Search results for: government information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13952

Search results for: government information

11612 Application of Heritage Clay Roof Tiles in Malaysia’s Government Buildings: Conservation Challenges

Authors: Mohd Sabere Sulaiman, Masyitah Abd Aziz, Norsiah Hassan, Jamilah Halina Abdul Halim, Mohd Saipul Asrafi Haron

Abstract:

The use of clay roof tiles was spread out through Asia and Europe, including Malaysia, since the early 17th Century. Most of the common type of clay roof tiles are used in a flat and rectangular shape, measurement, styles, and characteristics through each tradition and interest, including responsive to the climate. Various types of heritage clay roof tiles were used in Malaysia’s Government Buildings dated 1865, 1919, 1936, and so forth, which mostly were imported from India, France, and Italy. Until now, these heritage clay roof tiles are still found throughout Malaysia, including the ‘Interlocking’ clay roof tile type. This study is to investigate and overview the existence of heritage clay roof tiles used in Malaysia; the ‘interlocking’ type with ‘lip’ and ‘hooks’, through literature reviews as desktop study besides carried out a preliminary observation on various sites and interviews. From the literatures, the last production and used of the local heritage clay roof tiles in Malaysia dated in mid 1900s in Batu Arang, Selangor. The brick factory was abandoned since early 2000s. Although the modern ‘Interlocking’ type were produced to duplicate its form, pattern, and size of the original one, they still facing the problem to blend and merged, which end up dismantling the original version, or replacing one to one condition and even replaced overall with the modern materials. This is quite contradicting with the basic principles of building conservation and had become a challenge. Initial findings from the preliminary observation on site in various state in Malaysia shows some evidence that the heritage clay roof tiles are still intact and been used. Some of them might change to modern roof materials such as metal deck, probably due to easy maintenance and cheaper. Also, some are still struggling to maintain and retain its looks and authenticity of the roof while facing the increasing of material cost. Those improper alteration and changes made is due to lack of knowledge among the owner and end user. Various aspect needs to be considered in order to sustain its usage and its original looks by looking at the proper maintenance aspects of the heritage clay roof tiles to prolong the building life for future generation preferences.

Keywords: challenges, clay, interlocking, maintenance

Procedia PDF Downloads 94
11611 Knowledge Management Strategies within a Corporate Environment of Papers

Authors: Daniel J. Glauber

Abstract:

Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.

Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification

Procedia PDF Downloads 441
11610 A Corpus-Linguistic Analysis of Online Iranian News Coverage on Syrian Revolution

Authors: Amaal Ali Al-Gamde

Abstract:

The Syrian revolution is a major issue in the Middle East, which draws in world powers and receives a great focus in international mass media since 2011. The heavy global reliance on cyber news and digital sources plays a key role in conveying a sense of bias to a wide range of online readers. Thus, based on the assumption that media discourse possesses ideological implications, this study investigates the representation of Syrian revolution in online media. The paper explores the discursive constructions of anti and pro-government powers in Syrian revolution in 1000,000-word corpus of Fars online reports (an Iranian news agency), issued between 2013 and 2015. Taking a corpus assisted discourse analysis approach, the analysis investigates three types of lexicosemantic relations, the semantic macrostructures within which the two social actors are framed, the lexical collocations characterizing the news discourse and the discourse prosodies they tell about the two sides of the conflict. The study utilizes computer-based approaches, sketch engine and AntConc software to minimize the bias of the subjective analysis. The analysis moves from the insights of lexical frequencies and keyness scores to examine themes and the collocational patterns. The findings reveal the Fars agency’s ideological mode of representations in reporting events of Syrian revolution in two ways. The first is by stereotyping the opposition groups under the umbrella of terrorism, using words such as (law breakers, foreign-backed groups, militant groups, terrorists) to legitimize the atrocities of security forces against protesters and enhance horror among civilians. The second is through emphasizing the power of the government and depicting it as the defender of the Arab land by foregrounding the discourse of international conspiracy against Syria. The paper concludes discussing the potential importance of triangulating corpus linguistic tools with critical discourse analysis to elucidate more about discourses and reality.

Keywords: discourse prosody, ideology, keyness, semantic macrostructure

Procedia PDF Downloads 129
11609 Broadening the Public Sphere: Examining the Role of Community Radio in Fostering Participatory Democracy in Selected Communities in Ondo State, Nigeria

Authors: John Ibanga

Abstract:

Since May 1999, when Nigeria returned to uninterrupted democratic rule, there have been various attempts by successive governments at committing themselves to democratic ideals. Such efforts include a revision of communication policies after repeated calls by civil society organisations, development partners, researchers, and academics to allow not only the commencement of campus radio broadcasting but also the takeoff of community radio broadcasting. Thus, in 2015, operating licenses were granted to several communities spread across the six geopolitical zones in the country for the establishment of community radio stations culminating in the establishment of the first community radio in Nigeria on July 17, 2015. And, since citizens’ involvement in policy matters and governance is one of the tenets of participatory democracy, it becomes imperative to investigate how the emerging community radio sector in Nigeria is facilitating participatory democracy among Nigerians, even in the face of attempts by the present government to silence all dissenting voices. This study, therefore, examines how residents in Ondo State, Southwest Nigeria, are utilising programmes on Ejule Nen and Kakaaki community radio stations in Ondo State, Nigeria, to deepen participatory democracy. Much of the existing studies on the role of community radio in participatory democracy and citizens' engagement efforts miss out on Nigeria because of the delayed implementation of community radio policy in Nigeria being Africa’s most populous nation as well as a major player in the affairs of the African continent. While the participatory communication and communication infrastructure theories were used as framework, data were collected from in-depth interviews with staff of the community radio station and community leaders, focus group discussions with the community residents, and qualitative content analysis of programmes on the station. The residents used the community radio stations as platforms for demanding accountability from government, mobilising resources for the execution of a number of community projects, promoting credible electoral practices, and influencing the implementation of free education policy in their communities. Hence the community radio stations became the reliable and authoritative voices of residents for participating in the public sphere and, generally, the democratic process.

Keywords: community, community radio, democracy, participatory democracy

Procedia PDF Downloads 122
11608 Role of Vigilante in Crime Control in Bodija Market

Authors: Obadiah Nwabueze

Abstract:

Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.

Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI

Procedia PDF Downloads 247
11607 Systematic and Simple Guidance for Feed Forward Design in Model Predictive Control

Authors: Shukri Dughman, Anthony Rossiter

Abstract:

This paper builds on earlier work which demonstrated that Model Predictive Control (MPC) may give a poor choice of default feed forward compensator. By first demonstrating the impact of future information of target changes on the performance, this paper proposes a pragmatic method for identifying the amount of future information on the target that can be utilised effectively in both finite and infinite horizon algorithms. Numerical illustrations in MATLAB give evidence of the efficacy of the proposal.

Keywords: model predictive control, tracking control, advance knowledge, feed forward

Procedia PDF Downloads 545
11606 An Investigation on Organisation Cyber Resilience

Authors: Arniyati Ahmad, Christopher Johnson, Timothy Storer

Abstract:

Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise.

Keywords: critical information infrastructure, cyber resilience, organisation cyber resilience, reliability test

Procedia PDF Downloads 357
11605 Comparing Quality of Care in Family Planning Services in Primary Public and Private Health Care Facilities in Ethiopia

Authors: Gizachew Assefa Tessema, Mohammad Afzal Mahmood, Judith Streak Gomersall, Caroline O. Laurence

Abstract:

Introduction: Improving access to quality family planning services is the key to improving health of women and children. However, there is currently little evidence on the quality and scope of family planning services provided by private facilities, and this compares to the services provided in public facilities in Ethiopia. This is important, particularly in determining whether the government should further expand the roles of the private sector in the delivery of family planning facility. Methods: This study used the 2014 Ethiopian Services Provision Assessment Plus (ESPA+) survey dataset for comparing the structural aspects of quality of care in family planning services. The present analysis used a weighted sample of 1093 primary health care facilities (955 public and 138 private). This study employed logistic regression analysis to compare key structural variables between public and private facilities. While taking the structural variables as an outcome for comparison, the facility type (public vs private) were used as the key exposure of interest. Results: When comparing availability of basic amenities (infrastructure), public facilities were less likely to have functional cell phones (AOR=0.12; 95% CI: 0.07-0.21), and water supply (AOR=0.29; 95% CI: 0.15-0.58) than private facilities. However, public facilities were more likely to have staff available 24 hours in the facility (AOR=0.12; 95% CI: 0.07-0.21), providers having family planning related training in the past 24 months (AOR=4.4; 95% CI: 2.51, 7.64) and possessing guidelines/protocols (AOR= 3.1 95% CI: 1.87, 5.24) than private facilities. Moreover, comparing the availability of equipment, public facilities had higher odds of having pelvic model for IUD demonstration (AOR=2.60; 95% CI: 1.35, 5.01) and penile model for condom demonstration (AOR=2.51; 95% CI: 1.32, 4.78) than private facilities. Conclusion: The present study suggests that Ethiopian government needs to provide emphasis towards the private sector in terms of providing family planning guidelines and training on family planning services for their staff. It is also worthwhile for the public health facilities to allocate funding for improving the availability of basic amenities. Implications for policy and/ or practice: This study calls policy makers to design appropriate strategies in providing opportunities for training a health care providers working in private health facility.

Keywords: quality of care, family planning, public-private, Ethiopia

Procedia PDF Downloads 352
11604 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 658
11603 Using Implicit Data to Improve E-Learning Systems

Authors: Slah Alsaleh

Abstract:

In the recent years and with popularity of internet and technology, e-learning became a major part of majority of education systems. One of the advantages the e-learning systems provide is the large amount of information available about the students' behavior while communicating with the e-learning system. Such information is very rich and it can be used to improve the capability and efficiency of e-learning systems. This paper discusses how e-learning can benefit from implicit data in different ways including; creating homogeneous groups of student, evaluating students' learning, creating behavior profiles for students and identifying the students through their behaviors.

Keywords: e-learning, implicit data, user behavior, data mining

Procedia PDF Downloads 305
11602 BIASS in the Estimation of Covariance Matrices and Optimality Criteria

Authors: Juan M. Rodriguez-Diaz

Abstract:

The precision of parameter estimators in the Gaussian linear model is traditionally accounted by the variance-covariance matrix of the asymptotic distribution. However, this measure can underestimate the true variance, specially for small samples. Traditionally, optimal design theory pays attention to this variance through its relationship with the model's information matrix. For this reason it seems convenient, at least in some cases, adapt the optimality criteria in order to get the best designs for the actual variance structure, otherwise the loss in efficiency of the designs obtained with the traditional approach may be very important.

Keywords: correlated observations, information matrix, optimality criteria, variance-covariance matrix

Procedia PDF Downloads 441
11601 Clarifier Dialogue Interface to resolve linguistic ambiguities in E-Learning Environment

Authors: Dalila Souilem, Salma Boumiza, Abdelkarim Abdelkader

Abstract:

The Clarifier Dialogue Interface (CDI) is a part of an online teaching system based on human-machine communication in learning situation. This interface used in the system during the learning action specifically in the evaluation step, to clarify ambiguities in the learner's response. The CDI can generate patterns allowing access to an information system, using the selectors associated with lexical units. To instantiate these patterns, the user request (especially learner’s response), must be analyzed and interpreted to deduce the canonical form, the semantic form and the subject of the sentence. For the efficiency of this interface at the interpretation level, a set of substitution operators is carried out in order to extend the possibilities of manipulation with a natural language. A second approach that will be presented in this paper focuses on the object languages with new prospects such as combination of natural language with techniques of handling information system in the area of online education. So all operators, the CDI and other interfaces associated to the domain expertise and teaching strategies will be unified using FRAME representation form.

Keywords: dialogue, e-learning, FRAME, information system, natural language

Procedia PDF Downloads 376
11600 The Architecture, Engineering and Construction(AEC)New Paradigm Shift: Building Information Modelling Trend in the United Arab Emirates

Authors: Salem B. Abdalla

Abstract:

This study investigated the current Building Information Modelling (BIM) trends and practices in the UAE, particularly to shed light on a recently circulated Dubai BIM mandate. Two sets of surveys were mailed to the AEC industry and the corresponding academic sector within the UAE to collect up-to-date data on BIM awareness and utilization. The surveys showed startling results concerning the academic sector in the UAE where almost 70% of respondents were not aware of the BIM mandate. Among the rest, even when aware, the majority of mechanical and electrical engineering schools felt that BIM is not pertinent to their discipline. Therefore, the response to offering BIM in their curriculum was substantially low (35%). On the other hand, the industrial survey identified a large majority (76.5%) of the AEC industry in the UAE are using BIM. The results clearly indicate that the academia should include BIM in their curriculum to produce qualified graduates to support the market. However, the academia is also faced with several obstacles to implement BIM in their curriculum, where the main pretext is that there is “no room for new courses in existing curriculum”.

Keywords: building information modeling, BIM adoption, UAE BIM industry survey, UAE BIM academia survey, Dubai BIM mandate, UK BIM mandate, BIM education, architecture education, engineering schools, BIM implementation, BIM curriculum

Procedia PDF Downloads 414
11599 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 170
11598 Information Technology Governance Implementation and Its Determinants in the Egyptian Market

Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb

Abstract:

Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.

Keywords: effective IT governance, Egyptian market, information security, risk controls

Procedia PDF Downloads 165
11597 The Relationship between Market Orientation, Human Resource Management, Adoption of Information Communication Technology, Performance of Small and Medium Enterprises and Mediating Cash Management

Authors: Azizah Hashim, Rohana Ngah

Abstract:

Transformation of Economic Development is aimed to transform Malaysia to become a high-income developed nation with a knowledge-based economy by 2020. To achieve this national agenda, the country needs to further strengthen its economic development, growth and well-being. Therefore, this study aspires to examine the relationship between market orientation, human resource management and adoption of information communication technology and SMEs performance and cash management as a mediator. This study will employ quantitative approaches. Questionnaires will be distributed to managers and owners in service sectors. The data collected will be analyzed using SPSS and Structural Equation Modelling. Resource Based Theory (RBT) adopts as an integral part of management literature that explains the performance of organizations through building resources and implement of their strategies.

Keywords: small medium enterprises (SMEs), market orientation, human resource management, adoption of information communication technology

Procedia PDF Downloads 277
11596 Methodological Support for Teacher Training in English Language

Authors: Comfort Aina

Abstract:

Modern English, as we all know it to be a foreign language to many, will require training and re-training on the path of the teacher and learners alike. As a teacher, you cannot give that which you do not have. Teachers, many of whom are non-native speakers, are required to be competent in solving problems occurring in the teaching and learning processes. They should be conscious of up to date information about new approaches, methods, techniques as well as they should be capable in the use of information and communication technology (ICT) and, of course, should work on the improvement of their language components and competence. For teachers to be successful in these goals, they need to be encouraged and motivated. So, for EFL teachers to be successful, they are enrolled to in-service teacher training, ICT training, some of the training they undergo and the benefits accrued to it will be the focus of the paper.

Keywords: training, management, method, english language, EFL teachers

Procedia PDF Downloads 113
11595 Research on Contract's Explicit Incentive and Reputation's Implicit Incentive Mechanism towards Construction Contractors

Authors: Li Ma, Meishuang Ma, Mengying Huang

Abstract:

The quality of construction projects reflects the credit and responsibilities of construction contractors for the owners and the whole society. Because the construction contractors master more relevant information about the entrusted engineering project under construction while the owners are in unfavorable position of gaining information, asymmetric information may lead the contractors act against the owners in order to pursue their own interests. Building a powerful motivation mechanism is the key to guarantee investor economic interests and the life and property of users in construction projects. Based on principal-agent theory and game theory, the authors develop relevant mathematical models to analyze and compare the contractor’s utility functions under different combinations of contracts’ explicit incentive mechanism and reputation’s implicit incentive mechanism aiming at finding out the conditions for incentive validity. The research concludes that the most rational motivation way is to combine the explicit and implicit incentive effects of both contracts and reputation mechanism, and puts forth some measures for problems on account of China’s current situation.

Keywords: construction contractors, contract, reputation, incentive mechanism

Procedia PDF Downloads 508
11594 A Multi Sensor Monochrome Video Fusion Using Image Quality Assessment

Authors: M. Prema Kumar, P. Rajesh Kumar

Abstract:

The increasing interest in image fusion (combining images of two or more modalities such as infrared and visible light radiation) has led to a need for accurate and reliable image assessment methods. This paper gives a novel approach of merging the information content from several videos taken from the same scene in order to rack up a combined video that contains the finest information coming from different source videos. This process is known as video fusion which helps in providing superior quality (The term quality, connote measurement on the particular application.) image than the source images. In this technique different sensors (whose redundant information can be reduced) are used for various cameras that are imperative for capturing the required images and also help in reducing. In this paper Image fusion technique based on multi-resolution singular value decomposition (MSVD) has been used. The image fusion by MSVD is almost similar to that of wavelets. The idea behind MSVD is to replace the FIR filters in wavelet transform with singular value decomposition (SVD). It is computationally very simple and is well suited for real time applications like in remote sensing and in astronomy.

Keywords: multi sensor image fusion, MSVD, image processing, monochrome video

Procedia PDF Downloads 570
11593 Protection of Patients and Staff in External Beam Radiotherapy Using Linac in Kenya

Authors: Calvince Okome Odeny

Abstract:

There is a current action to increase radiotherapy services in Kenya. The National government of Kenya, in collaboration with the county governments, has embarked on building radiotherapy centers in all 47 regions of the country. As these new centers are established in Kenya, it has to be ensured that minimum radiation safety standards are in place prior to operation. For full implementation of this, it is imperative that more Research and training for regulators are done on radiation protection, and safety and national regulatory infrastructure is geared towards ensuring radiation protection and safety in all aspects of the use of external radiotherapy practices. The present work aims at reviewing the level of protection and safety for patients and staff during external beam radiotherapy using Linac in Kenya and provides relevant guidance to improve protection and safety. A retrospective evaluation was done to verify whether those occupationally exposed workers and patients are adequately protected from the harmful effect of radiation exposure during the treatment procedures using Linac. The project was experimental Research, also including an analysis of resource documents obtained from the literature and international organizations. The critical findings of the work revealed that the key elements of protection of occupationally exposed workers and patients include a comprehensive quality Management system governing all planned activities from siting, safety, and design of the Facility, construction, acceptance testing, commissioning, operation, and decommissioning of the Facility; Government empowering the Regulatory Authority to license Medical Linear facilities and to enforce the applicable regulations to ensure adequate protection; A comprehensive Radiation Protection and Safety program must be established to ensure adequate safety and protection of workers and patients during treatment planning and treatment delivery of patients and categories of staff associated with the Facility must be well educated and trained to perform professionally with a commitment to sound safety culture. Relevant recommendations from the findings are shared with the Medical Linear Accelerator facilities and the regulatory authority to provide guidance and continuous improvement of protection and safety to improve regulatory oversight.

Keywords: oncology, radiotherapy, protection, staff

Procedia PDF Downloads 75
11592 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 389
11591 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 99
11590 Healthcare Providers’ Perception Towards Utilization of Health Information Applications and Its Associated Factors in Healthcare Delivery in Health Facilities in Cape Coast Metropolis, Ghana

Authors: Richard Okyere Boadu, Godwin Adzakpah, Nathan Kumasenu Mensah, Kwame Adu Okyere Boadu, Jonathan Kissi, Christiana Dziyaba, Rosemary Bermaa Abrefa

Abstract:

Information and communication technology (ICT) has significantly advanced global healthcare, with electronic health (e-Health) applications improving health records and delivery. These innovations, including electronic health records, strengthen healthcare systems. The study investigates healthcare professionals' perceptions of health information applications and their associated factors in the Cape Coast Metropolis of Ghana's health facilities. Methods: We used a descriptive cross-sectional study design to collect data from 632 healthcare professionals (HCPs), in the three purposively selected health facilities in the Cape Coast municipality of Ghana in July 2022. Shapiro-Wilk test was used to check the normality of dependent variables. Descriptive statistics were used to report means with corresponding standard deviations for continuous variables. Proportions were also reported for categorical variables. Bivariate regression analysis was conducted to determine the factors influencing the Benefits of Information Technology (BoIT); Barriers to Information Technology Use (BITU); and Motives of Information Technology Use (MoITU) in healthcare delivery. Stata SE version 15 was used for the analysis. A p-value of less than 0.05 served as the basis for considering a statistically significant accepting hypothesis. Results: Healthcare professionals (HCPs) generally perceived moderate benefits (Mean score (M)=5.67) from information technology (IT) in healthcare. However, they slightly agreed that barriers like insufficient computers (M=5.11), frequent system downtime (M=5.09), low system performance (M=5.04), and inadequate staff training (M=4.88) hindered IT utilization. Respondents slightly agreed that training (M=5.56), technical support (M=5.46), and changes in work procedures (M=5.10) motivated their IT use. Bivariate regression analysis revealed significant influences of education, working experience, healthcare profession, and IT training on attitudes towards IT utilization in healthcare delivery (BoIT, BITU, and MoITU). Additionally, the age of healthcare providers, education, and working experience significantly influenced BITU. Ultimately, age, education, working experience, healthcare profession, and IT training significantly influenced MoITU in healthcare delivery. Conclusions: Healthcare professionals acknowledge moderate benefits of IT in healthcare but encounter barriers like inadequate resources and training. Motives for IT use include staff training and support. Bivariate regression analysis shows education, working experience, profession, and IT training significantly influence attitudes toward IT adoption. Targeted interventions and policies can enhance IT utilization in the Cape Coast Metropolis, Ghana.

Keywords: health information application, utilization of information application, information technology use, healthcare

Procedia PDF Downloads 64
11589 Human Capital Development: A Pivotal for Sustainable Development in Developing Countries

Authors: Yusuf Ismaila

Abstract:

The developing countries are characterized by inefficient production systems and unequal distribution of wealth. Developing countries are largely populated, yet under developed. This can be attributed partly to the unplanned efforts towards the development of human capital through education and training. In the developed nations a huge attention is accorded to indices such as life expectancy, literacy, infant mortality, education, and the efficient delivery of social services. This is the reason why many developing countries have been scored low by the United Nations in terms of its human development indicators. The population growth continued to expand far beyond the rate of economic growth, a situation that gave rise to increasing poverty. This paper examines the effect of selected human development indicators on the economic development. Thus human capital development is one of the fundamental solutions to enter the international arena. Both quantitative and qualitative analyses were used to demonstrate the effect of selected human capital indices and related literatures were also reviewed for exposition of the human capital concept. It was found that there are no conscious efforts in human capital planning. This has therefore resulted to continuing dwindling of production system and poverty. Recommendations made to redress the situation include that human capital development should be planned and adequately funded in line with the needs of the economy and by applying international standards. Specifically, developing countries must invest necessary resources in developing human capital which tend to have a great impact on sustainable development. Information about the labour market should improve while government policy should favour labour mobility. HCD strategy must focus on improving the skills of the workforce, reducing the cost of doing business and making available the resources business needs to compete and thrive in a fast globalizing economy. There should be regular interaction of planners, employers and builders of human capital to facilitate the process of meaningful national development.

Keywords: economic development, human capital, economic growth, developing countries

Procedia PDF Downloads 431
11588 Assessing Adoption Trends of Mukau (Melia volkensii (Gürke)) Enterprises in Eastern and Coastal Regions of Kenya

Authors: Lydia Murugi Mugendi

Abstract:

The promotion of tree growing as a lucrative enterprise is the focus of this paper as management practices have shifted focus from protection of natural forest resources to community/government partnerships with the aim of resource conservation, management and increase of on-farm tree growing. Using KEFRI as (the source) of information pertaining Melia volkensii (the medium or message) being transferred, this paper investigates the current perception towards forestry and the behavioural attitudes of recipients of forest intervention activities. The two objectives explored in this paper are to find out the level of adoption of Mukau in Kitui, Kibwezi and Samburu/Taru and secondly, to find out the characteristics of the adoption process between Kitui, Kibwezi and Samburu/Taru. The methodologies used during data collection were participatory rural appraisal tools in conjunction with the social survey questionnaires. Simple random sampling and snowball sampling were used to identify respondents within the three target sites and analysis was done using SPSS. Results of the study of indicating that adoption rates of the Mukau in Samburu/Taru, where forestry-related activities were introduced within the past one decade had significantly increase despite initial resistance. The other areas, which had benefited from numerous decades of intense forestry extension projects and activities, indicated a decline in re-adoption rates of Mukau as an enterprise. This study has brought out the reality of adoption trends and state of Mukau population within the three counties while providing a glimpse towards the communities’ perception in regards to adoption of forestry and other environmental innovations. The outcome of the study is to provide a guideline for extension/ dissemination officers in KEFRI and related stakeholders to promote seamless cohesive interaction between the recipient communities of the proposed interventions.

Keywords: adoption, innovation, enterprise, extension, DOI Theory

Procedia PDF Downloads 111
11587 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain

Authors: M. Pushparani, A. Sagaya

Abstract:

Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.

Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems

Procedia PDF Downloads 283
11586 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 306
11585 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 370
11584 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 298
11583 Socio Economic Deprivation, Institutional Outlay and the Intent of Mobile Snatching and Street Assaults in Pakistan

Authors: Asad Salahuddin

Abstract:

Crime rates seem to be severely augmenting over the past several years in Pakistan which has perpetuated concerns as to what, when and how this upsurge will be eradicated. State institutions are posed to be in utmost perplexity, given the enormity of worsening law and order situation, compelling government on the flip side to expend more resources in strengthening institutions to confront crime, whereas, the economy has been confronted with massive energy crisis, mass unemployment and considerable inflation which has rendered most of the people into articulate apprehension as to how to satisfy basic necessities. A framework to investigate the variability in the rising street crimes, as affected by social and institutional outcomes, has been established using a cross-sectional study. Questionnaire, entailing 7 sections incorporating numerous patterns of behavior and history of involvement in different crimes for potential street criminals was observed as data collection instrument. In order to specifically explicate the intent of street crimes on micro level, various motivational and de-motivational factors that stimulate people to resort to street crimes were scrutinized. Intent of mobile snatching and intent of street assault as potential dependent variables were examined using numerous variables that influence the occurrence and intent of these crimes using ordered probit along with ordered logit and tobit as competing models. Model Estimates asserts that intent of mobile snatching has been significantly enhanced owing to perceived judicial inefficiency and lower ability of police reforms to operate effectively, which signifies the inefficiency of institutions that are entitled to deliver justice and maintaining law and order respectively. Whereas, intent of street assaults, as an outcome, affirms that people with lack of self-stability and severe childhood punishments were more tempted to be involved in violent acts. Hence, it is imperative for government to render better resources in form of training, equipment and improved salaries to police and judiciary in order to enhance their abilities and potential to curb inflating crime.

Keywords: deprivation, street assault, self control, police reform

Procedia PDF Downloads 427