Search results for: negative data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27930

Search results for: negative data

25170 The Value of Computerized Corpora in EFL Textbook Design: The Case of Modal Verbs

Authors: Lexi Li

Abstract:

This study aims to contribute to the field of how computer technology can be exploited to enhance EFL textbook design. Specifically, the study demonstrates how computerized native and learner corpora can be used to enhance modal verb treatment in EFL textbooks. The linguistic focus is will, would, can, could, may, might, shall, should, must. The native corpus is the spoken component of BNC2014 (hereafter BNCS2014). The spoken part is chosen because the pedagogical purpose of the textbooks is communication-oriented. Using the standard query option of CQPweb, 5% of each of the nine modals was sampled from BNCS2014. The learner corpus is the POS-tagged Ten-thousand English Compositions of Chinese Learners (TECCL). All the essays under the “secondary school” section were selected. A series of five secondary coursebooks comprise the textbook corpus. All the data in both the learner and the textbook corpora are retrieved through the concordance functions of WordSmith Tools (version, 5.0). Data analysis was divided into two parts. The first part compared the patterns of modal verbs in the textbook corpus and BNC2014 with respect to distributional features, semantic functions, and co-occurring constructions to examine whether the textbooks reflect the authentic use of English. Secondly, the learner corpus was compared with the textbook corpus in terms of the use (distributional features, semantic functions, and co-occurring constructions) in order to examine the degree of influence of the textbook on learners’ use of modal verbs. Moreover, the learner corpus was analyzed for the misuse (syntactic errors, e.g., she can sings*.) of the nine modal verbs to uncover potential difficulties that confront learners. The results indicate discrepancies between the textbook presentation of modal verbs and authentic modal use in natural discourse in terms of distributions of frequencies, semantic functions, and co-occurring structures. Furthermore, there are consistent patterns of use between the learner corpus and the textbook corpus with respect to the three above-mentioned aspects, except could, will and must, partially confirming the correlation between the frequency effects and L2 grammar acquisition. Further analysis reveals that the exceptions are caused by both positive and negative L1 transfer, indicating that the frequency effects can be intercepted by L1 interference. Besides, error analysis revealed that could, would, should and must are the most difficult for Chinese learners due to both inter-linguistic and intra-linguistic interference. The discrepancies between the textbook corpus and the native corpus point to a need to adjust the presentation of modal verbs in the textbooks in terms of frequencies, different meanings, and verb-phrase structures. Along with the adjustment of modal verb treatment based on authentic use, it is important for textbook writers to take into consideration the L1 interference as well as learners’ difficulties in their use of modal verbs. The present study is a methodological showcase of the combination both native and learner corpora in the enhancement of EFL textbook language authenticity and appropriateness for learners.

Keywords: EFL textbooks, learner corpus, modal verbs, native corpus

Procedia PDF Downloads 120
25169 Triangular Hesitant Fuzzy TOPSIS Approach in Investment Projects Management

Authors: Irina Khutsishvili

Abstract:

The presented study develops a decision support methodology for multi-criteria group decision-making problem. The proposed methodology is based on the TOPSIS (Technique for Order Performance by Similarity to Ideal Solution) approach in the hesitant fuzzy environment. The main idea of decision-making problem is a selection of one best alternative or several ranking alternatives among a set of feasible alternatives. Typically, the process of decision-making is based on an evaluation of certain criteria. In many MCDM problems (such as medical diagnosis, project management, business and financial management, etc.), the process of decision-making involves experts' assessments. These assessments frequently are expressed in fuzzy numbers, confidence intervals, intuitionistic fuzzy values, hesitant fuzzy elements and so on. However, a more realistic approach is using linguistic expert assessments (linguistic variables). In the proposed methodology both the values and weights of the criteria take the form of linguistic variables, given by all decision makers. Then, these assessments are expressed in triangular fuzzy numbers. Consequently, proposed approach is based on triangular hesitant fuzzy TOPSIS decision-making model. Following the TOPSIS algorithm, first, the fuzzy positive ideal solution (FPIS) and the fuzzy negative-ideal solution (FNIS) are defined. Then the ranking of alternatives is performed in accordance with the proximity of their distances to the both FPIS and FNIS. Based on proposed approach the software package has been developed, which was used to rank investment projects in the real investment decision-making problem. The application and testing of the software were carried out based on the data provided by the ‘Bank of Georgia’.

Keywords: fuzzy TOPSIS approach, investment project, linguistic variable, multi-criteria decision making, triangular hesitant fuzzy set

Procedia PDF Downloads 424
25168 Synthesis and Characterization of Some Mono Chloro-S-Triazine Vinyl Sulphone Reactive Dyes

Authors: Nuradeen Abdullahi Nadabo, Kasali Adewale Bello, Chindo Istifanus

Abstract:

A series of ten bi functional mono-chloro-s-triazine vinyl sulphone reactive dyes were synthesized based on H-acid with varied substituents coded as (BRD). These dyes were characterized by IR spectroscopy. The results revealed an incorporation of various substituents. The visible absorption spectra of these dyes were examined in various solvents and results shows positive and negative salvatochromism as the solvent polarity; changes, melting point, percentage yield and molar extinction co-efficient of these dyes were also evaluated and the results obtained are within a reasonable range acceptable for commercial dyeing.

Keywords: bifunctional, characterization, reactive dyes, synthesis

Procedia PDF Downloads 428
25167 The Effects of Using Telephone and Social Media Applications While Driving in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

Social media have totally converged with social life all around the globe. Using social media applications and mobile phones have become somewhat of an addiction to most people. Driving while using mobile applications falls under such addiction when usage is not of urgency. This study aims to investigate the impact of using such applications while driving in the small rich state of Kuwait, where most people juggle more than one phone for different purposes. Positive and negative effects will be explored in detail as well as causes for these effects and possible reasons. A full range of recommendations will be presented so as to give other countries a specific case study upon which to build solutions and remedies to this emerging and dangerous social phenomenon.

Keywords: social media, driving, mobile applications, communication

Procedia PDF Downloads 354
25166 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 284
25165 Metastatic Esophageal Squamous Cell Carcinoma Presenting with COVID-19 Infection and Cardiac Tamponade

Authors: Sutinon Yuchomsuk, Satchachon Changthom, Pruet Areesawangvong, Monsiri Jinapen

Abstract:

Background: Esophageal squamous cell carcinoma can be presented with many symptoms, such as dysphagia or weight loss. However, in some circumstances, rare presentations can be found, e.g., dyspnea, which is more common in pulmonary malignancy. And dyspnea is also one of the most common presentations of COVID-19 infection. So, in this case, we can learn from many points in patient symptoms and findings leading to the diagnosis of esophageal squamous cell carcinoma. Method: This research is a case-report study including one patient from Mahasarakham Hospital, Thailand. Data were collected during December 2021. Result: A 55-year-old Thai male patient with an unknown past medical history presented with dyspnea and shortness of breath for the duration of three days prior to admission. His symptom also included cough, fever, and sore throat. Laboratory results indicated that the patient had COVID-19 pneumonia. Further investigation showed that he had cardiac tamponade and suspected pulmonary/esophageal cancer. Lung biopsy and pericardiocentesis were done, which were positive for carcinoma from pericardial effusion but negative for malignancy from the lung biopsy. Later esophagogastroduodenoscopy was done with endoscopic tissue biopsy; the result was positive for squamous cell carcinoma of the esophagus. Conclusion: Most commonly, esophageal cancer is presented with dysphagia or weight loss. However, in some rare cases, patients can also be presented with dyspnea due to cardiac tamponade. And in recent years, COVID-19 has become a pandemic all over the world, sometimes masking symptoms of other diseases. Such as in this case, the patient didn’t improve after the pneumonia was resolved, which led to the final diagnosis of metastatic esophageal cancer.

Keywords: esophageal cancer, cardiac tamponade, metastatic squamous cell carcinoma, COVID-19 infection

Procedia PDF Downloads 120
25164 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 61
25163 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 168
25162 Social Network Roles in Organizations: Influencers, Bridges, and Soloists

Authors: Sofia Dokuka, Liz Lockhart, Alex Furman

Abstract:

Organizational hierarchy, traditionally composed of individual contributors, middle management, and executives, is enhanced by the understanding of informal social roles. These roles, identified with organizational network analysis (ONA), might have an important effect on organizational functioning. In this paper, we identify three social roles – influencers, bridges, and soloists, and provide empirical analysis based on real-world organizational networks. Influencers are employees with broad networks and whose contacts also have rich networks. Influence is calculated using PageRank, initially proposed for measuring website importance, but now applied in various network settings, including social networks. Influencers, having high PageRank, become key players in shaping opinions and behaviors within an organization. Bridges serve as links between loosely connected groups within the organization. Bridges are identified using betweenness and Burt’s constraint. Betweenness quantifies a node's control over information flows by evaluating its role in the control over the shortest paths within the network. Burt's constraint measures the extent of interconnection among an individual's contacts. A high constraint value suggests fewer structural holes and lesser control over information flows, whereas a low value suggests the contrary. Soloists are individuals with fewer than 5 stable social contacts, potentially facing challenges due to reduced social interaction and hypothetical lack of feedback and communication. We considered social roles in the analysis of real-world organizations (N=1,060). Based on data from digital traces (Slack, corporate email and calendar) we reconstructed an organizational communication network and identified influencers, bridges and soloists. We also collected employee engagement data through an online survey. Among the top-5% of influencers, 10% are members of the Executive Team. 56% of the Executive Team members are part of the top influencers group. The same proportion of top influencers (10%) is individual contributors, accounting for just 0.6% of all individual contributors in the company. The majority of influencers (80%) are at the middle management level. Out of all middle managers, 19% hold the role of influencers. However, individual contributors represent a small proportion of influencers, and having information about these individuals who hold influential roles can be crucial for management in identifying high-potential talents. Among the bridges, 4% are members of the Executive Team, 16% are individual contributors, and 80% are middle management. Predominantly middle management acts as a bridge. Bridge positions of some members of the executive team might indicate potential micromanagement on the leader's part. Recognizing the individuals serving as bridges in an organization uncovers potential communication problems. The majority of soloists are individual contributors (96%), and 4% of soloists are from middle management. These managers might face communication difficulties. We found an association between being an influencer and attitude toward a company's direction. There is a statistically significant 20% higher perception that the company is headed in the right direction among influencers compared to non-influencers (p < 0.05, Mann-Whitney test). Taken together, we demonstrate that considering social roles in the company might indicate both positive and negative aspects of organizational functioning that should be considered in data-driven decision-making.

Keywords: organizational network analysis, social roles, influencer, bridge, soloist

Procedia PDF Downloads 98
25161 Sleep Quality as Perceived by Critically Ill Patients at El Manial University Hospitals

Authors: Mohamed Adel Ahmed, Warda Youssef Morsy , Hanaa Ali El Feky

Abstract:

Background: Literature review cited that sleep is absolutely essential for surviving and reclamation of the quality of life. Critically ill patients often have poor sleep quality with prolonged sleep latency, sleep fragmentation, decreased sleep efficiency and frequent arousals. Nurses have a unique role for the early diagnosis of sleep disorders, decreasing stressors levels and providing the necessary environmental regulations to create a therapeutic ambiance. The aim of the study: to assess perceived sleep quality and identify factors affecting sleep quality among adult critically ill patients At El Manial University Hospital. Research Design: A descriptive exploratory design was utilized. Research questions: a) how do adult critically ill patients perceive sleep quality in the Critical Care Department of El Manial University Hospital? b) What are the factors affecting sleep quality among adult critically ill patients at El Manial University Hospital? Setting: selected critical and cardiac care units at El Manial University Hospital. Sample: A samples of convenience consisting of 100 adult male and female patients were included in the study. Tools of data collection: tool 1: Socio-demographic and Medical Data Sheet, tool 2: Modified St Mary's Hospital Sleep Questionnaire tool 3: Factors Affecting Sleep Quality Questionnaire among ICU Patients Results: The current study revealed that 76.0% of the studied sample had lack of sleep disturbance before hospitalization. However, 84 % had sleep disturbances during ICU stay, of these more than two-thirds (67 %) had moderate sleep disturbance. Presence of strange and bad odors, noise, having pain, fear of death and a loud voice produced by the ICU personnel had the most significant negative impact on patients’ sleep in percentage of 52.4, 50, 61.9, 45.2, 52.4, respectively. Conclusion: Sleep disturbances in the ICU are multifactorial, and ICU patients’ perceived degrees of sleep disturbance as a moderate. Recommendations: Based on findings of the present study, the following are recommended to be done by ICU nurses; create a healing ICU environment that should incorporate noise, light and temperature controls; decrease stimuli during night time hours to promote regulation of the circadian rhythm, allow usage of sleeping aids such as relaxing music, eye patches and earplugs into their daily nursing practice; cluster nursing activities and eliminate non-essential treatments during night time hours to allow uninterrupted sleep periods of at least 90 minutes to complete one sleep cycle , and minimize staff conversation, alarm noise and light during the quiet night time hours.

Keywords: sleep quality, critically ill, patients, perception

Procedia PDF Downloads 438
25160 Mapping of Risks and Opportunities for Adolescents Girls’ Sexual and Reproductive Health in Peri-Urban Setting in Mwanza, Tanzania

Authors: Soori Nnko, Zaina Mchome, John Dusabe, Angela Obasi

Abstract:

In sub-Saharan Africa, adolescent girls living in urban and periurban settings are among the groups at increased risk of getting sexually transmitted infections. One of the challenges to improve uptake of sexual and reproductive health (SRH) services among adolescents is linked to little appreciation about their vulnerability and the knowledge on availability of the SRH services. Objective: This study assesses adolescents’ perceptions on risks for SRH problems and the availability of services to prevent against SRH problems. Methodology: The study was conducted in March 2011 in Mwanza region, Tanzania. Data collection techniques included 18 Participatory Group Discussions and 17 In-depth Interviews with adolescents and young mothers aged 15-20 years. Results: Adolescents indicated that risk places included their homes, bushes, commercial centers, roadsides as well as school settings. Risk for having unprotected sex varied depending on where you are, and the time of the day. For example, collection of firewood in the bushes or water from the wells exposed girls to men who forced or lured them to have sex. The girls reported to encounter motorcyclists who offered the ride in exchange for sex. Girls also knew myriads places to seek SRH services, including public and private clinics, drug shops and traditional healers. Despite being aware of risky environment, and places to seek the services, access to SRH services were limited due to the stigma and negative attitude of community regarding adolescents’ utilization of SRH services. Conclusion: Adolescents are exposed to various risky environments, yet due to social stigma they have difficult to access the available SRH services.

Keywords: adolescent girls, sexual and reproductive health, AIDS, risk, opportunities, interventions, sub Saharan africa

Procedia PDF Downloads 440
25159 The Extension of the Kano Model by the Concept of Over-Service

Authors: Lou-Hon Sun, Yu-Ming Chiu, Chen-Wei Tao, Chia-Yun Tsai

Abstract:

It is common practice for many companies to ask employees to provide heart-touching service for customers and to emphasize the attitude of 'customer first'. However, services may not necessarily gain praise, and may actually be considered excessive, if customers do not appreciate such behaviors. In reality, many restaurant businesses try to provide as much service as possible without taking into account whether over-provision may lead to negative customer reception. A survey of 894 people in Britain revealed that 49 percent of respondents consider over-attentive waiters the most annoying aspect of dining out. It can be seen that merely aiming to exceed customers’ expectations without actually addressing their needs, only further distances and dissociates the standard of services from the goals of customer satisfaction itself. Over-service is defined, as 'service provided that exceeds customer expectations, or simply that customers deemed redundant, resulting in negative perception'. It was found that customers’ reactions and complaints concerning over-service are not as intense as those against service failures caused by the inability to meet expectations; consequently, it is more difficult for managers to become aware of the existence of over-service. Thus the ability to manage over-service behaviors is a significant topic for consideration. The Kano model classifies customer preferences into five categories: attractive quality attribute, one-dimensional quality attribute, must-be quality attribute, indifferent quality attribute and reverse quality attributes. The model is still very popular for researchers to explore the quality aspects and customer satisfaction. Nevertheless, several studies indicated that Kano’s model could not fully capture the nature of service quality. The concept of over-service can be used to restructure the model and provide a better understanding of the service quality construct. In this research, the structure of Kano's two-dimensional questionnaire will be used to classify the factors into different dimensions. The same questions will be used in the second questionnaire for identifying the over-service experienced of the respondents. The finding of these two questionnaires will be used to analyze the relevance between service quality classification and over-service behaviors. The subjects of this research are customers of fine dining chain restaurants. Three hundred questionnaires will be issued based on the stratified random sampling method. Items for measurement will be derived from DINESERV scale. The tangible dimension of the questionnaire will be eliminated due to this research is focused on the employee behaviors. Quality attributes of the Kano model are often regarded as an instrument for improving customer satisfaction. The concept of over-service can be used to restructure the model and provide a better understanding of service quality construct. The extension of the Kano model will not only develop a better understanding of customer needs and expectations but also enhance the management of service quality.

Keywords: consumer satisfaction, DINESERV, kano model, over-service

Procedia PDF Downloads 158
25158 Vision-Based Daily Routine Recognition for Healthcare with Transfer Learning

Authors: Bruce X. B. Yu, Yan Liu, Keith C. C. Chan

Abstract:

We propose to record Activities of Daily Living (ADLs) of elderly people using a vision-based system so as to provide better assistive and personalization technologies. Current ADL-related research is based on data collected with help from non-elderly subjects in laboratory environments and the activities performed are predetermined for the sole purpose of data collection. To obtain more realistic datasets for the application, we recorded ADLs for the elderly with data collected from real-world environment involving real elderly subjects. Motivated by the need to collect data for more effective research related to elderly care, we chose to collect data in the room of an elderly person. Specifically, we installed Kinect, a vision-based sensor on the ceiling, to capture the activities that the elderly subject performs in the morning every day. Based on the data, we identified 12 morning activities that the elderly person performs daily. To recognize these activities, we created a HARELCARE framework to investigate into the effectiveness of existing Human Activity Recognition (HAR) algorithms and propose the use of a transfer learning algorithm for HAR. We compared the performance, in terms of accuracy, and training progress. Although the collected dataset is relatively small, the proposed algorithm has a good potential to be applied to all daily routine activities for healthcare purposes such as evidence-based diagnosis and treatment.

Keywords: daily activity recognition, healthcare, IoT sensors, transfer learning

Procedia PDF Downloads 128
25157 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 115
25156 Centrality and Patent Impact: Coupled Network Analysis of Artificial Intelligence Patents Based on Co-Cited Scientific Papers

Authors: Xingyu Gao, Qiang Wu, Yuanyuan Liu, Yue Yang

Abstract:

In the era of the knowledge economy, the relationship between scientific knowledge and patents has garnered significant attention. Understanding the intricate interplay between the foundations of science and technological innovation has emerged as a pivotal challenge for both researchers and policymakers. This study establishes a coupled network of artificial intelligence patents based on co-cited scientific papers. Leveraging centrality metrics from network analysis offers a fresh perspective on understanding the influence of information flow and knowledge sharing within the network on patent impact. The study initially obtained patent numbers for 446,890 granted US AI patents from the United States Patent and Trademark Office’s artificial intelligence patent database for the years 2002-2020. Subsequently, specific information regarding these patents was acquired using the Lens patent retrieval platform. Additionally, a search and deduplication process was performed on scientific non-patent references (SNPRs) using the Web of Science database, resulting in the selection of 184,603 patents that cited 37,467 unique SNPRs. Finally, this study constructs a coupled network comprising 59,379 artificial intelligence patents by utilizing scientific papers co-cited in patent backward citations. In this network, nodes represent patents, and if patents reference the same scientific papers, connections are established between them, serving as edges within the network. Nodes and edges collectively constitute the patent coupling network. Structural characteristics such as node degree centrality, betweenness centrality, and closeness centrality are employed to assess the scientific connections between patents, while citation count is utilized as a quantitative metric for patent influence. Finally, a negative binomial model is employed to test the nonlinear relationship between these network structural features and patent influence. The research findings indicate that network structural features such as node degree centrality, betweenness centrality, and closeness centrality exhibit inverted U-shaped relationships with patent influence. Specifically, as these centrality metrics increase, patent influence initially shows an upward trend, but once these features reach a certain threshold, patent influence starts to decline. This discovery suggests that moderate network centrality is beneficial for enhancing patent influence, while excessively high centrality may have a detrimental effect on patent influence. This finding offers crucial insights for policymakers, emphasizing the importance of encouraging moderate knowledge flow and sharing to promote innovation when formulating technology policies. It suggests that in certain situations, data sharing and integration can contribute to innovation. Consequently, policymakers can take measures to promote data-sharing policies, such as open data initiatives, to facilitate the flow of knowledge and the generation of innovation. Additionally, governments and relevant agencies can achieve broader knowledge dissemination by supporting collaborative research projects, adjusting intellectual property policies to enhance flexibility, or nurturing technology entrepreneurship ecosystems.

Keywords: centrality, patent coupling network, patent influence, social network analysis

Procedia PDF Downloads 50
25155 The Role of Online Deliberation on Citizens’ Attitudes

Authors: Amalia Triantafillidoy, Georgios Lappas, Prodromos Yannas, Alexandros Kleftodimos

Abstract:

In this paper an experiment was conducted to assess the impact of online deliberation on citizens’ attitudes. Specifically, this research compared pre and post deliberation opinions of participants who deliberated online via an asynchronous platform regarding the issue of political opinion polls. Results indicate that online deliberation had a positive effect on citizens’ attitudes since it was found that following deliberation participants changed their views regarding public opinion polls. Specifically, online deliberation improved discussants perceptions regarding the reliability of polls, while suppressing their negative views about the misuse of polls by media, polling organizations and politicians.

Keywords: attitudes change, e-democracy, online deliberation, opinion polls

Procedia PDF Downloads 313
25154 Corporate Governance and Bank Performance: A Study of Selected Deposit Money Banks in Nigeria

Authors: Ayodele Ajayi, John Ajayi

Abstract:

This paper investigates the effect of corporate governance with a view to determining the relationship between board size and bank performance. Data for the study were obtained from the audited financial statements of five sampled banks listed on the Nigerian Stock Exchange. Panel data technique was adopted and analysis was carried out with the use of multiple regression and pooled ordinary least square. Results from the study show that the larger the board size, the greater the profit implying that corporate governance is positively correlated with bank performance.

Keywords: corporate governance, banks performance, board size, pooled data

Procedia PDF Downloads 354
25153 Empowering a New Frontier in Heart Disease Detection: Unleashing Quantum Machine Learning

Authors: Sadia Nasrin Tisha, Mushfika Sharmin Rahman, Javier Orduz

Abstract:

Machine learning is applied in a variety of fields throughout the world. The healthcare sector has benefited enormously from it. One of the most effective approaches for predicting human heart diseases is to use machine learning applications to classify data and predict the outcome as a classification. However, with the rapid advancement of quantum technology, quantum computing has emerged as a potential game-changer for many applications. Quantum algorithms have the potential to execute substantially faster than their classical equivalents, which can lead to significant improvements in computational performance and efficiency. In this study, we applied quantum machine learning concepts to predict coronary heart diseases from text data. We experimented thrice with three different features; and three feature sets. The data set consisted of 100 data points. We pursue to do a comparative analysis of the two approaches, highlighting the potential benefits of quantum machine learning for predicting heart diseases.

Keywords: quantum machine learning, SVM, QSVM, matrix product state

Procedia PDF Downloads 91
25152 The Effect of Heat Stress on the Gastro-Intestinal Microbiota of Pigs

Authors: Yadnyavalkya Patil, Ravi Gooneratne, Xiang-Hong Ju

Abstract:

Heat stress (HS) negatively affects the physiology of pigs. In this study, 6 pigs will be subjected to temperatures of 35 ± 2℃ for 12 hrs/day for a duration of 21 days. The changes in the gastrointestinal tract (GIT) microbiota will be observed by analyzing the freshly collected faeces on days 1, 3, 7, 14 and 21. The changes will be compared to faeces from a set of 6 control pigs kept simultaneously at temperatures of 26 ± 2℃ for the same duration of 21 days. Different types of stresses such a weaning have a detrimental effect on GIT microflora. Similarly, HS is expected to have a harmful effect on the microbial diversity of the GIT. How these changes affect the immune system of the pigs will be studied and therapeutics to reduce the negative effects of HS will be developed.

Keywords: GIT microbiota, heat stress, immune system, therapeutics

Procedia PDF Downloads 207
25151 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 134
25150 Verification & Validation of Map Reduce Program Model for Parallel K-Mediod Algorithm on Hadoop Cluster

Authors: Trapti Sharma, Devesh Kumar Srivastava

Abstract:

This paper is basically a analysis study of above MapReduce implementation and also to verify and validate the MapReduce solution model for Parallel K-Mediod algorithm on Hadoop Cluster. MapReduce is a programming model which authorize the managing of huge amounts of data in parallel, on a large number of devices. It is specially well suited to constant or moderate changing set of data since the implementation point of a position is usually high. MapReduce has slowly become the framework of choice for “big data”. The MapReduce model authorizes for systematic and instant organizing of large scale data with a cluster of evaluate nodes. One of the primary affect in Hadoop is how to minimize the completion length (i.e. makespan) of a set of MapReduce duty. In this paper, we have verified and validated various MapReduce applications like wordcount, grep, terasort and parallel K-Mediod clustering algorithm. We have found that as the amount of nodes increases the completion time decreases.

Keywords: hadoop, mapreduce, k-mediod, validation, verification

Procedia PDF Downloads 363
25149 An Improved K-Means Algorithm for Gene Expression Data Clustering

Authors: Billel Kenidra, Mohamed Benmohammed

Abstract:

Data mining technique used in the field of clustering is a subject of active research and assists in biological pattern recognition and extraction of new knowledge from raw data. Clustering means the act of partitioning an unlabeled dataset into groups of similar objects. Each group, called a cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. Several clustering methods are based on partitional clustering. This category attempts to directly decompose the dataset into a set of disjoint clusters leading to an integer number of clusters that optimizes a given criterion function. The criterion function may emphasize a local or a global structure of the data, and its optimization is an iterative relocation procedure. The K-Means algorithm is one of the most widely used partitional clustering techniques. Since K-Means is extremely sensitive to the initial choice of centers and a poor choice of centers may lead to a local optimum that is quite inferior to the global optimum, we propose a strategy to initiate K-Means centers. The improved K-Means algorithm is compared with the original K-Means, and the results prove how the efficiency has been significantly improved.

Keywords: microarray data mining, biological pattern recognition, partitional clustering, k-means algorithm, centroid initialization

Procedia PDF Downloads 187
25148 Qualitative Study of Organizational Variables Affecting Nurses’ Resilience in Pandemic Condition

Authors: Zahra Soltani Shal

Abstract:

Introduction: The COVID-19 pandemic marks an extraordinary global public health crisis unseen in the last century, with its rapid spread worldwide and associated mortality burden. Healthcare resilience during a pandemic is crucial not only for continuous and safe patients care but also for control of any outbreak. Aim: The present study was conducted to discover the organizational variables effective in increasing resilience and continuing the work of nurses in critical and stressful pandemic conditions. Method: The study population is nurses working in hospitals for patients with coronavirus. Sampling was done purposefully and information was collected from 15 nurses through In-depth semi-structured interviews. The interview was conducted to analyze the data using the framework analysis method consisting of five steps and is classified in the table. Results: According to the findings through semi-structural interviews, among organizational variables, organizational commitment (Affective commitment, continuous commitment, normative commitment) has played a prominent role in nurses' resilience. Discussion: despite the non-withdrawal of nurses and their resilience, due to the negative quality of their working life, the mentioned variable has affected their level of performance and ability and leads to fatigue and physical and mental exhaustion. Implications for practice: By equipping hospitals and improving the facilities of nurses, their organizational commitment can be increased and lead to their resilience in critical situations. Supervisors and senior officials at the hospitals should be responsible for nurses' health and safety. A clear and codified program in critical situations and comprehensive management is effective in improving the quality of the work-life of nurses. Creating an empathetic and interactive environment can help promote nurses' mental health.

Keywords: organizational commitment, quality of work life, nurses resilience, pandemic, coronavirus

Procedia PDF Downloads 154
25147 "Revolutionizing Geographic Data: CADmapper's Automated Precision in CAD Drawing Transformation"

Authors: Toleen Alaqqad, Kadi Alshabramiy, Suad Zaafarany, Basma Musallam

Abstract:

CADmapper is a significant tool of software for transforming geographic data into realistic CAD drawings. It speeds up and simplifies the conversion process by automating it. This allows architects, urban planners, engineers, and geographic information system (GIS) experts to solely concentrate on the imaginative and scientific parts of their projects. While the future incorporation of AI has the potential for further improvements, CADmapper's current capabilities make it an indispensable asset in the business. It covers a combination of 2D and 3D city and urban area models. The user can select a specific square section of the map to view, and the fee is based on the dimensions of the area being viewed. The procedure is straightforward: you choose the area you want, then pick whether or not to include topography. 3D architectural data (if available), followed by selecting whatever design program or CAD style you want to publish the document which contains more than 200 free broad town plans in DXF format. If you desire to specify a bespoke area, it's free up to 1 km2.

Keywords: cadmaper, gdata, 2d and 3d data conversion, automated cad drawing, urban planning software

Procedia PDF Downloads 61
25146 Development of the Accelerator Applied to an Early Stage High-Strength Shotcrete

Authors: Ayanori Sugiyama, Takahisa Hanei, Yasuhide Higo

Abstract:

Domestic demand for the construction of tunnels has been increasing in recent years in Japan. To meet this demand, various construction materials and construction methods have been developed to attain higher strength, reduction of negative impact on the environment and improvement for working conditions. In this report, we would like to introduce the newly developed shotcrete with superior hardening properties which were tested through the actual machine scale and its workability and strength development were evaluated. As a result, this new tunnel construction method was found to achieve higher workability and quicker strength development in only a couple of minutes.

Keywords: accelerator, shotcrete, tunnel, high-strength

Procedia PDF Downloads 314
25145 Managing Core Competencies in Innovative Entrepreneurship: Theory and Practice

Authors: Olga Shvetsova

Abstract:

The research paper contains the different issues of competence management in innovation companies. The theoretical bases of human resources management and practical issues of innovative enterprises’ competitiveness are considered. The research is focused on the modern innovative enterprise management problems; it focuses on the effective management of the personnel of innovative enterprises on the basis of competence approach. The concept of core competence approach is discussed. The point of view, that the key competences of the company create the competitive advantages, support strategy development and protect business from external negative factors is considered. The used methodology is background research.

Keywords: competence model, competitiveness, innovation management, implementation

Procedia PDF Downloads 312
25144 An IoT-Enabled Crop Recommendation System Utilizing Message Queuing Telemetry Transport (MQTT) for Efficient Data Transmission to AI/ML Models

Authors: Prashansa Singh, Rohit Bajaj, Manjot Kaur

Abstract:

In the modern agricultural landscape, precision farming has emerged as a pivotal strategy for enhancing crop yield and optimizing resource utilization. This paper introduces an innovative Crop Recommendation System (CRS) that leverages the Internet of Things (IoT) technology and the Message Queuing Telemetry Transport (MQTT) protocol to collect critical environmental and soil data via sensors deployed across agricultural fields. The system is designed to address the challenges of real-time data acquisition, efficient data transmission, and dynamic crop recommendation through the application of advanced Artificial Intelligence (AI) and Machine Learning (ML) models. The CRS architecture encompasses a network of sensors that continuously monitor environmental parameters such as temperature, humidity, soil moisture, and nutrient levels. This sensor data is then transmitted to a central MQTT server, ensuring reliable and low-latency communication even in bandwidth-constrained scenarios typical of rural agricultural settings. Upon reaching the server, the data is processed and analyzed by AI/ML models trained to correlate specific environmental conditions with optimal crop choices and cultivation practices. These models consider historical crop performance data, current agricultural research, and real-time field conditions to generate tailored crop recommendations. This implementation gets 99% accuracy.

Keywords: Iot, MQTT protocol, machine learning, sensor, publish, subscriber, agriculture, humidity

Procedia PDF Downloads 60
25143 Improving Fake News Detection Using K-means and Support Vector Machine Approaches

Authors: Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy

Abstract:

Fake news and false information are big challenges of all types of media, especially social media. There is a lot of false information, fake likes, views and duplicated accounts as big social networks such as Facebook and Twitter admitted. Most information appearing on social media is doubtful and in some cases misleading. They need to be detected as soon as possible to avoid a negative impact on society. The dimensions of the fake news datasets are growing rapidly, so to obtain a better result of detecting false information with less computation time and complexity, the dimensions need to be reduced. One of the best techniques of reducing data size is using feature selection method. The aim of this technique is to choose a feature subset from the original set to improve the classification performance. In this paper, a feature selection method is proposed with the integration of K-means clustering and Support Vector Machine (SVM) approaches which work in four steps. First, the similarities between all features are calculated. Then, features are divided into several clusters. Next, the final feature set is selected from all clusters, and finally, fake news is classified based on the final feature subset using the SVM method. The proposed method was evaluated by comparing its performance with other state-of-the-art methods on several specific benchmark datasets and the outcome showed a better classification of false information for our work. The detection performance was improved in two aspects. On the one hand, the detection runtime process decreased, and on the other hand, the classification accuracy increased because of the elimination of redundant features and the reduction of datasets dimensions.

Keywords: clustering, fake news detection, feature selection, machine learning, social media, support vector machine

Procedia PDF Downloads 173
25142 Purpose in Procurement: Much Discussed, Less Conceptualized – An Exploratory Study of CPO Perceptions Based on the Gioia Methodology

Authors: Laurin Zemmrich, Nicolai Stickler

Abstract:

With the ongoing debate over how to incorporate sustainability, resilience, and value creation into business strategies, many procurement departments are put under pressure by governments, consumers, non-governmental organizations, and other stakeholders to disclose more information about their supply chains. According to practitioners and experts, procurement benefits the supply chain by increasing transparency and accountability, recruiting new suppliers, and supporting sustainable and ethical sourcing strategies. While most procurement departments establish these objectives, the bulk of activities are not carried out or are not regularly monitored. With the full potential of targeted sourcing still to be realized, procurement executives, in particular, are seeking for short-term cost-cutting impacts to appease external shareholders. We overcome this limitation by using an abductive approach to research and integrating empirical data from a Gioia methodology study design with relevant literature. Our analysis demonstrates that the procurement department has six essential levers aligned with sustainability, resilience, and value creation objectives and contributes to developing a new intra- and interorganizational purpose within the supply chain. Three enablers are identified as having a value-creating effect on supply chain interactions. Additionally, we discovered two impacts that alter the power balance between buyers and suppliers during transactions and have a cost-cutting or cost-avoiding effect. While cost-cutting, cost-avoidance, and dependency-reduction impacts are desirable, redistributing power may also have negative consequences. The article establishes a first strategy framework for evaluating the influence of the procurement department on supply chain transactions, allowing managers to understand better and apply the sourcing function inside a supply chain and embed it throughout the business.

Keywords: supply chain management, resilience, sustainability, value creation, purpose

Procedia PDF Downloads 115
25141 Integration of Microarray Data into a Genome-Scale Metabolic Model to Study Flux Distribution after Gene Knockout

Authors: Mona Heydari, Ehsan Motamedian, Seyed Abbas Shojaosadati

Abstract:

Prediction of perturbations after genetic manipulation (especially gene knockout) is one of the important challenges in systems biology. In this paper, a new algorithm is introduced that integrates microarray data into the metabolic model. The algorithm was used to study the change in the cell phenotype after knockout of Gss gene in Escherichia coli BW25113. Algorithm implementation indicated that gene deletion resulted in more activation of the metabolic network. Growth yield was more and less regulating gene were identified for mutant in comparison with the wild-type strain.

Keywords: metabolic network, gene knockout, flux balance analysis, microarray data, integration

Procedia PDF Downloads 575