Search results for: Wan-Ting Lee
53 Ways to Spend Time at an Airport before Boarding a Flight
Authors: Amol Parikh
Abstract:
The goal of this study is to understand the most preferred ways to spend time at an airport while waiting for a flight to board. Survey was done on 1639 people of the United States of America. In the overall data, it was found that majority people always preferred spending time doing something in their mobile phone. Second most preferred option was reading something, followed by wanting a companion to talk to or to eat/drink. Least preferred option was to eat/drink alone. Overall data was then filtered based on age, gender, income and urban density groups. Percentage of people wanting to use a mobile phone was highest in the age group of 18-24. People aged 45 and above chose reading as the most preferred option. In any of the ranges of income, gender or urban density using mobile phone was the most preferred option. Conclusion of this study is that introducing a mobile app to search for a companion at an airport to do like minded activity would get noticed by majority travelers and would be a business idea worth trying as wanting a companion to talk or eat/drink with is not the least preferred option.Keywords: waiting for a flight, airport, mobile phone, companion
Procedia PDF Downloads 28252 Netnography Research in Leisure, Tourism, and Hospitality: Lessons from Research and Education
Authors: Marisa P. De Brito
Abstract:
The internet is affecting the way the industry operates and communicates. It is also becoming a customary means for leisure, tourism, and hospitality consumers to seek and exchange information and views on hotels, destinations events and attractions, or to develop social ties with other users. On the one hand, the internet is a rich field to conduct leisure, tourism, and hospitality research; on the other hand, however, there are few researchers formally embracing online methods of research, such as netnography. Within social sciences, netnography falls under the interpretative/ethnographic research methods umbrella. It is an adaptation of anthropological techniques such as participant and non-participant observation, used to study online interactions happening on social media platforms, such as Facebook. It is, therefore, a research method applied to the study of online communities, being the term itself a contraction of the words network (as on internet), and ethnography. It was developed in the context of marketing research in the nineties, and in the last twenty years, it has spread to other contexts such as education, psychology, or urban studies. Since netnography is not universally known, it may discourage researchers and educators from using it. This work offers guidelines for researchers wanting to apply this method in the field of leisure, tourism, and hospitality or for educators wanting to teach about it. This is done by means of a double approach: a content analysis of the literature side-by-side with educational data, on the use of netnography. The content analysis is of the incidental research using netnography in leisure, tourism, and hospitality in the last twenty years. The educational data is the author and her colleagues’ experience in coaching students throughout the process of writing a paper using primary netnographic data - from identifying the phenomenon to be studied, selecting an online community, collecting and analyzing data to writing their findings. In the end, this work puts forward, on the one hand, a research agenda, and on the other hand, an educational roadmap for those wanting to apply netnography in the field or the classroom. The educator’s roadmap will summarise what can be expected from mini-netnographies conducted by students and how to set it up. The research agenda will highlight for which issues and research questions the method is most suitable; what are the most common bottlenecks and drawbacks of the method and of its application, but also where most knowledge opportunities lay.Keywords: netnography, online research, research agenda, educator's roadmap
Procedia PDF Downloads 18251 The Effectiveness of Rebranding as a Comparative Study of Ghanaian Business Using the Principles of Corporate Rebranding
Authors: Kennedy Gbenu, Richmond Kweku Frempong
Abstract:
Rebranding has become a very important strategic tool for companies wanting to succeed in the ever competitive business world using the principles of rebranding Moisescu. Two businesses in Ghana (Ghana Commercial Bank and Vodafone Ghana) have been used to ascertain how rebranding of these organizations was done using the principles in their effort to rebrand themselves and to stay relevant. A secondary research mainly on literature surrounding rebranding, official websites of the organizations under study have also been used extensively. After a basic comparative study undertaken two firms (GCB and VODAFONE) seems to be using the first three principles and reaping from it as provided by Moisescu. This goes to show that rebranding should not be done in vacuum but should be guided by such principles so as to achieve the full potential of any kind of investments made.Keywords: brands, corporate branding, innovation, case studies
Procedia PDF Downloads 39650 Knowledge Level of Mothers in Wet Nursery and Breast Milk Banking
Authors: Seyda Can, Meryem Unulu
Abstract:
Objective: Breast milk is the most fundamental nutritional element for the healthy growth and development of newborns as they supply all the necessary components. Various obstacles such as diseases of mother and child, allergies of the baby, and insufficient breastmilk affect breast-feeding adversely. The wet nursery or breast milk banking is the most important source in providing the nutrients closest to the ideal for the newborn. Despite increasing opinions about its benefits, breast milk banking practice is controversial because of reasons such as ethical problems, traditional beliefs and attitudes, security concerns of families and lack of knowledge. It is thought that the results of this study will create the data for studies to raise the awareness of the society regarding wet nursery, and milk banks. Method: The study was planned and performed in descriptive type. The population of the study consists of mothers that gave birth between October-November 2017 in a public hospital in Turkey, and the sample consisted of 205 mothers chosen by improbable sampling method from the population and accepted to participate in the study. While gathering data, a survey consisting of 33 questions designed to determine the socio-demographic characteristics and their views on wet nursery and breast milk banking. Written ethical committee and institution permit was taken. Before the interview, participants were informed about the purpose and content of the study and oral permit was taken. Result: When the distribution of 205 mothers according to their individual characteristics, it was detected that their age average was 28,16±5,23 and 63,4 of mothers (n=130) had normal delivery. It was determined that clear majority of mothers, 75,6% (n=155) had no breast-feeding problems and 75,1% (n=154) fed the baby only with breast milk. It was detected that 18,5% (n=38) would accept a stranger to be a wet nurse and 60% (n=123) would donate milk if there is a breast milk bank. It was detected 33,2 % (n=68) of participant mothers want to make use of breast milk bank if there is a situation that prevents breast feeding, 38,5 % (n=79) of mothers think breast milk bank would be problematic religiously. Statistical difference was detected between the educational status of women and the rate of wanting breast milk bank practice. As the educational status of mothers increased, their rate of wanting breast milk bank practice increased. Conclusion: It is essential that every baby is breastfed by its mother primarily. However, when this is not possible, in order to implement wet nursery and breast milk banking as an extension of national breast-feeding policy, regulations need to be made and worries should be eased. Also, organizing training programs are also really important to raise awareness of the society and mothers.Keywords: breast feeding, breast milk, milk banks, wet nursery
Procedia PDF Downloads 16749 The Future of the Architect's Profession in France with the Emergence of Building Information Modelling
Authors: L. Mercier, D. Beladjine, K. Beddiar
Abstract:
The digital transition of building in France brings many changes which some have been able to face very quickly, while others are struggling to find their place and the interest that BIM can bring in their profession. BIM today is already adopted or initiated by construction professionals. However, this change, which can be drastic for some, prevents them from integrating it definitively. This is the case with architects. The profession is shared on the practice of BIM in its exercise. The risk of not adopting this new working method now and of not wanting to switch to its new digital tools leads us to question the future of the profession in view of the gap that is likely to be created within project management. In order to deal with the subject efficiently, our work was based on a documentary watch on BIM and then on the profession of architect, which allowed us to establish links on these two subjects. The observation of the economic model towards which the agencies tend and the trend of the sought after profiles made it possible to develop the opportunities and the brakes likely to impact the future of the profession of architect. The centralization of research directs work towards the conclusion that the model implemented by companies does not allow to integrate BIM within their structure. A solution hypothesis was then issued, focusing on the development of agencies through the diversity of profiles, skills to be integrated internally with the aim of diversifying their skills, and their business practices. In order to address this hypothesis of a multidisciplinary agency model, we conducted a survey of architectural firms. It is built on the model of Anglo-Saxon countries, which do not have the same functioning in comparison to the French model. The results obtained showed a risk of gradual disappearance on the market from small agencies in favor of those who will have and could take this BIM working method. This is why the architectural profession must, first of all, look at what is happening within its training before absolutely wanting to diversify the profiles to integrate into its structure. This directs the study on the training of architects. The schools of French architects are generally behind schedule if we allow the comparison to the schools of engineers. The latter is currently experiencing a slight improvement with the emergence of masters and BIM options during the university course. If the training of architects develops towards learning BIM and the agencies have the desire to integrate different but complementary profiles, then they will develop their skills internally and therefore open their profession to new functions. The place of BIM Management on projects will allow the architect to remain in control of the project because of their overall vision of the project. In addition, the integration of BIM and more generally of the life cycle analysis of the structure will make it possible to guarantee eco-design or eco-construction by approaching the constraints of sustainable development omnipresent on the planet.Keywords: building information modelling, BIM, BIM management, BIM manager, BIM architect
Procedia PDF Downloads 11348 Becoming a Warrior: Conspiracy, Dramaturgy, and Follower Charisma on the Far Right
Authors: Anthony Albanese
Abstract:
While much of the literature concerning Max Weber’s concept of charisma has addressed the importance of the follower’s recognition of and devotion to the charismatic leader, very little has been said about the processes that lead to the development of follower charisma. This article examines this largely overlooked aspect of the concept, as doing so (1) exacts the dynamics behind charisma’s transferability by moving beyond follower-centric models that focus on the recognition of the leader and toward one that emphasizes the follower’s generation and exhibition of charisma, (2) bridges a crucial gap between the rather wanting “losers of modernization” thesis and the social actor’s proclivity to produce stories and self-cast in said stories, (3) presents authoritarian dispositions as a reaction to the weakening effects everydayness have on charisma, and (4) complicates Weber’s formulation by reassessing the role of continually demonstrable mastery. To illustrate these dynamics, one should turn to the January 6th Capitol attack in the United States.Keywords: max weber, extremism, right-wing populism, charisma
Procedia PDF Downloads 9247 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes
Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He
Abstract:
This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography
Procedia PDF Downloads 9846 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations
Authors: Sadiq Nasir
Abstract:
The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security
Procedia PDF Downloads 8645 Democracy Leadership and Good Governance in Nigerias Fourth Republic
Authors: Salisu Adamu Abdullahi, Yusuf Abdullahi Manu
Abstract:
Nigeria returned to a democratically elected government on May 29, 1999. This signaled the beginning of the journey into the Fourth Republic. The return has received popular endorsement by the electorates as the level of enthusiasm was high due to the yearnings and expectations by the electorate that democracy will bring about the much-desired change required by the general mass. As democracy would allow for popular participation through periodic elections and so on. The paper examines democracy, leadership, and challenges of good governance in Nigerias Fourth Republic. It utilizes secondary source of data and content analysis as a methodology. It argues that Nigerias practice of democracy over the years is marred by flagrant abuse of the principles of good governance by the ruling elite. This has posed threats to the survival of democracy due to non-adherence to one of the cardinal principles of democracy which is good governance. The paper recommends among others that the anti-corruption law is amended in such a way that death penalties be issued to those found wanting by the law.Keywords: democracy, democratic consolidation, challenges, good governance
Procedia PDF Downloads 35044 My Dress, My Body and My Choice Politics in Kenya
Authors: Emmy Kipsoi
Abstract:
Kenya legalized the Sexual offence bill (2001), after vigorous campaigning and lobbying by feminist both in and out of parliament to ensure that the bill passed with minimal amendments. The sexual offense act provides for a good description on what constitutes sexual offences and the penalties that follow. It is from this context that the paper explores and interrogated the lived experiences of women living and working in Kenyan urban towns, who had experienced some form of sexual harassment. The study employed phenomenology to interpret the experiences of twenty (20) women in an urban town between the ages of 20 to 65 years women who had received at least some formal education and where engaged in some formal form of employment. The findings indicated that various forms of sexual harassment were experienced in the Kenyan town. Secondly, the knowledge about the contents of the bill wanting most of the women interviews were not aware of the protection accorded by law. The number of reported cases of sexual harassment shed light on the isolation, frustration and fear that women live despite a progressive law in printKeywords: Kenya, phenomenology, sexual harassment, women
Procedia PDF Downloads 30843 Adsorption of Acetone Vapors by SBA-16 and MCM-48 Synthesized from Rice Husk Ash
Authors: Wanting Zeng, Hsunling Bai
Abstract:
Silica was extracted from agriculture waste rice husk ash (RHA) and was used as the silica source for synthesis of RMCM-48 and RSBA-16. An alkali fusion process was utilized to separate silicate supernatant and the sediment effectively. The CTAB/Si and F127/Si molar ratio was employed to control the structure properties of the obtained RMCM-48 and RSBA-16 materials. The N2 adsorption-desorption results showed the micro-mesoporous RSBA-16 possessed high specific surface areas (662-1001 m2/g). All the obtained RSBA-16 materials were applied as the adsorbents for acetone adsorption. And the breakthrough tests clearly revealed that the RSBA-16(0.004) materials could achieve the highest acetone adsorption capacity of 186 mg/g under 1000 ppmv acetone vapor concentration at 25oC, which was also superior to ZSM-5 (71mg/g) and MCM-41 (157mg/g) under same test conditions. This can help to reduce the solid waste and the high adsorption performance of the obtained materials could consider as potential adsorbents for acetone adsorption.Keywords: acetone, adsorption, micro-mesoporous material, rice husk ash (RHA), RSBA-16
Procedia PDF Downloads 34242 'Ebru', the Art of Marbling in Fashion Design between the Functional and Beauty Purpose of the Designs
Authors: Nessreen Elmelegy
Abstract:
Fashion is all about being fun, stylish and looking beautiful in your own way, whether it is with clothes, accessories, hairstyles, and even furniture. There are never ending ways and sources when wanting to seek inspiration. Fashion designers can get inspired by anything and everything that encompasses them in their everyday lives. When getting inspired, there are no boundaries or limits to when it comes to exploring one's originality and fashion sense. All designers focus on being unique, original and trendy when taking inspiration and transforming that into fashionable and wearable garments. Ebru is a Turkish art. The actual word 'Ebru' in Turkish means marbling. Marbling is the art which help designers to create innovative and rich and colorful patterns in fashion designs. By using this technique we will have countless unique designs in fashion because each design can never be repeated. It is a traditional Turkish art which is designated as one of the Intangible Cultural Heritage of Humanity by UNESCO in 2014. Ebru art has spread from the East to the West by way of Silk Road and other trade routes. So this research is focused on studying the history and the techniques of Ebru art in fashion as an amazing trend of fashion, which is still stranger to the Egyptian Fashion industry; also how we can benefit from the incorporation of Ebru art as into the garments designs while still maintaining the functional and beauty purpose of the design.Keywords: Ebru Art, Ebru techniques, fashion inspiration, fashion trends
Procedia PDF Downloads 31141 A Soft Error Rates (SER) Evaluation Method of Combinational Logic Circuit Based on Linear Energy Transfers
Authors: Man Li, Wanting Zhou, Lei Li
Abstract:
Communication stability is the primary concern of communication satellites. Communication satellites are easily affected by particle radiation to generate single event effects (SEE), which leads to soft errors (SE) of the combinational logic circuit. The existing research on soft error rates (SER) of the combined logic circuit is mostly based on the assumption that the logic gates being bombarded have the same pulse width. However, in the actual radiation environment, the pulse widths of the logic gates being bombarded are different due to different linear energy transfers (LET). In order to improve the accuracy of SER evaluation model, this paper proposes a soft error rate evaluation method based on LET. In this paper, the authors analyze the influence of LET on the pulse width of combinational logic and establish the pulse width model based on the LET. Based on this model, the error rate of test circuit ISCAS'85 is calculated. The effectiveness of the model is proved by comparing it with previous experiments.Keywords: communication satellite, pulse width, soft error rates, LET
Procedia PDF Downloads 17140 Study and Improvement of the Quality of a Production Line
Authors: S. Bouchami, M.N. Lakhoua
Abstract:
The automotive market is a dynamic market that continues to grow. That’s why several companies belonging to this sector adopt a quality improvement approach. Wanting to be competitive and successful in the environment in which they operate, these companies are dedicated to establishing a system of quality management to ensure the achievement of the objective quality, improving the products and process as well as the satisfaction of the customers. In this paper, the management of the quality and the improvement of a production line in an industrial company is presented. In fact, the project is divided into two essential parts: the creation of the technical line documentation and the quality assurance documentation and the resolution of defects at the line, as well as those claimed by the customer. The creation of the documents has required a deep understanding of the manufacturing process. The analysis and problem solving were done through the implementation of PDCA (Plan Do Check Act) and FTA (Fault Tree Analysis). As perspective, in order to better optimize production and improve the efficiency of the production line, a study on the problems associated with the supply of raw materials should be made to solve the problems of stock-outs which cause delays penalizing for the industrial company.Keywords: quality management, documentary system, Plan Do Check Act (PDCA), fault tree analysis (FTA) method
Procedia PDF Downloads 14239 A Phenomenological Analysis of LBTQI+ Women’s Identification and Disidentification Processes through Walking Interviews in Montreal
Authors: Tara Chanady
Abstract:
Through 21 walking interviews with women from various backgrounds and positionalities, this study examines issues of identity politics in Montreal’s sociocultural space. The research looks at the social, political and economical implications of claiming or refusing identifications amongst women of sexual diversity (e.g. defining as lesbian, queer, bi, pan, fluid or not wanting to identity). The results are analysed from a phenomenological perspective, paying attention to the participants personal interpretations and perspectives, as well as contextualising the interviews in time and space. Using intersectional insights, this study pays attention to varying social positions, including immigration status (newly immigrated, rural to city immigration, Montreal-born, seeking asylum), age (20 to 80), gender (cis, trans and intersex women), relationship style (monogamous and polyamorous) and class. Preliminary findings include a generational shift in issues (e.g. community politics within lesbian communities in the 1980s), varying perspectives on the need of exclusive and safe spaces, shifts in issues of racism and transphobia and identifying points of tensions within conceptualisations of queer and lesbian positionalities.Keywords: identifications, lesbian, queer, sexual orientation
Procedia PDF Downloads 13838 Degemination in Emirati Pidgin Arabic: A Sociolinguistic Perspective
Authors: Abdel Rahman Mitib Altakhaineh, Abdul Salam Mohamad Alnamer, Sulafah Abdul Salam Alnamer
Abstract:
This study examines the production of gemination in Emirati Pidgin Arabic (EPA) spoken by blue-collar workers in the United Arab Emirates (UAE). A simple naming test was designed to test the production of geminates and a follow-up discussion was conducted with some of the participants to obtain the complementary qualitative analysis. The goal of the test was to determine whether the EPA speakers would produce a geminated or degeminated phoneme. A semi-structured interview was conducted with a subset of the study cohort to obtain participants’ own explanation where they degeminated the consonants. Our findings suggest that the exercising of this choice functions as a sociolinguistic strategy in a similar manner to that observed by Labov in his study of Martha’s Vineyard. The findings also show that speakers of EPA are inclined to degeminate consonantal geminates to establish themselves as members of a particular social group. Reasons for wanting to achieve this aim were given as: to claim privileges only available to members of this group (such as employment) and to distinguish themselves from the dominant cultural group. The study concludes that degemination in EPA has developed into a sociolinguistic solidarity marker.Keywords: sociolinguistics, morphophonology, degemination, solidarity, Emirati pidgin Arabic
Procedia PDF Downloads 20937 Implementation of Renewable Energy Technologies in Rural Africa
Authors: Joseph Levodo, Andy Ford, ISSA Chaer
Abstract:
Africa enjoys some of the best solar radiation levels in the world averaging between 4-6 kWh/m2/day for most of the year and the global economic and political conditions that tend to make African countries more dependent on their own energy resources have caused growing interest in wanting renewable energy based technologies. However to-date, implementation of Modern Energy Technologies in Africa is still very low especially the use of solar conversion technologies. It was initially speculated that the low uptake of solar technology in Africa was associated with the continent’s high poverty levels and limitations in technical capacity as well as awareness. Nonetheless, this is not an academic based speculation and the exact reasons for this low trend in technology adoption are unclear and require further investigation. This paper presents literature review and analysis relating to the techno-economic feasibility of solar photovoltaic power generation in Africa. The literature review would include the following four main categories: design methods, techno-economic feasibility of solar photovoltaic power generation, performance evaluations of various systems, Then it looks at the role of policy and potential future of technological development of photovoltaic (PV) by exploring the impact of alternative policy instruments and technology cost reductions on the financial viability of investing solar photovoltaic (PV) in Africa.Keywords: Africa Solar Potential, policy, photovoltaic, technologies
Procedia PDF Downloads 56336 Experiencing the Shattered: Managing Countertransference Experiences with Anorexia Patients in Psychotherapy
Authors: M. Card
Abstract:
Working with anorexia patients can be a challenging experience for mental and health care professionals. The reasons for not wanting to work with this patient population stems from the numerous concerns surrounding the patient’s health – physically and mentally. Many health care professionals reported having strong negative feelings, such as; anger, hopelessness and helplessness when working with anorexia patients. These feelings often impaired their judgement to treatment and affected how they related to the patient. This research focused on psychotherapists who preferred to work with anorexia patients; what countertransference feelings were evoked in them during sessions with patients and most importantly, how they managed the feelings. The research used interpretative phenomenological analysis (IPA) as the theoretical framework and data analysis method. Semi-structured interviews were used with ten experienced psychotherapists to obtain their countertransference experiences with anorexia patients and how they manage it. There were three main themes discovered; (1) the use of supervision, (2) their own personal therapy and finally (3) experience and evolution. The research unearthed that experienced psychotherapists also experienced strong countertransference feelings towards their patients; some positive and some negative. However, these feelings could actually be interpreted as co-transference with their anorexia patients. The psychotherapists were able to own their part in the evocative unconscious nature of a relational therapeutic space, where their personal issues may be entangled in their anorexia patient’s symptomatology.Keywords: anorexia nervosa, countertransference, co-transference, psychotherapy, relational psychotherapy
Procedia PDF Downloads 16535 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 6134 Evaulation of Food Safety Management in Central Elementary School Canteens in Tuguegarao City, Philippines
Authors: Lea B. Milan
Abstract:
This descriptive study evaluated the existing Food Safety Management in Central Elementary School Canteens of Region 3. It made used of survey questionnaires, interview guide questions and validated knowledge test on food for data gathering. Results of the study revealed that school principals and canteen managers shared responsibilities in food safety management of school canteen. It also showed that the schools applied different methods of communication, monitoring and evaluation of food safety management. The study further revealed that implementation of monitoring and evaluation of food safety compliance are not being practiced in all elementary schools in the region. The study also showed that school canteens in the Region 3 do not have the thermometers and timers to use to conduct proper monitoring of foods during storage, preparation and serving. It was also found out from the study that canteen personnel lacks the basic knowledge and trainings on food safety. Potential source of physical, chemical and biological hazards that could contaminate foods were also found present in the canteen facilities of the elementary schools in the region. Moreover, evaluation showed that the existing implementation of food safety management in the Central Elementary School Canteens of Region 3 were below the expected level and the need to strengthen the appreciation and advocacy on food safety management in school canteens of Region 3 is still wanting.Keywords: food safety management, food safety school catering, food safety, school food safety management
Procedia PDF Downloads 37633 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security
Authors: Katie Wood
Abstract:
Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity
Procedia PDF Downloads 24232 Mirrors and Lenses: Multiple Views on Recognition in Holocaust Literature
Authors: Kirsten A. Bartels
Abstract:
There are a number of similarities between survivor literature and Holocaust fiction for children and young adults. The paper explores three facets of the parallels of recognition found specifically between Livia Bitton-Jackson’s memoir of her experience during the Holocaust as an inmate in Auschwitz, I Have Lived a Thousand Years (1999) and Morris Glietzman series of Holocaust fiction. While Bitton-Jackson reflects on her past and Glietzman designs a fictive character, both are judicious with what they are willing to impart, only providing information about their appearance or themselves when it impacts others or when it serves a necessary purpose to the story. Another similarity lies in another critical aspect of many works of Holocaust literature – the idea of being ‘representatively Jewish’. The authors come to this idea from different angles, perhaps best explained as the difference between showing and telling, for Bitton-Jackson provides personal details, and Gleitzman constructed Felix arguably with this idea in mind. Interwoven through their journeys is a shift in perspectives on being recognized -- from wanting to be seen as individuals to being seen as Jew. With this, being Jewish takes on different meaning, both youths struggle with being labeled as something they do not truly understand, and may have not truly identified with, from a label, to a death warrant. With survivor literature viewed as the most credible and worthwhile type of Holocaust literature and Holocaust fiction is often seen as the least (with children’s and young-adult being the lowest form) the similarities in approaches to telling the stories may go overlooked or be undervalued. This paper serves as an exploration in the some of parallel messages shared between the two.Keywords: holocaust fiction, Holocaust literature, representatively Jewish, survivor literature
Procedia PDF Downloads 16831 The Power of Story in Demonstrating the Story of Power
Authors: Marianne Vardalos
Abstract:
Many students are returning to school after years of rich, lived experiences as parents, employees, volunteers, and in various other roles outside the university. While in the workforce or at home raising a family, they have gained authentic, personal observations of the power dynamics referred to as racism, classism, sexism, heteronormativity, and ableism. Encouraging your students to apply their own realities to course material that interrogates power structures and privilege not only facilitates student learning and understanding but also reveals that you, as a teacher, respect the experiences of your students as valuable and valid teaching tools. Though there is general recognition of the pedagogical value of having students share their experiences, facilitating such discussion can be a harrowing challenge for faculty. Additionally, for some students, the classroom can be very strange and too intimidating to share personal stories of injustice or inequality. In larger classroom settings, an attempt to integrate story-telling can turn into a cacophony of emotional testimonials. Not wanting to lose control of the class and feeling unqualified to respond to students' emotional confessions from their past, educators are often tempted to minimize the personal comments of students and avoid altogether an impromptu free-for-all. Knowing how and when to draw on the personal experience of your students involves a systematic plan for eliciting the most useful information at the right time. The trick is to design methods that induce student self-reflection in a way that is relevant to the course material and to then effectively incorporate these methods into lesson plans.Keywords: pedagogy, story-telling, power and inequality, hierarchies of power
Procedia PDF Downloads 9230 A Sustainable Energy Portfolio for Greater Kampala Metropolitan Area by the Mid-Century
Authors: Ismail Kimuli
Abstract:
With a steadfast economic development, the Greater Kampala metropolitan area (GKMA) faces increasing pressures to increasetheshare of low-carbon electricity in the energy balance, abate CO2 emissions and also restructure the transportation sector for a sustainable 2050. GKMA, is Uganda’s commercial, political, social, and industrial hub with a population of 4.1 million, contributing 60% tothe nation’s GDP and accounts for 80% of Uganda’s industrial sector.However, with the rampant anthropogenic interference that causes climate change, CO2 emissions in the metropolitan are contributing to global warming. Many economies across the globe are addressing this challengethrough development and analysis of sustainable energy portfolios.A sustainable energy portfolio is a low-carbon scenario. The study reviews the literature to establish the current energy management situation of GKMA and finds it wanting in addressing the immediate challenges associated with energy management of the metropolitan. Then, the study develops and examines a sustainable energy portfolio for GKMA using TIMES-VEDA and then presents it as an investigative low-carbon energy scenario that could propel the metropolitan sustainably towards 2050.Sustainability is plausible by optimizing the total primary energy supply, generating low-carbon electricity from hydropower and PV-solar renewables, improving heating technologies for residential & commercial sectors, and switching 90% of land passengers from road to a Kampala metro for a sustainable mid-century.Keywords: GKMA, sustainability, TIMES-VEDA, low-carbon scenario
Procedia PDF Downloads 10729 An Assessment of Sexual Informational Needs of Breast Cancer Patients in Radiation Oncology
Authors: Li Hoon Lim, Nur Farhanah Said, Katie Simmons, Eric Pei Ping Pang, Sharon Mei Mei Wong
Abstract:
Background and Purpose: Research regarding the sexual impact of breast cancer treatment on Asian women is both sensitive and scarce. This study aims to assess and evaluate the sexual health needs and concerns of breast cancer radiotherapy patients. It is hoped that awareness will be increased and an appropriate intervention can be developed to address the needs of future breast cancer patients. Methods: 110 consecutive unselected breast cancer patients were recruited prospectively. Questionnaires were administered once for patient undergoing radiotherapy to the breast. This study employed an anonymous questionnaire; any breast radiotherapy patient who can read English can voluntarily receive and complete the survey. The questionnaire consisted of items addressing demographics, potential informational needs, and educational preferences. Results: Patients’ interest to address sexual concerns decreases with age (p=0.024). Coherently, sexual concerns of patients are reported to decrease with age (p=0.015) where 70% of all respondents below age 50 [age 20-29 (60%); 30-39 (56.3%); 40-49(55.1%)] have started to have sexual concerns regarding their treatment effects on their sexual health. Patients who underwent breast conservation surgery (42.2%) and reconstruction surgery (83.3%) were more likely to have concerns about sexual health versus patients who underwent mastectomy (36.7%) (p=0.032). 74.2% of patients with sexual concern regardless of age would initiate conversation with their healthcare providers (p < 0.001). Conclusions: The results showed a staggering interest of female patients wanting information on this area which would not only boost their confidence and body image but also address concerns of the effect of breast radiotherapy on sexual health during their treatment.Keywords: breast cancer, breast radiotherapy, sexual health, sexual impact
Procedia PDF Downloads 20728 Artificial Intelligent-Based Approaches for Task Offloading, Resource Allocation and Service Placement of Internet of Things Applications: State of the Art
Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib
Abstract:
In order to support the continued growth, critical latency of IoT applications, and various obstacles of traditional data centers, mobile edge computing (MEC) has emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. By adopting a MEC structure, IoT applications could be executed locally, on an edge server, different fog nodes, or distant cloud data centers. However, we are often faced with wanting to optimize conflicting criteria such as minimizing energy consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge devices and trying to keep high performance (reducing response time, increasing throughput and service availability) at the same time. Achieving one goal may affect the other, making task offloading (TO), resource allocation (RA), and service placement (SP) complex processes. It is a nontrivial multi-objective optimization problem to study the trade-off between conflicting criteria. The paper provides a survey on different TO, SP, and RA recent multi-objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications.Keywords: mobile edge computing, multi-objective optimization, artificial intelligence approaches, task offloading, resource allocation, service placement
Procedia PDF Downloads 11527 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 21626 Breaking Barriers: Utilizing Innovation to Improve Educational Outcomes for Students with Disabilities
Authors: Emily Purdom, Rachel Robinson
Abstract:
As the number of students worldwide requiring speech-language therapy, occupational therapy and mental health services during their school day increases, innovation is becoming progressively more important to meet the demand. Telepractice can be used to reach a greater number of students requiring specialized therapy while maintaining the highest quality of care. It can be provided in a way that is not only effective but ultimately more convenient for student, teacher and therapist without the added burden of travel. Teletherapy eradicates many hurdles to traditional on-site service delivery and helps to solve the pervasive shortage of certified professionals. Because location is no longer a barrier to specialized education plans for students with disabilities when teletherapy is conducted, there are many advantages that can be deployed. Increased frequency of engagement is possible along with students receiving specialized care from a clinician that may not be in their direct area. Educational teams, including parents, can work together more easily and engage in face-to-face, student-centered collaboration through videoconference. Practical strategies will be provided for connecting students with qualified therapists without the typical in-person dynamic. In most cases, better therapy outcomes are going to be achieved when treatment is most convenient for the student and educator. This workshop will promote discussion in the field of education to increase advocacy for remote service delivery. It will serve as a resource for those wanting to expand their knowledge of options for students with special needs afforded through innovation.Keywords: education technology, innovation, student support services, telepractice
Procedia PDF Downloads 24525 Indigenous Women and Intimate Partner Homicide in Australia: Preventing Future Deaths through Law, Policy and Practice Change
Authors: Kyllie Cripps
Abstract:
In Australia, not dissimilar to other jurisdictions with indigenous populations, indigenous women are more likely to experience violence than any other section of society. In recent years in response to horrific examples of Indigenous women’s deaths, Australian Coronial courts have investigated, wanting to know more about the circumstances that led to the deaths. This paper critically examined 12 Coronial Court investigations from around Australia, analyzing them thematically. The analysis highlighted the differential vulnerability of indigenous women to intimate partner homicides. In all the cases reviewed, it was evident that the women’s deaths, in most instances were entirely preventable. Evidence was also presented demonstrating that services were aware of the women’s heightened risks but were unable to sufficiently coordinate themselves to provide wrap around support to minimise the risk of violence and to maximise the women’s safety. Consequently, putting the women in environments where their deaths were both predictable and inevitable. The profound system failings at the intersections of law, policy, and practice have ultimately cost indigenous women their lives. This paper firstly explores the nuances of the Coronial Court findings – demonstrating the similarities and differences present within the cases. Part two interrogates the reported system failings, and part three considers potential improvements in system integration to prevent future deaths. The paper concludes recognizing that Indigenous women play important valued roles in indigenous communities, their loss has profound costs and consequences, and to honor their memory, we must learn from their deaths and improve responses to intimate partner violence.Keywords: homicide, intimate partner violence, indigenous women
Procedia PDF Downloads 18124 Attachment and Decision-Making in Infertility
Authors: Anisa Luli, Alessandra Santona
Abstract:
Wanting a child and experiencing the impossibility to conceive is a painful condition that often is linked to infertility and often leads infertile individuals to experience psychological, relational and social problems. In this situation, infertile couples have to review their choices and take into consideration new ones. Few studies have focused on the decision-making style used by infertile individuals to solve their problem and on the factors that influences it. The aim of this paper is to define the style of decision-making used by infertile persons to give a solution to the “problem” and the predictive role of the attachment, of the representations of the relationship with parents in childhood and of the dyadic adjustment. The total sample is composed by 251 participants, divided in two groups: the experimental group composed by 114 participants, 62 males and 52 females, age between 25 and 59 years, and the control group composed by 137 participants, 65 males and 72 females, age between 22 and 49 years. The battery of instruments comprises: General Decision Making Style (GDMS), Experiences in Close Relationships Questionnaire Revised (ECR-R), Dyadic Adjustment Scale (DAS), Parental Bonding Instrument (PBI) and Symptom Checklist-90-R (SCL-90-R). The results from the analysis of the samples showed a prevalence of the rational decision-making style for both males and females, experimental and control group. There have been founded significant statistical relationships between the attachment scales, the representations of the parenting style, the dyadic adjustment and the decision-making styles. These results contribute to enrich the literature on the subject of decision-making in infertile people and show the relationship between the attachment and decision-making styles, confirming the few results in literature.Keywords: attachment, decision-making style, infertility, dyadic adjustment
Procedia PDF Downloads 580