Search results for: information operations
11868 Predictability of Supply Chain in Indian Automobile Division
Authors: Dharamvir Mangal
Abstract:
Supply chain management has increasingly become an inevitable challenge to most companies to continuously survive and prosper in the global chain-based competitive environment. The current challenges of the Indian automotive world, their implications on supply chain are summarized and analyzed in this paper. In this competitive era of ‘LPG’ i.e. Liberalization, Privatization and Globalization, modern marketing systems, introduction of products with short life cycles, and the discriminating expectations of customers have enforced business enterprises to invest in and focus attention on their Supply Chains (SCs) in order to meet out the level of customer’s satisfaction and to survive in the competitive market. In fact, many of trends in the auto industry are reinforcing the need to redefine supply chain strategies layouts, and operations etc. Many manufacturing operations are designed to maximize throughput and lower costs with modest considerations for the crash on inventory levels and distribution capabilities. To improve profitability and efficiency, automotive players are seeking ways to achieve operational excellence, reduce operating cost and enhance customer service through efficient supply chain management.Keywords: automotive industry, supply chain, challenges, market potential
Procedia PDF Downloads 33011867 Sustainability of Green Supply Chain for a Steel Industry Using Mixed Linear Programing Model
Authors: Ameen Alawneh
Abstract:
The cost of material management across the supply chain represents a major contributor to the overall cost of goods in many companies both manufacturing and service sectors. This fact combined with the fierce competition make supply chains more efficient and cost effective. It also requires the companies to improve the quality of the products and services, increase the effectiveness of supply chain operations, focus on customer needs, reduce wastes and costs across the supply chain. As a heavy industry, steel manufacturing companies in particular are nowadays required to be more environmentally conscious due to their contribution to air, soil, and water pollution that results from emissions and wastes across their supply chains. Steel companies are increasingly looking for methods to reduce or cost cut in the operations and provide extra value to their customers to stay competitive under the current low margins. In this research we develop a green framework model for the sustainability of a steel company supply chain using Mixed integer Linear programming.Keywords: Supply chain, Mixed Integer linear programming, heavy industry, water pollution
Procedia PDF Downloads 44711866 The Effects of Green Logistics Management Practices on Sustainability Performance in Nigeria
Authors: Ozoemelam Ikechukwu Lazarus, Nizamuddin B. Zainuddi, Abdul Kafi
Abstract:
Numerous studies have been carried out on Green Logistics Management Practices (GLMPs) across the globe. The study on the practices and performance of green chain practices in Africa in particular has not gained enough scholarly attention. Again, the majority of supply chain sustainability research being conducted focus on environmental sustainability. Logistics has been a major cause of supply chain resource waste and environmental damage. Many sectors of the economy that engage in logistical operations significantly rely on vehicles, which emit pollutants into the environment. Due to urbanization and industrialization, the logistical operations of manufacturing companies represent a serious hazard to the society and human life, making the sector one of the fastest expanding in the world today. Logistics companies are faced with numerous difficulties when attempting to implement logistics practices along their supply chains. In Nigeria, manufacturing companies aspire to implement reverse logistics in response to stakeholders’ requirements to reduce negative environmental consequences. However, implementing this is impeded by a criteria framework, and necessitates the careful analysis of how such criteria interact with each other in the presence of uncertainty. This study integrates most of the green logistics management practices (GLMPs) into the Nigerian firms to improve generalizability, and credibility. It examines the effect of Green Logistics Management Practices on environmental performance, social performance, market performance, and financial performance in the logistics industries. It seeks to identify the critical success factors in order to develop a model that incorporates different factors from the perspectives of the technology, organization, human and environment to inform the adoption and use of technologies for logistics supply chain social sustainability in Nigeria. It uses exploratory research approach to collect and analyse the data.Keywords: logistics, management, sustainability, environment, operations
Procedia PDF Downloads 8111865 Energy Conversion from Waste Paper Industry Using Fluidized Bed Combustion
Authors: M. Dyah Ayu Yuli, S. Faisal Dhio, P. Johandi, P. Muhammad Sofyan
Abstract:
Pulp and paper mills generate various quantities of energy-rich biomass as wastes, depending on technological level, pulp and paper grades and wood quality. These wastes are produced in all stages of the process: wood preparation, pulp and paper manufacture, chemical recovery, recycled paper processing, waste water treatment. Energy recovery from wastes of different origin has become a generally accepted alternative to their disposal. Pulp and paper industry expresses an interest in adapting and integrating advanced biomass energy conversion technologies into its mill operations using Fluidized Bed Combustion. Industrial adoption of these new technologies has the potential for higher efficiency, lower capital cost, and safer operation than conventional operations that burn fossil fuels for energy. Incineration with energy recovery has the advantage of hygienic disposal, volume reduction, and the recovery of thermal energy by means of steam or super heated water that can be used for heating and power generation.Keywords: biomass, fluidized bed combustion, pulp and paper mills, waste
Procedia PDF Downloads 47211864 Organisational Disclosure: Threats to Individuals' Privacy
Authors: N. A. Badrul
Abstract:
People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data.Keywords: personal information, privacy, e-government, information disclosure
Procedia PDF Downloads 31811863 [Keynote Speech]: Curiosity, Innovation and Technological Advancements Shaping the Future of Science, Technology, Engineering and Mathematics Education
Authors: Ana Hol
Abstract:
We live in a constantly changing environment where technology has become an integral component of our day to day life. We rely heavily on mobile devices, we search for data via web, we utilise smart home sensors to create the most suited ambiences and we utilise applications to shop, research, communicate and share data. Heavy reliance on technology therefore is creating new connections between STEM (Science, Technology, Engineering and Mathematics) fields which in turn rises a question of what the STEM education of the future should be like? This study was based on the reviews of the six Australian Information Systems students who undertook an international study tour to India where they were given an opportunity to network, communicate and meet local students, staff and business representatives and from them learn about the local business implementations, local customs and regulations. Research identifies that if we are to continue to implement and utilise electronic devices on the global scale, such as for example implement smart cars that can smoothly cross borders, we will need the workforce that will have the knowledge about the cars themselves, their parts, roads and transport networks, road rules, road sensors, road monitoring technologies, graphical user interfaces, movement detection systems as well as day to day operations, legal rules and regulations of each region and country, insurance policies, policing and processes so that the wide array of sensors can be controlled across country’s borders. In conclusion, it can be noted that allowing students to learn about the local conditions, roads, operations, business processes, customs and values in different countries is giving students a cutting edge advantage as such knowledge cannot be transferred via electronic sources alone. However once understanding of each problem or project is established, multidisciplinary innovative STEM projects can be smoothly conducted.Keywords: STEM, curiosity, innovation, advancements
Procedia PDF Downloads 19911862 The Impacts of Green Logistics Management Practices on Sustainability Performance in Nigeria
Authors: Ozoemelam Ikechukwu Lazarus, Nizamuddin B. Zainuddin, Abdul Kafi
Abstract:
Numerous studies have been carried out on Green Logistics Management Practices (GLMPs) across the globe. The study on the practices and performance of green chain practices in Africa in particular has not gained enough scholarly attention. Again, the majority of supply chain sustainability research being conducted focus on environmental sustainability. Logistics has been a major cause of supply chain resource waste and environmental damage. Many sectors of the economy that engage in logistical operations significantly rely on vehicles, which emit pollutants into the environment. Due to urbanization and industrialization, the logistical operations of manufacturing companies represent a serious hazard to the society and human life, making the sector one of the fastest expanding in the world today. Logistics companies are faced with numerous difficulties when attempting to implement logistics practices along their supply chains. In Nigeria, manufacturing companies aspire to implement reverse logistics in response to stakeholders’ requirements to reduce negative environmental consequences. However, implementing this is impeded by a criteria framework, and necessitates the careful analysis of how such criteria interact with each other in the presence of uncertainty. This study integrates most of the green logistics management practices (GLMPs) into the Nigerian firms to improve generalizability, and credibility. It examines the effect of Green Logistics Management Practices on environmental performance, social performance, market performance, and financial performance in the logistics industries. It seeks to identify the critical success factors in order to develop a model that incorporates different factors from the perspectives of the technology, organization, human and environment to inform the adoption and use of technologies for logistics supply chain social sustainability in Nigeria. It uses exploratory research approach to collect and analyse the data.Keywords: logistics, managemernt, suatainability, environment, operations
Procedia PDF Downloads 6111861 Assessing the Effectiveness of Warehousing Facility Management: The Case of Mantrac Ghana Limited
Authors: Kuhorfah Emmanuel Mawuli
Abstract:
Generally, for firms to enhance their operational efficiency of logistics, it is imperative to assess the logistics function. The cost of logistics conventionally represents a key consideration in the pricing decisions of firms, which suggests that cost efficiency in logistics can go a long way to improve margins. Warehousing, which is a key part of logistics operations, has the prospect of influencing operational efficiency in logistics management as well as customer value, but this potential has often not been recognized. It has been found that there is a paucity of research that evaluates the efficiency of warehouses. Indeed, limited research has been conducted to examine potential barriers to effective warehousing management. Due to this paucity of research, there is limited knowledge on how to address the obstacles associated with warehousing management. In order for warehousing management to become profitable, there is the need to integrate, balance, and manage the economic inputs and outputs of the entire warehouse operations, something that many firms tend to ignore. Management of warehousing is not solely related to storage functions. Instead, effective warehousing management requires such practices as maximum possible mechanization and automation of operations, optimal use of space and capacity of storage facilities, organization through "continuous flow" of goods, a planned system of storage operations, and safety of goods. For example, there is an important need for space utilization of the warehouse surface as it is a good way to evaluate the storing operation and pick items per hour. In the setting of Mantrac Ghana, not much knowledge regarding the management of the warehouses exists. The researcher has personally observed many gaps in the management of the warehouse facilities in the case organization Mantrac Ghana. It is important, therefore, to assess the warehouse facility management of the case company with the objective of identifying weaknesses for improvement. The study employs an in-depth qualitative research approach using interviews as a mode of data collection. Respondents in the study mainly comprised warehouse facility managers in the studied company. A total of 10 participants were selected for the study using a purposive sampling strategy. Results emanating from the study demonstrate limited warehousing effectiveness in the case company. Findings further reveal that the major barriers to effective warehousing facility management comprise poor layout, poor picking optimization, labour costs, and inaccurate orders; policy implications of the study findings are finally outlined.Keywords: assessing, warehousing, facility, management
Procedia PDF Downloads 6511860 A Pattern Practise for Awareness Educations on Information Security: Information Security Project
Authors: Fati̇h Apaydin
Abstract:
Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.Keywords: computer, information security, education, technology, development
Procedia PDF Downloads 59411859 Information Retrieval for Kafficho Language
Authors: Mareye Zeleke Mekonen
Abstract:
The Kafficho language has distinct issues in information retrieval because of its restricted resources and dearth of standardized methods. In this endeavor, with the cooperation and support of linguists and native speakers, we investigate the creation of information retrieval systems specifically designed for the Kafficho language. The Kafficho information retrieval system allows Kafficho speakers to access information easily in an efficient and effective way. Our objective is to conduct an information retrieval experiment using 220 Kafficho text files, including fifteen sample questions. Tokenization, normalization, stop word removal, stemming, and other data pre-processing chores, together with additional tasks like term weighting, were prerequisites for the vector space model to represent each page and a particular query. The three well-known measurement metrics we used for our word were Precision, Recall, and and F-measure, with values of 87%, 28%, and 35%, respectively. This demonstrates how well the Kaffiho information retrieval system performed well while utilizing the vector space paradigm.Keywords: Kafficho, information retrieval, stemming, vector space
Procedia PDF Downloads 5711858 Provisions for Risk in Islamic Banking and Finance in Comparison to the Conventional Banks in Malaysia
Authors: Rashid Masoud Ali Al-Mazrui, Ramadhani Mashaka Shabani
Abstract:
Islamic banks and financial institutions are exposed to the same risks as conventional banking. These risks include the rate return risk, credit or market risk, liquidity risk, and operational risk among others. However, being a financial institution that operates Islamic banking and finance operations, there is additional risk associated with its operations different from conventional finance, such as displacing commercial risk. They face Shari'ah compliance risks because of their failure to follow Shari'ah principles. To have proper mitigation and risk management, banks should have proper risk management policies to mitigate risks. This paper aims to study the risk management taken by Islamic banks in comparison with conventional banks. Also, the study evaluates the provisions for risk management taken by selected Islamic banks and conventional banks. The study employs qualitative analysis using secondary data by applying a content analysis approach with a sample size of 4 Islamic banks and four conventional banks ranging from 2010 to 2020. We find that these banks all use the same technique, except for the associated risk. The extra ways are used, but only for additional risks that are available to Islamic banking and finance.Keywords: emerging risk, risk management, Islamic banking, conventional bank
Procedia PDF Downloads 8311857 Information Overload, Information Literacy and Use of Technology by Students
Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović
Abstract:
The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.Keywords: information overload, computers, mobile devices, digital media, information literacy, students
Procedia PDF Downloads 27711856 Dynamic Determination of Spare Engine Requirements for Air Fighters Integrating Feedback of Operational Information
Authors: Tae Bo Jeon
Abstract:
Korean air force is undertaking a big project to replace prevailing hundreds of old air fighters such as F-4, F-5, KF-16 etc. The task is to develop and produce domestic fighters equipped with 2 complete-type engines each. A large number of engines, however, will be purchased as products from a foreign engine maker. In addition to the fighters themselves, secure the proper number of spare engines serves a significant role in maintaining combat readiness and effectively managing the national defense budget due to high cost. In this paper, we presented a model dynamically updating spare engine requirements. Currently, the military administration purchases all the fighters, engines, and spare engines at acquisition stage and does not have additional procurement processes during the life cycle, 30-40 years. With the assumption that procurement procedure during the operational stage is established, our model starts from the initial estimate of spare engine requirements based on limited information. The model then performs military missions and repair/maintenance works when necessary. During operation, detailed field information - aircraft repair and test, engine repair, planned maintenance, administration time, transportation pipeline between base, field, and depot etc., - should be considered for actual engine requirements. At the end of each year, the performance measure is recorded and proceeds to next year when it shows higher the threshold set. Otherwise, additional engine(s) will be bought and added to the current system. We repeat the process for the life cycle period and compare the results. The proposed model is seen to generate far better results appropriately adding spare engines thus avoiding possible undesirable situations. Our model may well be applied to future air force military operations.Keywords: DMSMS, operational availability, METRIC, PRS
Procedia PDF Downloads 17111855 A Review of Information Systems Development in Developing Countries
Authors: B. N. Asare, O. A. Ajigini
Abstract:
Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model
Procedia PDF Downloads 37811854 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda
Authors: Sofia Sutera
Abstract:
Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda
Procedia PDF Downloads 13511853 A Decade of Creating an Alternative Banking System in Tanzania: The Current State of Affairs of Islamic Banks
Authors: Pradeep Kulshrestha, Maulana Ayoub Ali
Abstract:
The concept of financial inclusion has been tabled in the whole world where practitioners, academicians, policy makers and economists are working hard to look for the best possible opportunities in order to enable the whole society to be in the banking cycle. The Islamic banking system is considered to be one of the said opportunities. Countries like the United Kingdom, United States of America, Malaysia, Saudi Arabia, the whole of the United Arab Emirates and many African countries have accommodated the aspect of Islamic banking in the conventional banking system as one of the financial inclusion strategies. This paper tries to analyse the current state of affairs of the Islamic Banking system in Tanzania in order to understand the improvement of the provision of Islamic banking products and services in the said country. The paper discusses the historical background of the banking system in Tanzania, the level of penetration of banking products and services and the coming of the Islamic banking system in the country. Furthermore, the paper discusses banking regulatory bodies, legal instruments governing banking operations as well as number of legal challenges facing Islamic banking operations in the country. Following a critical literature review, the paper discovered that there is no legal instrument which talks about the introduction and provision of Islamic banking system in Tanzania. Furthermore, the Islamic banking system was considered as a banking product which is absolutely incorrect because Islamic banking is considered to be as a banking system of its own. In addition to that, it has been discovered that lack of a proper regulatory system and legal instruments to harmonize the conventional and Islamic banking systems has resulted in the closure of one Islamic window in the country, which in the end affects the credibility of the newly introduced banking system. In its conclusive remarks, the paper suggests that Tanzania should work on all legal challenges affecting the smooth operations of the Islamic banking system. This can be in a way of adopting various Islamic banking legal models which are used in countries like Malaysia and others, or a borrowing legal harmonization process which has been adopted by the UK, Uganda, Nigeria and Kenya.Keywords: Islamic banking, Islamic windows, regulations, banks
Procedia PDF Downloads 18811852 Enterprise Security Architecture: Approaches and a Framework
Authors: Amir Mohtarami, Hadi Kandjani
Abstract:
The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.Keywords: enterprise architecture, architecture framework, security architecture, information systems
Procedia PDF Downloads 70411851 Standardized Description and Modeling Methods of Semiconductor IP Interfaces
Authors: Seongsoo Lee
Abstract:
IP reuse is an effective design methodology for modern SoC design to reduce effort and time. However, description and modeling methods of IP interfaces are different due to different IP designers. In this paper, standardized description and modeling methods of IP interfaces are proposed. It consists of 11 items such as IP information, model provision, data type, description level, interface information, port information, signal information, protocol information, modeling level, modeling information, and source file. The proposed description and modeling methods enables easy understanding, simulation, verification, and modification in IP reuse.Keywords: interface, standardization, description, modeling, semiconductor IP
Procedia PDF Downloads 50211850 Occupant Behaviour Change in Post-Pandemic Australia
Authors: Yan Zhang, Felix Kin Peng Hui, Colin Duffield, Caroline X. Gao
Abstract:
In post-pandemic Australia, it is unclear how building occupant have changed their behaviour in their interaction with buildings and other occupants. This research provides information on occupant behaviour change compared to before the pandemic and examines the predictors for those behaviour changes. This paper analyses survey responses from 2298 building occupants in Melbourne to investigate occupant behaviour change and determinants for those changes one year after the pandemic in Australia. The behaviour changes were grouped into three categories based on respiratory infection routes: (1) fomite: hand-shaking and hand hygiene behaviours; (2) airborne: individual interventions to indoor air quality such as face masking, window openings for occupants working in naturally ventilated space; (3) droplets: social distancing, reducing working hours in the workplace. The survey shows that the pandemic has significantly changed occupants' behaviour in all three categories compared to before the pandemic. The changes are significantly associated with occupants' perceived indoor air quality, indoor environmental cleanliness, and occupant density, demonstrating their growing awareness of respiratory infection risk that influences their health behaviours. The two most significant factors identified from multivariate regressions to drive the behaviour change include occupant risk perception of respiratory infections at the workplace and their observed co-worker's behaviour change. Based on the survey results, the paper provides adjusted estimates for related occupant behaviour parameters. The study also discusses alternatives for managing window operations in naturally ventilated buildings to improve occupant satisfaction. This paper could help Building Managers, and Building Designers understand occupant behaviour change to improve building operations and new building design to enhance occupant experience. Also, building energy modellers and risk assessors may use the findings to adjust occupant behaviour-related parameters to improve the models. The findings contribute to the knowledge of Human-Building Interaction.Keywords: human-building interaction, risk perception, occupant behaviour, IAQ, COVID-19
Procedia PDF Downloads 6911849 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 48211848 Magnetic Solvent Extraction Using Nanoparticles Coated by Oleic Acid
Authors: Natália C. C. Lobato, Ângela M. Ferreira, Marcelo B. Mansur
Abstract:
In solvent extraction operations, large sedimentation areas in the mixer-settler are required when the disengagement of the aqueous and the organic phases is slow and/or difficult. The use of a magnetic organic liquid (also known as ferrofluid), consisting of magnetite nanoparticles coated by oleic acid dispersed in the organic diluent, has proven successful to speed up phase disengagement. The method, however, has never been used industrially; therefore, the aim of this study is to raise its main limitations. Tests were carried out using a ferrofluid containing 30 g/l of magnetite dissolved in commercial aliphatic kerosene Exxsol D80. The efficiency of cobalt extraction ([Co] = 1 g/l) with 10% v/v Cyanex 272 (bis-2,4,4-trimethylpentyl phosphinic acid) at changing pH of the aqueous phase (2 to 7) was found unaffected in the conditions studied. However, the chemical resistance of the ferrofluid in contact with deionized water at changing acidity (from 10-7 to 2 mol/l) revealed that the nanoparticles are not resistant when contacted to aqueous solutions with a pH ≤ 2. Such result represents a serious limitation to the applicability of the method mainly to hydrometallurgical systems because solvent extraction operations are normally done in acid conditions, therefore more effective strategies to coat the particles are required.Keywords: magnetic solvent extraction, oleic acid, magnetite nanoparticles, cyanex 272
Procedia PDF Downloads 39511847 Earnings-Related Information, Cognitive Bias, and the Disposition Effect
Authors: Chih-Hsiang Chang, Pei-Shan Kao
Abstract:
This paper discusses the reaction of investors in the Taiwan stock market to the most probable unknown earnings-related information and the most probable known earnings-related information. As compared with the previous literature regarding the effect of an official announcement of earnings forecast revision, this paper further analyzes investors’ cognitive bias toward the unknown and known earnings-related information, and the role of media during the investors' reactions to the foresaid information shocks. The empirical results show that both the unknown and known earnings-related information provides useful information content for a stock market. In addition, cognitive bias and disposition effect are the behavioral pitfalls that commonly occur in the process of the investors' reactions to the earnings-related information. Finally, media coverage has a remarkable influence upon the investors' trading decisions.Keywords: cognitive bias, role of media, disposition effect, earnings-related information, behavioral pitfall
Procedia PDF Downloads 22411846 Proprietary Blend Synthetic Rubber as Loss Circulation Material in Drilling Operation
Authors: Zatil Afifah Omar, Siti Nur Izati Azmi, Kathi Swaran, Navin Kumar
Abstract:
Lost circulation has always been one of the greatest problems faced by drilling companies during drilling operations due to excessive drilling Fluids losses. Loss of circulation leads to Huge cost and non-productive time. The objective of this study is to evaluate the sealing efficiency of a proprietary blend of synthetic rubber as loss circulation material in comparison with a conventional product such as calcium carbonate, graphite, cellulosic, and nutshells. Sand Bed Tester with a different proprietary blend of synthetic rubber compositions has been used to determine the effectiveness of the LCM in preventing drilling fluids losses in a lab scale. Test results show the proprietary blend of synthetic rubber have good bridging properties and sealing Off fractures of various sizes. The finish product is environmentally friendly with lower production lead time and lower production cost compared to current conventional loss circulation materials used in current drilling operations.Keywords: loss circulation materials, drilling operation, sealing efficiency, LCM
Procedia PDF Downloads 18211845 Application the Queuing Theory in the Warehouse Optimization
Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova
Abstract:
The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.Keywords: queuing theory, logistics system, mathematical methods, warehouse optimization
Procedia PDF Downloads 59311844 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange
Authors: Dora Triki, Irena Vida, Claude Obadia
Abstract:
Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.Keywords: conation, e-Forum, information exchange, members participation
Procedia PDF Downloads 15811843 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 42911842 Accounting Propositions for Sustainability Performance Information Systems Introduction: Environmental Attributes from Croatian Hotels
Authors: Vanja Vejzagic, Jackie Brander Brown, Peter Schmidt
Abstract:
Purpose: For some time now, the global hotel industry trends are strongly oriented towards sustainable development and environmental management accounting (EMA) should have the supporting role for hotel’s corporate social responsibility (CSR) management. The aim of this paper is thus to analyse and present data on the key steps leading toward the effective incorporation of EMA within hotel performance information systems. Design/Methodology/Approach: The research study is a continuation of the process carried out on the sample of 20 eco-hotels in the UK, a year ago. Research evidence was obtained via in-depth case studies on sample of 180 hotels (4 and 5 stars hotels) located in Croatia. Research was conducted through interviews with key personnel and an online survey which specifically focused on 10 business areas considered vital for successful EMA integration. Findings: The research results indicate a pattern by which hotels can determine the existing level of their sustainable (environmental) business. Furthermore, the management understanding of the sustainability concept was still proven to lead to a relatively subjective appreciation and presentation of sustainable hotel operations and their performance. It was determined that majority of analysed hotel organisations reflect typical short-term, financially oriented performance information systems. Steps for EMA introduction have been offered. Research Limitations/Implications: CSR is still a broad-set concept. Exploring the effects of EMA on such-like a defined management system may be subject to considerable influence of the respondent’s subjective perception of the concept. Originality/Value: This article should be of interest to higher education academics and careers staff who have an interest in CSR introduction and the ways of implementing its informational support for performance measurement.Keywords: environmental management accounting, EMA, corporate social responsibility, CSR, sustainability, hotel
Procedia PDF Downloads 17411841 Classification of Random Doppler-Radar Targets during the Surveillance Operations
Authors: G. C. Tikkiwal, Mukesh Upadhyay
Abstract:
During the surveillance operations at war or peace time, the Radar operator gets a scatter of targets over the screen. This may be a tracked vehicle like tank vis-à-vis T72, BMP etc, or it may be a wheeled vehicle like ALS, TATRA, 2.5Tonne, Shaktiman or moving the army, moving convoys etc. The radar operator selects one of the promising targets into single target tracking (STT) mode. Once the target is locked, the operator gets a typical audible signal into his headphones. With reference to the gained experience and training over the time, the operator then identifies the random target. But this process is cumbersome and is solely dependent on the skills of the operator, thus may lead to misclassification of the object. In this paper, we present a technique using mathematical and statistical methods like fast fourier transformation (FFT) and principal component analysis (PCA) to identify the random objects. The process of classification is based on transforming the audible signature of target into music octave-notes. The whole methodology is then automated by developing suitable software. This automation increases the efficiency of identification of the random target by reducing the chances of misclassification. This whole study is based on live data.Keywords: radar target, FFT, principal component analysis, eigenvector, octave-notes, DSP
Procedia PDF Downloads 39411840 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion
Authors: Rui Liu, Klaus Greve
Abstract:
The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization
Procedia PDF Downloads 28811839 Highly Automated Trucks In Intermodal Logistics: Findings From a Field Test in Railport and Container Depot Operations in Germany
Authors: Dustin Schöder
Abstract:
The potential benefits of the utilization of highly automated and autonomous trucks in logistics operations are the subject of interest to the entire logistics industry. The benefits of the use of these new technologies were scientifically investigated and implemented in roadmaps. So far, reliable data and experiences from real life use cases are still limited. A German research consortium of both academics and industry developed a highly automated (SAE level 4) vehicle for yard operations at railports and container depots. After development and testing, a several month field test at the DUSS Terminal in Ulm-Dornstadt (Germany) and the nearby DB Intermodal Services Container Depot in Ulm-Dornstadt was conducted. The truck was piloted in a shuttle service between both sites. In a holistic automation approach, the vehicle was integrated into a digital communication platform so that the truck could move autonomously without a driver and his manual interactions with a wide variety of stakeholders. The main goal is to investigate the effects of highly automated trucks in the key processes of container loading, unloading and container relocation on holistic railport yard operation. The field test data were used to investigate changes in process efficiency of key processes of railport and container yard operations. Moreover, effects on the capacity utilization and potentials for smothering peak workloads were analyzed. The results state that process efficiency in the piloted use case was significantly higher. The reason for that could be found in the digitalized data exchange and automated dispatch. However, the field test has shown that the effect is greatly varying depending on the ratio of highly automated and manual trucks in the yard as well as on the congestion level in the loading area. Furthermore, the data confirmed that under the right conditions, the capacity utilization of highly automated trucks could be increased. In regard to the potential for smothering peak workloads, no significant findings could be made based on the limited requirements and regulations of railway operation in Germany. In addition, an empirical survey among railport managers, operational supervisors, innovation managers and strategists (n=15) within the logistics industry in Germany was conducted. The goal was to identify key characteristics of future railports and terminals as well as requirements that railports will have to meet in the future. Furthermore, the railport processes where automation and autonomization make the greatest impact, as well as hurdles and challenges in the introduction of new technologies, have been surveyed. Hence, further potential use cases of highly automated and autonomous applications could be identified, and expectations have been mapped. As a result, a highly detailed and practice-based roadmap towards a ‘terminal 4.0’ was developed.Keywords: highly automated driving, autonomous driving, SAE level 4, railport operations, container depot, intermodal logistics, potentials of autonomization
Procedia PDF Downloads 78