Search results for: information disclosure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10882

Search results for: information disclosure

8812 AI-Based Techniques for Online Social Media Network Sentiment Analysis: A Methodical Review

Authors: A. M. John-Otumu, M. M. Rahman, O. C. Nwokonkwo, M. C. Onuoha

Abstract:

Online social media networks have long served as a primary arena for group conversations, gossip, text-based information sharing and distribution. The use of natural language processing techniques for text classification and unbiased decision-making has not been far-fetched. Proper classification of this textual information in a given context has also been very difficult. As a result, we decided to conduct a systematic review of previous literature on sentiment classification and AI-based techniques that have been used in order to gain a better understanding of the process of designing and developing a robust and more accurate sentiment classifier that can correctly classify social media textual information of a given context between hate speech and inverted compliments with a high level of accuracy by assessing different artificial intelligence techniques. We evaluated over 250 articles from digital sources like ScienceDirect, ACM, Google Scholar, and IEEE Xplore and whittled down the number of research to 31. Findings revealed that Deep learning approaches such as CNN, RNN, BERT, and LSTM outperformed various machine learning techniques in terms of performance accuracy. A large dataset is also necessary for developing a robust sentiment classifier and can be obtained from places like Twitter, movie reviews, Kaggle, SST, and SemEval Task4. Hybrid Deep Learning techniques like CNN+LSTM, CNN+GRU, CNN+BERT outperformed single Deep Learning techniques and machine learning techniques. Python programming language outperformed Java programming language in terms of sentiment analyzer development due to its simplicity and AI-based library functionalities. Based on some of the important findings from this study, we made a recommendation for future research.

Keywords: artificial intelligence, natural language processing, sentiment analysis, social network, text

Procedia PDF Downloads 115
8811 Contraceptives: Experiences of Agency and Coercion of Young People Living in Colombia

Authors: Paola Montenegro, Maria de los Angeles Balaguera Villa

Abstract:

Contraceptive methods play a fundamental role in preventing unwanted pregnancies and protecting users from sexually transmitted infections (STIs). Despite being known to almost the entire population of reproductive age living in Colombia, there are barriers, practices and complex notions about contraceptives that affect their desired mass use and effectiveness. This work aims to analyse some of the perceptions and practices discussed with young people (13-28 years old) living in Colombia regarding the use of contraceptives in their daily lives, preferences, needs and perceived side effects. This research also examines the perceived paradox in autonomy that young people experience regarding contraceptive use: in one hand, its use (or lack of it) is interpreted as an act of self-determination and primary example of reproductive agency, on the other hand, it was frequently associated with coercion and limited autonomy derived from the gaps in reliable information available for young people, the difficulty of accessing certain preferred methods, and sometimes the experienced coercion exercise by doctors, partners and/or family members. The data and analysis discussed in this work stems from a research project whose objective was to provide information about needs and preferences in sexual and reproductive health of young people living in Colombia in relation to a possible telehealth service that could close the gap in access to quality care and safe information. Through a mixed methods approach, this study collected 5.736 responses to a virtual survey disseminated nationwide in Colombia and 47 inperson interviews (24 of them with people who were assigned female at birth and 21 with local key stakeholders in the abortion ecosystem). Quantitative data was analyzed using Stata SE Version 16.0 and qualitative analysis was completed through NVivo using thematic analysis. Key findings on contraception use in young people living in Colombia reveal that 85,8% of participants had used a contraceptive method in the last two years, and that the most commonly used methods were condoms, contraceptive pills, the morning-after pill and the method of interruption. The remaining 14,2% of respondents who declared to not have used contraceptives in the last two years expressed that the main four barriers to access were: "Lack of knowledge about contraceptive methods and where to obtain information and/or access them (13.9%)", "Have had sex with people who have vaginas (10.2%)", "Cost of contraceptive method (8.4%)" and "Difficulties in obtaining medical authorisations (7.6%)". These barriers coincided with the ones used to explain the non-use of contraceptives in young people, which reveals that limitations in information, cost, and quality care represent structural issues that need to be address in programmes, services, and public policy. Finally, interviews showed that young people perceive contraceptive use and non-use as an example of reaffirming reproductive agency and limitations to this can be explained through the widespread incomplete knowledge about how methods work and the prevalence of other social representations of contraception associated with trust, fidelity, and partner preferences, that in the end create limitations to young people’s autonomy.

Keywords: contraception, family planning, premarital fertility, unplanned pregnancy

Procedia PDF Downloads 76
8810 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 88
8809 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong

Authors: Jojo Y. C. Mo

Abstract:

Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.

Keywords: privacy, right to be forgotten, data protection, Hong Kong

Procedia PDF Downloads 190
8808 Investigating the Effect of the Pedagogical Agent on Visual Attention in Attention Deficit Hyperactivity Disorder Students

Authors: Nasrin Mohammadhasani, Rosa Angela Fabio

Abstract:

The attention to relevance information is the key element for learning. Otherwise, Attention Deficit Hyperactivity Disorder (ADHD) students have a fuzzy visual pattern that prevents them to attention and remember learning subject. The present study aimed to test the hypothesis that the presence of a pedagogical agent can effectively support ADHD learner's attention and learning outcomes in a multimedia learning environment. The learning environment was integrated with a pedagogical agent, named Koosha as a social peer. This study employed a pretest and posttest experimental design with control group. The statistical population was 30 boys students, age 10-11 with ADHD that randomly assigned to learn with/without an agent in well designed environment for mathematic. The results suggested that experimental and control groups show a significant difference in time when they participated and mathematics achievement. According to this research, using the pedagogical agent can enhance learning of ADHD students by gaining and guiding their attention to relevance information part on display, so it can be considered as asocial cue that provides theme cognitive supports.

Keywords: attention, computer assisted instruction, multimedia learning environment, pedagogical agent

Procedia PDF Downloads 314
8807 An Examination of the Effectiveness of iPad-Based Augmentative and Alternative Intervention on Acquisition, Generalization and Maintenance of the Requesting Information Skills of Children with Autism

Authors: Amaal Almigal

Abstract:

Technology has been argued to offer distinct advantages and benefits for teaching children with autism spectrum disorder (ASD) to communicate. One aspect of this technology is augmentative and alternative communication (AAC) systems such as picture exchange or speech generation devices. Whilst there has been significant progress in teaching these children to request their wants and needs with AAC, there remains a need for developing technologies that can really make a difference in teaching them to ask questions. iPad-based AAC can be effective for communication. However, the effectiveness of this type of AAC in teaching children to ask questions needs to be examined. Thus, in order to examine the effectiveness of iPad-based AAC in teaching children with ASD to ask questions, This research will test whether iPad leads to more learning than a traditional approach picture and text cards does. Two groups of children who use AAC will be taught to ask ‘What is it?’ questions. With the first group, low-tech AAC picture and text cards will be used, while an iPad-based AAC application called Proloquo2Go will be used with the second group. Interviews with teachers and parents will be conducted before and after the experiment. The children’s perspectives will also be considered. The initial outcomes of this research indicate that iPad can be an effective tool to help children with autism to ask questions.

Keywords: autism, communication, information, iPad, pictures, requesting

Procedia PDF Downloads 264
8806 Bibliometric Measures on Leveraging Technology to Mitigate the Impact of Covid-19 on Business

Authors: Olanrewaju Johnson Akinduntire

Abstract:

This paper investigates the statistical evaluation of books, citations, articles, journals and other publications in accounting and finance on leveraging technology to mitigate the impact of COVID-19 on business. The research proffers an appraisal of the impact of computerized accounting systems in pre and post pandemic era on activities of the formal and informal sectors, it analyzes the concept of computerized accounting systems, and it seeks to determine the impact of computerized of the overall activities of the informal sector. A special focus of this ICT strategy should be to demystify and promote the diffusion of ICT as a general-purpose technology to the informal sector. It is believed that the use of new technologies can be crucial to meeting the Millennium Development Goals (MDGs) in a timely and effective fashion. Consequent to these, there is a need to prevent the further marginalization of the informal sector by availing ICT services which are mixed appropriately and also properly located. By implication, this will help them access markets and other business information, which can enable or make their economic activities more vibrant and facilitate the availability of information about new opportunities. Conclusively, for one to understand the application of ICT and their locational dynamics in informal sector clusters, there is a need to comprehend and acknowledge the drivers and pressures leading to the adoption of new technology.

Keywords: COVID-19 , (MDGs) , ICT, bibliometric

Procedia PDF Downloads 188
8805 The Findings EEG-LORETA about Epilepsy

Authors: Leila Maleki, Ahmad Esmali Kooraneh, Hossein Taghi Derakhshi

Abstract:

Neural activity in the human brain starts from the early stages of prenatal development. This activity or signals generated by the brain are electrical in nature and represent not only the brain function but also the status of the whole body. At the present moment, three methods can record functional and physiological changes within the brain with high temporal resolution of neuronal interactions at the network level: the electroencephalogram (EEG), the magnet oencephalogram (MEG), and functional magnetic resonance imaging (fMRI); each of these has advantages and shortcomings. EEG recording with a large number of electrodes is now feasible in clinical practice. Multichannel EEG recorded from the scalp surface provides a very valuable but indirect information about the source distribution. However, deep electrode measurements yield more reliable information about the source locations، Intracranial recordings and scalp EEG are used with the source imaging techniques to determine the locations and strengths of the epileptic activity. As a source localization method, Low Resolution Electro-Magnetic Tomography (LORETA) is solved for the realistic geometry based on both forward methods, the Boundary Element Method (BEM) and the Finite Difference Method (FDM). In this paper, we review The findings EEG- LORETA about epilepsy.

Keywords: epilepsy, EEG, EEG-LORETA

Procedia PDF Downloads 545
8804 Nurse Schedule Problem in Mubarak Al Kabeer Hospital

Authors: Khaled Al-Mansour, Nawaf Esmael, Abdulaziz Al-Zaid, Mohammed Al Ateeqi, Ali Al-Yousfi, Sayed Al-Zalzalah

Abstract:

In this project we will create the new schedule of nurse according to the preference of them. We did our project in Mubarak Al Kabeer Hospital (in Kuwait). The project aims to optimize the schedule of nurses in Mubarak Al Kabeer Hospital. The schedule of the nurses was studied and understood well to do any modification for their schedule to make the nurses feel as much comfort as they are. First constraints were found to know what things we can change and what things we can’t, the hard constraints are the hospital and ministry policies where we can’t change anything about, and the soft constraints are things that make nurses more comfortable. Data were collected and nurses were interviewed to know what is more better for them. All these constraints and date have been formulated to mathematical equations. This report will first contain an introduction to the topic which includes details of the problem definition. It will also contain information regarding the optimization of a nurse schedule and its contents and importance; furthermore, the report will contain information about the data needed to solve the problem and how it was collected. The problem requires formulation and that is also to be shown. The methodology will be explained which will state what has already been done. We used the lingo software to find the best schedule for the nurse. The schedule has been made according to what the nurses prefer, and also took consideration of the hospital policy when we make the schedule.

Keywords: nurse schedule problem, Kuwait, hospital policy, optimization of schedules

Procedia PDF Downloads 268
8803 A Descriptive Study to Assess the Knowledge Regarding Prevention and Management of Methicillin-Resistant Staphylococcus Aureus (MRSA) Infections Among Nursing Officers in a Selected Hospital, Bengaluru

Authors: Maneesha Pahlani, Najmin Sultana

Abstract:

A hospital is one of the most suitable places for acquiring an infection because it harbors a high population of virulent strains of microorganisms that may be resistant to antibiotics, especially the prevalence of Methicillin-Resistant Staphylococcus Aureus (MRSA) infections. The hospital-acquired infection has become a global challenge. In developed countries, healthcare-associated infections occur in 5-15% of hospitalized clients, affecting 9-37% of those admitted to intensive care units (ICU). A non-experimental descriptive study was conducted among 50 nursing officers working in a selected hospital in Bangalore to assess the nursing officers’ level of knowledge regarding the prevention and management of MRSA infections and to associate the pre-test knowledge mean scores of nursing officers with selected socio-demographic variables. Data was collected using a structured questionnaire consisting of socio-demographic data and a structured questionnaire on knowledge regarding the prevention and management of MRSA infections. The data was analyzed in terms of frequencies and percentages for the analysis of demographic variables and computing chi-square to determine the association between knowledge means scores and selected demographic variables. The study findings revealed that the nursing officer had an overall good level of knowledge (63.05%) regarding the prevention and management of MRSA infections, and there is no significant association found between the level of knowledge mean scores for prevention and management of MRSA infection with the selected socio-demographic variables. However, the categorization of knowledge items showed that the nursing officer must thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance for effective nursing care to patients with MRSA infections. The conclusions drawn from the study findings showed that it is necessary that the nursing officer thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance to provide effective nursing care to patients with MRSA infection as they constantly care for the patient who can be at risk for multi-drug resistance organisms to reduce the risk of MRSA infection in hospital care settings as well community settings.

Keywords: MRSA, nursing officers, knowledge, preventive and management

Procedia PDF Downloads 69
8802 Direct Integration of 3D Ultrasound Scans with Patient Educational Mobile Application

Authors: Zafar Iqbal, Eugene Chan, Fareed Ahmed, Mohamed Jama, Avez Rizvi

Abstract:

Advancements in Ultrasound Technology have enabled machines to capture 3D and 4D images with intricate features of the growing fetus. Sonographers can now capture clear 3D images and 4D videos of the fetus, especially of the face. Fetal faces are often seen on the ultrasound scan of the third trimester where anatomical features become more defined. Parents often want 3D/4D images and videos of their ultrasounds, and particularly image that capture the child’s face. Sidra Medicine developed a patient education mobile app called 10 Moons to improve care and provide useful information during the length of their pregnancy. In addition to general information, we built the ability to send ultrasound images directly from the modality to the mobile application, allowing expectant mothers to easily store and share images of their baby. 10 Moons represent the length of the pregnancy on a lunar calendar, which has both cultural and religious significance in the Middle East. During the third trimester scan, sonographers can capture 3D pictures of the fetus. Ultrasound machines are connected with a local 10 Moons Server with a Digital Imaging and Communications in Medicine (DICOM) application running on it. Sonographers are able to send images directly to the DICOM server by a preprogrammed button on the ultrasound modality. Mothers can also request which pictures they would like to be available on the app. An internally built DICOM application receives the image and saves the patient information from DICOM header (for verification purpose). The application also anonymizes the image by removing all the DICOM header information and subsequently converts it into a lossless JPEG. Finally, and the application passes the image to the mobile application server. On the 10 Moons mobile app – patients enter their Medical Record Number (MRN) and Date of Birth (DOB) to receive a One Time Password (OTP) for security reasons to view the images. Patients can also share the images anonymized images with friends and family. Furthermore, patients can also request 3D printed mementos of their child through 10 Moons. 10 Moons is unique patient education and information application where expected mothers can also see 3D ultrasound images of their children. Sidra Medicine staff has the added benefit of a full content management administrative backend where updates to content can be made. The app is available on secure infrastructure with both local and public interfaces. The application is also available in both English and Arabic languages to facilitate most of the patients in the region. Innovation is at the heart of modern healthcare management. With Innovation being one of Sidra Medicine’s core values, our 10 Moons application provides expectant mothers with unique educational content as well as the ability to store and share images of their child and purchase 3D printed mementos.

Keywords: patient educational mobile application, ultrasound images, digital imaging and communications in medicine (DICOM), imaging informatics

Procedia PDF Downloads 140
8801 Intelligent Wireless Patient Monitoring and Tracking System

Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam

Abstract:

Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.

Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller

Procedia PDF Downloads 382
8800 Probing Syntax Information in Word Representations with Deep Metric Learning

Authors: Bowen Ding, Yihao Kuang

Abstract:

In recent years, with the development of large-scale pre-trained lan-guage models, building vector representations of text through deep neural network models has become a standard practice for natural language processing tasks. From the performance on downstream tasks, we can know that the text representation constructed by these models contains linguistic information, but its encoding mode and extent are unclear. In this work, a structural probe is proposed to detect whether the vector representation produced by a deep neural network is embedded with a syntax tree. The probe is trained with the deep metric learning method, so that the distance between word vectors in the metric space it defines encodes the distance of words on the syntax tree, and the norm of word vectors encodes the depth of words on the syntax tree. The experiment results on ELMo and BERT show that the syntax tree is encoded in their parameters and the word representations they produce.

Keywords: deep metric learning, syntax tree probing, natural language processing, word representations

Procedia PDF Downloads 68
8799 Consumer Knowledge and Behavior in the Aspect of Food Waste

Authors: Katarzyna Neffe-Skocinska, Marzena Tomaszewska, Beata Bilska, Dorota Zielinska, Monika Trzaskowska, Anna Lepecka, Danuta Kolozyn-Krajewska

Abstract:

The aim of the study was to assess Polish consumer behavior towards food waste, including knowledge of information on food labels. The survey was carried out using the CAPI (computer assisted personal interview) method, which involves interviewing the respondent using mobile devices. The research group was a representative sample for Poland due to demographic variables: gender, age, place of residence. A total of 1.115 respondents participated in the study (51.1% were women and 48.9% were men). The questionnaire included questions on five thematic aspects: 1. General knowledge and sources of information on the phenomenon of food waste; 2. Consumption of food after the date of minimum durability; 3. The meanings of the phrase 'best before ...'; 4. Indication of the difference between the meaning of the words 'best before ...' and 'use by'; 5. Indications products marked with the phrase 'best before ...'. It was found that every second surveyed Pole met with the topic of food waste (54.8%). Among the respondents, the most popular source of information related to the research topic was television (89.4%), radio (26%) and the Internet (24%). Over a third of respondents declared that they consume food after the date of minimum durability. Only every tenth (9.8%) respondent does not pay attention to the expiry date and type of consumed products (durable and perishable products). Correctly 39.8% of respondents answered the question: How do you understand the phrase 'best before ...'? In the opinion of 42.8% of respondents, the statements 'best before ...' and 'use by' mean the same thing, while 36% of them think differently. In addition, more than one-fifth of respondents could not respond to the questions. In the case of products of the indication information 'best before ...', more than 40% of the respondents chosen perishable products, e.g., yoghurts and durable, e.g., groats. A slightly lower percentage of indications was recorded for flour (35.1%), sausage (32.8%), canned corn (31.8%), and eggs (25.0%). Based on the assessment of the behavior of Polish consumers towards the phenomenon of food waste, it can be concluded that respondents have elementary knowledge of the study subject. Noteworthy is the good conduct of most respondents in terms of compliance with shelf life and dates of minimum durability of food products. The publication was financed on the basis of an agreement with the National Center for Research and Development No. Gospostrateg 1/385753/1/NCBR/2018 for the implementation and financing of the project under the strategic research and development program social and economic development of Poland in the conditions of globalizing markets – GOSPOSTRATEG - acronym PROM.

Keywords: food waste, shelf life, dates of durability, consumer knowledge and behavior

Procedia PDF Downloads 174
8798 Forecasting the Influences of Information and Communication Technology on the Structural Changes of Japanese Industrial Sectors: A Study Using Statistical Analysis

Authors: Ubaidillah Zuhdi, Shunsuke Mori, Kazuhisa Kamegai

Abstract:

The purpose of this study is to forecast the influences of Information and Communication Technology (ICT) on the structural changes of Japanese economies based on Leontief Input-Output (IO) coefficients. This study establishes a statistical analysis to predict the future interrelationships among industries. We employ the Constrained Multivariate Regression (CMR) model to analyze the historical changes of input-output coefficients. Statistical significance of the model is then tested by Likelihood Ratio Test (LRT). In our model, ICT is represented by two explanatory variables, i.e. computers (including main parts and accessories) and telecommunications equipment. A previous study, which analyzed the influences of these variables on the structural changes of Japanese industrial sectors from 1985-2005, concluded that these variables had significant influences on the changes in the business circumstances of Japanese commerce, business services and office supplies, and personal services sectors. The projected future Japanese economic structure based on the above forecast generates the differentiated direct and indirect outcomes of ICT penetration.

Keywords: forecast, ICT, industrial structural changes, statistical analysis

Procedia PDF Downloads 375
8797 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks

Authors: Rei-Heng Cheng, Wen-Pinn Fang

Abstract:

A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.

Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks

Procedia PDF Downloads 391
8796 A Descriptive Study to Assess the Knowledge Regarding Prevention and Management of Methicillin-Resistant Staphylococcus Aureus Infections Among Nursing Officers in a Selected Hospital, Bengaluru.

Authors: Najmin Sultana, Maneesha Pahlani

Abstract:

A hospital is one of the most suitable places for acquiring an infection because it harbors a high population of virulent strains of microorganisms that may be resistant to antibiotics, especially the prevalence of Methicillin-Resistant Staphylococcus Aureus (MRSA) infections. The hospital-acquired infection has become a global challenge. In developed countries, healthcare-associated infections occur in 5-15% of hospitalized clients, affecting 9-37% of those admitted to intensive care units (ICU). A non-experimental descriptive study was conducted among 50 nursing officers working in a selected hospital in bengaluru to assess the nursing officers’ level of knowledge regarding the prevention and management of MRSA infections and to associate the pre-test knowledge mean scores of nursing officers with selected socio-demographic variables. Data was collected using a structured questionnaire consisting of socio-demographic data and a structured questionnaire on knowledge regarding the prevention and management of MRSA infections. The data was analyzed in terms of frequencies and percentages for the analysis of demographic variables and computing chi-square to determine the association between knowledge means scores and selected demographic variables. The study findings revealed that the nursing officer had an overall good level of knowledge (63.05%) regarding the prevention and management of MRSA infections, and there is no significant association found between the level of knowledge mean scores for prevention and management of MRSA infection with the selected socio-demographic variables. However, the categorization of knowledge items showed that the nursing officer must thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance for effective nursing care to patients with MRSA infections. The conclusions drawn from the study findings showed that it is necessary that the nursing officer thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance to provide effective nursing care to patients with MRSA infection as they constantly care for the patient who can be at risk for multi-drug resistance organisms to reduce the risk of MRSA infection in hospital care settings as well community settings.

Keywords: MRSA, knowledge, nursing officers', prevention and management

Procedia PDF Downloads 63
8795 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 524
8794 A Correlational Study between Sexual Awareness, Behaviour and Sources of Sexual Knowledge among Youth in Context of Bihar

Authors: Kanika Naresh Singh, Uday Shankar

Abstract:

Background: Human behaviours are influenced by drives. Sexual drive is one of them. Education regarding sexual behaviour plays a great role in shaping one’s attitude towards it. These days after attaining the age of puberty, adolescents are confused and feel shy to talk about it. In order to get information, they refer to various types of sources and these sources play a greater role in spreading awareness in the mass adolescent population. Sometimes it also leads to the building of myths and misconceptions. Due to increasing incidences of HIV/AIDS, RTIs/STIs and teenage pregnancies, there is a rising need to impart sex education. Aim: The aim of this research was to study the level of sexual awareness among the youth of Bihar and also study their sexual behaviour and sources of influence. It also aims to study the correlation between sexual awareness, behaviour and sources of sexual knowledge among youth in Bihar. Methods: The sample size for the project was 50 youth consisting of both boys and girls, in between the age group of 18 to 23 years from urban and semi-urban areas. The purposive sampling method was used in the research. The tools used were the Sexual Awareness Questionnaire and Sexual Behavior and Sources of Influence (SBSI) scale. The sexual Awareness Questionnaire was developed by Snell, having 35 items. A socio-demographic data sheet was also used. Results: The youth had poor sexual awareness. Internet and Friends were found to be the major source for gathering information. The youth of Bihar were less inclined towards resolving their doubts with their parents. There was a positive correlation between sexual awareness, behaviour and sources of knowledge. Conclusion: The youth of Bihar has poor sexual knowledge. Internet and Friends are major sources of information. Sex Education should be promoted as suggested by various institutions like World Health Organization United Nations. Psychiatrists and psychologists have a key leadership role in introducing these potentially emotionally challenging issues to the youth with consideration of psychosocial and cultural factors.

Keywords: sexual awareness, sexual behavior, sources of influence, youths, Bihar, India

Procedia PDF Downloads 141
8793 Comparing Performance of Irrigation System in Nepal by Collective Action and Decision-Making Capacity of the Farmers

Authors: Manita Ale, Ganesh P. Shivakoti, Ram C. Bastakoti

Abstract:

Irrigation system, a system for enhancing agricultural productivity, requires regular maintenance in order to avoid irregular allocation of water. For maintenance of the system in long run, farmers’ participation plays a key role increasing the performance of system. The performance of any irrigation system mainly relies on various factors which affect collective action plus decision making, as well as their shared impacts. The paper consists of system level information that were collected from 12 Irrigation Systems (IS) from three-sampled districts of Nepal and the household information that were collected from 160 irrigation water users. The results reveal that, out of 12 sampled irrigation systems, only 4 systems shows high performance levels. The high performance level of those systems was characterized on the basis of adequate availability of water, good maintenance of system infrastructure, and conformance to existing rules followed. In addition, the paper compares different irrigation systems based on trust, reciprocity, cropping intensity, command area and yield as tools to indicate the importance of collective action in performance of irrigation system.

Keywords: collective action, decision-making, farmers’ participation, performance

Procedia PDF Downloads 405
8792 Consumer Utility Analysis of Halal Certification on Beef Using Discrete Choice Experiment: A Case Study in the Netherlands

Authors: Rosa Amalia Safitri, Ine van der Fels-Klerx, Henk Hogeveen

Abstract:

Halal is a dietary law observed by people following Islamic faith. It is considered as a type of credence food quality which cannot be easily assured by consumers even upon and after consumption. Therefore, Halal certification takes place as a practical tool for the consumers to make an informed choice particularly in a non-Muslim majority country, including the Netherlands. Discrete choice experiment (DCE) was employed in this study for its ability to assess the importance of attributes attached to Halal beef in the Dutch market and to investigate consumer utilities. Furthermore, willingness to pay (WTP) for the desired Halal certification was estimated. Four most relevant attributes were selected, i.e., the slaughter method, traceability information, place of purchase, and Halal certification. Price was incorporated as an attribute to allow estimation of willingness to pay for Halal certification. There were 242 Muslim respondents who regularly consumed Halal beef completed the survey, from Dutch (53%) and non-Dutch consumers living in the Netherlands (47%). The vast majority of the respondents (95%) were within the age of 18-45 years old, with the largest group being student (43%) followed by employee (30%) and housewife (12%). Majority of the respondents (76%) had disposable monthly income less than € 2,500, while the rest earned more than € 2,500. The respondents assessed themselves of having good knowledge of the studied attributes, except for traceability information with 62% of the respondents considered themselves not knowledgeable. The findings indicated that slaughter method was valued as the most important attribute, followed by Halal certificate, place of purchase, price, and traceability information. This order of importance varied across sociodemographic variables, except for the slaughter method. Both Dutch and non-Dutch subgroups valued Halal certification as the third most important attributes. However, non-Dutch respondents valued it with higher importance (0,20) than their Dutch counterparts (0,16). For non-Dutch, the price was more important than Halal certification. The ideal product preferred by the consumers indicated the product serving the highest utilities for consumers, and characterized by beef obtained without pre-slaughtering stunning, with traceability info, available at Halal store, certified by an official certifier, and sold at 2.75 € per 500 gr. In general, an official Halal certifier was mostly preferred. However, consumers were not willing to pay for premium for any type of Halal certifiers, indicated by negative WTP of -0.73 €, -0.93 €, and -1,03€ for small, official, and international certifiers, respectively. This finding indicated that consumers tend to lose their utility when confronted with price. WTP estimates differ across socio-demographic variables with male and non-Dutch respondents had the lowest WTP. The unfamiliarity to traceability information might cause respondents to perceive it as the least important attribute. In the context of Halal certified meat, adding traceability information into meat packaging can serve two functions, first consumers can justify for themselves whether the processes comply with Halal requirements, for example, the use of pre-slaughtering stunning, and secondly to assure its safety. Therefore, integrating traceability info into meat packaging can help to make informed decision for both Halal status and food safety.

Keywords: consumer utilities, discrete choice experiments, Halal certification, willingness to pay

Procedia PDF Downloads 128
8791 Investigation on the Energy Impact of Spatial Geometry in a Residential Building Using Building Information Modeling Technology

Authors: Shashank. S. Bagane, H. N. Rajendra Prasad

Abstract:

Building Information Modeling (BIM) has currently developed into a potent solution. The consistent development of BIM technology in the sphere of Architecture, Engineering, and Construction (AEC) industry has enhanced the effectiveness of construction and decision making. However, aggrandized global warming and energy crisis has impacted on building energy analysis. It is now becoming an important factor to be considered in the AEC industry. Amalgamating energy analysis in the planning and design phase of a structure has become a necessity. In the current construction industry, estimating energy usage and reducing its footprint is of high priority. The construction industry is giving more prominence to sustainability alongside energy efficiency. This demand is compelling the designers, planners, and engineers to inspect the sustainable performance throughout the building's life cycle. The current study primarily focuses on energy consumption, space arrangement, and spatial geometry of a residential building. Most commonly residential structures in India are constructed considering Vastu Shastra. Vastu designs are intended to integrate architecture with nature and utilizing geometric patterns, symmetry, and directional alignments. In the current study, a residential brick masonry structure is considered for BIM analysis, Architectural model of the structure will be created using Revit software, later the orientation and spatial arrangement will be finalized based on Vastu principles. Furthermore, the structure will be investigated for the impact of building orientation and spatial arrangements on energy using Green Building Studio software. Based on the BIM analysis of the structure, energy consumption of subsequent building orientations will be understood. A well-orientated building having good spatial arrangement can save a considerable amount of energy throughout its life cycle and reduces the need for heating and lighting which will prove to diminish energy usage and improve the energy efficiency of the residential building.

Keywords: building information modeling, energy impact, spatial geometry, vastu

Procedia PDF Downloads 161
8790 Mapping the Relationship between Elements of Urban Morphology Density of Crime

Authors: Fabio Salvador Aparecido Santos, Spencer Chainey, Richard Wortley

Abstract:

Urban morphology can be understood as the study of the physical form of cities through its elements. Crime, at this turn, can be oversimplified as an action that breaks the rules established in a certain society. This study involves these two subjects through the relationship between elements of urban morphology and density of crime occurrences. We consider that there is a research gap about the influence of urban features on crime occurrences using statistic methods and mapping techniques on Geographic Information Systems. The investigation will comprehend three main phases. The first phase involves examining how theoretical principles associated with urban morphology can be viewed in terms of their influence on crime patterns. The second phase involves the development of tools to be used to model elements of urban morphology, and measure the relationship between these urban morphological elements and patterns of crime. The third phase involves determining the extent to which elements of the urban environment can contribute to crime reduction. Understanding the relationship between urban morphology and crime patterns in a Latin American context will help highlight the influence urban planning has on the crime problems that emerge in these settings, and how effectively urban planning can contribute to reducing crime.

Keywords: Agent-based Modelling, Environmental Criminology, Geographic Information System, Urban Morphology

Procedia PDF Downloads 136
8789 Impact of Extended Enterprise Resource Planning in the Context of Cloud Computing on Industries and Organizations

Authors: Gholamreza Momenzadeh, Forough Nematolahi

Abstract:

The Extended Enterprise Resource Planning (ERPII) system usually requires massive amounts of storage space, powerful servers, and large upfront and ongoing investments to purchase and manage the software and the related hardware which are not affordable for organizations. In recent decades, organizations prefer to adapt their business structures with new technologies for remaining competitive in the world economy. Therefore, cloud computing (which is one of the tools of information technology (IT)) is a modern system that reveals the next-generation application architecture. Also, cloud computing has had some advantages that reduce costs in many ways such as: lower upfront costs for all computing infrastructure and lower cost of maintaining and supporting. On the other hand, traditional ERPII is not responding for huge amounts of data and relations between the organizations. In this study, based on a literature study, ERPII is investigated in the context of cloud computing where the organizations operate more efficiently. Also, ERPII conditions have a response to needs of organizations in large amounts of data and relations between the organizations.

Keywords: extended enterprise resource planning, cloud computing, business process, enterprise information integration

Procedia PDF Downloads 222
8788 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 21
8787 Examining the Relationship Between Traditional Property Rights and Online Intellectual Property Rights in the Digital Age

Authors: Luljeta Plakolli-Kasumi

Abstract:

In the digital age, the relationship between traditional property rights and online intellectual property rights is becoming increasingly complex. On the one hand, the internet and advancements in technology have allowed for the widespread distribution and use of digital content, making it easier for individuals and businesses to access and share information. On the other hand, the rise of digital piracy and illegal file-sharing has led to increased concerns about the protection of intellectual property rights. This paper aims to examine the relationship between traditional property rights and online intellectual property rights in the digital age by analyzing the current legal frameworks, key challenges and controversies that arise, and potential solutions for addressing these issues. The paper will look at how traditional property rights concepts such as ownership and possession are being applied in the online context and how they intersect with new and evolving forms of intellectual property such as digital downloads, streaming services, and online content creation. It will also discuss the tension between the need for strong intellectual property protection to encourage creativity and innovation and the public interest in promoting access to information and knowledge. Ultimately, the paper will explore how the legal system can adapt to better balance the interests of property owners, creators, and users in the digital age.

Keywords: intellectual property, traditional property, digital age, digital content

Procedia PDF Downloads 91
8786 Biofilm Text Classifiers Developed Using Natural Language Processing and Unsupervised Learning Approach

Authors: Kanika Gupta, Ashok Kumar

Abstract:

Biofilms are dense, highly hydrated cell clusters that are irreversibly attached to a substratum, to an interface or to each other, and are embedded in a self-produced gelatinous matrix composed of extracellular polymeric substances. Research in biofilm field has become very significant, as biofilm has shown high mechanical resilience and resistance to antibiotic treatment and constituted as a significant problem in both healthcare and other industry related to microorganisms. The massive information both stated and hidden in the biofilm literature are growing exponentially therefore it is not possible for researchers and practitioners to automatically extract and relate information from different written resources. So, the current work proposes and discusses the use of text mining techniques for the extraction of information from biofilm literature corpora containing 34306 documents. It is very difficult and expensive to obtain annotated material for biomedical literature as the literature is unstructured i.e. free-text. Therefore, we considered unsupervised approach, where no annotated training is necessary and using this approach we developed a system that will classify the text on the basis of growth and development, drug effects, radiation effects, classification and physiology of biofilms. For this, a two-step structure was used where the first step is to extract keywords from the biofilm literature using a metathesaurus and standard natural language processing tools like Rapid Miner_v5.3 and the second step is to discover relations between the genes extracted from the whole set of biofilm literature using pubmed.mineR_v1.0.11. We used unsupervised approach, which is the machine learning task of inferring a function to describe hidden structure from 'unlabeled' data, in the above-extracted datasets to develop classifiers using WinPython-64 bit_v3.5.4.0Qt5 and R studio_v0.99.467 packages which will automatically classify the text by using the mentioned sets. The developed classifiers were tested on a large data set of biofilm literature which showed that the unsupervised approach proposed is promising as well as suited for a semi-automatic labeling of the extracted relations. The entire information was stored in the relational database which was hosted locally on the server. The generated biofilm vocabulary and genes relations will be significant for researchers dealing with biofilm research, making their search easy and efficient as the keywords and genes could be directly mapped with the documents used for database development.

Keywords: biofilms literature, classifiers development, text mining, unsupervised learning approach, unstructured data, relational database

Procedia PDF Downloads 170
8785 Worldwide Overview of Homologation for Radio Products

Authors: Nekzad R Doctor, Shubham Bhonde, Shashwat Gawande

Abstract:

The homologation, also known as “type approval,” describes primarily the granting of approval by an official authority. For the use and the import of Keys & ID transmitters as well as Body Control Modules with radio transmission around the globe, homologation is necessary. Depending on country requirements or technical properties (e.g., frequency or transmission power), different approaches need to be fulfilled. The requirements could vary in the form of certifications requirement or exemptions, any technologies forbidden, additional legal requirements and type approval for manufacturing locations. This research will give an overview of all different types of approval and technical requirement for worldwide countries.Information is not available for a lot of countries which is challenging for an entrant in the field of homologation. Also, even if the information is available, there could be a language barrier as different countries sometimes upload their regulations in a local language. Also, there is a lot of unclarity in many countries regarding type approval requirements (Safety, EMC certification,2nd factory certification). To have a clear overview and understanding of type approval requirements, in this document, the Worldwide country will be divided into 4 groups based on technology. After which, a region country-specific type approval requirement will be checked in detail. This document will facilitate in providing global Homologation requirements.

Keywords: homologation, type approval, EMC, body control modules

Procedia PDF Downloads 96
8784 Attitude Towards E-Learning: A Case of University Teachers and Students

Authors: Muhamamd Shahid Farooq, Maazan Zafar, Rizawana Akhtar

Abstract:

E-learning technologies are the blessings of advancements in science and technology. These facilitate the learners to get information at any place and any time by improving their self-confidence, self-efficacy and effectiveness in teaching learning process. E-learning provides an individualized learning experience for learners and remove barriers faced by students during new and creative ways of gaining information. It provides a wide range of facilities to enable the teachers and students for effective and purposeful learning. This study was conducted to explore the attitudes of university students and teachers towards e-learning working in a metropolitan university of Pakistan. The personal, institutional and technological characteristics of the teachers and students of higher education institution effect the adoption of e-learning. For this descriptive study 449 students and 35 university teachers were surveyed by using a Likert scale type questionnaire consisting of 52 statements relating to six factors "perceived usefulness, intention to adopt e-learning, ease of e-learning use, availability resources, e-learning stressors, and pressure to use e-learning". Data were analyzed by making comparisons on the basis of different demographic factors. The findings of the study show that both type of respondents have positive attitude towards e-learning. However, the male and female respondents differ in their opinion for e-learning implementation.

Keywords: e-learning, ICT, e-sources of learning, questionnaire

Procedia PDF Downloads 527
8783 Fake news and Conspiracy Narratives in the Covid-19 Crisis: An International Comparison

Authors: Caja Thimm

Abstract:

Already well before the Corona pandemic hit the world, ‘fake news‘ were no longer regarded as harmless twists of the truth but as intentionally composed disinformation, often with the goal of manipulative populist propaganda. During the Corona crisis, particularly conspiracy narratives have become a worldwide phenomenon with dangerous consequences (anti vaccination myths). The success of these manipulated news need s to be counteracted by trustworthy news, which in Europe particularly includes public broadcasting media and their social media channels. To understand better how the main public broadcasters in Germany, the UK, and France used Instagram strategically, a comparative study was carried out. The study – comparative analysis of Instagram during the Corona Crisis In our empirical study, we compared the activities by selected formats during the Corona crisis in order to see how the public broadcasters reached their audiences and how this might, in the longer run, affect journalistic strategies on social media platforms. First analysis showed that the increase in the use of social media overall was striking. Almost one in two adult online users (48 %) obtained information about the virus in social media, and in total, 38% of the younger age group (18-24) looked for Covid19 information on Instagram, so the platform can be regarded as one of the central digital spaces for Corona related information searches. Quantitative measures showed that 47% of recent posts by the broadcasters were related to Corona, and 7% treated conspiracy myths. For the more detailed content analysis, the following categories of analysis were applied: • Digital storytelling and instastories • Textuality and semantic keys • links to information • stickers • videochat • fact checking • news ticker • service • infografics and animated tables Additionally to these basic features, we particularly looked for new formats created during the crisis. Journalistic use of social media platforms opens up immediate and creative ways of applying the media logics of the respective platforms, and particularly the BBC and ARD formats proved to be interactive, responsive, and entertaining. Among them were new formats such as a space for user questions and personal uploads, interviews, music, comedy, etc. Particularly the fact checking channel got a lot of attention, as many user questions were focused on the conspiracy theories, which dominated the public discourse during many weeks in 2020. In the presentation, we will introduce eight particular strategies that show how public broadcasting journalism can adopt digital platforms and use them creatively and, hence help to counteract against conspiracy narratives and fake news.

Keywords: fake news, social media, digital journalism, digital methods

Procedia PDF Downloads 156