Search results for: law enforcement mid-level manager
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 668

Search results for: law enforcement mid-level manager

398 Role of Leadership in Project Management

Authors: Miriam Filipová, Peter Balco

Abstract:

At present, in Slovak and Czech Republic, the education within the field of Project Management is carried out either within the higher education or via commercial entities, whilst the most used contents are the commonly used methodologies of project management. Obtaining a diploma after completing a university degree or a training certificate does not automatically mean the success of the project or the success of the project manager. The importance of leadership and soft skills in project management is either not included at all within the training of project managers, or it is only partially reflected. From the methodology perspective, the most important things during the preparation and management of the projects are preparation of the project plan, resource planning, and project realization in accordance with the chosen methodology. However, the key element on which the success of the project depends on are the people – whether they are team members on the supplier's side, the stakeholders, or the end users. This research focuses on the real needs of working project managers, on the development of their strengths, expertise, skills, and knowledge regarding leadership and soft skills. At the same time, it looks into identifying the elements that they consider to be key to the success of the projects they have managed and successfully delivered. The result of this research is the input for creating recommendations for a comprehensive education of project managers in the field of leadership and soft skills.

Keywords: project management, leadership, soft skills, education, academic degree, certificates, skills, talents, knowledge

Procedia PDF Downloads 139
397 The Tariffs of Water Service for Productive Users: A Model for Defining Fare Classes

Authors: M. Macchiaroli, V. Pellecchia, L. Dolores

Abstract:

The water supply for production users (craft, commercial, industrial), understood as the set of water supply and wastewater collection services becomes an increasingly felt problem in a water scarcity regime. In fact, disputes are triggered between the different social parties for the fair and efficient use of water resources. Within this aspect, the problem arises of the different pricing of services between civil users and production users. Of particular interest is the question of defining the tariff classes depending on consumption levels. If for civil users, this theme is strongly permeated by social profiles (a topic dealt with by the author in a forthcoming research contribution) connected with the inalienability of the right to have water and with the reconciliation of the needs of the weakest groups of the population, for consumers in the production sector the logic adopted by the manager may be inspired by criteria of greater corporate rationality. This work illustrates the Italian regulatory framework and shows an optimization model of tariff classes in the production sector that reconciles the public objective of sustainable use of the resource and the needs of a production system in search of recovery after the depressing effects caused by COVID-19 pandemic.

Keywords: decision making, economic evaluation, urban water management, water tariff

Procedia PDF Downloads 95
396 Horizontal Cooperative Game Theory in Hotel Revenue Management

Authors: Ririh Rahma Ratinghayu, Jayu Pramudya, Nur Aini Masruroh, Shi-Woei Lin

Abstract:

This research studies pricing strategy in cooperative setting of hotel duopoly selling perishable product under fixed capacity constraint by using the perspective of managers. In hotel revenue management, competitor’s average room rate and occupancy rate should be taken into manager’s consideration in determining pricing strategy to generate optimum revenue. This information is not provided by business intelligence or available in competitor’s website. Thus, Information Sharing (IS) among players might result in improved performance of pricing strategy. IS is widely adopted in the logistics industry, but IS within hospitality industry has not been well-studied. This research put IS as one of cooperative game schemes, besides Mutual Price Setting (MPS) scheme. In off-peak season, hotel manager arranges pricing strategy to offer promotion package and various kinds of discounts up to 60% of full-price to attract customers. Competitor selling homogenous product will react the same, then triggers a price war. Price war which generates lower revenue may be avoided by creating collaboration in pricing strategy to optimize payoff for both players. In MPS cooperative game, players collaborate to set a room rate applied for both players. Cooperative game may avoid unfavorable players’ payoff caused by price war. Researches on horizontal cooperative game in logistics show better performance and payoff for the players, however, horizontal cooperative game in hotel revenue management has not been demonstrated. This paper aims to develop hotel revenue management models under duopoly cooperative schemes (IS & MPS), which are compared to models under non-cooperative scheme too. Each scheme has five models, Capacity Allocation Model; Demand Model; Revenue Model; Optimal Price Model; and Equilibrium Price Model. Capacity Allocation Model and Demand Model employs self-hotel and competitor’s full and discount price as predictors under non-linear relation. Optimal price is obtained by assuming revenue maximization motive. Equilibrium price is observed by interacting self-hotel’s and competitor’s optimal price under reaction equation. Equilibrium is analyzed using game theory approach. The sequence applies for three schemes. MPS Scheme differently aims to optimize total players’ payoff. The case study in which theoretical models are applied observes two hotels offering homogenous product in Indonesia during a year. The Capacity Allocation, Demand, and Revenue Models are built using multiple regression and statistically tested for validation. Case study data confirms that price behaves within demand model in a non-linear manner. IS Models can represent the actual demand and revenue data better than Non-IS Models. Furthermore, IS enables hotels to earn significantly higher revenue. Thus, duopoly hotel players in general, might have reasonable incentives to share information horizontally. During off-peak season, MPS Models are able to predict the optimal equal price for both hotels. However, Nash equilibrium may not always exist depending on actual payoff of adhering or betraying mutual agreement. To optimize performance, horizontal cooperative game may be chosen over non-cooperative game. Mathematical models can be used to detect collusion among business players. Empirical testing can be used as policy input for market regulator in preventing unethical business practices potentially harming society welfare.

Keywords: horizontal cooperative game theory, hotel revenue management, information sharing, mutual price setting

Procedia PDF Downloads 268
395 Working Hours of Nurses in Public Hospitals: An Analyse Based on Working Schedules

Authors: Feride Eskin Bacaksiz, Arzu K. Harmanci Seren

Abstract:

The problems about the working hours of nursing personnel, such as overworking, numbers of night or daytime shifts, is stated one of the most complained issues by nurses. Otherwise, besides of nursing shortage, absenteeism of nurses because of sickness, some other health problems, or other reasons enforces nurse managers to make working schedules. In this study, it was aimed to analyse and evaluate the working schedules of nurses working in public hospitals. Working schedule lists of nursing personnel for the months of October and November in two public hospitals were analysed and evaluated. Approvals were acquired from the head nurse managers. Descriptive and comparative analyses were used. Totally 36 lists were analysed from two hospitals. There were totally 416 nurses (manager nurse: 25, nurse: 391) and 6-28 (12.6, SD=5.34) nurses in each list. It was found that nurses were working 8 (42.5%), 12 (27.9%) and 16 (20%) hours, in inpatient clinics (74.8%). Totally 20.2% of the nurses were absent during analysing time due to the annual, paid or unpaid leaves. Nurses were generally working 20-112 hours (80.27, SD=11.92). Most of the nurses over worked 1.5-443 hours (47.436, SD=60.78) the year before that year. It was determined that 11.8% of the nurses (n: 49) were working only night shifts and 42.1% (n: 175) of the nurses were working only daytime shifts. It was found that there were inequities in the working hours of nurses.

Keywords: nurse, public hospitals, working conditions, working schedules

Procedia PDF Downloads 264
394 Evaluating the Location of Effective Product Advertising on Facebook Ads

Authors: Aulia F. Hadining, Atya Nur Aisha, Dimas Kurninatoro Aji

Abstract:

Utilization of social media as a marketing tool is growing rapidly, including for SMEs. Social media allows the user to give product evaluation and recommendations to the public. In addition, the social media facilitate word-of-mouth marketing communication. One of the social media that can be used is Facebook, with Facebook Ads. This study aimed to evaluate the location of Facebook Ads, to obtain an appropriate advertising design. There are three alternatives location consist of desktop, right-hand column and mobile. The effectiveness and efficiency of advertising will be measured based on advertising metrics such as reach, click, Cost per Click (CUC) and Unique Click-Through-Rate (UCTR). Facebook's Ads Manager was used for seven days, targeted by age (18-24), location (Bandung), language (Indonesia) and keywords. The result was 13,999 total reach, as well as 342 clicks. Based on the results of comparison using ANOVA, there was a significant difference for each placement location based on advertising metrics. Mobile location was chosen to be successful ads, because it produces the lowest CUC, amounting to Rp 691,- per click and 14% UCTR. Results of this study showed Facebook Ads was useful and cost-effective media to promote the product of SME, because it could be view by many people in the same time.

Keywords: marketing communication, social media, Facebook Ads, mobile location

Procedia PDF Downloads 329
393 Personal Egocentrism as an Indicator of the Management Activity Efficiency

Authors: Lusine S. Stepanyan, Elina V. Asriyan.

Abstract:

It is known, that the efficiency of management depend on individual characteristics of manager. In case, was shown the role of personal position in the efficiency of management. Current research is aimed at reveal psychological and psychophysiological basis efficiency of management and finding ways of increasing the productivity of management that is most essential and topical problems of modern society. To understand the investigated phenomenon it was applied a complex approach. The Eysenk questionnaire was used for determining the level of aggression, frustration, anxiety and rigidity. The test of egocentric associations was used for determining the level of egocentrism. The test of COS (communicativeness and organizational skills) was used for diagnosing the level of communicativeness. The integral index of job satisfaction was used for diagnosis the efficiency of management activity. Then, the relationship between the above mentioned mental state, communicativeness, self-esteem, job satisfaction, locus of control, and egocentrism was investigated. The obtained results have shown the positive correlation between the egocentrism and frustration, anxiety and also the negative correlation with job satisfaction and communicativeness. Intergroup analyses has revealed the significant differences by communicativeness and the internality’ level. The revealed results can be used for diagnosis of efficiency of management.

Keywords: egocentrism, locus control, mental state, job satisfaction, professional activity

Procedia PDF Downloads 348
392 Impact of Nurses' Migration to Nursing Management in Selected Health Institutions in the Philippines

Authors: Maria Luisa T. Uayan

Abstract:

The global need for qualified nurses to take care of the clients with various health needs is an incessant occurrence that persistently cause migration of nurses from developing to developed countries. The pull-push theory of migration greatly affects health care delivery systems of sending countries which is the same way affects nursing management. The exodus of nurses prepared to provide the much needed leadership at the bedside leaves the country in clusters giving health care institutions limited time to develop the next front-line managers that will assure quality patient care. This paper focuses on the extent and consequences of the massive recurring migration phenomena that is felt ONLY IN THE PHILIPPINE health care arena. It deals with the causes, problems, and effects of the cyclical loss of competent Filipina nurses in terms of emigration. Also, it will highlights the difficulties confronted by nursing service departments and health care teams when more experienced nurses set out for the “greener pastures” and patients are placed under the care of novice nurses. Fundamentally, it will emphasize the impact of suffering the loss of competent nurse managers in the Philippine health care institutions and provide contemporary recommendations on how to responsd accordingly to this very timely issue.

Keywords: Migration, Nurse Manager, Philippines

Procedia PDF Downloads 342
391 Requirement Analysis for Emergency Management Software

Authors: Tomáš Ludík, Jiří Barta, Sabina Chytilová, Josef Navrátil

Abstract:

Emergency management is a discipline of dealing with and avoiding risks. Appropriate emergency management software allows better management of these risks and has a direct influence on reducing potential negative impacts. Although there are several emergency management software products in the Czech Republic, they cover user requirements from the emergency management field only partially. Therefore, the paper focuses on the issues of requirement analysis within development of emergency management software. Analysis of the current state describes the basic features and properties of user requirements for software development as well as basic methods and approaches for gathering these requirements. Then, the paper presents more specific mechanisms for requirement analysis based on chosen software development approach: structured, object-oriented or agile. Based on these experiences it is designed new methodology for requirement analysis. Methodology describes how to map user requirements comprehensively in the field of emergency management and thus reduce misunderstanding between software analyst and emergency manager. Proposed methodology was consulted with department of fire brigade and also has been applied in the requirements analysis for their current emergency management software. The proposed methodology has general character and can be used also in other specific areas during requirement analysis.

Keywords: emergency software, methodology, requirement analysis, stakeholders, use case diagram, user stories

Procedia PDF Downloads 521
390 Evaluation of Institutionalization in Public Hospitals: A Province Example

Authors: Manar Aslan, Ayse Yildiz

Abstract:

The study was conducted descriptively to assess their hospital institutionalization of upper and mid-level managers of 18 hospitals affiliated to Public Hospitals Association. In its simplest form institutionalization is whatever the subject matter, is dominated by the rules of articulated and determined behavior in all kinds of business, interaction, and communication. Hospital service is a type of service carried out chained together. It should not be forgotten that this kind of services is carried out without barrier, and who and what to do with definite lines, hospital management is a process, and this process can be achieved through institutionalization. With the establishment of the Public Hospitals Unions in Turkey, all the state hospitals in the provinces have been gathered under this roof. One of the goals is to establish control mechanisms to ensure that hospitals reach pre-determined financial, medical, and administrative standards. In this way, the preparations for the institutionalization of units and hospital enterprises will be completed. The data of the study were collected by institutionalization management attitude scale (cronbach alpha: 0.98) of composed of 5 sub-dimensions and 52 questions in 18 hospitals’ managers (N=310) in the largest province in Turkey. The results of the study revealed that the total score taken by managers at the institutionalization scale was 200.80, and this was close to the maximum score. In addition, it was determined that the difference between the mean score of the scale and its sub-dimensions with the gender, the hospitals, and the management position.

Keywords: institutionalization, hospital, manager, evaluation

Procedia PDF Downloads 201
389 Development of Intelligent Construction Management System Using Web-Camera Image and 3D Object Image

Authors: Hyeon-Seung Kim, Bit-Na Cho, Tae-Woon Jeong, Soo-Young Yoon, Leen-Seok Kang

Abstract:

Recently, a construction project has been large in the size and complicated in the site work. The web-cameras are used to manage the construction site of such a large construction project. They can be used for monitoring the construction schedule as compared to the actual work image of the planned work schedule. Specially, because the 4D CAD system that the construction appearance is continually simulated in a 3D CAD object by work schedule is widely applied to the construction project, the comparison system between the real image of actual work appearance by web-camera and the simulated image of planned work appearance by 3D CAD object can be an intelligent construction schedule management system (ICON). The delayed activities comparing with the planned schedule can be simulated by red color in the ICON as a virtual reality object. This study developed the ICON and it was verified in a real bridge construction project in Korea. To verify the developed system, a web-camera was installed and operated in a case project for a month. Because the angle and zooming of the web-camera can be operated by Internet, a project manager can easily monitor and assume the corrective action.

Keywords: 4D CAD, web-camera, ICON (intelligent construction schedule management system), 3D object image

Procedia PDF Downloads 490
388 The Effect of Market Orientation on Marketing Performance through Product Adaptation Strategy

Authors: Hotlan Siagian, Hatane Semuel, Wilma Laura Sahetapy

Abstract:

This study aims at examining the effect of market orientation on marketing performance through product adaptation strategy. The population of the research is domestic leather craft companies located in five regions, the center of the leather craft industry in Indonesia, i.e., Central Java, East Java, South Sulawesi, Bali, and West Kalimantan. The respondent consists of a manager level from each company. Data collection used a questionnaire designed with five-item Likert scale. Collected data were analyzed using structural equation modeling (SEM) technique with SmartPLS software version 3.0 to examine the hypotheses. The result of the study shows that all hypotheses are supported. Market orientation affects marketing performance. Market orientation affects product adaptation strategy. Product adaptation strategy influences the marketing performance. The research also has revealed the main finding that product adaptation strategy contributes to a mediating role in the market orientation strategy and marketing performance relationship. The leather craft companies in Indonesia, therefore, may refer to this result in improving their marketing performance.

Keywords: leather craft industry, market orientation, marketing performance, product adaptation strategy

Procedia PDF Downloads 341
387 A Multi-Criteria Model for Scheduling of Stochastic Single Machine Problem with Outsourcing and Solving It through Application of Chance Constrained

Authors: Homa Ghave, Parmis Shahmaleki

Abstract:

This paper presents a new multi-criteria stochastic mathematical model for a single machine scheduling with outsourcing allowed. There are multiple jobs processing in batch. For each batch, all of job or a quantity of it can be outsourced. The jobs have stochastic processing time and lead time and deterministic due dates arrive randomly. Because of the stochastic inherent of processing time and lead time, we use the chance constrained programming for modeling the problem. First, the problem is formulated in form of stochastic programming and then prepared in a form of deterministic mixed integer linear programming. The objectives are considered in the model to minimize the maximum tardiness and outsourcing cost simultaneously. Several procedures have been developed to deal with the multi-criteria problem. In this paper, we utilize the concept of satisfaction functions to increases the manager’s preference. The proposed approach is tested on instances where the random variables are normally distributed.

Keywords: single machine scheduling, multi-criteria mathematical model, outsourcing strategy, uncertain lead times and processing times, chance constrained programming, satisfaction function

Procedia PDF Downloads 245
386 Lean Airport Infrastructure Development: A Sustainable Solution for Integration of Remote Regions

Authors: Joeri N. Aulman

Abstract:

In the remote Indian region of Gulbarga a case study of lean airport infrastructure development is getting ‘cast in stone’; In April the first turbo-props will land, and the optimized terminal building will process its first passengers, using minimal square meters in a facility that is based on a complete dress-down of the core operational processes. Yet the solution that resulted from this case study has such elegance in its simplicity that it has emboldened the local administration to invest in its construction and thus secure this remote region’s connectivity to India’s growth story. This paper aims to provide further background to the Gulbarga case study and its relevance to remote region connectivity, covering the demand that was identified, its practical application and its regulatory context and relevance for today’s airport manager and local administrators. This embodies the scope of the paper. In summary, the paper will give airport managers and regional authorities an overview and background to innovative case studies of lean airport infrastructure developments which combine both optimized CAPEX and running costs/OPEX without losing sight of the aspirational nature of up and coming remote regions; a truly sustainable model.

Keywords: airport, CAPEX, lean, sustainable, air connectivity, remote regions

Procedia PDF Downloads 296
385 Physico-Chemical and Heavy Metals Analysis of Contaminated Ndawuse River in North Central of Nigeria

Authors: Abimbola Motunrayo Enitan, Ibironke Titilayo Enitan, John Odiyo

Abstract:

The study assessed quality of surface water across Ndawuse River Phase 1, District of the Federal Capital Territory (FCT), Abuja, Nigeria based on physico-chemical variables that are linked to agrochemical and eutrophication, as well as heavy metals concentrations. In total, sixteen surface water samples were obtained from five locations along the river. The results were compared with the standard limits set by both World Health Organization and Federal Environmental Protection Agency for drinking water. The results obtained indicated that BOD5, turbidity, 0.014-3.511 mg Fe/L and 0.078-0.14 mg Cr/L were all above the standard limits. The results further showed that the quality of surface water is being significantly affected by human activities around the Ndawuse River which could pose an adverse health risk to several communities that rely on these receiving water bodies primarily as their source of water. Therefore, there is a need for strict enforcement of environmental laws considering the physico-chemical analysis.

Keywords: Abuja, heavy metals, human exposure risk, Ndawuse River, Nigeria, surface water

Procedia PDF Downloads 239
384 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 120
383 Translation, Cross-Cultural Adaption, and Validation of the Vividness of Movement Imagery Questionnaire 2 (VMIQ-2) to Classical Arabic Language

Authors: Majid Alenezi, Abdelbare Algamode, Amy Hayes, Gavin Lawrence, Nichola Callow

Abstract:

The purpose of this study was to translate and culturally adapt the Vividness of Movement Imagery Questionnaire-2 (VMIQ-2) from English to produce a new Arabic version (VMIQ-2A), and to evaluate the reliability and validity of the translated questionnaire. The questionnaire assesses how vividly and clearly individuals are able to imagine themselves performing everyday actions. Its purpose is to measure individuals’ ability to conduct movement imagery, which can be defined as “the cognitive rehearsal of a task in the absence of overt physical movement.” Movement imagery has been introduced in physiotherapy as a promising intervention technique, especially when physical exercise is not possible (e.g. pain, immobilisation.) Considerable evidence indicates movement imagery interventions improve physical function, but to maximize efficacy it is important to know the imagery abilities of the individuals being treated. Given the increase in the global sharing of knowledge it is desirable to use standard measures of imagery ability across language and cultures, thus motivating this project. The translation procedure followed guidelines from the Translation and Cultural Adaptation group of the International Society for Pharmacoeconomics and Outcomes Research and involved the following phases: Preparation; the original VMIQ-2 was adapted slightly to provide additional information and simplified grammar. Forward translation; three native speakers resident in Saudi Arabia translated the original VMIQ-2 from English to Arabic, following instruction to preserve meaning (not literal translation), and cultural relevance. Reconciliation; the project manager (first author), the primary translator and a physiotherapist reviewed the three independent translations to produce a reconciled first Arabic draft of VMIQ-2A. Backward translation; a fourth translator (native Arabic speaker fluent in English) translated literally the reconciled first Arabic draft to English. The project manager and two study authors compared the English back translation to the original VMIQ-2 and produced the second Arabic draft. Cognitive debriefing; to assess participants’ understanding of the second Arabic draft, 7 native Arabic speakers resident in the UK completed the questionnaire, and rated the clearness of the questions, specified difficult words or passages, and wrote in their own words their understanding of key terms. Following review of this feedback, a final Arabic version was created. 142 native Arabic speakers completed the questionnaire in community meeting places or at home; a subset of 44 participants completed the questionnaire a second time 1 week later. Results showed the translated questionnaire to be valid and reliable. Correlation coefficients indicated good test-retest reliability. Cronbach’s a indicated high internal consistency. Construct validity was tested in two ways. Imagery ability scores have been found to be invariant across gender; this result was replicated within the current study, assessed by independent-samples t-test. Additionally, experienced sports participants have higher imagery ability than those less experienced; this result was also replicated within the current study, assessed by analysis of variance, supporting construct validity. Results provide preliminary evidence that the VMIQ-2A is reliable and valid to be used with a general population who are native Arabic speakers. Future research will include validation of the VMIQ-2A in a larger sample, and testing validity in specific patient populations.

Keywords: motor imagery, physiotherapy, translation and validation, imagery ability

Procedia PDF Downloads 307
382 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things

Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin

Abstract:

With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.

Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)

Procedia PDF Downloads 141
381 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 271
380 Using Kalosara Tradition for Conflict Resolution in Tolaki's People, Southeast Sulawesi

Authors: S. S. Ramis Rauf

Abstract:

This study will be explained the role of local wisdom in Tolakinese customary law on customs offense. The scope of this study was the informants who have a conflict located in Southeast Sulawesi. Then, their conflicts were resolved by using Kalosara tradition. The method of this study was a qualitative research by applying the techniques of deep interviews, revealing experiences and stories from informants, interviews customary leaders who are skilled and experienced in the customary settlement process of Kalosara tradition. Kalosara, as Tolakinese local wisdom, has contained in Tolakinese customary law. Kalosara was the application of customary law which was guided by Tolaki’s people when there was a problem. Knowledge and understanding of the customs have been conceived as something that comes from the ancestors. They created custom rules based on the law of Allah SWT for the elderly to do with full of awareness. Then, it was hereditary obeying by their children from generation to generation. The conflict occurred because of several things, namely bad words, aspersion, and other violations (such as harassment and affair). In custom settlement process, kalosara was done by using the enforcement of Tolakinese customary law that managed within an institution. It was called as Sara Wonua. It led by someone who was called as Pu'utobu that serves as a customary leader.

Keywords: kalosara, conflict resolution, tradition, unity, diversity

Procedia PDF Downloads 185
379 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 247
378 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 330
377 A Fuzzy Analytic Hierarchy Process Approach for the Decision of Maintenance Priorities of Building Entities: A Case Study in a Facilities Management Company

Authors: Wai Ho Darrell Kwok

Abstract:

Building entities are valuable assets of a society, however, all of them are suffered from the ravages of weather and time. Facilitating onerous maintenance activities is the only way to either maintain or enhance the value and contemporary standard of the premises. By the way, maintenance budget is always bounded by the corresponding threshold limit. In order to optimize the limited resources allocation in carrying out maintenance, there is a substantial need to prioritize maintenance work. This paper reveals the application of Fuzzy AHP in a Facilities Management Company determining the maintenance priorities on the basis of predetermined criteria, viz., Building Status (BS), Effects on Fabrics (EF), Effects on Sustainability (ES), Effects on Users (EU), Importance of Usage (IU) and Physical Condition (PC) in dealing with categorized 8 predominant building components maintenance aspects for building premises. From the case study, it is found that ‘building exterior repainting or re-tiling’, ‘spalling concrete repair works among exterior area’ and ‘lobby renovation’ are the top three maintenance priorities from facilities manager and maintenance expertise personnel. Through the application of the Fuzzy AHP for maintenance priorities decision algorithm, a more systemic and easier comparing scalar linearity factors being explored even in considering other multiple criteria decision scenarios of building maintenance issue.

Keywords: building maintenance, fuzzy AHP, maintenance priority, multi-criteria decision making

Procedia PDF Downloads 220
376 An Economic Order Quantity Model for Deteriorating Items with Ramp Type Demand, Time Dependent Holding Cost and Price Discount Offered on Backorders

Authors: Arjun Paul, Adrijit Goswami

Abstract:

In our present work, an economic order quantity inventory model with shortages is developed where holding cost is expressed as linearly increasing function of time and demand rate is a ramp type function of time. The items considered in the model are deteriorating in nature so that a small fraction of the items is depleted with the passage of time. In order to consider a more realistic situation, the deterioration rate is assumed to follow a continuous uniform distribution with the parameters involved being triangular fuzzy numbers. The inventory manager offers his customer a discount in case he is willing to backorder his demand when there is a stock-out. The optimum ordering policy and the optimum discount offered for each backorder are determined by minimizing the total cost in a replenishment interval. For better illustration of our proposed model in both the crisp and fuzzy sense and for providing richer insights, a numerical example is cited to exemplify the policy and to analyze the sensitivity of the model parameters.

Keywords: fuzzy deterioration rate, price discount on backorder, ramp type demand, shortage, time varying holding cost

Procedia PDF Downloads 172
375 User-Driven Product Line Engineering for Assembling Large Families of Software

Authors: Zhaopeng Xuan, Yuan Bian, C. Cailleaux, Jing Qin, S. Traore

Abstract:

Traditional software engineering allows engineers to propose to their clients multiple specialized software distributions assembled from a shared set of software assets. The management of these assets however requires a trade-off between client satisfaction and software engineering process. Clients have more and more difficult to find a distribution or components based on their needs from all of distributed repositories. This paper proposes a software engineering for a user-driven software product line in which engineers define a feature model but users drive the actual software distribution on demand. This approach makes the user become final actor as a release manager in software engineering process, increasing user product satisfaction and simplifying user operations to find required components. In addition, it provides a way for engineers to manage and assembly large software families. As a proof of concept, a user-driven software product line is implemented for eclipse, an integrated development environment. An eclipse feature model is defined, which is exposed to users on a cloud-based built platform from which clients can download individualized Eclipse distributions.

Keywords: software product line, model-driven development, reverse engineering and refactoring, agile method

Procedia PDF Downloads 414
374 Accidents Involving Pedestrians Walking along with/against Traffic: An Evaluation of Crash Characteristics and Injuries

Authors: Chih-Wei Pai, Rong-Chang Jou

Abstract:

Using A1 A2 police-reported accident data for years 2003–2010 in Taiwan, the paper examines anatomic injuries and crash characteristics specific to pedestrians in “facing traffic” and “back to traffic” crashes. There were 2768 and 7558 accidents involving pedestrians walking along with/against traffic respectively. Injuries sustained by pedestrians and crash characteristics in these two crash types were compared with those in other crash types (nearside crash, nearside dart-out crash, offside crash, offside dart-out crash). Main findings include that “back to traffic” crashes resulted in more severe injuries, and pedestrians in “back to traffic” crashes had increased head, neck, and spine injuries than those in other crash types; and there was an elevated risk of head injuries in unlit darkness and NBU (non-built-up) roadways. Several crash features (e.g. unlit darkness, overtaking maneuvers, phone use by pedestrians and drivers, intoxicated drivers) appear to be over-involved in “back to traffic” crashes. The implications of the research findings regarding pedestrian/driver education, enforcement, and remedial engineering design are discussed.

Keywords: pedestrian accident, crash characteristics, injury, facing traffic, back to traffic

Procedia PDF Downloads 355
373 Determination of International Jurisdiction of Courts over Disputes Arising from Electronic Consumer Contracts

Authors: Aslihan Coban

Abstract:

As a result of the rapid development of information communication technology, especially the internet, consumers have become an active party in commerce and in law. Consequently, the protection of consumers in cross-border contracts has become increasingly important. This paper is confined to the international jurisdiction of courts over disputes arising from electronic consumer contracts according to the ‘5718 Turkish Act on Private International Law and Civil Procedure’ and the ‘1215/2012 Council Regulation On Jurisdiction and The Recognition and Enforcement Of Judgments In Civil and Commercial Matters’ (Hereafter ‘Brussels I Regulation’). The international jurisdiction of courts for consumer contracts is recognized under both acts above-mentioned; however, there exist some differences between the said legal regulations. Firstly, while there is a specific provision for electronic consumer contracts in Brussels I Regulation, there is no specific provision in the Turkish Act. Secondly, under the Turkish Act, habitual residence, domicile, and workplace of the other party who is not a consumer are all accepted as jurisdiction elements; while domicile is the only jurisdiction element in Brussels I Regulation. Thirdly, the ability to make jurisdiction agreements in disputes arising from electronic consumer contracts is a controversial issue under the Turkish Act while it is explicitly regulated under Brussels I Regulation that such jurisdiction agreements can be concluded by complying with certain conditions.

Keywords: Brussels I Regulation, electronic consumer contracts, jurisdiction, jurisdiction agreement

Procedia PDF Downloads 136
372 Cultural Competence of Philippine National Police Personnel

Authors: Nestor C. Nabe, Melvie F. Bayog

Abstract:

The cultural competence of police officers can lead to effective law enforcement and gain respect to their organization. This study evaluated the level of cultural competence of Philippine National Police Personnel in Midsayap, Cotabato, Philippines. Descriptive survey research design was used in this study. The survey utilized an adapted questionnaire to measure the level of cultural competence of the respondents. Questionnaires were administered to 305 ethnic minorities coming from the four major ethnic tribes in Midsayap, Cotabato, Philippines. The data gathered were treated using Percentage, Mean, T-test and Analysis of Variance (ANOVA). The findings are as follows: the level of cultural competence of police personnel is moderate; and, there is no significant difference in the cultural competence of the police personnel when analyzed by age, gender, civil status and, occupation while there is a significant difference analyzed by educational attainment and ethnic tribe. Based on the findings, the following conclusions were drawn: the level of cultural competence of police personnel is only manifested sometimes; and, civil status, and occupation has no significant difference in the cultural competence of police personnel while educational attainment and ethnic tribe has a significant difference.

Keywords: competence, cultural, Philippines, police

Procedia PDF Downloads 323
371 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 106
370 The Battle Against Corruption in Indonesia’s Municipalities

Authors: Edy Wahyu Susilo

Abstract:

This research discusses a comparative analysis of various anti-corruption responses of three Indonesian City Governments (Jakarta, Surabaya, and Medan) and completes previous findings on the effectiveness of the city anti-corruption program. Some factors (transparency, accountability, leadership, law enforcement, and bureaucratic reform) have been chosen in this study to diagnose the main role in the success and the failure of anti-corruption programs in these cities. These factors diagnose the relationship between factors and their dominancy, which is then utilized to create the city’s strategic anti-corruption programs. Although this study found leadership had a dominant influence both in encouraging and discouraging the performance of city transformation drastically, however, it is not the only factor that determined the performance of the city in the fight against corruption. It needs other factors as an ideal balancing element to achieve an anti-corruption program, namely KPK’s intervention and public engagement. Based on the dominance factors found, this research then develops an appropriate strategy using a policy evaluation approach to create a real practical guide regardless of the existence of good or bad leadership in the city. This research is expected to be a useful reference for stakeholders, especially the government, as a blueprint to prevent corruption by considering several important steps and guidance in efforts to eradicate corruption in the city, especially in Indonesia.

Keywords: intervention, KPK (corruption eradication commission), law enforcements, leadership, policy evaluation

Procedia PDF Downloads 82
369 Impact of Chimerism on Y-STR DNA Determination: Sex Mismatch Analysis

Authors: Anupuma Raina, Ajay P. Balayan, Prateek Pandya, Pankaj Shrivastava, Uma Kanga, Tulika Seth

Abstract:

DNA fingerprinting analysis aids in personal identification for forensic purposes and has always been a driving motivation for law enforcement agencies in almost all countries since its inception. The introduction of DNA markers (Y-STR) has allowed for greater precision and higher discriminatory power in forensic testing. A criminal/ person committing crime after bone marrow transplantation is a rare situation but not an impossible one. Keeping such a situation in mind, a study was carried out to find out the best biological sample to be used for personal identification, especially in forensic situation. We choose a female patient (recipient) and a male donor. The pre transplant sample (blood) and post transplant samples (blood, buccal swab, hair roots) were collected from the recipient (patient). The same were compared with the blood sample of the donor using DNA FP technique. Post transplant samples were collected at different interval of time (15, 30, 60, and 90 days). The study was carried out using Y-STR kit at 23 loci. The results determined discusses the phenomenon of chimerism and its impact on Y-STR. Hair sample was found the most suitable sample which had no donor DNA profiling up to 90 days.

Keywords: bone marrow transplantation, chimerism, DNA profiling, Y-STR

Procedia PDF Downloads 128