Search results for: reliable information
12062 Contrast Enhancement of Masses in Mammograms Using Multiscale Morphology
Authors: Amit Kamra, V. K. Jain, Pragya
Abstract:
Mammography is widely used technique for breast cancer screening. There are various other techniques for breast cancer screening but mammography is the most reliable and effective technique. The images obtained through mammography are of low contrast which causes problem for the radiologists to interpret. Hence, a high quality image is mandatory for the processing of the image for extracting any kind of information from it. Many contrast enhancement algorithms have been developed over the years. In the present work, an efficient morphology based technique is proposed for contrast enhancement of masses in mammographic images. The proposed method is based on Multiscale Morphology and it takes into consideration the scale of the structuring element. The proposed method is compared with other state-of-the-art techniques. The experimental results show that the proposed method is better both qualitatively and quantitatively than the other standard contrast enhancement techniques.Keywords: enhancement, mammography, multi-scale, mathematical morphology
Procedia PDF Downloads 42312061 Opportunities in Self-care Abortion and Telemedicine: Findings from a Study in Colombia
Authors: Paola Montenegro, Maria de los Angeles Balaguera Villa
Abstract:
In February 2022 Colombia achieved a historic milestone in ensuring universal access to abortion rights with ruling C-055 of 2022 decriminalising abortion up to 24 weeks of gestation. In the context of this triumph and the expansion of telemedicine services in the wake of the COVID-19 pandemic, this research studied the acceptability of self-care abortion in young people (13 - 28 years) through a telemedicine service and also explored the primary needs that should be the focus of such care. The results shine light on a more comprehensive understanding of opportunities and challenges of teleabortion practices in a context that combines overall higher access to technology and low access to reliable information of safe abortion, stigma, and scarcity especially felt by transnational migrants, racialised people, trans men and non-binary people. Through a mixed methods approach, this study collected 5.736 responses to a virtual survey disseminated nationwide in Colombia and 47 in-person interviews (24 of them with people who were assigned female at birth and 21 with local key stakeholders in the abortion ecosystem). Quantitative data was analyzed using Stata SE Version 16.0 and qualitative analysis was completed through NVivo using thematic analysis. Key findings of the research suggest that self-care abortion is practice with growing acceptability among young people, but important adjustments must be made to meet quality of care expectations of users. Elements like quick responses from providers, lower costs, and accessible information were defined by users as decisive factors to choose over the abortion service provider. In general, the narratives in participants about quality care were centred on the promotion of autonomy and the provision of accompaniment and care practices, also perceived as transformative and currently absent of most health care services. The most staggering findings from the investigation are related to current barriers faced by young people in abortion contexts even when the legal barriers have: high rates of scepticism and distrust associated with pitfalls of telehealth and structural challenges associated with lacking communications infrastructure, among a few of them. Other important barriers to safe self-care abortion identified by participants surfaced like lack of privacy and confidentiality (especially in rural areas of the country), difficulties accessing reliable information, high costs of procedures and expenses related to travel costs or having to cease economic activities, waiting times, and stigma are among the primary barriers to abortion identified by participants. Especially in a scenario marked by unprecedented social, political and economic disruptions due to the COVID-19 pandemic, the commitment to design better care services that can be adapted to the identities, experiences, social contexts and possibilities of the user population is more necessary than ever. In this sense, the possibility of expanding access to services through telemedicine brings us closer to the opportunity to rethink the role of health care models in transforming the role of individuals and communities to make autonomous, safe and informed decisions about their own health and well-being.Keywords: contraception, family planning, premarital fertility, unplanned pregnancy
Procedia PDF Downloads 7112060 Formulating Rough Approximations in Information Tables with Possibilistic Information
Authors: Michinori Nakata, Hiroshi Sakai
Abstract:
A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations
Procedia PDF Downloads 32112059 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 18412058 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 14812057 A Comprehensive Evaluation of Supervised Machine Learning for the Phase Identification Problem
Authors: Brandon Foggo, Nanpeng Yu
Abstract:
Power distribution circuits undergo frequent network topology changes that are often left undocumented. As a result, the documentation of a circuit’s connectivity becomes inaccurate with time. The lack of reliable circuit connectivity information is one of the biggest obstacles to model, monitor, and control modern distribution systems. To enhance the reliability and efficiency of electric power distribution systems, the circuit’s connectivity information must be updated periodically. This paper focuses on one critical component of a distribution circuit’s topology - the secondary transformer to phase association. This topology component describes the set of phase lines that feed power to a given secondary transformer (and therefore a given group of power consumers). Finding the documentation of this component is call Phase Identification, and is typically performed with physical measurements. These measurements can take time lengths on the order of several months, but with supervised learning, the time length can be reduced significantly. This paper compares several such methods applied to Phase Identification for a large range of real distribution circuits, describes a method of training data selection, describes preprocessing steps unique to the Phase Identification problem, and ultimately describes a method which obtains high accuracy (> 96% in most cases, > 92% in the worst case) using only 5% of the measurements typically used for Phase Identification.Keywords: distribution network, machine learning, network topology, phase identification, smart grid
Procedia PDF Downloads 29912056 Traffic Congestions Modeling and Predictions by Social Networks
Authors: Bojan Najdenov, Danco Davcev
Abstract:
Reduction of traffic congestions and the effects of pollution and waste of resources that come with them has been a big challenge in the past decades. Having reliable systems to facilitate the process of modeling and prediction of traffic conditions would not only reduce the environmental pollution, but will also save people time and money. Social networks play big role of people’s lives nowadays providing them means of communicating and sharing thoughts and ideas, that way generating huge knowledge bases by crowdsourcing. In addition to that, crowdsourcing as a concept provides mechanisms for fast and relatively reliable data generation and also many services are being used on regular basis because they are mainly powered by the public as main content providers. In this paper we present the Social-NETS-Traffic-Control System (SNTCS) that should serve as a facilitator in the process of modeling and prediction of traffic congestions. The main contribution of our system is to integrate data from social networks as Twitter and also implements a custom created crowdsourcing subsystem with which users report traffic conditions using an android application. Our first experience of the usage of the system confirms that the integrated approach allows easy extension of the system with other social networks and represents a very useful tool for traffic control.Keywords: traffic, congestion reduction, crowdsource, social networks, twitter, android
Procedia PDF Downloads 48112055 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 42112054 Migration, Violent Extremism and Gang Violence in Trinidad and Tobago
Authors: Raghunath Mahabir
Abstract:
This paper provides an analysis of the existing evidence on the relationships between the migration of Venezuelans into Trinidad and Tobago, violent extremism and gang violence. Arguing that there is a dearth of reliable data on the subject matter, the paper fills the gap by providing relevant definitions of terms used, discusses the sources of data and identifies the causes for this migration and the subsequent ramifications for Trinidad and Tobago and for the migrants themselves. A simple but clear classification pointing to the nexus between migration gang violence and violent extremism is developed, following the logic of migration of criminals(gang members), the need to link with local gangs and the view that certain elements within the TnT society has become radicalized to the point where violent extremism is being displayed in different ways. The paper highlights implications for further policy debate:the imperatives for more effective communication between government officials responsible for migration and those personnel who are tasked with countering violent extremism and gang violence: promoting and executing better integration and social inclusion policies which are necessary to minimize social exclusion, and the threat of violent extremist agendas emanating from both Venezuelans and Trinidadians and generally to establish strong analytical framework grounded in stronger definitions, more reliable data and other evidence which can guide further research and analysis and contribute to policy formation.Keywords: migration, violent extremism, gangs, Venezuela
Procedia PDF Downloads 5412053 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies
Authors: Dumitru Valentin Florentin
Abstract:
The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.Keywords: information technologies, impact, company, Romania, empirical study
Procedia PDF Downloads 42412052 Assessment of Exhaust Emissions and Fuel Consumption from Means of Transport in Agriculture
Authors: Jerzy Merkisz, Piotr Lijewski, Pawel Fuc, Maciej Siedlecki, Andrzej Ziolkowski, Sylwester Weymann
Abstract:
The paper discusses the problem of load transport using farm tractors and road tractor units. This type of carriage of goods is often done with farm vehicles. The tests were performed with the PEMS equipment (Portable Emission Measurement System) under actual traffic conditions. The vehicles carried a load of 20000 kg. This research method is one of the most desired because it provides reliable information on the actual vehicle emissions and fuel consumption (carbon balance method). For the tests, a route was selected that simulated a trip from a small town to a food-processing facility located in a city. The analysis of the obtained results gave a clear answer as to what vehicles need to be used for the carriage of this type of cargo in terms of exhaust emissions and fuel consumption.Keywords: emission, transport, fuel consumption, PEMS
Procedia PDF Downloads 52912051 Visual Analytics of Higher Order Information for Trajectory Datasets
Authors: Ye Wang, Ickjai Lee
Abstract:
Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data
Procedia PDF Downloads 40212050 Measures of Reliability and Transportation Quality on an Urban Rail Transit Network in Case of Links’ Capacities Loss
Authors: Jie Liu, Jinqu Cheng, Qiyuan Peng, Yong Yin
Abstract:
Urban rail transit (URT) plays a significant role in dealing with traffic congestion and environmental problems in cities. However, equipment failure and obstruction of links often lead to URT links’ capacities loss in daily operation. It affects the reliability and transport service quality of URT network seriously. In order to measure the influence of links’ capacities loss on reliability and transport service quality of URT network, passengers are divided into three categories in case of links’ capacities loss. Passengers in category 1 are less affected by the loss of links’ capacities. Their travel is reliable since their travel quality is not significantly reduced. Passengers in category 2 are affected by the loss of links’ capacities heavily. Their travel is not reliable since their travel quality is reduced seriously. However, passengers in category 2 still can travel on URT. Passengers in category 3 can not travel on URT because their travel paths’ passenger flow exceeds capacities. Their travel is not reliable. Thus, the proportion of passengers in category 1 whose travel is reliable is defined as reliability indicator of URT network. The transport service quality of URT network is related to passengers’ travel time, passengers’ transfer times and whether seats are available to passengers. The generalized travel cost is a comprehensive reflection of travel time, transfer times and travel comfort. Therefore, passengers’ average generalized travel cost is used as transport service quality indicator of URT network. The impact of links’ capacities loss on transport service quality of URT network is measured with passengers’ relative average generalized travel cost with and without links’ capacities loss. The proportion of the passengers affected by links and betweenness of links are used to determine the important links in URT network. The stochastic user equilibrium distribution model based on the improved logit model is used to determine passengers’ categories and calculate passengers’ generalized travel cost in case of links’ capacities loss, which is solved with method of successive weighted averages algorithm. The reliability and transport service quality indicators of URT network are calculated with the solution result. Taking Wuhan Metro as a case, the reliability and transport service quality of Wuhan metro network is measured with indicators and method proposed in this paper. The result shows that using the proportion of the passengers affected by links can identify important links effectively which have great influence on reliability and transport service quality of URT network; The important links are mostly connected to transfer stations and the passenger flow of important links is high; With the increase of number of failure links and the proportion of capacity loss, the reliability of the network keeps decreasing, the proportion of passengers in category 3 keeps increasing and the proportion of passengers in category 2 increases at first and then decreases; When the number of failure links and the proportion of capacity loss increased to a certain level, the decline of transport service quality is weakened.Keywords: urban rail transit network, reliability, transport service quality, links’ capacities loss, important links
Procedia PDF Downloads 12812049 Conservation Status of a Lowland Tropical Forest in South-West, Nigeria
Authors: Lucky Dartsa Wakawa, Friday Nwabueze Ogana, Temitope Elizabeth Adeniyi
Abstract:
Timely and reliable information on the status of a forest is essential for assessing the extent of regeneration and degradation. However, when such information is lacking effective forest management practices becomes impossible. Therefore, this study assessed the tree species composition, richness, diversity, structure of Oluwa forest reserve with the view of ascertaining it conservation status. A systematic line transect was used in the laying of eight (8) temporary sample plots (TSPs) of size 50m x 50m. Trees with Dbh ≥ 10cm in the selected plots were enumerated, identified and measured. The results indicate that 535 individual trees were enumerated cutting across 26 families and 58 species. The family Sterculiaceae recorded the highest number of species (10) and occurrence (112) representing 17.2% and 20.93% respectively. Celtis zenkeri is the species with the highest number of occurrence of tree per hectare and importance value index (IVI) of 59 and 53.81 respectively. The reserve has the Margalef's index of species richness, Shannon-Weiner diversity Index (H') and Pielou's Species Evenness Index (EH) of 9.07, 3.43 and 0.84 respectively. The forest has a mean Dbh (cm), mean height (m), total basal area/ha (m2) and total volume/ha (m3) of 24.7, 16.9, 36.63 and 602.09 respectively. The important tropical tree species identified includes Diospyros crassiflora Milicia excels, Mansonia altisima, Triplochiton scleroxylon. Despite the level of exploitation in the forest, the forest seems to be resilience. Given the right attention, it could regenerate and replenish to save some of the original species composition of the reserve.Keywords: forest conservation, forest structure, Lowland tropical forest, South-west Nigeria
Procedia PDF Downloads 34212048 Value Relevance of Accounting Information: Empirical Evidence from China
Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li
Abstract:
This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.Keywords: accounting information, response time, value relevance, stock price
Procedia PDF Downloads 9612047 Building a Model for Information Literacy Education in School Settings
Authors: Tibor Koltay
Abstract:
Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory
Procedia PDF Downloads 14712046 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 8112045 Methodologies for Deriving Semantic Technical Information Using an Unstructured Patent Text Data
Authors: Jaehyung An, Sungjoo Lee
Abstract:
Patent documents constitute an up-to-date and reliable source of knowledge for reflecting technological advance, so patent analysis has been widely used for identification of technological trends and formulation of technology strategies. But, identifying technological information from patent data entails some limitations such as, high cost, complexity, and inconsistency because it rely on the expert’ knowledge. To overcome these limitations, researchers have applied to a quantitative analysis based on the keyword technique. By using this method, you can include a technological implication, particularly patent documents, or extract a keyword that indicates the important contents. However, it only uses the simple-counting method by keyword frequency, so it cannot take into account the sematic relationship with the keywords and sematic information such as, how the technologies are used in their technology area and how the technologies affect the other technologies. To automatically analyze unstructured technological information in patents to extract the semantic information, it should be transformed into an abstracted form that includes the technological key concepts. Specific sentence structure ‘SAO’ (subject, action, object) is newly emerged by representing ‘key concepts’ and can be extracted by NLP (Natural language processor). An SAO structure can be organized in a problem-solution format if the action-object (AO) states that the problem and subject (S) form the solution. In this paper, we propose the new methodology that can extract the SAO structure through technical elements extracting rules. Although sentence structures in the patents text have a unique format, prior studies have depended on general NLP (Natural language processor) applied to the common documents such as newspaper, research paper, and twitter mentions, so it cannot take into account the specific sentence structure types of the patent documents. To overcome this limitation, we identified a unique form of the patent sentences and defined the SAO structures in the patents text data. There are four types of technical elements that consist of technology adoption purpose, application area, tool for technology, and technical components. These four types of sentence structures from patents have their own specific word structure by location or sequence of the part of speech at each sentence. Finally, we developed algorithms for extracting SAOs and this result offer insight for the technology innovation process by providing different perspectives of technology.Keywords: NLP, patent analysis, SAO, semantic-analysis
Procedia PDF Downloads 26212044 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists
Authors: Miral Sabry AlAshry
Abstract:
The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution
Procedia PDF Downloads 37312043 Impact of Data and Model Choices to Urban Flood Risk Assessments
Authors: Abhishek Saha, Serene Tay, Gerard Pijcke
Abstract:
The availability of high-resolution topography and rainfall information in urban areas has made it necessary to revise modeling approaches used for simulating flood risk assessments. Lidar derived elevation models that have 1m or lower resolutions are becoming widely accessible. The classical approaches of 1D-2D flow models where channel flow is simulated and coupled with a coarse resolution 2D overland flow models may not fully utilize the information provided by high-resolution data. In this context, a study was undertaken to compare three different modeling approaches to simulate flooding in an urban area. The first model used is the base model used is Sobek, which uses 1D model formulation together with hydrologic boundary conditions and couples with an overland flow model in 2D. The second model uses a full 2D model for the entire area with shallow water equations at the resolution of the digital elevation model (DEM). These models are compared against another shallow water equation solver in 2D, which uses a subgrid method for grid refinement. These models are simulated for different horizontal resolutions of DEM varying between 1m to 5m. The results show a significant difference in inundation extents and water levels for different DEMs. They are also sensitive to the different numerical models with the same physical parameters, such as friction. The study shows the importance of having reliable field observations of inundation extents and levels before a choice of model and data can be made for spatial flood risk assessments.Keywords: flooding, DEM, shallow water equations, subgrid
Procedia PDF Downloads 14112042 Information Technology and Communications in Management of the Imperial Citadel of Thang Long-A World Heritage Site
Authors: Ngo the Bach
Abstract:
Information technology and communications are growing strongly and penetrated almost the entire Vietnamese economy and society. The article presents an overview of information technology and application communications in the management the Central Sector of the Imperial Citadel of Thang Long (Hanoi, Vietnam) - A World Heritage Site. The author also points out the opportunities and challenges of the information technology and communications in the sectors of culture and heritage; the use of information technology as an effective tool to develop mass and interactive communications. The article emphasizes on the advantage of information technology and communications in supporting effectively the management reform with respect to the Imperial Citadel of Thang Long in particular and the management of world heritage sites in Vietnam in general.Keywords: information technology, communications, management, culture, heritage
Procedia PDF Downloads 32912041 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 21512040 An Exploratory Study of the Ghanaian Music Industry: Its Impacts on the Economy and Society
Authors: Ralph Nyadu-Addo, Francis Matambalya, Utz Dornberger
Abstract:
The global music industry is a multi-billion dollar sector. The potential of Africa’s music industry is widely recognised in the socio-economic development milieu. It has impacted positively on several sectors including most especially the tourism, media and information, communication technology (ICT) among others. It is becoming increasingly clear that even in Africa (as demonstrated in Nigeria) that in addition to its intrinsic value, the sector has significant economic returns. UNCTAD observed, the creative industries offer some of the best prospects for high growth in least developed countries. The statistics from Africa may be far lower than similar sectors in developed countries but it goes to give further credence to several UNCTAD publications which say the creative industry is under researched and its potential under-estimated but holds the key to its rapid development The emerging creative economy (music in particular) has become a leading component of economic growth, employment, trade, innovation, and social cohesion in many countries. In line with these developments, the Ghana government recognizes the potential that the Creative Industries have to shape and reinforce Ghana’s economic growth. Creative sectors, particularly music, tend to rely less on sophisticated infrastructure or capital-intensive investment. Potential is particularly abundant in Africa, where musical creativity is rich, diverse, well-loved, and constantly evolving while drawing on strong traditions. The development of a popular music industry thus represents low-hanging fruit for most African economies says the World Bank. As we shift towards economic diversification using the creative industry, value is increasingly created at the intersection of arts, business and technology. Cultural and creative entrepreneurs are leading this trend. It is one of the areas where value is captured within the country as emerging trends have shown in Nigeria and Ghana among others. Yet, evidence shows that the potential of the cultural and creative sectors remains largely untapped. Furthermore, its socio-economic impact remains under-researched in many developing countries and its dynamics unknown. Despite its huge influence on music repertoire across the globe, most countries in Africa have not historically been significant markets for the international music industry. Today, that is beginning to change. Generally, reliable and adequate literature about music in the sub-region is difficult to obtain. The growing interests in academia and business cycles about a reliable data on the growing music industry in developing countries have called for an urgent need to undertake this research. Research questions: i. Who are the major stakeholders in the music value chain in Ghana? ii. How much of value is captured domestically iii. What is the economic impact of the Ghanaian music industry iv. How has the advent of ICT (internet) impacted on the music landscape? Research sources will be mainly through interviews of major stakeholders, baseline study of the industry by KPMG and content analysis of related newspapers and magazines.Keywords: economic impact, information communications technology (ICT), music-industry, value chain
Procedia PDF Downloads 29412039 The Investigation of Relationship between Accounting Information and the Value of Companies
Authors: Golamhassan Ghahramani Aghdam, Pedram Bavili Tabrizi
Abstract:
The aim of this research is to investigate the relationship between accounting information and the value of the companies accepted in Tehran Exchange Market. The dependent variable in this research is the value of a company that is measured by price coefficients, and the independent variables are balance sheet information, profit and loss information, cash flow state information, and profit quality characteristics. The profit quality characteristic index is to be related and to be on-time. This research is an application research, and the research population includes all companies that are active in Tehran exchange market. The number of 194 companies was selected by the systematic method as the statistics sample in the period of 2018-2019. The multi-variable linear regression model was used for the hypotheses test. The results show that there is no relationship between accounting information and companies’ value (stock value) that can be due to the lack of efficiency of the investment market and the inability to use the accounting information by investment market activists.Keywords: accounting information, company value, profit quality characteristics, price coefficient
Procedia PDF Downloads 13912038 Evaluation of Intervention Effectiveness from the Client Perspective: Dimensions and Measurement of Wellbeing
Authors: Neşe Alkan
Abstract:
Purpose: The point that applied/clinical psychology, which is the practice and research discipline of the mental health field, has reached today can be summarized as the necessity of handling the psychological well-being of people from multiple perspectives and the goal of moving it to a higher level. Clients' subjective assessment of their own condition and wellbeing is an integral part of evidence-based interventions. There is a need for tools through which clients can evaluate the effectiveness of the psychotherapy/intervention performed with them and their contribution to the wellbeing and wellbeing of this process in a valid and reliable manner. The aim of this research is to meet this need, to test the reliability and validity of the index in Turkish, and explore its usability in the practices of both researchers and psychotherapists. Method: A total of 213 adults aged between 18-54, 69.5% working and 29.5% university students, were included in the study. Along with their demographic information, the participants were administered a set of scales: wellbeing, life satisfaction, spiritual satisfaction, shopping addiction, and loneliness, namely via an online platform. The construct validity of the wellbeing scale was tested with exploratory and confirmatory factor analyses, convergent and discriminant validity were tested with two-way full and partial correlation analyses and, measurement invariance was tested with one-way analysis of variance. Results: Factor analyzes showed that the scale consisted of six dimensions as it is in its original structure. The internal consistency of the scale was found to be Cronbach α = .82. Two-way correlation analyzes revealed that the wellbeing scale total score was positively correlated with general life satisfaction (r = .62) and spiritual satisfaction (r = .29), as expected. It was negatively correlated with loneliness (r = -.51) and shopping addiction (r = -.15). While the scale score did not vary by gender, previous illness, or nicotine addiction, it was found that the total wellbeing scale scores of the participants who had used antidepressant medication during the past year were lower than those who did not use antidepressant medication (F(1,204) = 7.713, p = .005). Conclusion: It has been concluded that the 12-item wellbeing scale consisting of six dimensions can be used in research and health sciences practices as a valid and reliable measurement tool. Further research which examines the reliability and validity of the scale in different widely used languages such as Spanish and Chinese is recommended.Keywords: wellbeing, intervention effectiveness, reliability and validity, effectiveness
Procedia PDF Downloads 17912037 Alignment of Information System Strategy and Green Information System Strategy: Comprehension and A Review of the Literature
Authors: Wartika Memed Purawinata, Kridanto Surendro, Husni Sastramiharja, Iping Supriana S.
Abstract:
The information system is one of the contributors to environmental degradation and pollution are known to be released, such as the increasing of use of IT equipment and energy consumption , life cycles of IT equipment are getting shorter, IT equipment waste disposal and so on, therefore the information system should have a role in related environmental issues. Organization need to develop the ability of green to minimize negative impacts on the environment. Although the green information system is an important topic, many organizations fail to manage the environment in a way that is adequate because they ignore aspect of strategy. Alignment strategy is very important to ensure that all people do the activities of the organization headed in the same direction. Alignment strategy helps organization, determine which is more important for organization, and then make road mad to achieve the organization goal. Therefore, this paper discusses the review of the alignment, information systems strategy, and IS green strategy. With this discussion is expected there is an understanding about the alignment of information systems strategy and strategy of green IS, and its relationship with the achievement of business goals that have commitment to reduce the negative impact of information systems on the environment.Keywords: alignment, strategy, information system, green
Procedia PDF Downloads 45612036 Using Technology to Enhance the Student Assessment Experience
Authors: Asim Qayyum, David Smith
Abstract:
The use of information tools is a common activity for students of any educational stage when they encounter online learning activities. Finding the relevant information for particular learning tasks is the topic of this paper as it investigates the use of information tools for a group of student participants. The paper describes and discusses the results with particular implications for use in higher education, and the findings suggest that improvement in assessment design and subsequent student learning may be achieved by structuring the purposefulness of information tools usage and online reading behaviors of university students.Keywords: information tools, assessment, online learning, student assessment experience
Procedia PDF Downloads 56012035 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy
Authors: Ilhan Keskin, Hasan Bulent Kantarci
Abstract:
In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates
Procedia PDF Downloads 52412034 Developing of Attitude towards Using Complementary Treatments Scale in Turkey
Authors: Ayşegül Bilge, Merve Uğuryol, Şeyda Dülgerler, Mustafa Yıldız
Abstract:
The purpose of this research is to prove the Attitude towards Using Complementary Treatments Scale reliability and validity. The research is a methodological type of research that has been planned to determine the validity and reliability of the Attitude towards Using Complementary Treatments Scale. The scale has been developed by the researchers. In the scale, there are 23 questions including complementary and modern therapies individuals apply when they have health problems 4-item Likert-type evaluation has been carried out in preparing the questionnaire. High score obtained from the scale indicates a positive attitude towards complementary therapies. In the course of validity assessment of the scale, expert opinion has been received, and the content validity of the scale has been determined by using Kendall coefficient correlation test (Wa=0.200, p = 0.460). In the course of the reliability assessment of the scale, total score correlations of 23 materials have been examined, and those under 0.20 correlation limit has been removed from the scale correlation. As a result, the scale was left to be 13 items. In the internal consistency tests of the analyses, Cronbach's alpha value has been found to be 0.79. As a result, of the validity analyses of the Attitude towards Using Complementary Treatments Scale, the content and language validity analyses has been found to be at the expected level. It has been determined to be a highly reliable scale as the result of the reliability analyses. In conclusion, Attitude towards Using Complementary Treatments Scale is a valid and reliable scale.Keywords: alternative health care, complementary treatment, instrument development, nursing practice
Procedia PDF Downloads 39912033 Algorithm for Information Retrieval Optimization
Authors: Kehinde K. Agbele, Kehinde Daniel Aruleba, Eniafe F. Ayetiran
Abstract:
When using Information Retrieval Systems (IRS), users often present search queries made of ad-hoc keywords. It is then up to the IRS to obtain a precise representation of the user’s information need and the context of the information. This paper investigates optimization of IRS to individual information needs in order of relevance. The study addressed development of algorithms that optimize the ranking of documents retrieved from IRS. This study discusses and describes a Document Ranking Optimization (DROPT) algorithm for information retrieval (IR) in an Internet-based or designated databases environment. Conversely, as the volume of information available online and in designated databases is growing continuously, ranking algorithms can play a major role in the context of search results. In this paper, a DROPT technique for documents retrieved from a corpus is developed with respect to document index keywords and the query vectors. This is based on calculating the weight (Keywords: information retrieval, document relevance, performance measures, personalization
Procedia PDF Downloads 241