Search results for: intentional service execution
4255 Towards a Business Process Model Deriving from an Intentional Perspective
Authors: Omnia Saidani Neffati, Rim Samia Kaabi, Naoufel Kraiem
Abstract:
In this paper, we propose an approach aiming at (i) representing services at two levels: the intentional level and the organizational level, and (ii) establishing mechanisms allowing to make a transition from the first level to the second one in order to execute intentional services. An example is used to validate our approach.Keywords: intentional service, business process, BPMN, MDE, intentional service execution
Procedia PDF Downloads 3954254 Intentional Learning vs Incidental Learning
Authors: Shahbaz Ahmed
Abstract:
This study is conducted to demonstrate the knowledge of intentional learning and incidental learning. Hypothesis of this experiment is intentional learning is better than incidental learning, participants were demonstrated and were asked to learn the 10 nonsense syllables in a specific sequence from the colored cards in the end they were asked to recall the background color of each card instead of nonsense syllables. Independent variables of the experiment are the colored cards containing nonsense syllables which are to be memorized by the participants, dependent variables are the number of correct responses made by the participant. The findings of the experiment concluded that intentional learning is better than incidental learning, hence hypothesis is proved.Keywords: intentional learning, incidental learning, non-sense syllable cards, score sheets
Procedia PDF Downloads 5344253 The Impact of Project Management Approaches in Enhancing Entrepreneurial Growth: A Study Using the Theory of Planned Behaviour as a Lens to Understand
Authors: Akunna Agunwah, Kevin Gallimore, Kathryn Kinnmond
Abstract:
Entrepreneurship and project management are widely associated and seen as a vehicle for economic growth, but are studied separately. A few authors have considered the interconnectivity existing between these two fields, but relatively little empirical data currently exist in the literature. The purpose of the present empirical study is to explore whether successful entrepreneurs utilise project management approaches in enhancing enterprise growth by understanding the working practices and experiences of the entrepreneurs’ using the Theory of Planned Behaviour (TPB) as a lens. In order to understand those experiences, ten successful entrepreneurs in various business sectors in the North West of England were interviewed through a face-to-face semi-structured interview method. The collected audio tape-recorded data was transcribed and analysed using the deductive thematic technique (qualitative approach). The themes were viewed through the lens of Theory of Planned Behaviour to identify the three intentional antecedents (attitude, subjective norms, and perceived behavioural control) and to understand how they relate to the project management approaches (Planning, execution, and monitoring). The findings are twofold, the first evidence of the three intentional antecedents, which make up Theory of Planned Behaviour was present. Secondly, the analysis of project management approaches themes (planning, execution, and monitoring) using the lens of the theory of planned behaviour shows evidence of the three intentional antecedents. There were more than one intentional antecedents found in a particular project management theme, which indicates that the entrepreneur does utilise these approaches without categorising them into definite themes. However, the entrepreneur utilised these intentional antecedents as processes to enhanced business growth. In conclusion, the work presented here showed a way of understanding the interconnectivity between entrepreneurship and project management towards enhancing enterprise growth by examining the working practices and experiences of the successful entrepreneurs in the North-West England.Keywords: business growth, entrepreneurship, project management approaches, theory of planned behaviour
Procedia PDF Downloads 2054252 Transaction Cost Analysis, Execution Quality, and Best Execution under MiFID II
Authors: Rodrigo Zepeda
Abstract:
Transaction cost analysis (TCA) is a way of analyzing the relative performance of different intermediaries and different trading strategies for trades undertaken in financial instruments. It is a way for an investor to determine the overall quality of execution of a particular trade, and there are many different approaches to undertaking TCA. Under the updated Markets in Financial Instruments Directive (2014/65/EU) (MiFID II), investment firms are required when executing orders, to take all sufficient steps to obtain the best possible result for their clients. This requirement for 'Best Execution' must take into account price, costs, speed, likelihood of execution and settlement, size, nature or any other consideration relevant to the execution of the order. The new regulatory compliance framework under MiFID II will now also apply across a very broad range of financial instruments. This article will provide a comprehensive technical analysis of how TCA and Best Execution will significantly change under MiFID II. It will also explain why harmonization of post-trade reporting requirements under MiFID II could potentially support the development of peer group analysis, which in turn could provide a new and highly advanced framework for TCA that could more effectively support Best Execution requirements under MiFID II. The study is significant because there are no studies that have dealt with TCA and Best Execution under MiFID II in the literature.Keywords: transaction cost analysis, execution quality, best execution, MiFID II, financial instruments
Procedia PDF Downloads 2904251 HD-WSComp: Hypergraph Decomposition for Web Services Composition Based on QoS
Authors: Samah Benmerbi, Kamal Amroun, Abdelkamel Tari
Abstract:
The increasing number of Web service (WS)providers throughout the globe, have produced numerous Web services providing the same or similar functionality. Therefore, there is a need of tools developing the best answer of queries by selecting and composing services with total transparency. This paper reviews various QoS based Web service selection mechanisms and architectures which facilitate qualitatively optimal selection, in other fact Web service composition is required when a request cannot be fulfilled by a single web service. In such cases, it is preferable to integrate existing web services to satisfy user’s request. We introduce an automatic Web service composition method based on hypergraph decomposition using hypertree decomposition method. The problem of selection and the composition of the web services is transformed into a resolution in a hypertree by exploring the relations of dependency between web services to get composite web service via employing an execution order of WS satisfying global request.Keywords: web service, web service selection, web service composition, QoS, hypergraph decomposition, BE hypergraph decomposition, hypertree resolution
Procedia PDF Downloads 5094250 Data Security and Privacy Challenges in Cloud Computing
Authors: Amir Rashid
Abstract:
Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud
Procedia PDF Downloads 2994249 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2844248 3rd Generation Modular Execution: A Global Breakthrough in Modular Facility Construction System
Authors: Sean Bryner S. Rey, Eric Tanjutco
Abstract:
Modular execution strategies are performed to address the various challenges of any projects and are implemented on each project phase that covers Engineering, Procurement, Fabrication and Construction. It was until the recent years that the intent to surpass mechanical modularization approach were conceptualized to give solution to much greater demands of project components such as site location and adverse weather condition, material sourcing, construction schedule, safety risks and overall plot layout and allocation. The intent of this paper is to introduce the 3rd Generation Modular Execution with an overview of its advantages on project execution and will give emphasis on Engineering, Construction, Operation and Maintenance. Most importantly, the paper will present the key differentiator of 3rd Gen modular execution against other conventional project execution and the merits it bears for the industry.Keywords: 3rd generation modular, process block, construction, operation & maintenance
Procedia PDF Downloads 4754247 An Architectural Approach for the Dynamic Adaptation of Services-Based Software
Authors: Mohhamed Yassine Baroudi, Abdelkrim Benammar, Fethi Tarik Bendimerad
Abstract:
This paper proposes software architecture for dynamical service adaptation. The services are constituted by reusable software components. The adaptation’s goal is to optimize the service function of their execution context. For a first step, the context will take into account just the user needs but other elements will be added. A particular feature in our proposition is the profiles that are used not only to describe the context’s elements but also the components itself. An adapter analyzes the compatibility between all these profiles and detects the points where the profiles are not compatibles. The same Adapter search and apply the possible adaptation solutions: component customization, insertion, extraction or replacement.Keywords: adaptative service, software component, service, dynamic adaptation
Procedia PDF Downloads 2984246 Detection of Intentional Attacks in Images Based on Watermarking
Authors: Hazem Munawer Al-Otum
Abstract:
In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection
Procedia PDF Downloads 2554245 Social Media and Internet Celebrity for Social Commerce Intentional and Behavioral Recommendations
Authors: Shu-Hsien Liao, Yao-Hsuan Yang
Abstract:
Social media is a virtual community and online platform that people use to create, share, and exchange opinions/experiences. Internet celebrities are people who become famous on the Internet, increasing their popularity through their social networking or video websites. Social commerce (s-ecommerce) is the combination of social relations and commercial transaction activities. The combination of social media and Internet celebrities is an emerging model for the development of s-ecommerce. With recent advances in system sciences, recommendation systems are gradually moving to develop intentional and behavioral recommendations. This background leads to the research issues regarding digital and social media in enterprises. Thus, this study implements data mining analytics, including clustering analysis and association rules, to investigate Taiwanese users (n=2,102) to investigate social media and Internet celebrities’ preferences to find knowledge profiles/patterns/rules for s-ecommerce intentional and behavioral recommendations.Keywords: social media, internet celebrity, social commerce (s-ecommerce), data mining analytics, intentional and behavioral recommendations
Procedia PDF Downloads 304244 A System Framework for Dynamic Service Deployment in Container-Based Computing Platform
Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang
Abstract:
Cloud computing and virtualization technology have brought an innovative way for people to develop and use software nowadays. However, conventional virtualization comes at the expense of performance loss for applications. Container-based virtualization could be an option as it potentially reduces overhead and minimizes performance decline of the service platform. In this paper, we introduce a system framework and present an implementation of resource broker for dynamic cloud service deployment on the container-based platform to facilitate the efficient execution and improve the utilization. We target the load-aware service deployment approach for task ranking scenario. This proposed effort can collaborate with resource management system to adaptively deploy services according to the different requests. In particular, our approach relies on composing service immediately onto appropriate container according to user’s requirement in order to conserve the waiting time. Our evaluation shows how efficient of the service deployment is and how to expand its applicability to support the variety of cloud service.Keywords: cloud computing, container-based virtualization, resource broker, service deployment
Procedia PDF Downloads 1724243 Evaluation of E-Government Service Quality
Authors: Nguyen Manh Hien
Abstract:
Service quality is the highest requirement from users, especially for the service in electronic government. During the past decades, it has become a major area of academic investigation. Considering this issue, there are many researches that evaluated the dimensions and e-service contexts. This study also identified the dimensions of service quality but focused on a new conceptual and provides a new methodological in developing measurement scales of e-service quality such as information quality, service quality and organization quality. Finally, the study will suggest a key factor to evaluate e-government service quality better.Keywords: dimensionality, e-government, e-service, e-service quality
Procedia PDF Downloads 5414242 Research on Fuzzy Test Framework Based on Concolic Execution
Authors: Xiong Xie, Yuhang Chen
Abstract:
Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage.Keywords: concolic execution, constraint solving, fuzzy test, vulnerability discovery
Procedia PDF Downloads 2284241 Survey of Web Service Composition
Authors: Wala Ben Messaoud, Khaled Ghedira, Youssef Ben Halima, Henda Ben Ghezala
Abstract:
A web service (WS) is called compound or composite when its execution involves interactions with other WS to use their features. The composition of WS specifies which services need to be invoked, in what order and how to handle exception conditions. This paper gives an overview of research efforts of WS composition. The approaches proposed in the literature are diverse, interesting and have opened important research areas. Based on many studies, we extracted the most important role of WS composition use in order to facilitate its introduction in WS concept.Keywords: SOA, web services, composition approach, composite WS
Procedia PDF Downloads 3084240 Adoption of Lean Thinking and Service Improvement for Care Home Service
Authors: Chuang-Chun Chiou
Abstract:
Ageing population is a global trend; therefore the need of care service has been increasing dramatically. There are three basic forms of service delivered to the elderly: institution, community, and home. Particularly, the institutional service can be seen as an extension of medical service. The nursing home or so-called care home which is equipped with professional staff and facilities can provide a variety of service including rehabilitation service, short-term care, and long term care. Similar to hospital and other health care service, care home service do need to provide quality and cost-effective service to satisfy the dwellers. The main purpose of this paper is to show how lean thinking and service innovation can be applied to care home operation. The issues and key factors of implementing lean practice are discussed.Keywords: lean, service improvement, SERVQUAL, care home service
Procedia PDF Downloads 6064239 Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment
Authors: Dongjae Kang, Sokho Son, Jinmee Kim
Abstract:
Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area.Keywords: cloud service brokerage, multiple Clouds, Integrated service provisioning, SLA, network service
Procedia PDF Downloads 4884238 Service Interactions Coordination Using a Declarative Approach: Focuses on Deontic Rule from Semantics of Business Vocabulary and Rules Models
Authors: Nurulhuda A. Manaf, Nor Najihah Zainal Abidin, Nur Amalina Jamaludin
Abstract:
Coordinating service interactions are a vital part of developing distributed applications that are built up as networks of autonomous participants, e.g., software components, web services, online resources, involve a collaboration between a diverse number of participant services on different providers. The complexity in coordinating service interactions reflects how important the techniques and approaches require for designing and coordinating the interaction between participant services to ensure the overall goal of a collaboration between participant services is achieved. The objective of this research is to develop capability of steering a complex service interaction towards a desired outcome. Therefore, an efficient technique for modelling, generating, and verifying the coordination of service interactions is developed. The developed model describes service interactions using service choreographies approach and focusing on a declarative approach, advocating an Object Management Group (OMG) standard, Semantics of Business Vocabulary and Rules (SBVR). This model, namely, SBVR model for service choreographies focuses on a declarative deontic rule expressing both obligation and prohibition, which can be more useful in working with coordinating service interactions. The generated SBVR model is then be formulated and be transformed into Alloy model using Alloy Analyzer for verifying the generated SBVR model. The transformation of SBVR into Alloy allows to automatically generate the corresponding coordination of service interactions (service choreography), hence producing an immediate instance of execution that satisfies the constraints of the specification and verifies whether a specific request can be realised in the given choreography in the generated choreography.Keywords: service choreography, service coordination, behavioural modelling, complex interactions, declarative specification, verification, model transformation, semantics of business vocabulary and rules, SBVR
Procedia PDF Downloads 1544237 Scalable UI Test Automation for Large-scale Web Applications
Authors: Kuniaki Kudo, Raviraj Solanki, Kaushal Patel, Yash Virani
Abstract:
This research mainly concerns optimizing UI test automation for large-scale web applications. The test target application is the HHAexchange homecare management WEB application that seamlessly connects providers, state Medicaid programs, managed care organizations (MCOs), and caregivers through one platform with large-scale functionalities. This study focuses on user interface automation testing for the WEB application. The quality assurance team must execute many manual users interface test cases in the development process to confirm no regression bugs. The team automated 346 test cases; the UI automation test execution time was over 17 hours. The business requirement was reducing the execution time to release high-quality products quickly, and the quality assurance automation team modernized the test automation framework to optimize the execution time. The base of the WEB UI automation test environment is Selenium, and the test code is written in Python. Adopting a compilation language to write test code leads to an inefficient flow when introducing scalability into a traditional test automation environment. In order to efficiently introduce scalability into Test Automation, a scripting language was adopted. The scalability implementation is mainly implemented with AWS's serverless technology, an elastic container service. The definition of scalability here is the ability to automatically set up computers to test automation and increase or decrease the number of computers running those tests. This means the scalable mechanism can help test cases run parallelly. Then test execution time is dramatically decreased. Also, introducing scalable test automation is for more than just reducing test execution time. There is a possibility that some challenging bugs are detected by introducing scalable test automation, such as race conditions, Etc. since test cases can be executed at same timing. If API and Unit tests are implemented, the test strategies can be adopted more efficiently for this scalability testing. However, in WEB applications, as a practical matter, API and Unit testing cannot cover 100% functional testing since they do not reach front-end codes. This study applied a scalable UI automation testing strategy to the large-scale homecare management system. It confirmed the optimization of the test case execution time and the detection of a challenging bug. This study first describes the detailed architecture of the scalable test automation environment, then describes the actual performance reduction time and an example of challenging issue detection.Keywords: aws, elastic container service, scalability, serverless, ui automation test
Procedia PDF Downloads 1064236 Optimised Path Recommendation for a Real Time Process
Authors: Likewin Thomas, M. V. Manoj Kumar, B. Annappa
Abstract:
Traditional execution process follows the path of execution drawn by the process analyst without observing the behaviour of resource and other real-time constraints. Identifying process model, predicting the behaviour of resource and recommending the optimal path of execution for a real time process is challenging. The proposed AlfyMiner: αyM iner gives a new dimension in process execution with the novel techniques Process Model Analyser: PMAMiner and Resource behaviour Analyser: RBAMiner for recommending the probable path of execution. PMAMiner discovers next probable activity for currently executing activity in an online process using variant matching technique to identify the set of next probable activity, among which the next probable activity is discovered using decision tree model. RBAMiner identifies the resource suitable for performing the discovered next probable activity and observe the behaviour based on; load and performance using polynomial regression model, and waiting time using queueing theory. Based on the observed behaviour αyM iner recommend the probable path of execution with; next probable activity and the best suitable resource for performing it. Experiments were conducted on process logs of CoSeLoG Project1 and 72% of accuracy is obtained in identifying and recommending next probable activity and the efficiency of resource performance was optimised by 59% by decreasing their load.Keywords: cross-organization process mining, process behaviour, path of execution, polynomial regression model
Procedia PDF Downloads 3344235 Understanding Risky Borrowing Behavior among Young Consumers: An Empirical Study
Authors: T. Hansen
Abstract:
Many consumers are uncertain of what financial borrowing behavior may serve their interests in the best way. This is important since consumers’ risky financial decisions may not only negatively affect their short-term liquidity but may haunt them for years after they are made. Obviously, this is especially critical for young adults who often carry large amounts of student loans or credit card debt, which in turn may hinder their future ability to obtain financial healthiness. Even though factors such as financial knowledge, attitudes towards risk, gender, and motivations of borrowing, among others, are known to influence consumer borrowing behavior, no existing model comprehensibly describes the mechanisms behind young adults’ risky borrowing behavior. This is unfortunate since a better understanding of the relationships between such factors and young adults’ risky borrowing behavior may be of value to financial service providers and financial authorities aiming to improve young adults’ borrowing behavior. This research extends prior research by developing a conceptual framework for the purpose of understanding young adults’ risky borrowing behavior. The study is based on two survey samples comprising 488 young adults aged 18-25 who have not obtained a risky loan (sample 1) and 214 young adults aged 18-25 who already have obtained a risky loan (sample 2), respectively. The results suggest several psychological, sociological, and behavioral factors that may influence young adults’ intentional risky borrowing behavior, which in turn is shown to affect actualized risky borrowing behavior. We also found that the relationship between intentional risky borrowing behavior and actualized risky borrowing behavior is negatively moderated by perceived risk – but not by perceived complexity. In particular, the results of this study indicate that public policy makers, banks and financial educators should seek to eliminate less desirable social norms on how to behave financially. In addition, they should seek to enhance young adults’ risky borrowing perceived risk, thereby preventing that intentional risky borrowing behavior translates into actualized risky behavior.Keywords: financial services, risky borrowing behavior, young adults, financial knowledge, social norms, perceived risk, financial trust, public financial policy
Procedia PDF Downloads 2654234 Investigating the Effect of Artificial Intelligence on the Improvement of Green Supply Chain in Industry
Authors: Sepinoud Hamedi
Abstract:
Over the past few decades, companies have appeared developing concerns in connection to the natural affect of their fabricating exercises. Green supply chain administration has been considered by the producers as a attainable choice to decrease the natural affect of operations whereas at the same time moving forward their operational execution. Contemporaneously the coming of digitalization and globalization within the supply chain space has driven to a developing acknowledgment of the importance of data preparing methodologies, such as enormous information analytics and fake insights innovations, in improving and optimizing supply chain execution. Also, supply chain collaboration in part intervenes the relationship between manufactured innovation and supply chain execution Ponders appear that the use of BDA-AI advances includes a significant impact on natural handle integration and green supply chain collaboration conjointly underlines that both natural handle integration and green supply chain collaboration have a critical affect on natural execution. Correspondingly savvy supply chain contributes to green execution through overseeing green connections and setting up green operations.Keywords: green supply chain, artificial intelligence, manufacturers, technology, environmental
Procedia PDF Downloads 734233 Improvement to Pedestrian Walkway Facilities to Enhance Pedestrian Safety-Initiatives in India
Authors: Basavaraj Kabade, K. T. Nagaraja, Swathi Ramanathan, A. Veeraragavan, P. S. Reashma
Abstract:
Deteriorating quality of the pedestrian environment and the increasing risk of pedestrian crashes are major concerns for most of the cities in India. The recent shift in the priority to motorized transport and the abating condition of existing pedestrian facilities can be considered as prime reasons for the increasing pedestrian related crashes in India. Bengaluru City – the IT capital hub of the nation is not much different from this. The increase in number of pedestrian crashes in Bengaluru reflects the same. To resolve this issue and to ensure safe, sustainable and pedestrian friendly sidewalks, Govt. of Karnataka, India has implemented newfangled pedestrian sidewalks popularized programme named Tender S.U.R.E. (Specifications for Urban Road Execution) projects. Tender SURE adopts unique urban street design guidelines where the pedestrians are given prime preference. The present study presents an assessment of the quality and performance of the pedestrian side walk and the walkability index of the newly built pedestrian friendly sidewalks. Various physical and environmental factors affecting pedestrian safety are identified and studied in detail. The pedestrian mobility is quantified through Pedestrian Level of Service (PLoS) and the pedestrian walking comfort is measured by calculating the Walkability Index (WI). It is observed that the new initiatives taken in reference to improving pedestrian safety have succeeded in Bengaluru by attaining a level of Service of ‘A’ and with a good WI score.Keywords: pedestrian safety, pedestrian level of service (PLoS), Right of Way (RoW), Tender S.U.R.E (Specifications for Urban Road Execution), walkability index (WI), walkway facilities
Procedia PDF Downloads 2004232 Suicidal Attempts as a Reason for Emergency Medical Teams’ Call-Outs Based on Examples of Ambulance Service in Siedlce, Poland
Authors: Dawid Jakimiuk, Krzysztof Mitura, Leszek Szpakowski, Sławomir Pilip, Daniel Celiński
Abstract:
The Emergency Medical Teams (EMS) of the Ambulance Service in Siedlce serve the population living in the Mazowieckie Voivodeship (the area of eastern Poland with approximately 550,000 inhabitants). They provide health services at the pre-hospital stage to all life-threatening patients. The analysis covered the interventions of emergency medical teams in cases of suicide attempts that occurred in the years 2015-2018. The study was retrospective. The data was obtained on the basis of digital medical records of completed call-outs. When defining the disease entity, the International Statistical Classification of Diseases and Health Problems ICD-10 prepared by WHO was used. The relationship between selected disease entities and the area of EMT intervention, the patient's sex and age, and the time of occurrence of the event were investigated. Non-urban area was defined as the area inhabited by a population below 10,000 residents. Statistical analysis was performed using Pearson's Chi ^ 2 test and presenting the percentage of cases in the study group. Of all the suicide attempts, drug abuse cases were the most frequent, including: X60 (Intentional self-poisoning by and exposure to nonopioid analgesics, antipyretics and antirheumatics); X61 (Intentional self-poisoning by and exposure to antiepileptic, sedative-hypnotic, antiparkinsonian and psychotropic drugs, not elsewhere classified); X62 (Intentional self-poisoning by and exposure to narcotics and psycholeptics [hallucinogens], not elsewhere classified); X63 (Intentional self-poisoning by and exposure to other drugs acting on the autonomic nervous system); X64 (Intentional self-poisoning by and exposure to other and unspecified drugs, medicaments and biological substance) oraz X70 (Intentional self-harm by hanging, strangulation and suffocation). In total, they accounted for 69.4% of all interventions to suicide attempts in the studied period. Statistical analysis shows significant differences (χ2 = 39.30239, p <0.0001, n = 561) between the area of EMT intervention and the type of suicide attempt. In non-urban areas, a higher percentage of X70 diagnoses was recorded (55.67%), while in urban areas, X60-X64 (72.53%). In non-urban areas, a higher proportion of patients attempting suicide was observed compared to patients living in urban areas. For X70 and X60 - X64 in total, the incidence rates in non-urban areas were 80.8% and 56%, respectively. Significant differences were found (χ2 = 119.3304, p <0.0001, n = 561) depending on the method of attempting suicide in relation to the patient's sex. The percentage of women diagnosed with X60-X64 versus X70 was 87.50%, which was the largest number of patients (n = 154) as compared to men. In the case of X70 in relation to X60-X64, the percentage of men was 62.08%, which was the largest number of patients (n = 239) as compared to women (n = 22). In the case of X70, the percentage of men compared to women was as high as 92%. Significant differences were observed (χ2 = 14.94848, p <0.01058) between the hour of EMT intervention and the type of suicide attempt. The highest percentage of X70 occurred between 04:01 - 08:00 (64.44%), while X60-X64 between 00:01 - 04:00 (70.45%). The largest number of cases of all tested suicide attempts was recorded between 16:01 - 20:00 for X70 (n = 62), X60 - X64 (n = 82), respectively. The highest percentage of patients undertaking all suicide attempts studied at work was observed in the age range of 18-30 (31.5%), while the lowest was in the age group over 60 years of age. (11%). There was no significant correlation between the day of the week or individual months of the year and the type of suicide attempt - respectively (χ2 = 6.281729, p <0.39238, n = 561) and (χ2 = 3.348913, p <0.9857, n = 561). There were also no significant differences in the incidence of suicide attempts for each year in the study period (χ2 = 3.348913, p <0.9857 n = 561). The obtained results suggest the necessity to undertake preventive measures in order to minimize the number of suicide attempts. Such activities should be directed especially at young patients living in non-urban areas.Keywords: emergency med, emergency medical team, attempted suicide, pre-hospital
Procedia PDF Downloads 924231 Benchmarking Service Quality among Quick-Service Restaurants towards Service Innovations
Authors: Scott Earthy Baldo, Anna Cred Patricia Barroma, Miguel Angelo Eñano, John Ares Hipolito, Orange Sundra Sison, Rixielle Gwendale Tumambing
Abstract:
Service Innovation is the introduction of several new-fangled ways on how to deliver service to customers with the intention to improve one’s existing service quality and to attract more customers. This research paper aims to identify the various service practices being implemented on the different quick-service restaurants within Morayta Street, Manila, Philippines and compare each establishment to the best within the industry through the process of benchmarking towards service innovations. In order for the gathering of valuable data to be possible, a mixed-method approach was used, wherein qualitative data were taken from the managers of each establishment, indicating the service practices being used, and quantitative data were collected from the customers and employees regarding their perception towards the present service quality of each selected quick-service restaurants, in line with the current service innovations being implemented. This research was conducted in order to discern which service practices are effective in attracting customers and boosting their satisfaction for future references of practitioners who are planning to manage a quick-service restaurant and for students studying in the field of hospitality, specifically on service.Keywords: benchmarking, quick-service restaurants, service innovations, service quality
Procedia PDF Downloads 3734230 Applying Transformative Service Design to Develop Brand Community Service in Women, Children and Infants Retailing
Authors: Shian Wan, Yi-Chang Wang, Yu-Chien Lin
Abstract:
This research discussed the various theories of service design, the importance of service design methodology, and the development of transformative service design framework. In this study, transformative service design is applied while building a new brand community service for women, children and infants retailing business. The goal is to enhance the brand recognition and customer loyalty, effectively increase the brand community engagement by embedding the brand community in social network and ultimately, strengthen the impact and the value of the company brand.Keywords: service design, transformative service design, brand community, innovation
Procedia PDF Downloads 4984229 Searching the Relationship among Components that Contribute to Interactive Plight and Educational Execution
Authors: Shri Krishna Mishra
Abstract:
In an educational context, technology can prompt interactive plight only when it is used in conjunction with interactive plight methods. This study, therefore, examines the relationships among components that contribute to higher levels of interactive plight and execution, such as interactive Plight methods, technology, intrinsic motivation and deep learning. 526 students participated in this study. With structural equation modelling, the authors test the conceptual model and identify satisfactory model fit. The results indicate that interactive Plight methods, technology and intrinsic motivation have significant relationship with interactive Plight; deep learning mediates the relationships of the other variables with Execution.Keywords: searching the relationship among components, contribute to interactive plight, educational execution, intrinsic motivation
Procedia PDF Downloads 4544228 SciPaaS: a Scientific Execution Platform for the Cloud
Authors: Wesley H. Brewer, John C. Sanford
Abstract:
SciPaaS is a prototype development of an execution platform/middleware designed to make it easy for scientists to rapidly deploy their scientific applications (apps) to the cloud. It provides all the necessary infrastructure for running typical IXP (Input-eXecute-Plot) style apps, including: a web interface, post-processing and plotting capabilities, job scheduling, real-time monitoring of running jobs, and even a file/case manager. In this paper, first the system architecture is described and then is demonstrated for a two scientific applications: (1) a simple finite-difference solver of the inviscid Burger’s equation, and (2) Mendel’s Accountant—a forward-time population genetics simulation model. The implications of the prototype are discussed in terms of ease-of-use and deployment options, especially in cloud environments.Keywords: web-based simulation, cloud computing, Platform-as-a-Service (PaaS), rapid application development (RAD), population genetics
Procedia PDF Downloads 5904227 Service Delivery Process in the Luxury Hotel Industry in Dubai: A Hoteliers’ Perspective
Authors: Veronique Gregorec, Prakash Vel, Collins A. Brobbey
Abstract:
Service delivery process in the face of ever changing customer expectations could not have been more important in glamorous Dubai luxury hotel service sector. Based on in-depth discussions with Dubai luxury hotel service pioneers, customer expectations, service processes, customer complaining behavior, and service recovery strategies in the luxury hotel industry are evaluated from the perspectives of service providers. Findings are in agreement with the statement that in the service industry the customer is not always right, and that hotel service providers have acknowledged the need to take extra measures towards individualized and personal service experience delivery. Ultimately, hoteliers set highest standards at all stages of the service delivery process in order to achieve positive and high customer ratings in all customer evaluation areas.Keywords: luxury hotels, Dubai hotels, Dubai hospitality industry, guest service process
Procedia PDF Downloads 4994226 Automating Test Activities: Test Cases Creation, Test Execution, and Test Reporting with Multiple Test Automation Tools
Authors: Loke Mun Sei
Abstract:
Software testing has become a mandatory process in assuring the software product quality. Hence, test management is needed in order to manage the test activities conducted in the software test life cycle. This paper discusses on the challenges faced in the software test life cycle, and how the test processes and test activities, mainly on test cases creation, test execution, and test reporting is being managed and automated using several test automation tools, i.e. Jira, Robot Framework, and Jenkins.Keywords: test automation tools, test case, test execution, test reporting
Procedia PDF Downloads 583