J. Muth
Hasil untuk "Information theory"
Menampilkan 20 dari ~21730293 hasil · dari DOAJ, CrossRef, Semantic Scholar
W. Schneider, R. Shiffrin
Mohammad Qudah, Husain A. Murad, Mohammed Habes et al.
This study explores the impact of DW’s news coverage on the perceptions, knowledge, and behavioural changes of the Syrian diaspora in Germany regarding the Syrian crisis. Grounded in the Uses and Gratifications theory, data were collected from 207 Syrian immigrants residing in Germany between September and November 2023 using a convenience sampling approach. The findings reveal that DW is perceived as a credible and objective news source that provides comprehensive and balanced coverage of the Syrian crisis. Exposure to DW’s reporting significantly enhanced respondents’ understanding of the crisis, enabling them to engage in informed discussions. DW’s coverage motivated behavioural changes, encouraging participation in social media discussions and humanitarian initiatives. This study highlights the critical role of trusted international media in shaping diaspora communities’ perceptions, knowledge, and actions during crises. These findings also highlight DW’s influence as a key information source for the Syrian diaspora, fostering both awareness and proactive engagement with the ongoing crisis.
Aneeza Alam, Ahmad Sami Al-Shamayleh, Nisrean Thalji et al.
Abstract A bone fracture is a medical condition characterized by a partial or complete break in the continuity of the bone. Fractures are primarily caused by injuries and accidents, affecting millions of people worldwide. The healing process for a fracture can take anywhere from one month to one year, leading to significant economic and psychological challenges for patients. The detection of bone fractures is crucial, and radiographic images are often relied on for accurate assessment. An efficient neural network method is essential for the early detection and timely treatment of fractures. In this study, we propose a novel transfer learning-based approach called MobLG-Net for feature engineering purposes. Initially, the spatial features are extracted from bone X-ray images using a transfer model, MobileNet, and then input into a tree-based light gradient boosting machine (LGBM) model for the generation of class probability features. Several machine learning (ML) techniques are applied to the subsets of newly generated transfer features to compare the results. K-nearest neighbor (KNN), LGBM, logistic regression (LR), and random forest (RF) are implemented using the novel features with optimized hyperparameters. The LGBM and LR models trained on proposed MobLG-Net (MobileNet-LGBM) based features outperformed others, achieving an accuracy of 99% in predicting bone fractures. A cross-validation mechanism is used to evaluate the performance of each model. The proposed study can improve the detection of bone fractures using X-ray images.
Nusrat Jahan, Saiful Hoque, Md Alamgir Hossain et al.
Social media has become integral to contemporary society, with online behaviors impacting individual experiences and the wider community. In Bangladesh, a developing country, SNS have played a pivotal role in the nation's digitalization efforts. This study explores the relationship between social capital theory, D&M Information System Model, subjective well-being, and SNS Citizenship Behavior (SCB) among active social media users in Bangladesh. Data was collected from 418 participants through an online survey, and hypotheses were tested using structural equation modeling. The findings indicate that the items of the D&M model positively influenced the aspects of social capital theory, excluding service quality. In contrast, social interaction ties and shared values were positively associated with SCB, although social trust did not exhibit a significant relationship. Additionally, subjective well-being mediated the connection between social capital and SCB. This research offers valuable insights into the factors influencing online prosocial behavior and provides practical implications for cultivating a positive communication culture in the digital era. The model proposed in this study holds significant implications for Bangladesh's policymakers and social networking site authorities, guiding their efforts in implementing technology-based initiatives.
Siyang Xu, Jiebei Zhu, Bingsen Li et al.
With large-scale grid integration of renewable energy sources (RES), power grid operations gradually exhibit the new characteristics of high-order uncertainty, leading to significant challenges for system operational security. Traditional model-driven generation dispatch methods require large computational resources, whereas the widely concerned Reinforcement Learning (RL)-based methods lead to issues such as slow training speed due to the high complexity and dimension of processed grid state information. For this reason, this paper proposes a novel Grid Expert Strategy Imitation Learning (GESIL)-based real-time (5 min intervals in this paper) dispatch method. Firstly, a grid model is established based on the graph theory. Secondly, a pure rule-based grid expert strategy (GES) considering detailed power grid operations is proposed. Then, the GES is combined with the established model to obtain a GESIL agent using imitation learning by offline–online training, which can produce specific grid dispatch decisions for real-time. By designing a graph theory-based grid model, a model-driven purely rule-based GES, and embedding a penalty factor-based loss function into IL offline–online training, GESIL ultimately achieves high training speed, high solution speed, and strong generalization capability. A modified IEEE 118-node system is employed to compare the proposed GESIL to traditional dispatch method and RL method. Results show that GESIL has significantly improved computational efficiency by approximately 17 times and training speed by 14.5 times. GESIL can more stably and efficiently compute real-time dispatch decisions of grid operations, enhancing the optimization effect in terms of transmission overloading mitigation, transmission loading optimization, and power balancing control.
Esmat Momeni
Purpose: Identifying, accessing, and evaluating course content, along with the skills of extracting, reasoning, and inferring, lead to the organization and presentation of materials in teaching. The purpose of the current research is to enhance the educational content of Bruner's curriculum by incorporating information literacy skills and critical thinking. Method: The current research is fundamental in terms of its purpose and has conducted using with the comparative qualitative content analysis method, with a directional approach. Research data has been collected in six stages through the study of library documents. The validity of the current research is based on content and reliability, utilizing library texts and documents. The reliability is ensured through a detailed description of steps and information analysis, as well as the principle of verifiability by maintaining documents related to different stages of the research. Finally, the principle of accuracy is intended to convey the research results accurately and in detail. Findings: The research findings indicated that the ability to identify information needs and analyze effectively empowers learners to respond to both typical and atypical questions within the content. The skill of obtaining the required information and the ability to infer encourage learners to engage critically with the content, prompting them to problematize and build upon previous concepts at the start of the lesson. The ability to critique and evaluate information sources, along with inferential reasoning skills, can transform content from simple to complex by presenting new concepts in a prominent and specific manner. The skill of optimal utilization of information sources and the ability of inductive reasoning are essential for learners to comprehend concepts by identifying similarities and differences, promoting practical guessing based on the content. The skill of complying with legal and ethical principles in information use, along with the skill of evaluation, fosters awareness in learners and lays the foundation for active participation, teamwork, self-direction, and independence. Conclusion: Learners in the process draw based on the fourteen cases of the educational from of curriculum, integrating the skills of information literacy and thinking. This integration helps them thinking, establish connections relationships information the information in their leading leads enhanced greater understanding, learning, learning the assimilation of new achieving content concepts. new. It is suggested to enhance the educational content of Bruner's curriculum by incorporating critical thinking skills and information literacy.
Neda Azizi, Peyman Akhavan, Ali Ahsan et al.
The present study aims to extend our understanding of motivational factors that improve the knowledge sharing intention of employees thereby can lead to creating knowledge successfully. Specifically, we aim to extend previous knowledge management research to contribute to both knowledge sharing theory and knowledge creation process with consideration of motivational factors including socialization, externalization, combination and internalization. This study has used quantitative research methodology wherein the data have been collected from 405 students from various universities in Iran using a survey questionnaire. Structural equation modelling has been applied to test the hypotheses of the study. The findings of the study reveal that motivational factors positively influence knowledge sharing and knowledge creation. Results reveal that motivational factors tend to increase the usage of knowledge sharing methods, and consequently, they impact on the creation process of knowledge. Further, motivational factors act as a mediator between knowledge sharing and knowledge creation. This study has limitations that present opportunities for future research. First, the research context covered people from universities only, which limits the generalizability of findings. Second, we did not consider regional cultural differences, which could cause variations in people’ knowledge sharing intention. Future studies can build upon the research models to understand the influence of the cultural factors on other type of organisations. This research contributes to both knowledge sharing theory and knowledge creation process with consideration of motivational factors including socialization, externalization, combination and internalization. Thus, the study provides directions to managers to focus on cognitive social aspects (i.e., motivational factors) to encourage the people to share and create knowledge. To the best of authors’ knowledge, this study is an early study conducted to examine the influence of motivational factors on knowledge sharing and knowledge creation. This research provides valuable information and guidelines that will be helpful for the managers to consider the important issues during knowledge creation establishment in the universities and organizations which are directly involved with creating knowledge.
M.G. Tokmachev
The paper proposes an algorithm for processing a photo of a granule in order to determine its volume. Factors that influence the result of automatic data processing in the optical micrometry method are investigated. It is shown that by estimating the outline of an ellipse-shaped granule, the algorithm determines its volume with a relative error of 0.4 %, which corresponds to an error in determining the granule diameter of 1 pixel.
Bram Vroege
(Series Information) European Papers - A Journal on Law and Integration, 2021 6(3), 1575-1601 | Article | (Table of Contents) I. Introduction. - II. Methodology. - II.1. Cause and effect: contextualising the EDF. - III. If you want peace, sell more guns? - IV. From theory to practice: the ineffectiveness of arms export controls in the EU. - V. Don't fuel the fire: the EU's duty to act as a responsible arms financier. - V.1. The EU as a guardian of the international legal order. - V.2. The EU as a consistent legislator. - V.3. The nature of the EU's duty to act as a responsible arms financier. - VI. Designing a more responsible European Defence Fund. - VI.1. Operationalising the EU's duty to act as a responsible arms financier. - VI.2. Analysing the EU's policy toolbox. - VII. Conclusion. | (Abstract) Through the European Defence Fund (EDF) the EU will become involved for the first time in arms development. EDF funding is intended to contribute to the EU's strategic autonomy in defence. But arms developed with EDF funding may also be exported to non-EU States. International and EU norms meant to ensure a humane and responsible arms trade are insufficiently effective, leaving room for Member States to export arms even when there is a serious risk of their use in violations of international humanitarian law (IHL). On the basis of both legal and policy-based arguments, this Article argues that the EU has failed to properly take these IHL concerns into account in the EDF Regulation. The EU's commitments to international law and to consistency require it to refrain from con-tributing to activities prohibited under international and EU law. These commitments oblige the EU to act as a responsible arms financier. This would also be in line with EU soft power efforts to pro-mote export norm adoption and compliance internationally. For such soft power efforts to be effective, the EU must visibly uphold those norms it is trying to promote. By failing to enact measures that could mitigate the risk of illegal exports of EDF-funded arms - such as a ban on financing certain high-risk activities or a financial clawback mechanism in case funding recipients export arms illegally - the EU is violating its commitments to international law and to consistency and jeopardising its reputation as an international norm entrepreneur.
Linda Andriani
Presidential elections in Indonesia are practices of Indonesian democracy that are interesting to be discussed in the community, especially for women. The research objective was to dismantle the political message patterns in women's participatory communication patterns through the use of Facebook. in the Presidential Election of the Republic of Indonesia in 2019. This research uses the Action Assembly Theory. This is a descriptive qualitative research with a constructivist paradigm and a Netnographic method. The results showed that the pattern of women's political messages on the Facebook wall was a woman's actions in the form of support for both Candidate Pairs of Presidential and Vice-President Candidates 01 and 02 or rejection of Candidate Pairs of Presidential and Vice-President Number 01 or 02. Researchers also found that nowadays it is important for women to master digital literacy and the Law on Information and Electronic Transactions (ITE Law). Keywords:
article editorial
.
Shih-Hsien Tseng, Tien Son Nguyen
In the “Age of the Internet”, fake news and rumor-mongering have emerged as some of the most critical factors that affect our online social lives. For example, in the workplace, rumor spreading runs rampant during times when employees may be plagued with uncertainty about the nature and consequences of major changes. Positive information should be widely propagated as much as possible; however, we must limit the spread of rumors in an effort to reduce their inherently harmful effects. The purpose of this research is to explain the mechanisms for controlling rumors and suggest an approach for dispelling the rumor effect in the workplace. In this study, we will present a simple simulation framework of agent-based modeling and apply Social Impact Theory to explain rumor propagation within social networks. Based on our results, we have found that organizations can significantly reduce the spread of the rumors by improving the workplace environment and instituting counseling for those in management positions.
Ludek LUKAS
The safety and security is one of the key areas of interest for society and especially for organizations. Several dozen kinds of safety and security exist today. The organization must provide several kinds of security at the same time. Physical security, information security, occupational health and safety, fire protection and others are among the kinds of security provided. These kinds of safety and security usually exist independently, that causing problems. Discrepancy, greater complexity, staffing and financial costs are among those problems. Converged security is a possible solution. Converged security represents the integration of compatible kinds of safety and security. As a rule, physical security, cybersecurity and operational safety integrated into converged security within the organization. Converged security integrates separate data and events into a single unit, enabling a better understanding of the security situation. At the same time, it enables faster resolution of security breaches. Introducing converged security in an organization requires a good understanding of the security environment in which the reference object is located. Several ways of representing a security environment in the form of a model exist at present. The article describes how to create an organization's security environment model. It considers the conceptual model to be the most appropriate. This model allows a deeper analysis of the security environment. The article is a contribution to the development of theory of safety and security.
Mahdi Zahedi Nooghabi, Rahmatollah Fattahi, Javad Salehi Fadardi et al.
Nowadays most of the day today services we receive are based upon computer systems. Services such as information searching or online shopping are considered among the most frequent online information systems’ services. Users assess and process the information they receive from information systems. The theory of mind information processing asserts that humans process and analyze the information they receive from their environment. This theory also deals with the perception and recognition. User-interface paves the way regarding using and reaching the goal for the ultimate users. If user-interface is designed properly, the way through which the user reaches his/her goal would be a logical one; otherwise the lack of solidarity would result in system misuse. In other words if the user-interface grabs the user’s attention, the interaction with the user would be successful. For studying the human-computer interaction a lot of methods have been proposed. Eye-tracking method is one of them. This method makes it possible to gather qualitative and quantitative data in this regard. Eyesight is very important regarding human perception, thus its data could be invaluable. The basis of this method is mind-eye theory which says eyes’movements could show the attention of a person regarding a picture or stimuli. This attention could report passion or problem. There are different types of eye movement, such as a fixation and saccade. Eye tracking delivers a voluminous data regarding users’ attention in the form of quick and unconscious processes. Analyzing the eye-movement data is hard and its data extraction is tedious. Moreover the test environment and users’ health are also of great importance in this regard. At last one must mention that eye movement data is invaluable for assessing the bottom-up cognition of the world and the top-down perception of mind.
Mark Jeffries, Richard N Keers, Denham L Phipps et al.
INTRODUCTION:Developments in information technology offer opportunities to enhance medication safety in primary care. We evaluated the implementation and adoption of a complex pharmacist-led intervention involving the use of an electronic audit and feedback surveillance dashboard to identify patients potentially at risk of hazardous prescribing or monitoring of medicines in general practices. The intervention aimed to create a rapid learning health system for medication safety in primary care. This study aimed to explore how the intervention was implemented, adopted and embedded into practice using a qualitative process evaluation. METHODS:Twenty two participants were purposively recruited from eighteen out of forty-three general practices receiving the intervention as well as clinical commissioning group staff across Salford UK, which reflected the range of contexts in which the intervention was implemented. Interviews explored how pharmacists and GP staff implemented the intervention and how this affected care practice. Data analysis was thematic with emerging themes developed into coding frameworks based on Normalisation Process Theory (NPT). RESULTS:Engagement with the dashboard involved a process of sense-making in which pharmacists considered it added value to their work. The intervention helped to build respect, improve trust and develop relationships between pharmacists and GPs. Collaboration and communication between pharmacists and clinicians was primarily initiated by pharmacists and was important for establishing the intervention. The intervention operated as a rapid learning health system as it allowed for the evidence in the dashboard to be translated into changes in work practices and into transformations in care. CONCLUSIONS:Our study highlighted the importance of the combined use of information technology and the role of pharmacists working in general practice settings. Medicine optimisation activities in primary care may be enhanced by the implementation of a pharmacist-led electronic audit and feedback system. This intervention established a rapid learning health system that swiftly translated data from electronic health records into changes in practice to improve patient care. Using NPT provided valuable insights into the ways in which developing relationships, collaborations and communication between health professionals could lead to the implementation, adoption and sustainability of the intervention.
Halaman 15 dari 1086515