41 research outputs found

    Extending information system models to the health care context: An empirical study and experience from developing countries

    Get PDF
    © 2017, Zarka Private University. All rights reserved. This study aims to evaluate Hospital Information Systems (HIS) and their impact on end-user performance and the health care services in two developing countries. A survey methodology was used to gather empirical data for model validation and hypothesis testing. A correlation and factor analysis were conducted to test the reliability and validity of the study instrument. The structural equation modelling technique was also used to evaluate the measurement and the structural models. The results confirmed the significance of the integrated model in explaining user performance and demonstrated that our model can better represent factors associated with user performance and health care services; our model was able to explain 74% of the variance in user performance and 52% of the variance in the health care services. The study indicated the need to consider the context of the HIS when using models like the Technology Acceptance Model (TAM) and the information systems success model. Some information systems factors have become more relevant, such as System Quality (SQ) and Task-Technology Fit (TTF). Others have different implications, including ease of use and usefulness, indicating the need to adapt these models based on the context of the system under study

    Culture in the design of mHealth UI:An effort to increase acceptance among culturally specific groups

    Get PDF
    Purpose: Designers of mobile applications have long understood the importance of users’ preferences in making the user experience easier, convenient and therefore valuable. The cultural aspects of groups of users are among the key features of users’ design preferences, because each group’s preferences depend on various features that are culturally compatible. The process of integrating culture into the design of a system has always been an important ingredient for effective and interactive human computer interface. This study aims to investigate the design of a mobile health (mHealth) application user interface (UI) based on Arabic culture. It was argued that integrating certain cultural values of specific groups of users into the design of UI would increase their acceptance of the technology. Design/methodology/approach: A total of 135 users responded to an online survey about their acceptance of a culturally designed mHealth. Findings: The findings showed that culturally based language, colours, layout and images had a significant relationship with users’ behavioural intention to use the culturally based mHealth UI. Research limitations/implications: First, the sample and the data collected of this study were restricted to Arab users and Arab culture; therefore, the results cannot be generalized to other cultures and users. Second, the adapted unified theory of acceptance and use of technology model was used in this study instead of the new version, which may expose new perceptions. Third, the cultural aspects of UI design in this study were limited to the images, colours, language and layout. Practical implications: It encourages UI designers to implement the relevant cultural aspects while developing mobile applications. Originality/value: Embedding Arab cultural aspects in designing UI for mobile applications to satisfy Arab users and enhance their acceptance toward using mobile applications, which will reflect positively on their lives.</p

    Engagement in cloud-supported collaborative learning and student knowledge construction:a modeling study

    Get PDF
    Many universities, especially in low-income countries, have considered the potential of cloud-supported collaborative learning in planning and managing students’ learning experiences. This is because cloud tools can offer students the necessary skills for collaboration with one another and improving communication between all users. This study examined how cloud tools can help students engage in reflective thinking, knowledge sharing, cognitive engagement, and cognitive presence experiences. The impact of these experiences on students’ functional intellectual ability to construct knowledge was also examined. A quantitative questionnaire was used to collect data from 150 postgraduate students. A reflective–formative hierarchical model was developed to explain students' knowledge construction in the cloud environment. The findings revealed a positive influence of cognitive engagement, knowledge sharing, and reflective thinking on students’ knowledge construction. Outcomes from this study can help decision makers, researchers, and academicians to understand the potential of using cloud-supported collaborative tools in developing individuals’ knowledge construction.</p

    LogUAD: Log unsupervised anomaly detection based on word2Vec

    Get PDF
    System logs record detailed information about system operation and are important for analyzing the system\u27s operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational cost and avoid log instability we propose a new Word2Vec-based log unsupervised anomaly detection method (LogUAD). LogUAD does not require a log parsing step and takes original log messages as input to avoid the noise. LogUAD uses Word2Vec to generate word vectors and generates weighted log sequence feature vectors with TF-IDF to handle the evolution of log statements. At last, a computationally efficient unsupervised clustering is exploited to detect the anomaly. We conducted extensive experiments on the public dataset from Blue Gene/L (BGL). Experimental results show that the F1-score of LogUAD can be improved by 67.25% compared to LogCluster

    LogEvent2vec : LogEvent-to-vector based anomaly detection for large-scale logs in internet of things

    Get PDF
    Funding: This work was funded by the National Natural Science Foundation of China (Nos. 61802030), the Research Foundation of Education Bureau of Hunan Province, China (No. 19B005), and the International Cooperative Project for “Double First-Class”, CSUST (No. 2018IC24), the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education (No. JZNY201905), the Open Research Fund of the Hunan Provincial Key Laboratory of Network Investigational Technology (No. 2018WLZC003). This work was funded by the Researchers Supporting Project No. (RSP-2019/102) King Saud University, Riyadh, Saudi Arabia. Acknowledgments: We thank Researchers Supporting Project No. (RSP-2019/102) King Saud University, Riyadh, Saudi Arabia, for funding this research. We thank Francesco Cauteruccio for proofreading this paper.Peer reviewedPublisher PD

    Robust graph neural networks via ensemble learning

    Get PDF
    Graph neural networks (GNNs) have demonstrated a remarkable ability in the task of semi-supervised node classification. However, most existing GNNs suffer from the nonrobustness issues, which poses a great challenge for applying GNNs into sensitive scenarios. Some researchers concentrate on constructing an ensemble model to mitigate the nonrobustness issues. Nevertheless, these methods ignore the interaction among base models, leading to similar graph representations. Moreover, due to the deterministic propagation applied in most existing GNNs, each node highly relies on its neighbors, leaving the nodes to be sensitive to perturbations. Therefore, in this paper, we propose a novel framework of graph ensemble learning based on knowledge passing (called GEL) to address the above issues. In order to achieve interaction, we consider the predictions of prior models as knowledge to obtain more reliable predictions. Moreover, we design a multilayer DropNode propagation strategy to reduce each node’s dependence on particular neighbors. This strategy also empowers each node to aggregate information from diverse neighbors, alleviating oversmoothing issues. We conduct experiments on three benchmark datasets, including Cora, Citeseer, and Pubmed. GEL outperforms GCN by more than 5% in terms of accuracy across all three datasets and also performs better than other state-of-the-art baselines. Extensive experimental results also show that the GEL alleviates the nonrobustness and oversmoothing issues. © 2022 by the authors. Licensee MDPI, Basel, Switzerland

    Relational structure-aware knowledge graph representation in complex space

    Get PDF
    Relations in knowledge graphs have rich relational structures and various binary relational patterns. Various relation modelling strategies are proposed for embedding knowledge graphs, but they fail to fully capture both features of relations, rich relational structures and various binary relational patterns. To address the problem of insufficient embedding due to the complexity of the relations, we propose a novel knowledge graph representation model in complex space, namely MARS, to exploit complex relations to embed knowledge graphs. MARS takes the mechanisms of complex numbers and message-passing and then embeds triplets into relation-specific complex hyperplanes. Thus, MARS can well preserve various relation patterns, as well as structural information in knowledge graphs. In addition, we find that the scores generated from the score function approximate a Gaussian distribution. The scores in the tail cannot effectively represent triplets. To address this particular issue and improve the precision of embeddings, we use the standard deviation to limit the dispersion of the score distribution, resulting in more accurate embeddings of triplets. Comprehensive experiments on multiple benchmarks demonstrate that our model significantly outperforms existing state-of-the-art models for link prediction and triple classification. © 2022 by the authors. Licensee MDPI, Basel, Switzerland

    Fine-Grained Multivariate Time Series Anomaly Detection in IoT

    Get PDF
    Funding Information: Funding Statement: This work was supported in part by the National Natural Science Foundation of China under Grant 62272062, the Researchers Supporting Project number. (RSP2023R102) King Saud University, Riyadh, Saudi Arabia, the Open Research Fund of the Hunan Provincial Key Laboratory of Network Investigational Technology under Grant 2018WLZC003, the National Science Foundation of Hunan Province under Grant 2020JJ2029, the Hunan Provincial Key Research and Development Program under Grant 2022GK2019, the Science Fund for Creative Research Groups of Hunan Province under Grant 2020JJ1006, the Scientific Research Fund of Hunan Provincial Transportation Department under Grant 202143, and the Open Fund of Key Laboratory of Safety Control of Bridge Engineering, Ministry of Education (Changsha University of Science Technology) under Grant 21KB07. Publisher Copyright: © 2023 Tech Science Press. All rights reserved.Peer reviewedPublisher PD

    Data query mechanism based on hash computing power of blockchain in internet of things

    Get PDF
    Funding: This work is supported by the NSFC (61772280, 61772454, 61811530332, 61811540410), the PAPD fund from NUIST. This work was funded by the Researchers Supporting Project No. (RSP-2019/102) King Saud University, Riyadh, Saudi Arabia. Jin Wang and Osama Alfarraj are the corresponding authors. Acknowledgments: We thank Researchers Supporting Project No. (RSP-2019/102) King Saud University, Riyadh, Saudi Arabia for funding this paper. Author Contributions: Y.R., F.Z. and O.A. conceived the mechanism design and wrote the paper, P.K.S. built the models. T.W. and A.T. developed the mechanism, J.W. and O.A. revised the manuscript. All authors have read and agreed to the published version of the manuscript.Peer reviewedPublisher PD
    corecore