Search results for: information access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12757

Search results for: information access

12547 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage

Authors: M. Iommi, G. Losco

Abstract:

Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.

Keywords: energy building design tools, solar access analysis, solar potential, urban planning

Procedia PDF Downloads 317
12546 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri

Abstract:

This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.

Keywords: JAX-WS, SMTP, SOAP, web service, XML

Procedia PDF Downloads 460
12545 Effect of Access to Finance on Innovation and Productivity of SMEs in Nigeria: Evidence from the World Bank Enterprise Survey

Authors: Abidemi C. Adegboye, Samuel Iweriebor

Abstract:

The primary link between financial institutions and economic performance is the provision of resources by these institutions to businesses in order to drive enterprise expansion, sustainability, and development. In this study, the role of access to finance in driving innovations and productivity in Nigerian SMEs is investigated using the World Bank Enterprise Survey (ES) dataset. Innovation is defined based on the ES analysis using five compositions including product, method, organisational, use of foreign-licensed technology, and spending on R&D. The study considers finance in terms of source in meeting investment needs and in terms of access. Moreover, finance access is categorized as external and internal to a firm with each having different implications. The research methodology adopted a survey analysis based on the 2014 World Bank Enterprise Survey of 19 states in Nigeria. The survey comprised over 10,000 manufacturing and services firms, both at the small scale and medium scale levels. The logit estimation technique is used to estimate the relationships in the study. The results from the empirical analysis show that in general, access to finance drives SME innovation in Nigeria. In particular, ease of accessing bank loans and credit is shown to be the strongest positive force in driving all types of innovation among SMEs in Nigeria. In the same vein, the type of finance source for investment matters in terms of how it affects innovation: it is shown that both internal and external sources improve investment in product, process, and organisational innovation, but only external financing has effect on R&D spending and use of foreign licensed technology. Overall spending on R&D is only driven by access to external finance by the SMEs. For productivity, the results show that while structure of financing investment improves productivity, increased access to finance may actually lead to productivity decline among SMEs in Nigeria. There is a need for the financial system to evolve structures to increase fund availability to SMEs in Nigeria, especially for the purpose of innovation investment.

Keywords: access to finance, financing investment, innovation, productivity, SMEs

Procedia PDF Downloads 329
12544 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama

Authors: Frie Ayalew, Seada Hussen

Abstract:

Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.

Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation

Procedia PDF Downloads 49
12543 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 332
12542 Persuasive Communication on Social Egg Freezing in California from a Framing Theory Perspective

Authors: Leila Mohammadi

Abstract:

This paper presents the impact of persuasive communication implemented by fertility clinics websites, and how this information influences women at their decision-making for undertaking this procedure. The influential factors for women decisions to do social egg freezing (SEF) are analyzed from a framing theory perspective, with a specific focus on the impact of persuasive information on women’s decision making. This study follows a quantitative approach. A two-phase survey has been conducted to examine the interest rate to undertake SEF. In the first phase, a questionnaire was available during a month (May 2015) to women to answer whether or not they knew enough information of this process, with a total of 230 answers. The second phase took place in the two last weeks of July 2015. All the respondents were invited to a seminars called ‘All about egg freezing’ and afretwards they were requested to answer the second questionnaire. After the seminar, in which they were given an extensive amount of information about egg freezing, a total of 115 women replied the questionnaire. The collected data during this process were analyzed using descriptive statistics. Most of the respondents changed their opinion in the second questionaire which was after receiving information. Although in the first questionnaire their self-evaluation of having knowledge about this process and the implemented technologies was very high, they realized that they still need to access more information from different sources in order to be able to make a decision. The study reached the conclusion that persuasive and framed information by clinics would affect the decisions of these women. Despite the reasons women have to do egg freezing and their motivations behind it, providing people necessary information and unprejudiced data about this process (such as its positive and negative aspects, requirements, suppositions, possibilities and consequences) would help them to make a more precise and reasonable decision about what they are buying.

Keywords: decision making, fertility clinics, framing theory, persuasive information, social egg freezing

Procedia PDF Downloads 220
12541 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 113
12540 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 26
12539 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 169
12538 Digitalize or Die-Responsible Innovations in Healthcare and Welfare Sectors

Authors: T. Iakovleva

Abstract:

Present paper suggests a theoretical model that describes the process of the development of responsible innovations on the firm level in health and welfare sectors. There is a need to develop new firm strategies in these sectors. This paper suggests to look on the concept of responsible innovation that was originally developed on the social level and to apply this new concept to the new area of firm strategy. The rapid global diffusion of information and communication technologies has greatly improved access to knowledge. At the same time, communication is cheap, information is a commodity, and global trade increases technological diffusion. As a result, firms and users, including those outside of industrialized nations, get early exposure to the latest technologies and information. General-purpose technologies such as mobile phones and 3D printers enable individuals to solve local needs and customize products. The combined effect of these changes is having a profound impact on the innovation landscape. Meanwhile, the healthcare sector is facing unprecedented challenges, which are magnified by budgetary constraints, an aging population and the desire to provide care for all. On the other hand, patients themselves are changing. They are savvier about their diseases, they expect their relation with the healthcare professionals to be open and interactive, but above all they want to be part of the decision process. All of this is a reflection of what is already happening in other industries where customers have access to large amount of information and became educated buyers. This article addresses the question of how ICT research and innovation may contribute to developing solutions to grand societal challenges in a responsible way. A broad definition of the concept of responsibility in the context of innovation is adopted in this paper. Responsibility is thus seen as a collective, uncertain and future-oriented activity. This opens the questions of how responsibilities are perceived and distributed and how innovation and science can be governed and stewarded towards socially desirable and acceptable ends. This article addresses a central question confronting politicians, business leaders, and regional planners.

Keywords: responsible innovation, ICT, healthcare, welfare sector

Procedia PDF Downloads 168
12537 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System

Authors: Loreta Axhami

Abstract:

Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.

Keywords: authoritarian pedagogic model, education system, ICT, media literacy

Procedia PDF Downloads 99
12536 Girls’ Education Policy and Practices in Three Selected Countries of Africa: Feminism, Educational Reform and Cultural Inflections in View

Authors: Endalew Fufa Kufi

Abstract:

One of the major concerns in educational provision and success determination is access to available opportunities. In that, girls’ access to education has been a point of concern, and more emphasis has come to be at the forefront regarding success. Researches have mostly been held on extremes such as equal access and success, but only a few works deal with process issues related to home and school interplay, issues of progress from lower to higher levels, and spatial conditions related to girls’ education. Hence, this survey assessed experiences in three countries of Africa: Ethiopia, Ghana, and Botswana regarding girls’ education in policy and practice as related to contextual matters in girls’ education. Contextual discourse analysis of qualitative design was used to materialize the study. From each country, five research works held 2010 onwards were purposively selected through criterion-sampling. On the policy aspect, workable documents were looked into. The findings denoted that educational access was of more stretch and generic nature, and the narration was dominated by institutional expectations, not identifying which group should benefit what. The researches largely dealt with either subject-specific dealings or access alone at large. Success studies, by far, dealt with a comparison of girls with boys rather than determinant-related projections. Moreover, the cultural representation of girls’ education had a very minimal part in both policy and researches. From that, it could be found that in-depth scrutiny on the individual, institutional, and leadership determinants of girls’ education would be necessary.

Keywords: determinants, girls, education, feminism

Procedia PDF Downloads 256
12535 Factors Contributing to Farmers’ Attitude Towards Climate Adaptation Farming Practices: A Farm Level Study in Bangladesh

Authors: Md Rezaul Karim, Farha Taznin

Abstract:

The purpose of this study was to assess and describe the individual and household characteristics of farmers, to measure the attitude of farmers towards climate adaptation farming practices and to explore the individual and household factors contributing in predicting their attitude towards climate adaptation farming practices. Data were collected through personal interviews using a pre-tested interview schedule. The data collection was done at Biral Upazila under Dinajpur district in Bangladesh from 1st November to 15 December 2018. Besides descriptive statistical parameters, Pearson’s Product Moment Correlation Coefficient (r), multiple regression and step-wise multiple regression analysis were used for the statistical analysis. Findings indicated that the highest proportion (77.6 percent) of the farmers had moderately favorable attitudes, followed by only 11.2 percent with highly favorable attitudes and 11.2 percent with slightly favorable attitudes towards climate adaptation farming practices. According to the computed correlation coefficients (r), among the 10 selected factors, five of them, such as education of household head, farm size, annual household income, organizational participation, and information access by extension services, had a significant relationship with the attitude of farmers towards climate-smart practices. The step-wise multiple regression results showed that two characteristics as education of household head and information access by extension services, contributed 26.2% and 5.1%, respectively, in predicting farmers' attitudes towards climate adaptation farming practices. In addition, more than two-thirds of farmers cited their opinion to the problems in response to ‘price of vermi species is high and it is not easily available’ as 1st ranked problem, followed by ‘lack of information for innovative climate-smart technologies’. This study suggests that policy implications are necessary to promote extension education and information services and overcome the obstacles to climate adaptation farming practices. It further recommends that research study should be conducted in diverse contexts of nationally or globally.

Keywords: factors, attitude, climate adaptation, farming practices, Bangladesh

Procedia PDF Downloads 57
12534 VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

Authors: Justie Su-Tzu Juan, Ming-Jheng Li, Ching-Fen Lee, Ruei-Yu Wu

Abstract:

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.

Keywords: multi-secret image sharing scheme, verifiable, de-tectable, general access structure

Procedia PDF Downloads 100
12533 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 264
12532 Instructional Information Resources

Authors: Parveen Kumar

Abstract:

This article discusses institute information resources. Information, in its most restricted technical sense, is a sequence of symbols that can be interpreted as message information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message being conveyed. This concept has numerous other meanings in different contexts. Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.

Keywords: institutions, information institutions, information services for mission-oriented institute, pattern

Procedia PDF Downloads 330
12531 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 299
12530 The Perceptions of Patients with Osteoarthritis at a Public Community Rehabilitation Centre in the Cape Metropole for Using Digital Technology in Rehabilitation

Authors: Gabriela Prins, Quinette Louw, Dawn Ernstzen

Abstract:

Background: Access to rehabilitation services is a major challenge globally, especially in low-and-middle income countries (LMICs) where resources and infrastructure are extremely limited. Telerehabilitation (TR) has emerged in recent decades as a highly promising method to dramatically expand accessibility to rehabilitation services globally. TR provides rehabilitation care remotely using communication technologies such as video conferencing, smartphones, and internet-connected devices. This boosts accessibility to underprivileged regions and allows for greater flexibility for patients. Despite this, TR is hindered by several factors, including limited technological resources, high costs, lack of digital access, and the unavailability of healthcare systems, which are major barriers to widespread adoption among LMIC patients. These barriers have collectively hindered the potential implementation and adoption of TR services in LMICs healthcare settings. Adoption of TR will also require the buy-in of end users and limited information is known on the perspectives of the SA population. Aim: The study aimed to understand patients' perspectives regarding the use of digital technology as part of their OA rehabilitation at a public community healthcare centre in the Cape Metropole Area. Methods: A qualitative descriptive study design was used on 10 OA patients from a public community rehabilitation centre in South Africa. Data collection included semi-structured interviews and patient-reported outcome measures (PSFS, ASES-8, and EuroQol EQ-5D-5L) on functioning and quality of life. Transcribed interview data were coded in Atlas.ti. 22.2 and analyzed using thematic analysis. The results were narratively documented. Results: Four themes arose from the interviews. The themes were Telerehabilitation awareness (Use of Digital Technology Information Sources and Prior Experience with Technology /TR), Telerehabilitation Benefits (Access to healthcare providers, Access to educational information, Convenience, Time and Resource Efficiency and Facilitating Family Involvement), Telerehabilitation Implementation Considerations (Openness towards TR Implementation, Learning about TR and Technology, Therapeutic relationship, and Privacy) and Future use of Telerehabilitation (Personal Preference and TR for the next generation). The ten participants demonstrated limited awareness and exposure to TR, as well as minimal digital literacy and skills. Skepticism was shown when comparing the effectiveness of TR to in-person rehabilitation and valued physical interactions with health professionals. However, some recognized potential benefits of TR for accessibility, convenience, family involvement and improving community health in the long term. Willingness existed to try TR with sufficient training. Conclusion: With targeted efforts addressing identified barriers around awareness, technological literacy, clinician readiness and resource availability, perspectives on TR may shift positively from uncertainty towards endorsement of this expanding approach for simpler rehabilitation access in LMICs.

Keywords: digital technology, osteoarthritis, primary health care, telerehabilitation

Procedia PDF Downloads 30
12529 Mass Media Products Consumption Patterns in Rural South-South, Nigeria Communities

Authors: Inemesit Akpan Umoren, Aniekan James Akpan

Abstract:

Media practitioners and information managers have often erroneously operated on the premise that media messages are received as disseminated to the extent that audiences of whatever background assimilate the content uniformly. This does not subsist since media audiences are often segmented in terms of educational level, social category, place of residence, gender, among others. While those who are highly educated, live in urban areas and are of highest standing are more likely to have direct access to the media, those in the rural areas and of low education and standing, may not have direct or easy access. These, therefore, informed the study to establish the consumption patterns of mass media products by residents of rural communities in south-south, Nigeria. The study, which was anchored on the multi-step flow and social categories theories, adopted a survey research design and a sample of 383 using Mayer’s 1979 guide drawn from nine rural communities in the south-south, Nigeria states of Akwa Ibom, Rivers and Edo. Findings among others showed that while a negligible percentage is highly exposed to media messages of all types, a greater member depend on opinion leaders, social groups, drinking joints, among other such for filtered content. It was concluded that since rural or community media organizations are very vital in ensuring media content get to all audience without necessarily being passing through intermediaries. Among the recommendations was that information managers and media organizations should always have in mind the ruralites while packaging their contents even in the mainstream media.

Keywords: consumption, media, media product, pattern

Procedia PDF Downloads 109
12528 Meeting User’s Information Need: A Study on the Acceptance of Mobile Library Service at UGM Library

Authors: M. Fikriansyah Wicaksono, Rafael Arief Budiman, M. Very Setiawan

Abstract:

Currently, a wide range of innovative mobile library (M-Library) service is provided for the users in the library. The M-Library service is an innovation that aims to bring the collections of the library to users who currently use their smartphone so often. With M-Library services, it is expected that the users can fulfill their information needs more conveniently and practically. This study aims to find out how users use M-Library services provided by UGM library. This study applied a quantitative approach to investigate how to use the application M-Library. The Technology Acceptance Model (TAM) theory is applied to perform the analysis in terms of perceived usefulness, perceived ease of use, attitude towards behavior, behavioral intention and actual system usage. The results show that overall the users found that the M-Library application is useful to meet their information needs. Such as facilitate user to access e-resources, search UGM library collections, online booking collections, and reminder for returning book.

Keywords: m-library, mobile library services, technology acceptance, library of UGM

Procedia PDF Downloads 200
12527 A Corpus-Based Approach to Understanding Market Access in Fisheries and Aquaculture: A Systematic Literature Review

Authors: Cheryl Marie Cordeiro

Abstract:

Although fisheries and aquaculture studies might seem marginal to international business (IB) studies in general, fisheries and aquaculture IB (FAIB) management is currently facing increasing pressure to meet global demand and consumption for fish in the next coming decades. In part address to this challenge, the purpose of this systematic review of literature (SLR) study is to investigate the use of the term ‘market access’ in its context of use in the generic literature and business sector discourse, in comparison to the more specific literature and discourse in fisheries, aquaculture and seafood. This SLR aims to uncover the knowledge/interest gaps between the academic subject discourses and business sector practices. Corpus driven in methodology and using a triangulation method of three different text analysis software including AntConc, VOSviewer and Web of Science (WoS) analytics, the SLR results indicate a gap in conceptual knowledge and business practices in how ‘market access’ is conceived and used in the context of the pharmaceutical healthcare industry and FAIB research and practice. While it is acknowledged that the product orientation of different business sectors might differ, this SLR study works with the assumption that both business sectors are global in orientation. These business sectors are complex in their operations from product to market. This SLR suggests a conceptual model in understanding the challenges, the potential barriers as well as avenues for solutions to developing market access for FAIB.

Keywords: market access, fisheries and aquaculture, international business, systematic literature review

Procedia PDF Downloads 121
12526 The Development of Open Access in Latin America and Caribbean: Mapping National and International Policies and Scientific Publications of the Region

Authors: Simone Belli, Sergio Minniti, Valeria Santoro

Abstract:

ICTs and technology transfer can benefit and move a country forward in economic and social development. However, ICT and access to the Internet have been inequitably distributed in most developing countries. In terms of science production and dissemination, this divide articulates itself also through the inequitable distribution of access to scientific knowledge and networks, which results in the exclusion of developing countries from the center of science. Developing countries are on the fringe of Science and Technology (S&T) production due not only to low investment in research but also to the difficulties to access international scholarly literature. In this respect, Open access (OA) initiatives and knowledge infrastructure represent key elements for both producing significant changes in scholarly communication and reducing the problems of developing countries. The spreading of the OA movement in the region, exemplified by the growth of regional and national initiatives, such as the creation of OA institutional repositories (e.g. SciELO and Redalyc) and the establishing of supportive governmental policies, provides evidence of the significant role that OA is playing in reducing the scientific gap between Latin American countries and improving their participation in the so-called ‘global knowledge commons’. In this paper, we map OA publications in Latin America and observe how Latin American countries are moving forward and becoming a leading force in widening access to knowledge. Our analysis, developed as part of the H2020 EULAC Focus research project, is based on mixed methods and consists mainly of a bibliometric analysis of OA publications indexed in the most important scientific databases (Web of Science and Scopus) and OA regional repositories, as well as the qualitative analysis of documents related to the main OA initiatives in Latin America. Through our analysis, we aim at reflecting critically on what policies, international standards, and best practices might be adapted to incorporate OA worldwide and improve the infrastructure of the global knowledge commons.

Keywords: open access, LAC countries, scientific publications, bibliometric analysis

Procedia PDF Downloads 183
12525 Information Literacy Among Faculty Members in the Medical Colleges of Khyber Pakhtunkhwa-Pakistan

Authors: Saeed Ullah Jan, Waheed Ullah Kha

Abstract:

Purpose of the study: This study aims to assess faculty members' information literacy skills in public sector medical colleges in Khyber Pakhtunkhwa. Design/Methodology/approach: The descriptive research design was used to conduct and accomplish the study's objectives. The research population consisted of faculty members at public sector medical colleges in Khyber Pakhtunkhwa southern region. Professors, Associate Professors, Assistant Professors, Lecturers, and demonstrators comprise the faculty. The adapted questionnaires were modified and used as data collection instruments. Key findings: The majority of the public sector medical college faculty recognizes the various sources of information, and they use both printed and online materials to identify needed information. The majority of faculty at these medical colleges consults monographs/textbooks regularly, preceded by online journals/medical databases. A good number of medical faculty members opted to use the HEC digital library to locate and access their contents. Delimitations of the study: This study is delimited to three public sector medical colleges operate in southern districts: Khyber Medical University Institute of Medical Sciences (KIMS) in Kohat, the Gomal Medical College (GMC) in Dera Ismail Khan, and the Bannu Medical College (BMC) in Bannu. Practical implication(s): The findings of the study will motivate the policymakers and authorities of these three medical colleges in the southern region of Khyber Pakhtunkhwa to enhance the information literacy skills of medical faculty. This practice will result in an effective medical education in the province. Contribution to the knowledge: No significant work has been done on the Faculty's Information literacy skills at public sector medical colleges in Khyber Pakhtunkhwa. This study will add valuable literature to the literary world.

Keywords: information literacy skills-Khyber Pakhtunkhwa, information literacy skills-medical faculty-Khyber Pakhtunkhwa, medical sciences, information literacy, information-literacy-Pakistan

Procedia PDF Downloads 70
12524 Choice Analysis of Ground Access to São Paulo/Guarulhos International Airport Using Adaptive Choice-Based Conjoint Analysis (ACBC)

Authors: Carolina Silva Ansélmo

Abstract:

Airports are demand-generating poles that affect the flow of traffic around them. The airport access system must be fast, convenient, and adequately planned, considering its potential users. An airport with good ground access conditions can provide the user with a more satisfactory access experience. When several transport options are available, service providers must understand users' preferences and the expected quality of service. The present study focuses on airport access in a comparative scenario between bus, private vehicle, subway, taxi and urban mobility transport applications to São Paulo/Guarulhos International Airport. The objectives are (i) to identify the factors that influence the choice, (ii) to measure Willingness to Pay (WTP), and (iii) to estimate the market share for each modal. The applied method was Adaptive Choice-based Conjoint Analysis (ACBC) technique using Sawtooth Software. Conjoint analysis, rooted in Utility Theory, is a survey technique that quantifies the customer's perceived utility when choosing alternatives. Assessing user preferences provides insights into their priorities for product or service attributes. An additional advantage of conjoint analysis is its requirement for a smaller sample size compared to other methods. Furthermore, ACBC provides valuable insights into consumers' preferences, willingness to pay, and market dynamics, aiding strategic decision-making to provide a better customer experience, pricing, and market segmentation. In the present research, the ACBC questionnaire had the following variables: (i) access time to the boarding point, (ii) comfort in the vehicle, (iii) number of travelers together, (iv) price, (v) supply power, and (vi) type of vehicle. The case study questionnaire reached 213 valid responses considering the scenario of access from the São Paulo city center to São Paulo/Guarulhos International Airport. As a result, the price and the number of travelers are the most relevant attributes for the sample when choosing airport access. The market share of the selection is mainly urban mobility transport applications, followed by buses, private vehicles, taxis and subways.

Keywords: adaptive choice-based conjoint analysis, ground access to airport, market share, willingness to pay

Procedia PDF Downloads 47
12523 Artificial Intelligence as a Policy Response to Teaching and Learning Issues in Education in Ghana

Authors: Joshua Osondu

Abstract:

This research explores how Artificial Intelligence (AI) can be utilized as a policy response to address teaching and learning (TL) issues in education in Ghana. The dual (AI and human) instructor model is used as a theoretical framework to examine how AI can be employed to improve teaching and learning processes and to equip learners with the necessary skills in the emerging AI society. A qualitative research design was employed to assess the impact of AI on various TL issues, such as teacher workloads, a lack of qualified educators, low academic performance, unequal access to education and educational resources, a lack of participation in learning, and poor access and participation based on gender, place of origin, and disability. The study concludes that AI can be an effective policy response to TL issues in Ghana, as it has the potential to increase students’ participation in learning, increase access to quality education, reduce teacher workloads, and provide more personalized instruction. The findings of this study are significant for filling in the gaps in AI research in Ghana and other developing countries and for motivating the government and educational institutions to implement AI in TL, as this would ensure quality, access, and participation in education and help Ghana industrialize.

Keywords: artificial intelligence, teacher, learner, students, policy response

Procedia PDF Downloads 47
12522 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 291
12521 The Need for Implementing Building Information Modelling (BIM) and Integrated Project Delivery (IPD) in the Construction Project: A Case Study in UAE

Authors: C. W. F. Che Wan Putra, M. Alshawi, M. S. Al Ahbabi, M. Jabakhanji

Abstract:

Much of the waste that is generated throughout the life-cycle of a building is mainly related to project stakeholders not having access to information that others have created. This results in waste and high costs. Over the past decade, however, the industry reacted to these challenges by adopting effective procurement approaches, such as partnering and design and build, to improve collaboration and communication among projects’ stakeholders. Most recently, there is a focus on creating and reusing digital project information of stakeholders throughout the life-cycle to facilitate the exchange of information among partners. This shift is based around BIM (Building Information Modelling) and collaborative environment (IPD). The power of collaborative BIM goes beyond improving efficiency. Sustainability, perhaps the most important challenge for the design and construction community, is at the intersection of BIM and collaborative project delivery, drawing strength from both. Due to these benefits, a research study has been carried out to investigate the need of BIM and IPD, on a large scale construction project which is procured on a traditional approach, i.e. design-bid-build. A qualitative research work including a semi-structured interview with project partners was conducted on a typical project in the UAE, whereby the selected project suffered from severe delays and cost overrun. This paper aims to bring about clear evidence to what most likely to happen to a typical construction project in spite of employing very good consultants, project manager and contractors and how these problems could have been avoided if BIM and IPD were deployed.

Keywords: building information modelling (BIM), integrated project delivery (IPD), collaborative environment, case study

Procedia PDF Downloads 375
12520 Catastrophic Spending on Health: A Determinant of Access to Health Care by Migrant Slum Population

Authors: Saira Mehnaz, Ali Jafar Abedi, Shazia Farooq Fazli, Sakeena Mushfiq, Zulfia Khan, M. Athar Ansari

Abstract:

Introduction: Public health spending is a necessity in an underdeveloped country like India. The people are already suffering from poverty and that clubbed with out of pocket expenditure leads them to a very catastrophic situation, reducing the overall access to healthcare. Objectives: This study was designed to determine the usual source of medical care opted, the illness pattern, the expenditure incurred on illness and its source of procurement by the study population. It also intended to assess this expenditure as a determinant of access to health care. Methodology: Cities like Aligarh, which are classified as B grade cities in India are thought to be ripe sites for getting livelihood and hence are almost half filled with migrants living in urban slums. A cross sectional study was done to study the newer slum pockets. 3409 households with a population of 16,978 were studied with the help of pretested questionnaire; SPSS 20 was used for statistical analysis. Results and Conclusions: In our study, we found that almost all the households suffered from catastrophic health expenditure. The study population, which was already vulnerable owing to their low socio-economic and migrant status was further being forced with into poverty and indebtedness on account of expenditure on illness. This lead to a significant decrease in access to health. National health financing systems should be designed to protect households from financial catastrophe, by reducing out-of-pocket spending.

Keywords: access to healthcare, catastrophic health expenditure, new urban slums, out of pocket expenditure

Procedia PDF Downloads 175
12519 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station

Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner

Abstract:

A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.

Keywords: radio base station, maintenance, classification, detection, deep learning, automation

Procedia PDF Downloads 168
12518 Methodology of the Turkey’s National Geographic Information System Integration Project

Authors: Buse A. Ataç, Doğan K. Cenan, Arda Çetinkaya, Naz D. Şahin, Köksal Sanlı, Zeynep Koç, Akın Kısa

Abstract:

With its spatial data reliability, interpretation and questioning capabilities, Geographical Information Systems make significant contributions to scientists, planners and practitioners. Geographic information systems have received great attention in today's digital world, growing rapidly, and increasing the efficiency of use. Access to and use of current and accurate geographical data, which are the most important components of the Geographical Information System, has become a necessity rather than a need for sustainable and economic development. This project aims to enable sharing of data collected by public institutions and organizations on a web-based platform. Within the scope of the project, INSPIRE (Infrastructure for Spatial Information in the European Community) data specifications are considered as a road-map. In this context, Turkey's National Geographic Information System (TUCBS) Integration Project supports sharing spatial data within 61 pilot public institutions as complied with defined national standards. In this paper, which is prepared by the project team members in the TUCBS Integration Project, the technical process with a detailed methodology is explained. In this context, the main technical processes of the Project consist of Geographic Data Analysis, Geographic Data Harmonization (Standardization), Web Service Creation (WMS, WFS) and Metadata Creation-Publication. In this paper, the integration process carried out to provide the data produced by 61 institutions to be shared from the National Geographic Data Portal (GEOPORTAL), have been trying to be conveyed with a detailed methodology.

Keywords: data specification, geoportal, GIS, INSPIRE, Turkish National Geographic Information System, TUCBS, Turkey's national geographic information system

Procedia PDF Downloads 116