic Finance, Islamic Law of Contract, profit distribution, Shariah

Procedia PDF Downloads 286
10680 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 106
10679 Relocating Migration for Higher Education: Analytical Account of Students' Perspective

Authors: Sumit Kumar

Abstract:

The present study aims to identify the factors responsible for the internal migration of students other than push & pull factors; associated with the source region and destination region, respectively, as classified in classical geography. But in this classification of factors responsible for the migration of students, an agency of individual and the family he/she belongs to, have not been recognized which has later become the centre of the argument for describing and analyzing migration in New Economic theory of migration and New Economics of labour migration respectively. In this backdrop, the present study aims to understand the agency of an individual and the family members regarding one’s migration for higher education. Therefore, this study draws upon New Economic theory of migration and New Economics of labour migration for identifying the agency of individual or family in the context of migration. Further, migration for higher education consists not only the decision to migrate but also where to migrate (location), which university, which college and which course to pursue, also. In order to understand the role of various individuals at various stage of student migration, present study seeks help from the social networking approach for migration which identifies the individuals who facilitate the process of migration by reducing negative externalities of migration through sharing information and various other sorts of help to the migrant. Furthermore, this study also aims to rank those individuals who have helped migrants at various stages of migration for higher education in taking a decision, along with the factors responsible for their migration on the basis of their perception. In order to fulfill the above mentioned objectives of this study, quantification of qualitative data (perception of respondents) has been done employing through frequency distribution analysis. Qualitative data has been collected at two levels but questionnaire survey was the tool for data collection at both the occasions. Twenty five students who have migrated to other state for the purpose of higher education have been approached for pre-questionnaire survey consisting open-ended questions while one hundred students belonging to the same clientele have been approached for questionnaire survey consisting close-ended questions. This study has identified social pressure, peer group pressure and parental pressure; variables not constituting push & pull factors, very important for students’ migration. They have been even assigned better ranked by the respondents than push factors. Further, self (migrant themselves) have been ranked followed by parents by the respondents when it comes to take various decisions attached with the process of migration. Therefore, it can be said without sounding cynical that there are other factors other than push & pull factors which do facilitate the process of migration for higher education not only at the level to migrate but also at other levels intrinsic to the process of migration for higher education.

Keywords: agency, migration for higher education, perception, push and pull factors

Procedia PDF Downloads 224
10678 Wireless Information Transfer Management and Case Study of a Fire Alarm System in a Residential Building

Authors: Mohsen Azarmjoo, Mehdi Mehdizadeh Koupaei, Maryam Mehdizadeh Koupaei, Asghar Mahdlouei Azar

Abstract:

The increasing prevalence of wireless networks in our daily lives has made them indispensable. The aim of this research is to investigate the management of information transfer in wireless networks and the integration of renewable solar energy resources in a residential building. The focus is on the transmission of electricity and information through wireless networks, as well as the utilization of sensors and wireless fire alarm systems. The research employs a descriptive approach to examine the transmission of electricity and information on a wireless network with electric and optical telephone lines. It also investigates the transmission of signals from sensors and wireless fire alarm systems via radio waves. The methodology includes a detailed analysis of security, comfort conditions, and costs related to the utilization of wireless networks and renewable solar energy resources. The study reveals that it is feasible to transmit electricity on a network cable using two pairs of network cables without the need for separate power cabling. Additionally, the integration of renewable solar energy systems in residential buildings can reduce dependence on traditional energy carriers. The use of sensors and wireless remote information processing can enhance the safety and efficiency of energy usage in buildings and the surrounding spaces.

Keywords: renewable energy, intelligentization, wireless sensors, fire alarm system

Procedia PDF Downloads 39
10677 Robust Variable Selection Based on Schwarz Information Criterion for Linear Regression Models

Authors: Shokrya Saleh A. Alshqaq, Abdullah Ali H. Ahmadini

Abstract:

The Schwarz information criterion (SIC) is a popular tool for selecting the best variables in regression datasets. However, SIC is defined using an unbounded estimator, namely, the least-squares (LS), which is highly sensitive to outlying observations, especially bad leverage points. A method for robust variable selection based on SIC for linear regression models is thus needed. This study investigates the robustness properties of SIC by deriving its influence function and proposes a robust SIC based on the MM-estimation scale. The aim of this study is to produce a criterion that can effectively select accurate models in the presence of vertical outliers and high leverage points. The advantages of the proposed robust SIC is demonstrated through a simulation study and an analysis of a real dataset.

Keywords: influence function, robust variable selection, robust regression, Schwarz information criterion

Procedia PDF Downloads 127
10676 The Interaction of Country-of-Manufacturing with Country-of-Design within Different Consumption Context

Authors: Ebru Genc, Shih-Ching Wang

Abstract:

In today’s globalized world, while companies move their production centers to developing countries in order to gain cost advantage, they receive negative responses from consumers because of the weak image of those countries. In this study, we looked at this tradeoff faced by multinational companies. Some companies that have headquarters in developed countries have devised a strategy of manipulating country-of-origin (COO) information by introducing the concept of country of design (COD). We analyzed the impact of country-of-manufacturing (COM) information on consumers’ product evaluation and purchase intention in the presence of different levels of COD information, namely, in terms of developed and developing countries. We found that it is not advantageous for a firm to publish a design location with a strong image if the firm is producing in a country that has a weak image. On the other hand, revealing COD information has a reinforcing effect on consumers’ product evaluation and purchase intention if the firm is producing in a country with a strong image. Second, we studied the impact of consumption context on this relationship (in terms of public or private use) and found that for products that are typically used in public, COM has significantly shown higher importance on product evaluation and purchase intention, compared to products typically used in private. However, our results show that consumption context shows no effect of an impact resulting from COD information.

Keywords: consumption context, country of design, country of manufacturing, country of origin

Procedia PDF Downloads 231
10675 Using Signature Assignments and Rubrics in Assessing Institutional Learning Outcomes and Student Learning

Authors: Leigh Ann Wilson, Melanie Borrego

Abstract:

The purpose of institutional learning outcomes (ILOs) is to assess what students across the university know and what they do not. The issue is gathering this information in a systematic and usable way. This presentation will explain how one institution has engineered this process for both student success and maximum faculty curriculum and course design input. At Brandman University, there are three levels of learning outcomes: course, program, and institutional. Institutional Learning Outcomes (ILOs) are mapped to specific courses. Faculty course developers write the signature assignments (SAs) in alignment with the Institutional Learning Outcomes for each course. These SAs use a specific rubric that is applied consistently by every section and every instructor. Each year, the 12-member General Education Team (GET), as a part of their work, conducts the calibration and assessment of the university-wide SAs and the related rubrics for one or two of the five ILOs. GET members, who are senior faculty and administrators who represent each of the university's schools, lead the calibration meetings. Specifically, calibration is a process designed to ensure the accuracy and reliability of evaluating signature assignments by working with peer faculty to interpret rubrics and compare scoring. These calibration meetings include the full time and adjunct faculty members who teach the course to ensure consensus on the application of the rubric. Each calibration session is chaired by a GET representative as well as the course custodian/contact where the ILO signature assignment resides. The overall calibration process GET follows includes multiple steps, such as: contacting and inviting relevant faculty members to participate; organizing and hosting calibration sessions; and reviewing and discussing at least 10 samples of student work from class sections during the previous academic year, for each applicable signature assignment. Conversely, the commitment for calibration teams consist of attending two virtual meetings lasting up to three hours in duration. The first meeting focuses on interpreting the rubric, and the second meeting involves comparing scores for sample work and sharing feedback about the rubric and assignment. Next, participants are expected to follow all directions provided and participate actively, and respond to scheduling requests and other emails within 72 hours. The virtual meetings are recorded for future institutional use. Adjunct faculty are paid a small stipend after participating in both calibration meetings. Full time faculty can use this work on their annual faculty report for "internal service" credit.

Keywords: assessment, assurance of learning, course design, institutional learning outcomes, rubrics, signature assignments

Procedia PDF Downloads 268
10674 Electronic Payment Recording with Payment History Retrieval Module: A System Software

Authors: Adrian Forca, Simeon Cainday III

Abstract:

The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.

Keywords: collection, information system, manual procedure, payment

Procedia PDF Downloads 152
10673 Experiences of Pediatric Cancer Patients and Their Families: A Focus Group Interview

Authors: Bu Kyung Park

Abstract:

Background: The survival rate of pediatric cancer patients has been increased. Thus, the needs of long-term management and follow-up education after discharge continue to grow. Purpose: The purpose of this study was to explore the experiences of pediatric cancer patients and their families from first diagnosis to returning their social life. The ultimate goal of this study was to assess which information and intervention did pediatric cancer patients and their families required and needed, so that this could provide fundamental information for developing educational content of web-based intervention program for pediatric cancer patients. Research Approach: This study was based on a descriptive qualitative research design using semi-structured focus group interview. Participants: Twelve pediatric cancer patients and 12 family members participated in a total six focus group interview sessions. Methods: All interviews were audiotaped after obtaining participants’ approval. The recordings were transcribed. Qualitative Content analysis using the inductive coding approach was performed on the transcriptions by three coders. Findings: Eighteen categories emerged from the six main themes: 1) Information needs, 2) Support system, 3) Barriers to treatment, 4) Facilitators to treatment, 5) Return to social life, 6) Healthcare system issues. Each theme had both pediatric cancer patients’ codes and their family members’ codes. Patients and family members had high information needs through the whole process of treatment, not only the first diagnosis but also after completion of treatment. Hospitals provided basic information on chemo therapy, medication, and various examinations. However, they were more likely to rely on information from other patients and families by word of mouth. Participants’ information needs were different according to their treatment stage (e.g., first admitted patients versus cancer survivors returning to their social life). Even newly diagnosed patients worried about social adjustment after completion of all treatment, such as return to school and diet and physical activity at home. Most family members had unpleasant experiences while they were admitted in hospitals and concerned about healthcare system issues, such as medical error and patient safety. Conclusions: In conclusion, pediatric cancer patients and their family members wanted information source which can provide tailored information based on their needs. Different information needs with patients and their family members based on their diagnosis, progress, stage of treatment were identified. Findings from this study will be used to develop a patient-centered online health intervention program for pediatric cancer patients. Pediatric cancer patients and their family members had variety fields of education needs and soak the information from various sources. Web-based health intervention program for them is required to satisfy their inquiries to provide reliable information.

Keywords: focus group interview, family caregivers, pediatric cancer patients, qualitative content analysis

Procedia PDF Downloads 174
10672 IT Skills and Soft Skills for Accountants in Thailand

Authors: Manirath Wongsim

Abstract:

Information technology management has become important for the achievement of organisations. An increase in the pace of technological change has revolutionised the way accountants perform their jobs. In response to this challenge, the identification of a new comprehensive set of information technology competencies combined with information technology skills and other skills (namely, soft skills) are necessary. Thus, this study aims to investigate IT competencies among professional accountants to enhance firm performance. This research was conducted with 42 respondents at ten organisations in Thailand. This research used qualitative, interpretive evidence.The results indicate that the factor IT competencies within the organizational issues defines19 factors. Specifically, these new factors, based on the research findings and the literature and unique to IT competences for professional accountants, include ERP software skills, BI software skills and accounting law and legal skills. The evidence in this study suggests that ERP software, spreadsheets, BI software and accounting software were ranked as much-needed skills to be acquired by accountants while communication skills were ranked as the most required skills, and delegation skills as the least required. The findings of the research’s empirical evidence suggest that organizations should understand appropriate into developing information technology related competencies for knowledge workers in general and professional accountants in particular and provide assistance in all processes of decision making.

Keywords: IT competencies, IT competencies for accountants, IT skills for accounting, soft skills for accountants

Procedia PDF Downloads 400
10671 Functionalized Nanoparticles for Drug Delivery Applications

Authors: Temesgen Geremew

Abstract:

Functionalized nanoparticles have emerged as a revolutionary platform for drug delivery, offering significant advantages over traditional methods. By strategically modifying their surface properties, these nanoparticles can be designed to target specific tissues and cells, significantly reducing off-target effects and enhancing therapeutic efficacy. This targeted approach allows for lower drug doses, minimizing systemic exposure and potential side effects. Additionally, functionalization enables controlled release of the encapsulated drug, improving drug stability and reducing the frequency of administration, leading to improved patient compliance. This work explores the immense potential of functionalized nanoparticles in revolutionizing drug delivery, addressing limitations associated with conventional therapies and paving the way for personalized medicine with precise and targeted treatment strategies.

Keywords: nanoparticles, drug, nanomaterials, applications

Procedia PDF Downloads 55
10670 Creating Inclusive Information Services: Librarians’ Design-Thinking Approach to Helping Students Succeed in the Digital Age

Authors: Yi Ding

Abstract:

With the rapid development of educational technologies, higher education institutions are facing the challenge of creating an inclusive learning environment for students from diverse backgrounds. Academic libraries, the hubs of research, instruction, and innovation at higher educational institutions, are facing the same challenge. While academic librarians worldwide have been working hard to provide services for emerging information technology such as information literacy education, online learning support, and scholarly communication advocacy, the problem of digital exclusion remains a difficult one at higher education institutions. Information services provided by academic libraries can result in the digital exclusion of students from diverse backgrounds, such as students with various digital readiness levels, students with disabilities, as well as English-as-a-Second-Language learners. This research study shows how academic librarians can design digital learning objects that are cognizant of differences in learner traits and student profiles through the lens of design thinking. By demonstrating how the design process of digital learning objects can take into consideration users’ needs, experiences, and engagement with different technologies, this research study explains design principles of accessibility, connectivity, and scalability in creating inclusive digital learning objects as shown in various case studies. Equipped with the mindset and techniques to be mindful of diverse student learning traits and profiles when designing information services, academic libraries can improve the digital inclusion and ultimately student success at higher education institutions.

Keywords: academic librarians, digital inclusion, information services, digital learning objects, student success

Procedia PDF Downloads 202
10669 Application of Fuzzy Logic to Design and Coordinate Parallel Behaviors for a Humanoid Mobile Robot

Authors: Nguyen Chan Hung, Mai Ngoc Anh, Nguyen Xuan Ha, Tran Xuan Duc, Dang Bao Lam, Nguyen Hoang Viet

Abstract:

This paper presents a design and implementation of a navigation controller for a humanoid mobile robot platform to operate in indoor office environments. In order to fulfil the requirement of recognizing and approaching human to provide service while avoiding random obstacles, a behavior-based fuzzy logic controller was designed to simultaneously coordinate multiple behaviors. Experiments in real office environment showed that the fuzzy controller deals well with complex scenarios without colliding with random objects and human.

Keywords: behavior control, fuzzy logic, humanoid robot, mobile robot

Procedia PDF Downloads 396
10668 3D Human Body Reconstruction Based on Multiple Viewpoints

Authors: Jiahe Liu, HongyangYu, Feng Qian, Miao Luo

Abstract:

The aim of this study was to improve the effects of human body 3D reconstruction. The MvP algorithm was adopted to obtain key point information from multiple perspectives. This algorithm allowed the capture of human posture and joint positions from multiple angles, providing more comprehensive and accurate data. The study also incorporated the SMPL-X model, which has been widely used for human body modeling, to achieve more accurate 3D reconstruction results. The use of the MvP algorithm made it possible to observe the reconstructed object from multiple angles, thus reducing the problems of blind spots and missing information. This algorithm was able to effectively capture key point information, including the position and rotation angle of limbs, providing key data for subsequent 3D reconstruction. Compared with traditional single-view methods, the method of multi-view fusion significantly improved the accuracy and stability of reconstruction. By combining the MvP algorithm with the SMPL-X model, we successfully achieved better human body 3D reconstruction effects. The SMPL-X model is highly scalable and can generate highly realistic 3D human body models, thus providing more detail and shape information.

Keywords: 3D human reconstruction, multi-view, joint point, SMPL-X

Procedia PDF Downloads 50
10667 A Microfluidic Biosensor for Detection of EGFR 19 Deletion Mutation Targeting Non-Small Cell Lung Cancer on Rolling Circle Amplification

Authors: Ji Su Kim, Bo Ram Choi, Ju Yeon Cho, Hyukjin Lee

Abstract:

Epidermal growth factor receptor (EGFR) 19 deletion mutation gene is over-expressed in carcinoma patient. EGFR 19 deletion mutation is known as typical biomarker of non-small cell lung cancer (NSCLC), which one section in the coding exon 19 of EGFR is deleted. Therefore, there have been many attempts over the years to detect EGFR 19 deletion mutation for replacing conventional diagnostic method such as PCR and tissue biopsy. We developed a simple and facile detection platform based on Rolling Circle Amplification (RCA), which provides highly amplified products in isothermal amplification of the ligated DNA template. Limit of detection (~50 nM) and a faster detection time (~30 min) could be achieved by introducing RCA.

Keywords: EGFR19, cancer, diagnosis, rolling circle amplification (RCA), hydrogel

Procedia PDF Downloads 241
10666 Peer-Assisted Learning of Ebm in, a UK Medical School: Evaluation of the NICE Evidence Search Student Champion Scheme

Authors: Emily Jin, Harry Sharples, Anne Weist

Abstract:

Introduction: NICE Evidence Search Student Champion Scheme is a peer-assisted learning scheme that aims to improve the routine use of evidence-based information by future health and social care staff. The focus is on the NICE evidence search portal that provides selected information from more than 800 reliable health, social care, and medicines sources, including up-to-date guidelines and information for the public. This paper aims to evaluate the effectiveness of the scheme when implemented in Liverpool School of Medicine and to understand the experiences of those attending. Methods: Twelve student champions were recruited and trained in February 2020 as peer tutors during a workshop facilitated by NICE. Cascade sessions were then organised and delivered on an optional basis for students, in small groups of < 10 to approximately 70 attendees. Surveys were acquired immediately before and 8-12 weeks after cascade sessions (n=47 and 45 respectively). Data from these surveys facilitated the analysis of the scheme. Results: Surveys demonstrated 74% of all attendees frequently searched for health and social care information online as a part of their studies. However, only 15% of attendees reported having prior formal training on searching for health information, despite receiving such training earlier on in the curriculum. After attending cascade sessions, students reported a 58% increase in confidence when searching for information using evidence search, from a pre-session a baseline of 36%. Conclusion: NICE Evidence Search Student Champion Scheme provided clear benefits for attending students, increasing confidence in searching for peer-reviewed, mainly secondary sources of health information. The lack of reported training represents the unmet need that the champion scheme satisfies, and this likely benefits student champions as well as attendees. Increasing confidence in searching for healthcare information online may support future evidence-based decision-making.

Keywords: evidence-based medicine, NICE, medical education, medical school, peer-assisted learning

Procedia PDF Downloads 116
10665 The Impact of Electronic Marketing on the Quality Banking Services

Authors: Ahmed Ghalem

Abstract:

The research to be explained is a collection of information about several public and private economic institutions. This information is represented in highlighting the large and useful role in adopting the method of electronic marketing. Which is widespread and easy to use among community members at the local and international levels. Which generates large sums of money with little effort and little time, and also satisfies the customers. Do these things, despite what we have said, run the risk of losing large amounts of money in a moment or a short time.

Keywords: economic, finance, bank, development, marketing

Procedia PDF Downloads 77
10664 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 129
10663 Combined Optical Coherence Microscopy and Spectrally Resolved Multiphoton Microscopy

Authors: Bjorn-Ole Meyer, Dominik Marti, Peter E. Andersen

Abstract:

A multimodal imaging system, combining spectrally resolved multiphoton microscopy (MPM) and optical coherence microscopy (OCM) is demonstrated. MPM and OCM are commonly integrated into multimodal imaging platforms to combine functional and morphological information. The MPM signals, such as two-photon fluorescence emission (TPFE) and signals created by second harmonic generation (SHG) are biomarkers which exhibit information on functional biological features such as the ratio of pyridine nucleotide (NAD(P)H) and flavin adenine dinucleotide (FAD) in the classification of cancerous tissue. While the spectrally resolved imaging allows for the study of biomarkers, using a spectrometer as a detector limits the imaging speed of the system significantly. To overcome those limitations, an OCM setup was added to the system, which allows for fast acquisition of structural information. Thus, after rapid imaging of larger specimens, navigation within the sample is possible. Subsequently, distinct features can be selected for further investigation using MPM. Additionally, by probing a different contrast, complementary information is obtained, and different biomarkers can be investigated. OCM images of tissue and cell samples are obtained, and distinctive features are evaluated using MPM to illustrate the benefits of the system.

Keywords: optical coherence microscopy, multiphoton microscopy, multimodal imaging, two-photon fluorescence emission

Procedia PDF Downloads 497
10662 Surface to the Deeper: A Universal Entity Alignment Approach Focusing on Surface Information

Authors: Zheng Baichuan, Li Shenghui, Li Bingqian, Zhang Ning, Chen Kai

Abstract:

Entity alignment (EA) tasks in knowledge graphs often play a pivotal role in the integration of knowledge graphs, where structural differences often exist between the source and target graphs, such as the presence or absence of attribute information and the types of attribute information (text, timestamps, images, etc.). However, most current research efforts are focused on improving alignment accuracy, often along with an increased reliance on specific structures -a dependency that inevitably diminishes their practical value and causes difficulties when facing knowledge graph alignment tasks with varying structures. Therefore, we propose a universal knowledge graph alignment approach that only utilizes the common basic structures shared by knowledge graphs. We have demonstrated through experiments that our method achieves state-of-the-art performance in fair comparisons.

Keywords: knowledge graph, entity alignment, transformer, deep learning

Procedia PDF Downloads 31
10661 Comparative between Different Methodological Procedures Used to Obtain Information on the First Lexical Development in Bilingual Basque-Spanish Children

Authors: Asier Romero Andonegi, Irati De Pablo Delgado

Abstract:

The objective of this study is to explore the different methodological procedures that are used to obtain information on the early linguistic development of children. To this end, two different methodological procedures were carried out on the same sample: on the one hand, the MacArthur-Bates Communicative Development Inventories, in its adaptations in Spanish and Basque; and on the other hand, longitudinal observation through professional software: ELAN and CHAT. The sample consists of 8 Basque children/ages 16 to 30 months with different mother tongue (L1). The results show the usefulness of inventories in obtaining information on the development of early communication and language skills, but also their limitations mostly focused on the interpretive overvaluation of their children’s lexical development.

Keywords: early language development, language evaluation, lexicon, MacArthur-Bates communicative development inventories

Procedia PDF Downloads 143
10660 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 450
10659 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 222
10658 Matching Farmer Competence and Farm Resources with the Transformation of Agri-Food Marketing Systems

Authors: Bhawat Chiamjinnawat

Abstract:

The agri-food market transformation has implied market growth for the fruit industry in Thailand. This article focuses on analysis of farmer competence and farm resources which affect market strategies used by fruit farmers in Chanthaburi province of Thailand. The survey data were collected through the use of face-to-face interviews with structured questionnaires. This study identified 14 drivers related to farmer competence and farm resources of which some had significant effect on the decision to use either high-value markets or traditional markets. The results suggest that farmers who used high-value markets were better educated and they had longer experience and larger sized business. Identifying the important factors that match with the market transformation provides policy with opportunities to support the fruit farmers to increase their market power. Policies that promote business expansion of agricultural cooperatives and knowledge sharing among farmers are recommended to reduce limitations due to limited knowledge, low experience, and small business sizes.

Keywords: farmer competence, farm resources, fruit industry, high-value markets, Thailand

Procedia PDF Downloads 151
10657 Empowering the Citizens: The Potential of Zimbabwean Library and Information Science Schools in Contributing towards Socio-Economic Transformation

Authors: Collence Takaingenhamo Chisita, Munyaradzi Shoko

Abstract:

Library and Information Science Schools play significant roles in socio–economic transformation but in most cases they are downplayed or overshadowed by other institutions, and professions. Currently Zimbabwe boasts of high literacy rate in Africa and this success would have been impossible without the contributions of library schools and related institutions. Libraries and librarians are at the epicentre of socio-economic development and their role cannot be downplayed. It is out of this context that the writer will explore the extent to which library schools are contributing towards socio-economic transformation, for example, human capital development and facilitating access to information. The writer will seek to explain and clarify how LIS schools are engaged in socio-economic transformation through supporting education and culture through community engagement. The paper will examine the LIS education models, for example, general education and Technical Vocational Education and Training (TVET) or Competency Based Education and Training (CBET). It will also seek to find out how LIS Schools are contributing to the information/knowledge economy through education, training and research. The writer will also seek to find out how LIS Education is responding to socio-economic and political dynamics in Zimbabwe amidst forces of globalisation and cultural identities. Furthermore, the writer will explore the extent to which LIS education can help to reposition Zimbabwe in the global knowledge economy. The author will examine how LIS schools integrate culture and technology.

Keywords: development, information/knowledge economy, culture, empowerment, collaboration, globalisation

Procedia PDF Downloads 305
10656 A Deep Explanation for the Formation of Force as a Foundational Law of Physics by Incorporating Unknown Degrees of Freedom into Space

Authors: Mohsen Farshad

Abstract:

Information and force definition has been intertwined with the concept of entropy for many years. The displacement information of degrees of freedom with Brownian motions at a given temperature in space emerges as an entropic force between species. Here, we use this concept of entropy to understand the underlying physics behind the formation of attractive and repulsive forces by imagining that space is filled with free Brownian degrees of freedom. We incorporate the radius of bodies and the distance between them into entropic force relation systematically. Using this modified gravitational entropic force, we derive the attractive entropic force between bodies without considering their spin. We further hypothesize a possible mechanism for the formation of the repulsive force between two bodies. We visually elaborate that the repulsive entropic force will be manifested through the rotation of degrees of freedom around the spinning particles.

Keywords: entropy, information, force, Brownian Motions

Procedia PDF Downloads 59
10655 Impact of COVID-19 on Antenatal Care Provision at Public Hospitals in Ethiopia: A Mixed Method Study

Authors: Zemenu Yohannes

Abstract:

Introduction: The pandemic overstretched the weak health systems in developing countries, including Ethiopia. This study aims to assess and explore the effect of COVID-19 on antenatal care (ANC) provision. Methods: A concurrent mixed methods study was applied. An interrupted time series design was applied for the quantitative study, and in-depth interviews were implemented for the qualitative research to explore maternity care providers' perceptions of ANC provision during COVID-19. We used routine monthly collected data from the health management information system (HMIS) in fifteen hospitals in the Sidama region, Ethiopia, from March 2019 to February 2020 (12 months) before COVID-19 and from March to August 2020 (6 months) during COVID-19. We imported data into STATA V.17 for analysis. ANC provision's mean monthly incidence rate ratio (IRR) was calculated using Poisson regression with a 95% confidence interval. The qualitative data were analysed using thematic analysis. Findings from quantitative and qualitative elements were integrated with a contiguous approach. Results: Our findings indicate the rate of ANC provision significantly decreased in the first six months of COVID-19. This study has three identified main themes: barriers to ANC provision, inadequate COVID-19 prevention approach, and delay in providing ANC. Conclusion and recommendation: Based on our findings, the pandemic affected ANC provision in the study area. The health bureau and stakeholders should take a novel and sustainable approach to prevent future pandemics. The health bureau and hospital administrators should establish a task force that relies on financial self-reliance to close gaps in future pandemics of medical supply shortages. Pregnant women should receive their care promptly from maternity care providers. In order to foster contact and avoid discrimination the future pandemics, hospital administrators should set up a platform for community members and maternity care providers.

Keywords: ANC provision, COVID-19, mixed methods study, Ethiopia

Procedia PDF Downloads 56
10654 The Impact of Information and Communication Technologies on Teaching Performance at an Iranian University

Authors: Yusef Hedjazi, Saeedeh Nazari Nooghabi

Abstract:

New information and communication technologies (ICT) as one of the main needs of Faculty members in the process of teaching and learning has used in Irans higher education system since 2000.The main purpose of this study is to investigate the role of information and communication technologies (ICT) in teaching performance of Agricultural and Natural Resources Faculties at University of Tehran. The statistical population of the study consisted of all 250 faculties in Agriculture and Natural Resources Colleges and a questionnaire was used to collect data. The reliability of the questionnaire was confirmed by computing of Cronbachs Alpha coefficient at greater than .72. The study showed a significant relationship between agricultural Faculty members teaching performance and competency in using ICT. The results of the regression analysis also explained 51.7% of the variance, teaching performance. The six independent variables that accounted for the explained variance were experience in using educational websites or software, use of educational multimedia (e.g. film and CD, etc), making a presentation using PowerPoint, familiarity with online education websites, using News group to discuss on educational subjects with colleagues and students, and using Electronic communication (messengers) to solve studentsproblems.

Keywords: information and communication technologies, agricultural and natural resources, faculties, teaching performance

Procedia PDF Downloads 317
10653 Dynamic Modeling of Orthotropic Cracked Materials by X-FEM

Authors: S. Houcine Habib, B. Elkhalil Hachi, Mohamed Guesmi, Mohamed Haboussi

Abstract:

In this paper, dynamic fracture behaviors of cracked orthotropic structure are modeled using extended finite element method (X-FEM). In this approach, the finite element method model is first created and then enriched by special orthotropic crack tip enrichments and Heaviside functions in the framework of partition of unity. The mixed mode stress intensity factor (SIF) is computed using the interaction integral technique based on J-integral in order to predict cracking behavior of the structure. The developments of these procedures are programmed and introduced in a self-software platform code. To assess the accuracy of the developed code, results obtained by the proposed method are compared with those of literature.

Keywords: X-FEM, composites, stress intensity factor, crack, dynamic orthotropic behavior

Procedia PDF Downloads 558
10652 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 384