Search results for: threat information sharing
9831 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.Keywords: discrete wavelet transforms, AES, dynamic SBox
Procedia PDF Downloads 4349830 Using Data from Foursquare Web Service to Represent the Commercial Activity of a City
Authors: Taras Agryzkov, Almudena Nolasco-Cirugeda, Jose L. Oliver, Leticia Serrano-Estrada, Leandro Tortosa, Jose F. Vicent
Abstract:
This paper aims to represent the commercial activity of a city taking as source data the social network Foursquare. The city of Murcia is selected as case study, and the location-based social network Foursquare is the main source of information. After carrying out a reorganisation of the user-generated data extracted from Foursquare, it is possible to graphically display on a map the various city spaces and venues –especially those related to commercial, food and entertainment sector businesses. The obtained visualisation provides information about activity patterns in the city of Murcia according to the people`s interests and preferences and, moreover, interesting facts about certain characteristics of the town itself.Keywords: social networks, spatial analysis, data visualization, geocomputation, Foursquare
Procedia PDF Downloads 4279829 Mental Disorders and Physical Illness in Geriatric Population
Authors: Vinay Kumar, M. Kishor, Sathyanarayana Rao Ts
Abstract:
Background: Growth of elderly people in the general population in recent years is termed as ‘greying of the world’ where there is a shift from high mortality & fertility to low mortality and fertility, resulting in an increased proportion of older people as seen in India. Improved health care promises longevity but socio-economic factors like poverty, joint families and poor services pose a psychological threat. Epidemiological data regarding the prevalence of mental disorders in geriatric population with physical illness is required for proper health planning. Methods: Sixty consecutive elderly patients aged 60 years or above of both sexes, reporting with physical illness to general outpatient registration counter of JSS Medical College and Hospital, Mysore, India, were considered for the Study. With informed consent, they were screened with General Health Questionnaire (GHQ-12) and were further evaluated for diagnosing mental disorders according to WHO International Classification of Diseases (ICD-10) criteria. Results: Mental disorders were detected in 48.3%, predominantly depressive disorders, nicotine dependence, generalized anxiety disorder, alcohol dependence and least was dementia. Most common physical illness was cardiovascular disease followed by metabolic, respiratory and other diseases. Depressive disorders, substance dependence and dementia were more associated with cardiovascular disease compared to metabolic disease and respiratory diseases were more associated with nicotine dependence. Conclusions: Depression and Substance use disorders among elderly population is of concern, which needs to be further studied with larger population. Psychiatric morbidity will adversely have an impact on physical illness which needs proper assessment and management. This will enhance our understanding and prioritize our planning for future.Keywords: Geriatric, mental disorders, physical illness, psychiatry
Procedia PDF Downloads 2879828 Power Grid Line Ampacity Forecasting Based on a Long-Short-Term Memory Neural Network
Authors: Xiang-Yao Zheng, Jen-Cheng Wang, Joe-Air Jiang
Abstract:
Improving the line ampacity while using existing power grids is an important issue that electricity dispatchers are now facing. Using the information provided by the dynamic thermal rating (DTR) of transmission lines, an overhead power grid can operate safely. However, dispatchers usually lack real-time DTR information. Thus, this study proposes a long-short-term memory (LSTM)-based method, which is one of the neural network models. The LSTM-based method predicts the DTR of lines using the weather data provided by Central Weather Bureau (CWB) of Taiwan. The possible thermal bottlenecks at different locations along the line and the margin of line ampacity can be real-time determined by the proposed LSTM-based prediction method. A case study that targets the 345 kV power grid of TaiPower in Taiwan is utilized to examine the performance of the proposed method. The simulation results show that the proposed method is useful to provide the information for the smart grid application in the future.Keywords: electricity dispatch, line ampacity prediction, dynamic thermal rating, long-short-term memory neural network, smart grid
Procedia PDF Downloads 2859827 Biogenic Amines Production during RAS Cheese Ripening
Authors: Amr Amer
Abstract:
Cheeses are among those high-protein-containing foodstuffs in which enzymatic and microbial activities cause the formation of biogenic amines from amino acids decarboxylation. The amount of biogenic amines in cheese may act as a useful indicator of the hygienic quality of the product. In other words, their presence in cheese is related to its spoilage and safety. Formation of biogenic amines during Ras cheese (Egyptian hard cheese) ripening was investigated for 4 months. Three batches of Ras cheese were manufactured using Egyptian traditional method. From each batch, Samples were collected at 1, 7, 15, 30, 60, 90 and 120 days after cheese manufacture. The concentrations of biogenic amines (Tyramine, Histamine, Cadaverine and Tryptamine) were analyzed by high performance liquid chromatography (HPLC). There was a significant increased (P<0.05) in Tyramine levels from 4.34± 0.07 mg|100g in the first day of storage till reached 88.77± 0.14 mg|100g at a 120-day of storage. Also, Histamine and Cadaverine levels had the same increased pattern of Tyramine reaching 64.94± 0.10 and 28.28± 0.08 mg|100g in a 120- day of storage, respectively. While, there was a fluctuation in the concentration of Tryptamine level during ripening period as it decreased from 3.24± 0.06 to 2.66± 0.11 mg|100g at 60-day of storage then reached 5.38±0.08 mg|100g in a 120- day of storage. Biogenic amines can be formed in cheese during production and storage: many variables, as pH, salt concentration, bacterial activity as well as moisture, storage temperature and ripening time, play a relevant role in their formation. Comparing the obtained results with the recommended standard by Food and Drug Administration "FDA" (2001), High levels of biogenic amines in various Ras cheeses consumed in Egypt exceeded the permissible value (10 mg%) which seemed to pose a threat to public health. In this study, presence of high concentrations of biogenic amines (Tyramine, Histamine, cadaverine and Tryptamine) in Egyptian Ras cheeses reflects the bad hygienic conditions under which they produced and stored. Accordingly, the levels of biogenic amines in different cheeses should be come in accordance with the safe permissible limit recommended by FDA to ensure human safety.Keywords: Ras cheese, biogenic amines, tyramine, histamine, cadaverine
Procedia PDF Downloads 4379826 XANES Studies on the Oxidation States of Copper Ion in Silicate Glass
Authors: R. Buntem, K. Samkongngam
Abstract:
The silicate glass was prepared using rice husk as the source of silica. The base composition of glass sample is composed of SiO2 (from rice husk ash), Na2CO3, K2CO3, ZnO, H3BO3, CaO, Al2O3 or Al, and CuO. Aluminum is used in place of Al2O3 in order to reduce Cu2+ to Cu+. The red color of Cu2O in the glass matrix was observed when the Al was added into the glass mixture. The expansion coefficients of the copper doped glass are in the range of 1.2 x 10-5-1.4x10-5 (ºC -1) which is common for the silicate glass. The finger prints of the bond vibrations were studied using IR spectroscopy. While the oxidation state and the coordination information of the copper ion in the glass matrix were investigated using X-ray absorption spectroscopy. From the data, Cu+ and Cu2+ exist in the glass matrix. The red particles of Cu2O can be formed in the glass matrix when enough aluminum was added.Keywords: copper in glass, coordination information, silicate glass, XANES spectrum
Procedia PDF Downloads 2639825 Partner Selection in International Strategic Alliances: The Case of the Information Industry
Authors: H. Nakamura
Abstract:
This study analyzes international strategic alliances in the information industry. The purpose of this study is to clarify the strategic intention of an international alliance. Secondly, it investigates the influence of differences in the target markets of partner companies on alliances. Using an international strategy theory approach to analyze the global strategies of global companies, the study compares a database business and an electronic publishing business. In particular, these cases emphasized factors attributable to "people" and "learning", reliability and communication between organizations and the evolution of the IT infrastructure. The theory evolved in this study validates the effectiveness of these strategies.Keywords: database business, electronic library, international strategic alliances, partner selection
Procedia PDF Downloads 3729824 Study on the Situation between France and the South China Sea from the Perspective of Balance of Power Theory
Authors: Zhenyi Chen
Abstract:
With the rise of China and the escalation of tension between China and the United States, European countries led by Great Britain, France, and Germany pay increasing attention to the regional situation in the Asia-Pacific (now known as "Indo-Pacific"). Among them, the South China Sea (SCS) is one of the main areas disputed by China, the United States, Southeast Asian countries and some European countries. Western countries are worried that the rise of China's military power will break the stability of the situation in SCS and alter the balance of power among major powers. Therefore, they tried to balance China's rise through alliance. In France's Indo-Pacific strategy, France aims to build a regional order with the alliance of France, India and Australia as the core, and regularly carry out military exercises targeting SCS with the United States, Japan and Southeast Asian countries. For China, the instability of the situation in SCS could also threaten the security of the southeast coastal areas and Taiwan, affect China's peaceful development process, and pose a threat to China's territorial sovereignty. This paper aims to study the activities and motivation of France in the South China Sea, and put the situation in SCS under the perspective of Balance of Power Theory, focusing on China, America and France. To be more specific, this paper will first briefly introduce Balance of Power Theory, then describe the new trends of France in recent years, followed with the analysis on the motivation of the increasing trend of France's involvement in SCS, and finally analyze the situation in SCS from the perspective of "balance of power" theory. It will be argued that great powers are carefully maintaining the balance of military power in SCS, and it is highly possible that this trend would still last in the middle and long term, particularly via military deployment and strategic alliances.Keywords: South China Sea, France, China, balance of power theory, Indo-Pacific
Procedia PDF Downloads 1769823 Sustainable Approach to Fabricate Titanium Nitride Film on Steel Substrate by Using Automotive Plastics Waste
Authors: Songyan Yin, Ravindra Rajarao, Veena Sahajwalla
Abstract:
Automotive plastics waste (widely known as auto-fluff or ASR) is a complicated mixture of various plastics incorporated with a wide range of additives and fillers like titanium dioxide, magnesium oxide, and silicon dioxide. Automotive plastics waste is difficult to recycle and its landfilling poses the significant threat to the environment. In this study, a sustainable technology to fabricate protective nanoscale TiN thin film on a steel substrate surface by using automotive waste plastics as titanium and carbon resources is suggested. When heated automotive plastics waste with steel at elevated temperature in a nitrogen atmosphere, titanium dioxide contented in ASR undergo carbothermal reduction and nitridation reactions on the surface of the steel substrate forming a nanoscale thin film of titanium nitride on the steel surface. The synthesis of TiN film on steel substrate under this technology was confirmed by X-ray photoelectron spectrometer, high resolution X-ray diffraction, field emission scanning electron microscope, a high resolution transmission electron microscope fitted with energy dispersive X-ray spectroscopy, and inductively coupled plasma mass spectrometry techniques. This sustainably fabricated TiN film was verified of dense, well crystallized and could provide good oxidation resistance to the steel substrate. This sustainable fabrication technology is maneuverable, reproducible and of great economic and environmental benefit. It not only reduces the fabrication cost of TiN coating on steel surface, but also provides a sustainable environmental solution to recycling automotive plastics waste. Moreover, high value copper droplets and char residues were also extracted from this unique fabrication process.Keywords: automotive plastics waste, carbonthermal reduction and nitirdation, sustainable, TiN film
Procedia PDF Downloads 3969822 An Empirical Investigation on the Dynamics of Knowledge and IT Industries in Korea
Authors: Sang Ho Lee, Tae Heon Moon, Youn Taik Leem, Kwang Woo Nam
Abstract:
Knowledge and IT inputs to other industrial production have become more important as a key factor for the competitiveness of national and regional economies, such as knowledge economies in smart cities. Knowledge and IT industries lead the industrial innovation and technical (r)evolution through low cost, high efficiency in production, and by creating a new value chain and new production path chains, which is referred as knowledge and IT dynamics. This study aims to investigate the knowledge and IT dynamics in Korea, which are analyzed through the input-output model and structural path analysis. Twenty-eight industries were reclassified into seven categories; Agriculture and Mining, IT manufacture, Non-IT manufacture, Construction, IT-service, Knowledge service, Non-knowledge service to take close look at the knowledge and IT dynamics. Knowledge and IT dynamics were analyzed through the change of input output coefficient and multiplier indices in terms of technical innovation, as well as the changes of the structural paths of the knowledge and IT to other industries in terms of new production value creation from 1985 and 2010. The structural paths of knowledge and IT explain not only that IT foster the generation, circulation and use of knowledge through IT industries and IT-based service, but also that knowledge encourages IT use through creating, sharing and managing knowledge. As a result, this paper found the empirical investigation on the knowledge and IT dynamics of the Korean economy. Knowledge and IT has played an important role regarding the inter-industrial transactional input for production, as well as new industrial creation. The birth of the input-output production path has mostly originated from the knowledge and IT industries, while the death of the input-output production path took place in the traditional industries from 1985 and 2010. The Korean economy has been in transition to a knowledge economy in the Smart City.Keywords: knowledge and IT industries, input-output model, structural path analysis, dynamics of knowledge and it, knowledge economy, knowledge city and smart city
Procedia PDF Downloads 3359821 Nutritionists' Perspective on the Conception of a Telenutrition Platform for Diabetes Care: Qualitative Study
Authors: Choumous Mannoubi, Dahlia Kairy, Brigitte Vachon
Abstract:
The use of technology allows clinicians to provide an individualized approach in a cost-effective manner and to reach a broader client base more easily. Such interventions can be effective in ensuring self-management and follow-up of people with diabetes, reducing the risk of complications by improving accessibility to care services, and better adherence to health recommendations. Consideration of users' opinions and fears to inform the design and implementation stages of these telehealth services seems to be essential to improve their acceptance and usability. The objective of this study is to describe the telepractice of nutritionists supporting the therapeutic management of diabetic patients and document the functional requirements of nutritionists for the design of a tele-nutrition platform. To best identify the requirements and constraints of nutritionists, we conducted individual semi-structured interviews with 10 nutritionists who offered tele-nutrition services. Using a qualitative design with a descriptive approach based on the Nutrition Care Process Model (mNCP) framework, we explored in depth the state of nutritionists' telepractice in public and private health care settings, as well as their requirements for teleconsultation. Qualitative analyses revealed that nutritionists primarily used telephone calls during the COVID 19 pandemic to provide teleconsultations. Nutritionists identified the following important features for the design of a tele-nutrition platform: it should support interprofessional collaboration, allow for the development and monitoring of a care plan, integrate with the existing IT environment, be easy to use, accommodate different levels of patient literacy, and allow for easy sharing of educational materials to support nutrition education.Keywords: telehealth, nutrition, diabetes, telenutrition, teleconsultation, telemonitoring
Procedia PDF Downloads 1369820 Green Logistics Management and Performance for Thailand’s Logistic Enterprises
Authors: Kittipong Tissayakorn, Fumio Akagi, Yu Song
Abstract:
Logistics is the integrated management of all of the activities required to move products through the supply chain. For a typical product, this supply chain extends from a raw material source through the production and distribution system to the point of consumption and the associated reverse logistics. The logistical activities are comprised of freight transport, storage, inventory management, materials handling and all related information processing. This paper analyzes the green management system of logistics enterprise for Thailand and advances the concept of Green Logistics, which should be held by the public. In addition, it proposes that the government should strengthen its supervision and support for green logistics, and companies should construct self-disciplined green logistics management systems and corresponding processes, a reverse logistics management system and a modern green logistics information collection and management system.Keywords: logistics, green logistics, management system, ecological economics
Procedia PDF Downloads 4089819 A Structuring and Classification Method for Assigning Application Areas to Suitable Digital Factory Models
Authors: R. Hellmuth
Abstract:
The method of factory planning has changed a lot, especially when it is about planning the factory building itself. Factory planning has the task of designing products, plants, processes, organization, areas, and the building of a factory. Regular restructuring is becoming more important in order to maintain the competitiveness of a factory. Restrictions in new areas, shorter life cycles of product and production technology as well as a VUCA world (Volatility, Uncertainty, Complexity and Ambiguity) lead to more frequent restructuring measures within a factory. A digital factory model is the planning basis for rebuilding measures and becomes an indispensable tool. Furthermore, digital building models are increasingly being used in factories to support facility management and manufacturing processes. The main research question of this paper is, therefore: What kind of digital factory model is suitable for the different areas of application during the operation of a factory? First, different types of digital factory models are investigated, and their properties and usabilities for use cases are analysed. Within the scope of investigation are point cloud models, building information models, photogrammetry models, and these enriched with sensor data are examined. It is investigated which digital models allow a simple integration of sensor data and where the differences are. Subsequently, possible application areas of digital factory models are determined by means of a survey and the respective digital factory models are assigned to the application areas. Finally, an application case from maintenance is selected and implemented with the help of the appropriate digital factory model. It is shown how a completely digitalized maintenance process can be supported by a digital factory model by providing information. Among other purposes, the digital factory model is used for indoor navigation, information provision, and display of sensor data. In summary, the paper shows a structuring of digital factory models that concentrates on the geometric representation of a factory building and its technical facilities. A practical application case is shown and implemented. Thus, the systematic selection of digital factory models with the corresponding application cases is evaluated.Keywords: building information modeling, digital factory model, factory planning, maintenance
Procedia PDF Downloads 1119818 Caped Intervention: A Single Country Comparative Study of the Role of Russia in Its Involvement in the Crimean Crisis 2014
Authors: Katrina Angeline Santos, Francis Mark Fernandez, Francheska Esmao
Abstract:
Intervention is defined as a forcible interference by a state or states with power in the affairs of another state using force or the threat of force. On the other hand, a military intervention is an intervention, specifically used to define an intervention which uses force. With these, the authors realized a lack in the concept of intervention wherein it is an invited one.The authors wrote this paper to introduce a concept of intervention wherein the intervening state is offering assistance to the state in crisis which asked for one. The authors decided to make a contextual description of this phenomenon because of the lack of concepts regarding intervention between the idea of a single state performing a ‘heroic’ role of intervening in the crisis of another state. The problem that the authors would like to address is regarding the lack of availability in the concept of intervention wherein the state in crisis is seeking the assistance of another state. The authors utilized a contextual description approach to the study through the descriptive presentation of the series of events, by utilizing the news articles and news reports published, which happened in Ukraine and Crimea. This concept is further demonstrated through the utilization of a conceptual framework which shows the mutual relationship between the states. From the analysis of the behavior of Russia and its role in the Crimean Crisis 2014, the authors are able to coin the term, 'Caped Intervention' to describe an intervention of a state as a response to the invitation of assistance of a state in crisis in order for them to achieve their goals. This concept entails a mutual relationship between an intervening state and a sate in crisis. The concept of Caped Intervention describes the role of Russia as a Caped State or an intervening state observed through its action towards Crimea. This concept will help in the observation of the behavior of actors or states in events such as this. It will further help in analyzing the actors’ role in intervention by making it possible to classify the intervening acts into another concept.Keywords: assistance, caped intervention, crisis, heroic
Procedia PDF Downloads 3139817 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 2769816 Customer Satisfaction for Integrated Marketing Communication in Department Store Chiang Mai Province
Authors: Teerapong Chaisen, Pornpan Puttaraksa, Chayanit Chitchai, Peeraya Somsak, Rinyaphat Kecharananta
Abstract:
This paper aims to study integrated marketing communication (IMC) of department store in Chiang Mai with the object to understand how department stores manage communication in order to inform customer and how customers react to the received information. We study the example of 300 customers both Thai and foreigners who received the given information from the department stores and the reactions of these customers. This paper shows Central festival is the top destination to visit for Thai customers. On the other hand, Central Plaza is favored by foreign customers. However, all department stores need to use more IMC to make awareness for customer.Keywords: integrated marketing communication, satisfaction, department store, consumer
Procedia PDF Downloads 3219815 Indonesian Food Safety Policy for Local Commodity against ASEAN Economic Community: An Uneven Battle in the Global War
Authors: Wahyu Riawanti
Abstract:
Food safety is the one of a prominent issue for globalization era. The more concern is paid in international food and agriculture trade; the more consumers will consider raising the standard of food safety. For this reason, the role of the issue is not only in term of added value but since then also the main requirement in import export activity, including agriculture products. Unfortunately, Indonesia and other developing countries found it difficult to fulfill some of the technical issues and end it up with the lower export activity. In this case, the technical requirements of food safety become an obstacle rather than challenging. Furthermore for local farmers’ activity, food safety is more or less a threat. The study is aimed to reveal on how Indonesian government had dealt with the certification regulation to face problem on competitiveness of Indonesian products. Local government has conducted the regulation of food certification. The study used the case of Salak Pondoh fruit (Salacca zalacca) certification process on Sleman District- Yogyakarta. Triangulation method was used to analyze the effectiveness of the certification program. The quantitative data series taken from 7 farmer groups during the certification processes were used for the research main data. The supporting qualitative data was obtained from in-depth interview with the members of farmers group. The pre-research result has shown that the impact varied from different groups. Conclusively the certification regulation has partly failed to make a significant change in local farmers’ competitiveness. Even the profit was increased, the highly amount budget of the program did not significantly increase the economic incentives for local farmers.Keywords: economic incentive, food security, government regulation, international trade, local commodity, Salacca zalacca
Procedia PDF Downloads 2779814 Expectation-Confirmation Model of Information System Continuance: A Meta-Analysis
Authors: Hui-Min Lai, Chin-Pin Chen, Yung-Fu Chang
Abstract:
The expectation-confirmation model (ECM) is one of the most widely used models for evaluating information system continuance, and this model has been extended to other study backgrounds, or expanded with other theoretical perspectives. However, combining ECM with other theories or investigating the background problem may produce some disparities, thus generating inaccurate conclusions. Habit is considered to be an important factor that influences the user’s continuance behavior. This paper thus critically examines seven pairs of relationships from the original ECM and the habit variable. A meta-analysis was used to tackle the development of ECM research over the last 10 years from a range of journals and conference papers published in 2005–2014. Forty-six journal articles and 19 conference papers were selected for analysis. The results confirm our prediction that a high effect size for the seven pairs of relationships was obtained (ranging from r=0.386 to r=0.588). Furthermore, a meta-analytic structural equation modeling was performed to simultaneously test all relationships. The results show that habit had a significant positive effect on continuance intention at p<=0.05 and that the six other pairs of relationships were significant at p<0.10. Based on the findings, we refined our original research model and an alternative model was proposed for understanding and predicting information system continuance. Some theoretical implications are also discussed.Keywords: Expectation-confirmation theory, Expectation-confirmation model, Meta-analysis, meta-analytic structural equation modeling.
Procedia PDF Downloads 3099813 Entropy Analysis in a Bubble Column Based on Ultrafast X-Ray Tomography Data
Authors: Stoyan Nedeltchev, Markus Schubert
Abstract:
By means of the ultrafast X-ray tomography facility, data were obtained at different superficial gas velocities UG in a bubble column (0.1 m in ID) operated with an air-deionized water system at ambient conditions. Raw reconstructed images were treated by both the information entropy (IE) and the reconstruction entropy (RE) algorithms in order to identify the main transition velocities in a bubble column. The IE values exhibited two well-pronounced minima at UG=0.025 m/s and UG=0.085 m/s identifying the boundaries of the homogeneous, transition and heterogeneous regimes. The RE extracted from the central region of the column’s cross-section exhibited only one characteristic peak at UG=0.03 m/s, which was attributed to the transition from the homogeneous to the heterogeneous flow regime. This result implies that the transition regime is non-existent in the core of the column.Keywords: bubble column, ultrafast X-ray tomography, information entropy, reconstruction entropy
Procedia PDF Downloads 3959812 Analysis of Business Intelligence Tools in Healthcare
Authors: Avishkar Gawade, Omkar Bansode, Ketan Bhambure, Bhargav Deore
Abstract:
In recent year wide range of business intelligence technology have been applied to different area in order to support decision making process BI enables extraction of knowledge from data store. BI tools usually used in public health field for financial and administrative purposes.BI uses a dashboard in presentation stage to deliver information to information to end users.In this paper,we intend to analyze some open source BI tools on the market and their applicability in the clinical sphere taking into consideration the general characteristics of the clinical environment.A pervasive BI platform was developed using a real case in order to prove the tool viability.Analysis of various BI Tools in done with the help of several parameters such as data security,data integration,data quality reporting and anlaytics,performance,scalability and cost effectivesness.Keywords: CDSS, EHR, business intelliegence, tools
Procedia PDF Downloads 1389811 Enablers and Inhibitors of Effective Waste Management Measures in Informal Settlements in South Africa: A Case of Alaska
Authors: Lynda C. Mbadugha, Bankole Awuzie, Kwanda Khumalo, Lindokuhle Matsebula, Masenoke Kgaditsi
Abstract:
Inadequate waste management remains a fundamental issue in the majority of cities around the globe, but it becomes a threat when it concerns informal settlements. Although studies have evaluated the performance of waste management measures, only a few have addressed that with a focus on South African informal settlements and the reasons for their apparent ineffectiveness in such locations. However, there may be evidence of variations in the extant problems due to the uniqueness of each location and the factors influencing the performance. Thus, there is a knowledge deficit regarding implementing waste management measures in South African informal settlements. This study seeks to evaluate the efficacy of waste management measures in the Alaska informal settlement in South Africa to assess the previously collected data of other areas using the degree of correlation. The research investigated a real-world scenario in the specified location using a case study approach and multiple data sources. The findings described various waste management practices used in Alaska's informal settlements; however, a correlation was found between the performance of these measures and those already used. The observed differences are primarily attributable to the physical characteristics of the locations, the lack of understanding of the environmental and health consequences of careless waste disposal, and the negative attitudes of the residents toward waste management practices. This study elucidates waste management implementation in informal settlements. It contributes to the relevant bodies of knowledge by describing these practices in South Africa. This paper's practical value emphasizes the general waste management characteristics of South Africa's informal settlements to facilitate the planning and provision of necessary interventions. The study concludes that the enablers and inhibitors are mainly political, behavioral, and environmental concerns.Keywords: factors, informal settlement, performance, waste management
Procedia PDF Downloads 979810 Decision Support System for Tourism in Northern Part of Thailand
Authors: Katejarinporn Chaiya, Thawit Janbanklong
Abstract:
The purposes of this study were to design and find users’ satisfaction after using the decision support system for tourism in the Northern part of Thailand, which can provide tourists with touristic information and plan their personal voyage. Such information can be retrieved systematically based on personal budget and provinces. The samples of this study were five experts and users: 30 "white collars" in Bangkok. This decision support system was designed via ASP.NET. Its database was developed by using MySQL, for administrators to effectively manage the database. The application outcome revealed that the innovation works properly as sought in objectives. Specialists and white collars in Bangkok have evaluated the decision support system; the result was satisfactorily positive.Keywords: decision Support System, ASP.NET, MySQL, white collars
Procedia PDF Downloads 3609809 Factors Affecting Online Health Seeking Behaviors in Middle-Income Class Filipino Adults
Authors: Reinzo Vittorio B. Cardenas, Heather Venice L. Abogado, Andrea Therese V. Afable, Rhea D. Avillanoza, Marie Abegail P. Ayagan, Catherine D. Bantayan
Abstract:
As the Internet provides fast and reliable health-related information, the tendency to self-diagnose increases to further understand medical jargon in a diagnosis with a physician and decreases costly consultation fees. The study aimed to explore and understand the factors affecting online health-seeking behaviors in middle-income class adults in Metro Manila. The study was conducted from March to April of 2021 with a sample size of 200 individuals aged 20 to 49 years old. The study was delivered via an online survey that used a questionnaire adapted from the research of Lee et al. (2015). Specifically, the survey consisted of three sections: assessing web-based health-seeking behaviors, consultation with health professionals, and participants' hesitancy to consult with physicians, which used a mix of a 5-point Likert-type scale with multiple responses and multiple-choice options. The results showed that the age and educational attainment of the respondents had a negative effect while presenting a positive effect of socio-economic status on health-seeking behavior. Lastly, there was a significant effect of participant’s hesitancy for professional consultation on their health-seeking behavior. The results gleaned from the study indicated that various individual and socio-economic factors might significantly affect one’s health-seeking behaviors. Although hesitancy had a significant effect on the spectrum of health-seeking behaviors, this does not imply that certain factors are specifically related to an individual’s tendency to seek health information. This information instead becomes essential in understanding the patient-physician relationship and giving patients a more holistic treatment.Keywords: health-seeking behavior, health information, Internet, physician consultation
Procedia PDF Downloads 2189808 The Impact of Information and Communication Technology on Bilateral Trade in Goods
Authors: Christina Tay
Abstract:
This paper investigates the impact of Information and Communication Technology (ICT) on bilateral trade in goods. Empirical analysis is performed on the United States and 34 partnering countries from 2000 to 2013. Our econometric model fits the data well, explaining 52% of the variation in trade flows for goods trade, 53.2% of the variation in trade flows for goods export and 48% of the variation in trade flows for goods import. For every 10% increase in fixed broadband Internet subscribers per 100 people increases, goods trade by 7.9% and for every 5% increase in fixed broadband Internet subscribers per 100 people, goods export increases by 11%. For every 1% increase in fixed telephone line penetration per 100 people, goods trade increases by 26.3%, goods export increases by 24.4% and goods import increases by 24.8%. For every 1% increase in mobile-cellular telephone subscriptions, goods trade decreases by 29.6% and goods export decreases by 27.1%, whilst for every 0.01% increase in mobile-cellular telephone subscriptions, goods import decreases by 34.3%. For every 1% increase in the percentage of population who used the Internet from any location in the last 12 months Internet, goods trade increases by 32.5%, goods export increases by 38.9%, goods import increases by 33%. All our trade determinants as well as our ICT variables have significances on goods exports for the US. We can also draw from our study that the US relies more rather heavily on ICT for its goods export compared to goods import.Keywords: bilateral trade, fixed broadband, fixed telephone, goods trade, information and communicative technologies, Internet, mobile-cellular phone
Procedia PDF Downloads 2989807 Avatar Creation for E-Learning
Authors: M. Najib Osman, Hanafizan Hussain, Sri Kusuma Wati Mohd Daud
Abstract:
Avatar was used as user’s symbol of identity in online communications such as Facebook, Twitter, online game, and portal community between unknown people. The development of this symbol is the use of animated character or avatar, which can engage learners in a way that draws them into the e-Learning experience. Immersive learning is one of the most effective learning techniques, and animated characters can help create an immersive environment. E-learning is an ideal learning environment using modern means of information technology, through the effective integration of information technology and the curriculum to achieve, a new learning style which can fully reflect the main role of the students to reform the traditional teaching structure thoroughly. Essential in any e-learning is the degree of interactivity for the learner, and whether the learner is able to study at any time, or whether there is a need for the learner to be online or in a classroom with other learners at the same time (synchronous learning). Ideally, e-learning should engage the learners, allowing them to interact with the course materials, obtaining feedback on their progress and assistance whenever it is required. However, the degree of interactivity in e-learning depends on how the course has been developed and is dependent on the software used for its development, and the way the material is delivered to the learner. Therefore, users’ accessibility that allows access to information at any time and places and their positive attitude towards e-learning such as having interacting with a good teacher and the creation of a more natural and friendly environment for e-learning should be enhanced. This is to motivate their learning enthusiasm and it has been the responsibility of educators to incorporate new technology into their ways of teaching.Keywords: avatar, e-learning, higher education, students' perception
Procedia PDF Downloads 4129806 Morpheme Based Parts of Speech Tagger for Kannada Language
Authors: M. C. Padma, R. J. Prathibha
Abstract:
Parts of speech tagging is the process of assigning appropriate parts of speech tags to the words in a given text. The critical or crucial information needed for tagging a word come from its internal structure rather from its neighboring words. The internal structure of a word comprises of its morphological features and grammatical information. This paper presents a morpheme based parts of speech tagger for Kannada language. This proposed work uses hierarchical tag set for assigning tags. The system is tested on some Kannada words taken from EMILLE corpus. Experimental result shows that the performance of the proposed system is above 90%.Keywords: hierarchical tag set, morphological analyzer, natural language processing, paradigms, parts of speech
Procedia PDF Downloads 2979805 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia
Authors: Rina Arum Prastyanti
Abstract:
Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.Keywords: mobile commerce, legal protection, consumer, effectiveness
Procedia PDF Downloads 3679804 Three Tier Indoor Localization System for Digital Forensics
Authors: Dennis L. Owuor, Okuthe P. Kogeda, Johnson I. Agbinya
Abstract:
Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the implementation of a robust system that is capable of locating, tracking mobile device users and store location information for both indoor and partially outdoor the cloud. The system can be used during disaster to track and locate mobile phone users. The developed system is a mobile application built based on Android, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), JavaScript and MATLAB for the Android mobile users. Using Waterfall model of software development, we have implemented a three level system that is able to track, locate and store mobile device information in secure database (cloud) on almost a real time basis. The outcome of the study showed that the developed system is efficient with regard to the tracking and locating mobile devices. The system is also flexible, i.e. can be used in any building with fewer adjustments. Finally, the system is accurate for both indoor and outdoor in terms of locating and tracking mobile devices.Keywords: indoor localization, digital forensics, fingerprinting, tracking and cloud
Procedia PDF Downloads 3399803 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups
Authors: Reagan Rodriguez
Abstract:
With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.Keywords: identity threat, social psychology, group identity, culture and social mobility
Procedia PDF Downloads 1529802 Impact of Mass Customization for 3D Geographic Information Systems under Turbulent Environments
Authors: Abdo Shabah
Abstract:
Mass customization aims to produce customized goods (allowing economies of scope) at lower cost (to achieve economies of scale) using multiple strategies (modularization and postponement). Through a simulation experiment of organizations under turbulent environment, we aim to compare standardization and mass customization of services and assess the impact of different forms of mass customization (early and late postponement) on performance, quality and consumer satisfaction, on the use of modular dynamic 3D Geographic Information System. Our hypothesis is that mass customization performs better and achieves better quality in turbulent environment than standardization, but only when using early postponement strategies. Using mixed methods study, we try to confirm our hypothesis.Keywords: mass customization, postponement, experiment, performance, quality, satisfaction, 3D GIS
Procedia PDF Downloads 455