Conference Proceedings and Papers
Permanent URI for this communityhttp://197.255.125.131:4000/handle/123456789/28120
Conference proceeding is a collection of academic papers published in the context of an academic conference or workshop. Conference proceedings typically contain the contributions made by researchers at the conference. They are the written record of the work that is presented to fellow researchers.
Browse
9 results
Search Results
Item The Narrative Structure Of John Milton’s Paradise Lost(University Of Ghana, 2018) Fosu, J.C.Paradise Lost was written sometime in the 17th Century by John Milton as a Christian epic with a Christian-redefined meaning of heroism. Using the epic structure, Milton successfully outlines the genealogy of man, even the state of the world before man was brought into it by God. Milton does this by tracing the linear stories of man from Genesis, through the Messianic and redemption stories, and the introduction of the eschaton by Jesus Christ in the New Testament. In Paradise Lost, Milton talks about three objectives. They are: the fall of man, an epic aiming to surpass all other epics, and justifying God’s ways to men. My thesis is a structural discussion of the three objectives by way of narratology. In order to prove Milton’s three objectives, my research discusses the structure of the narrative using Gerard Genette’s Narrative Discourse: An Essay in Method (1980). At the second level, my research focuses on the “Intertextual” elements of Paradise Lost using Gerard Genette’s Palimpsest: Literature in the Second Degree (1982). At the end of my discussion, it is obvious Milton’s epic is not a Miltonic Version Bible, but a work of art, borrowing its topic from the Bible and the epic form from icons Homer and Virgil. Indeed Milton has outgrown his occasion and withstood the test of time since Paradise Lost encapsulates the genealogy of man.Item Item Occupational Health and Safety Dimensions and Work Outcomes in the Mental Hospitals in Ghana: The Moderating Effect of Job Satisfaction(Advances in Intelligent Systems and Computing, 2017-06) Gyensare, M.A.; Anku-Tsede, O.; Kumedzro, L.E.Like high risk industries such as aviation and mining, occupational health and safety issues in the mental hospitals cannot be underestimated. For instance, although some conceptual and empirical studies have focused on patient safety in mental hospitals, the safety and health management of nurses in the mental health sector has largely been ignored. This paper seeks to examine the relationship between occupational health and safety management and two work outcomes such as engagement and turnover intention in a large mental hospital in Ghana. Results of the correlation coefficient indicated a positive relationship between occupational health and safety and engagement, and a negative relationship with turnover intention. The hierarchical regression results revealed a positive influence of safety procedure and safety leadership on mental health nurses engagement. In addition, only safety supervision and safety leadership had negative effect on the mental health nurses’ turnover intention. Finally, job satisfaction of the mental health nurses moderated the relationships between safety supervision and safety leadership, and intention to turnover. © Springer International Publishing AG 2018.Item Institutional Effects on API Development and Integration in Developing Countries: Evidence from Ghana(Americas Conference on Information Systems 2018: Digital Disruption, AMCIS 2018, 2018-08) Ofoeda, J.; Boateng, R.Application Programming Interfaces (APIs) are perceived as major enablers of digital transformation, as such they have attracted the attention of both practitioners and researchers. This notwithstanding, past research on APIs have focused largely on the technical dimensions, neglecting the social and cultural contexts. The purpose of this study is therefore to understand how regulative, normative and cognitive institutions affect the development and integration of APIs in Ghana. Drawing on the new institutional theory as a lens and an interpretive case study methodology, our findings show that normative institutions such as business strategy, customers need, relationships, and experience of vendors enabled the development and integration of APIs. However, regulative institutions in the form of regulations and laws (unwillingness of some institutions to integrate with other applications), security concerns, were regarded as constraining factors to API integration. Also, Cognitive forces in the form of non-disclosure issues and carelessness constrained the integration of APIsItem Use of Sentinel-l and Sentinel-2 for Monitoring Illegal Fishing Off Ghana(International Geoscience and Remote Sensing Symposium (IGARSS), 2018-07) Kurekin, A.; Loveday, B.; Clements, O.; Quartly, G.; Miller, P.; Wiafe, G.; Agyekum, K.A.An efficient and inexpensive service has been developed for the monitoring of fishing vessels in West Africa using Earth Observation (EO) data. The service makes use of fast- delivery data from the Synthetic Aperture Radar (SAR) instrument on Sentinel-1 and the Multi Spectral Imager (MSI) on Sentinel-2, detecting objects that differ markedly from their immediate background using a constant false alarm rate (CFAR) test. The selected objects are then discounted from further analysis if they fall within the bespoke land mask or can be shown from time series analysis to be static (signals associated with jetties, oil platforms and "ghost objects" arising from very bright land targets). Detections are matched to, and verified by, AIS data, which provides location and dimensions of ships that are legally in the region. Both matched and un-matched data are then displayed on a web portal for use by the Gulf of Guinea (GoG) state authorities.Item Effect of Dipole Corrections and Spin Orbit Coupling on Tungsten Dichalcogenides Monolayer: A in Silico First Principles Study(2018 Open Innovations Conference, OI, 2018-11) Obodo, K.O.; Ouma, C.N.M.; Gebreyesus, G; Obodo, J.T.; Braun, M.The structural and electronic properties of tungsten dichalogenides compounds (WS 2 , WSe 2 , WTe 2 ) were investigated from first principles calculations. We found that the structural and electronic properties changed both as a function of the dipole corrections and spin-orbit coupling (SOC). Comparing the calculated results with experimental values, we found that introducing SOC by itself in these 2D materials grossly underestimates the electronic band gap. Adding the self-consistent dipole correction results in larger electronic band gap for these tungsten dichalogenide compounds. Thus, the influence of dipole corrections in these 2D WX 2 materials was found to be significant. The SOC are not relevant for these materials and care should be taken on application of these dipole corrections.Item Understanding behaviour patterns of multi-agents in digital business ecosystems: An organisational semiotics inspired framework(Advances in Intelligent Systems and Computing, 2019-01) Senyo, P.K.; Liu, K.; Effah, J.Digital business ecosystem (DBE) is a collaborative network of organisations, processes and technologies that collectively create value. Thus, value creation in DBEs is jointly undertaken by multiple human and digital agents. To aid appropriate apportionment of work and design of information systems, it is essential to understand behaviour of both human and digital agents. However limited attention has been paid to agents’ behaviour in the extant DBEs literature. Moreover, multi-agent research has also largely focused on technical issues while limited research exists on agents’ behaviour. As such, in this paper, we develop a framework to understand behaviour patterns of multi-agent in DBEs. This framework builds its foundation on the theoretical lens of Organisational Semiotics, a sociotechnical theory towards contribution to DBE research.Item Survey of Mobile Malware Analysis, Detection Techniques and Tool(2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, 2018-11) Gyamfi, N.K.; Owusu, E.The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.Item Bank Fraud Detection Using Support Vector Machine(2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, 2018-11) Gyamfi, N.K.; Abdulai, J.D.With the significant development of communications and computing, bank fraud is growing in its forms and amounts. In this paper, we analyze the various forms of fraud to which are exposed banks d data mining tools allowing its early detection data already accumulated in a bank. We use supervised learning methods Support Vector Machines with Spark (SVM-S) to build models representing normal and abnormal customer behavior and then use it to evaluate validity of new transactions. The results obtained from databases of credit card transactions show that these techniques are effective in the fight against banking fraud in big data. Experiment result from the study show that SVM-S have better prediction performance than Back Propagation Netw orks (BPN). Besides the average prediction, accuracy reaches a maximum when training the data ratio arrives at 0.8.