Search results for: mobile information behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17469

Search results for: mobile information behavior

14439 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice

Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese

Abstract:

Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.

Keywords: documentation, knowledge, patient care, patient’s information, training

Procedia PDF Downloads 186
14438 Seismic Performance of Highway Bridges with Partially Self-Centering Isolation Bearings against Near-Fault Ground Motions

Authors: Shengxin Yu

Abstract:

Earthquakes can cause varying degrees of damage to building and bridge structures. Traditional laminated natural rubber bearings (NRB) exhibit inadequate energy dissipation and restraint, particularly under near-fault ground motions, resulting in excessive displacements in the superstructure. This paper presents a composite natural rubber bearing (NFUD-NRB) incorporating two types of shape memory alloy (SMA) U-shaped dampers (UD). The bearing exhibits adjustable features, predominantly characterized by partial self-centering and multi-level energy dissipation, facilitated by nickel-titanium-based SMA (NiTi-SMA) and iron-based SMA (Fe-SMA) UDs. The hysteresis characteristics of NFUD-NRB can be tailored by manipulating the configuration of NiTi-SMA and Fe-SMA UDs. Firstly, the proposed bearing's geometric configuration and working principle are introduced. The rationality of the modeling strategy for the bearing is validated through existing experimental results. Parameterized numerical simulations are subsequently performed to investigate the partially self-centering behavior of NFUD-NRB. The findings indicate that NFUD-NRB can attain the anticipated nonlinear behavior and deliver adequate energy dissipation. Finally, the impact of NFUD-NRB on improving the seismic resilience of highway bridges is examined using the OpenSees software, with particular emphasis on the seismic performance of NFUD-NRB under near-fault ground motions. System-level analysis reveals that bridge systems equipped with NFUD-NRBs exhibit satisfactory residual deformations and higher energy dissipation than those equipped with traditional NRBs. Moreover, NFUD-NRB markedly mitigates the detrimental impacts of near-fault ground motions on the main structure of bridges.

Keywords: partially self-centering behavior, energy dissipation, natural rubber bearing, shape memory alloy, U-shaped damper, numerical investigation, near-fault ground motion

Procedia PDF Downloads 53
14437 Role of Sodium Concentration, Waiting Time and Constituents’ Temperature on the Rheological Behavior of Alkali Activated Slag Concrete

Authors: Muhammet M. Erdem, Erdoğan Özbay, Ibrahim H. Durmuş, Mustafa Erdemir, Murat Bikçe, Müzeyyen Balçıkanlı

Abstract:

In this paper, rheological behavior of alkali activated slag concretes were investigated depending on the sodium concentration (SC), waiting time (WT) after production, and constituents’ temperature (CT) parameters. For this purpose, an experimental program was conducted with four different SCs of 1.85, 3.0, 4.15, and 5.30%, three different WT of 0 (just after production), 15, and 30 minutes and three different CT of 18, 30, and 40 °C. Solid precursors are activated by water glass and sodium hydroxide solutions with silicate modulus (Ms = SiO2/Na2O) of 1. Slag content and (water + activator solution)/slag ratio were kept constant in all mixtures. Yield stress and plastic viscosity values were defined for each mixture by using the ICAR rheometer. Test results were demonstrated that all of the three studied parameters have tremendous effect on the yield stress and plastic viscosity values of the alkali activated slag concretes. Increasing the SC, WT, and CT drastically augmented the rheological parameters. At the 15 and 30 minutes WT after production, most of the alkali activated slag concretes were set instantaneously, and rheological measurements were not performed.

Keywords: alkali activation, slag, rheology, yield stress, plastic viscosity

Procedia PDF Downloads 287
14436 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 391
14435 Understanding the Influence of Cross-National Distances on Tourist Expenditure

Authors: Wei-Ting Hung

Abstract:

Inbound tourist expenditure might not only have influenced by individual tourist characteristics but may also be affected by nationality characteristics. The cross national distance effects on tourist consumption behavior should be incorporated in the analytical framework. Additionally, the often used factor analysis, cluster analysis and regression analysis overlook the hierarchical tourist consumption data structure and may lead to misleading results. The objectives of the present study were twofold. First, we propose a multilevel model that takes individual and cross-national differences into account under a hierarchical framework. Second, we further sought to determine the types of cross-national differences affecting tourist expenditure. Thus, this study incorporates the individual tourist effects and cross national distance effects simultaneously, uses the data of 2010 Annual Survey Report on Visitors’ Expenditure and Trends in Taiwan to investigate the determinants of inbound tourist expenditure. Multilevel analysis was used to investigate the influence of individual tourist effects and cross national distance effects on inbound tourist expenditure. The empirical results show that cross national distance plays a crucial role in tourist consumption behavior. Our findings also indicate age and income have positive influence on tourism expenditure., whereas education and gender do not have significant impact. Regarding macro-level factors, geographic and cultural differences exhibited significant positive relationships on tourism expenditure, while economic differences did not. Based on the above empirical results, it is suggested that tour operators should take tourists’ individual attributes, particularly their income and age, into consideration when arranging tours. In addition, nationality holds sway over tourists’ consumption behavior, of which geographic and cultural differences are the two major factors at play. The empirical results of this study serve as practical suggestions for tourism marketing strategies and policy implications for government policies.

Keywords: cross national distance, inbound tourist, multilevel analysis, tourist expenditure

Procedia PDF Downloads 357
14434 Assessment of Frying Material by Deep-Fat Frying Method

Authors: Brinda Sharma, Saakshi S. Sarpotdar

Abstract:

Deep-fat frying is popular standard method that has been studied basically to clarify the complicated mechanisms of fat decomposition at high temperatures and to assess their effects on human health. The aim of this paper is to point out the application of method engineering that has been recently improved our understanding of the fundamental principles and mechanisms concerned at different scales and different times throughout the process: pretreatment, frying, and cooling. It covers the several aspects of deep-fat drying. New results regarding the understanding of the frying method that are obtained as a results of major breakthroughs in on-line instrumentation (heat, steam flux, and native pressure sensors), within the methodology of microstructural and imaging analysis (NMR, MRI, SEM) and in software system tools for the simulation of coupled transfer and transport phenomena. Such advances have opened the approach for the creation of significant information of the behavior of varied materials and to the event of latest tools to manage frying operations via final product quality in real conditions. Lastly, this paper promotes an integrated approach to the frying method as well as numerous competencies like those of chemists, engineers, toxicologists, nutritionists, and materials scientists also as of the occupation and industrial sectors.

Keywords: frying, cooling, imaging analysis (NMR, MRI, SEM), deep-fat frying

Procedia PDF Downloads 427
14433 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 127
14432 Managing Physiological and Nutritional Needs of Rugby Players in Kenya

Authors: Masita Mokeira, Kimani Rita, Obonyo Brian, Kwenda Kennedy, Mugambi Purity, Kirui Joan, Chomba Eric, Orwa Daniel, Waiganjo Peter

Abstract:

Rugby is a highly intense and physical game requiring speed and strength. The need for physical fitness therefore cannot be over-emphasized. Sports are no longer about lifting weights so as to build muscle. Most professional teams are investing much more in the sport in terms of time, equipment and other resources. To play competitively, Kenyan players may therefore need to complement their ‘home-grown’ and sometimes ad-hoc training and nutrition regimes with carefully measured strength and conditioning, diet, nutrition, and supplementation. Nokia Research Center and University of Nairobi conducted an exploratory study on needs and behaviours surrounding sports in Africa. Rugby being one sport that is gaining ground in Kenya was selected as the main focus. The end goal of the research was to identify areas where mobile technology could be used to address gaps, challenges and/or unmet needs. Themes such as information gap, social culture, growth, and development, revenue flow, and technology adoption among others emerged about the sport. From the growth and development theme, it was clear that as rugby continues to grow in the country, teams, coaches, and players are employing interesting techniques both in training and playing. Though some of these techniques are indeed scientific, those employing them are sometimes not fully aware of their scientific basis. A further case study on sports science in rugby in Kenya focusing on physical fitness and nutrition revealed interesting findings. This paper discusses findings on emerging adoption of techniques in managing physiological and nutritional needs of rugby players across different levels of rugby in Kenya namely high school, club and national levels.

Keywords: rugby, nutrition, physiological needs, sports science

Procedia PDF Downloads 380
14431 Development of a Technology Assessment Model by Patents and Customers' Review Data

Authors: Kisik Song, Sungjoo Lee

Abstract:

Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.

Keywords: technology assessment, patents, citation information, opinion mining

Procedia PDF Downloads 460
14430 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 376
14429 Numerical Simulation of High Strength Steel Hot-Finished Elliptical Hollow Section Subjected to Uniaxial Eccentric Compression

Authors: Zhengyi Kong, Xueqing Wang, Quang-Viet Vu

Abstract:

In this study, the structural behavior of high strength steel (HSS) hot-finished elliptical hollow section (EHS) subjected to uniaxial eccentric compression is investigated. A finite element method for predicting the cross-section resistance of HSS hot-finished EHS is developed using ABAQUS software, which is then verified by comparison with previous experiments. The validated finite element method is employed to carry out parametric studies for investigating the structural behavior of HSS hot-finished EHS under uniaxial eccentric compression and evaluate the current design guidance for HSS hot-finished EHS. Different parameters, such as the radius of the larger and smaller outer diameter of EHS, thickness of EHS, eccentricity, and material property, are considered. The resulting data from 84 finite element models are used to obtain the relationship between the cross-section resistance of HSS hot-finished EHS and cross-section slenderness. It is concluded that current design provisions, such as EN 1993-1-1, BS 5950-1, AS4100, and Gardner et al., are conservative for predicting the HSS hot-finished EHS under uniaxial eccentric compression.

Keywords: hot-finished, elliptical hollow section, uniaxial eccentric compression, finite element method

Procedia PDF Downloads 134
14428 Multiresolution Mesh Blending for Surface Detail Reconstruction

Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal

Abstract:

In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.

Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending

Procedia PDF Downloads 137
14427 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 236
14426 Finch-Skea Stellar Structures in F(R, ϕ, X) Theory of Gravity Using Bardeen Geometry

Authors: Aqsa Asharaf

Abstract:

The current study aims to examine the physical characteristics of charge compact spheres employing anisotropic fluid under f(R, ϕ, X) modified gravity approach, exploring how this theoretical context influences their attributes and behavior. To accomplish our goal, we adopt the Spherically Symmetric (SS) space-time and, additionally, employ a specific Adler-based mode for the metric potential (gtt), which yields a broader class of solutions, Then, by making use of the Karmarkar condition, we successfully derive the other metric potential. A primary component of our current analysis is utilizing the Bardeen geometry as extrinsic space-time to determine the constant parameters of intrinsic space-time. Further, to validate the existence of Bardeen stellar spheres, we debate the behavior of physical properties and parameters such as components of pressure, energy density, anisotropy, parameters of EoS, stability and dynamical equilibrium, energy bounds, mass function, adiabatic index, compactness factor, and surface redshift. Conclusively, all the obtained results show that the system under consideration is physically stable, free from singularity, and viable models.

Keywords: cosmology, GR, Bardeen BH, modified gravities

Procedia PDF Downloads 18
14425 Synergistic Erosion–Corrosion Behavior of Petroleum Pipelines at Various Conditions

Authors: M. A. Deyab, A. Al-Sabagh, S. Keera

Abstract:

The effects of flow velocity, sand concentration, sand size and temperature on erosion-corrosion of petroleum pipelines (carbon steel) in the oil sands slurry were studied by electrochemical polarization measurements. It was found that the anodic excursion spans of carbon steel in the oil sands slurry are characterized by the occurrence of a well-defined anodic peak, followed by a passive region. The data reveal that increasing flow velocity, sand concentration and temperature enhances the anodic peak current density (jAP) and shifts pitting potential (Epit) towards more negative values. The variation of sand particle size does not have apparent effect on polarization behavior of carbon steel. The ratios of the erosion rate to corrosion rate (E/C) were calculated and discussed. The ratio of erosion to corrosion rates E/C increased with increasing the flow velocity, sand concentration, sand size, and temperature indicating that an increasing slurry flow velocity, sand concentration, sand size and temperature resulted in an enhancement of the erosion effect.

Keywords: erosion-corrosion, oil sands slurry, polarization, steel

Procedia PDF Downloads 315
14424 Mutual Information Based Image Registration of Satellite Images Using PSO-GA Hybrid Algorithm

Authors: Dipti Patra, Guguloth Uma, Smita Pradhan

Abstract:

Registration is a fundamental task in image processing. It is used to transform different sets of data into one coordinate system, where data are acquired from different times, different viewing angles, and/or different sensors. The registration geometrically aligns two images (the reference and target images). Registration techniques are used in satellite images and it is important in order to be able to compare or integrate the data obtained from these different measurements. In this work, mutual information is considered as a similarity metric for registration of satellite images. The transformation is assumed to be a rigid transformation. An attempt has been made here to optimize the transformation function. The proposed image registration technique hybrid PSO-GA incorporates the notion of Particle Swarm Optimization and Genetic Algorithm and is used for finding the best optimum values of transformation parameters. The performance comparision obtained with the experiments on satellite images found that the proposed hybrid PSO-GA algorithm outperforms the other algorithms in terms of mutual information and registration accuracy.

Keywords: image registration, genetic algorithm, particle swarm optimization, hybrid PSO-GA algorithm and mutual information

Procedia PDF Downloads 405
14423 Numerical Simulation and Analysis of Axially Restrained Steel Cellular Beams in Fire

Authors: Asal Pournaghshband

Abstract:

This paper presents the development of a finite element model to study the large deflection behavior of restrained stainless steel cellular beams at elevated temperature. Cellular beams are widely used for efficient utilization of raw materials to facilitate long spans with faster construction resulting sustainable design solution that can enhance the performance and merit of any construction project. However, their load carrying capacity is less than the equivalent beams without opening due to developing shear-moment interaction at the openings. In structural frames due to elements continuity, such beams are restrained by their adjoining members which has a substantial effect on beams behavior in fire. Stainless steel has also become integral part of the build environment due to its excellent corrosion resistance, whole life-cycle costs, and sustainability. This paper reports the numerical investigations into the effect of structural continuity on the thermo-mechanical performance of restrained steel beams with circle and elongated circle shapes of web opening in fire. The numerical model is firstly validated using existing numerical results from the literature, and then employed to perform a parametric study. The structural continuity is evaluated through the application of different levels of axial restraints on the response of carbon steel and stainless steel cellular beam in fire. The transit temperature for stainless steel cellular beam is shown to be less affected by the level of axial stiffness than the equivalent carbon steel cellular beam. Overall, it was established that whereas stainless steel cellular beams show similar stages of behavior of carbon steel cellular beams in fire, they are capable of withstanding higher temperatures prior to the onset of catenary action in large deflection, despite the higher thermal expansion of stainless steel material.

Keywords: axial restraint, catenary action, cellular beam, fire, numerical modeling, stainless steel, transit temperature

Procedia PDF Downloads 73
14422 The Effect of the Internal Organization Communications' Effectiveness through Employee's Performance of Faculty of Management Science, Suan Sunandha Rajabhat University

Authors: Malaiphan Pansap, Surasit Vithayarat

Abstract:

The purpose of this study was to study the relationship between internal organization communications’ effectiveness and employee’s performance of Faculty of Management Science, Suan Sunandha Rajabhat University. Study on solutions of communication were carried out within the organization. Questionnaire was used to collect information from 136 people of staff and instructor and data were analyzed by using frequency, percentage, mean and standard deviation and then data processing statistic programs. The result found that organization communication that affects their employee’s performance is sender which lack the skills for speaking and writing to convince audiences ready before taking message and the message which organizations are not always informed. The employees believe the behavior of good organization communication has a positive impact on the development of organization because the employees feel involved and be a part of the organization, by the cooperation in working to achieve the goal, the employees can work in the same direction and meet goal quickly.

Keywords: employee’s performance, faculty of management science, internal organization communications’ effectiveness, management accounting, Suan Sunandha Rajabhat University

Procedia PDF Downloads 235
14421 The Role of Celebrity Endorser in Men's Grooming Communication

Authors: Susana Marques, Cleide Abreu

Abstract:

Presently, more than ever, men’s grooming is seen as a broad category. The problem comes when the previous research about male consumer behavior have neglected some aspects in this subject. The purpose of this investigation is to examine the role of celebrity endorsement in men’s grooming communication to Generation Y. After identifying some gaps in the literature, with regard to this contemporary subject, the most important variables were defined in order to develop the investigation and draw conclusions through statistical analysis and validation, about the role celebrity endorsement as source of credibility in men’s grooming communication. According to the design and methodology, this research was sustained through in depth marketing analysis (secondary data), and primary data collection via online questionnaire, whereby 168 male respondents, from Brazil and Portugal, were exposed to some advertisement pieces in order to express their opinion and feelings. The findings reveal all the relationships among the variables, suggested by the literature, have occurred, presenting a significant relationship in terms of Source Credibility scale dimensions – attractiveness, trustworthiness and expertise. This paper aims to contribute to the existing literature with important conclusions about the role of celebrity endorsement and its credibility in men’s grooming advertisement.

Keywords: communication, celebrity endorsement, men’s grooming, consumer behavior

Procedia PDF Downloads 239
14420 External Sector and Its Impact on Economic Growth of Pakistan (1990-2010)

Authors: Rizwan Fazal

Abstract:

This study investigates the behavior of external sector of Pakistan economy and its impact on economic growth, using quarterly data for the period 1990:01-2010:04. External sector indices used in this study are financial integration, net foreign assets and trade integration. Augmented Ducky fuller confirms that all variables of external sector are non-stationary at level, but at first difference it becomes stationary. The co-integration test suggests one co-integrating variables in the study. The analysis is based on Vector Auto Regression model followed by Vector Error Correction Model. The empirical findings show that financial integration play important role in increasing economic growth in Pakistan economy while trade integration has negative effect on economic growth of Pakistan in the long run. However, the short run confirms that output lag accounts for error correction. The estimated CUSUM and CUSUMQ stability test provide information that the period of the study equation remains stable.

Keywords: financial integration, trade integration, net foreign assets, gross domestic product

Procedia PDF Downloads 268
14419 Deformation Behavior of Virgin and Polypropylene Modified Bituminous Mixture

Authors: Noor Zainab Habib, Ibrahim Kamaruddin, Madzlan Napiah

Abstract:

This paper present a part of research conducted to investigate the creep behavior of bituminous concrete mixture prepared with well graded using the dynamic creep test. The samples were prepared from unmodified control mix and Polypropylene modified bituminous mix. Unmodified or control mix was prepared with 80/100 grade bitumen while polypropylene modified mix was prepared using polypropylene PP polymer as modifier, blended with 80/100 Pen bitumen. The concentration of polymer in the blend was kept at 1%, 2%, and 3% by weight of bitumen content. For Dynamic Creep Test, Marshall Specimen were prepared at optimum bitumen content and then tested using IPC Global Universal Testing Machine (UTM), in order to investigate the creep stiffness of both modified and control mix. From the results obtained it was found that 1% and 2% PP modified bituminous mix offer better results in comparison to control and 3% PP modified mix samples. The results verify all the findings of empirical and viscosity test results which indicates that polymer modification induces stiffening effect in the binder. Enhanced viscous component of the binder was considered responsible for this change which eventually enhances the mechanical strength of the modified bituminous mixes.

Keywords: polymer modified bitumen, stiffness, creep, viscosity

Procedia PDF Downloads 413
14418 Behavior of Castellated Beam Column Due to Cyclic Loads

Authors: Junus Mara, Herman Parung, Jhony Tanijaya, Rudy Djamaluddin

Abstract:

The purpose of this study is to determine the behavior of beam-column sub-assemblages castella due to cyclic loading. Knowing these behaviors can if be analyzed the effectiveness of the concrete filler to reduce the damage and improve capacity of beam castella. Test beam consists of beam castella fabricated from normal beam (CB), castella beams with concrete filler between the flange (CCB) and normal beam (NB) as a comparison. Results showed castella beam (CB) has the advantage to increase the flexural capacity and energy absorption respectively 100.5% and 74.3%. Besides advantages, castella beam has the disadvantage that lowering partial ductility and full ductility respectively 12.6% and 18.1%, decrease resistance ratio 29.5% and accelerate the degradation rate of stiffness ratio 31.4%. By the concrete filler between the beam flange to improve the ability of castella beam, then the beam castella have the ability to increase the flexural capacity of 184.78 %, 217.1% increase energy absorption, increase ductility partial and full ductility respectively 27.9 % and 26 %, increases resistance ratio 52.5% and slow the rate of degradation of the stiffness ratio 55.1 %.

Keywords: steel, castella, column beams, cyclic load

Procedia PDF Downloads 455
14417 Effects, Causes, and Prevention of Teen Dating Violence

Authors: Isabel Jones

Abstract:

As adolescence is a formative time, experiences during adolescence often affect the rest of one’s life. Therefore, dating, specifically violence in dating, can have lasting effects on the rest of one’s life. In order to find sources, searches were conducted on PsycINFO, specifically EBSCO, and narrowed down under the criteria that the source contained information about adolescent dating violence rather than adult, and focused on causes, effects, or prevention methods. This literature review examines research regarding the effects and causes of TDV, and then what methods are effective in the prevention of TDV development. This will allow for a clear image of how these prevention methods are effective and why they are important. Effects of TDV extend beyond the physical, including psychological and sexual long-lasting effects. These are caused by a number of concepts, including learned behavior, inhibitory issues/substance abuse, and cultural factors. When both of these are taken into account, preventative measures such as school-based interventions, parental/adult monitoring, and the presence of positive family examples are more clear as to their effectiveness. This literature review may provide further awareness to this public health crisis and give the public a view of how adolescents are affected by TDV on their path from child to adult.

Keywords: adolescence, dating violence, risk factors, predictors, relationship

Procedia PDF Downloads 65
14416 A Comparative Assessment of Daylighting Metrics Assessing the Daylighting Performance of Three Shading Devices under Four Different Orientations

Authors: Mohamed Boubekri, Jaewook Lee

Abstract:

The assessment of the daylighting performance of a design solution is a complex task due to the changing nature of daylight. A few quantitative metrics are available to designers to assess such a performance, among them are the mean hourly illuminance (MHI), the daylight factor (DF), the daylight autonomy (DA) and the useful daylight illuminance (UDI). Each of these metrics has criteria and limitations that affect the outcome of the evaluation. When to use one metric instead of another depends largely on the design goals to be achieved. Using Design Iterate Validate Adapt (DIVA) daylighting simulation program we set out to examine the performance behavior of these four metrics with the changing dimensions of three shading devices: a horizontal overhang, a horizontal louver system, and a vertical louver system, and compare their performance behavior as the orientation of the window changes. The context is a classroom of a prototypical elementary school in South Korea. Our results indicate that not all four metrics behave similarly as we vary the size of each shading device and as orientations changes. The UDI is the metric that leads to outcome most different than the other three metrics. Our conclusion is that not all daylighting metrics lead to the same conclusions and that it is important to use the metric that corresponds to the specific goals and objectives of the daylighting solution.

Keywords: daylight factor, hourly daylight illuminance, daylight autonomy, useful daylight illuminance

Procedia PDF Downloads 281
14415 Neural Network Mechanisms Underlying the Combination Sensitivity Property in the HVC of Songbirds

Authors: Zeina Merabi, Arij Dao

Abstract:

The temporal order of information processing in the brain is an important code in many acoustic signals, including speech, music, and animal vocalizations. Despite its significance, surprisingly little is known about its underlying cellular mechanisms and network manifestations. In the songbird telencephalic nucleus HVC, a subset of neurons shows temporal combination sensitivity (TCS). These neurons show a high temporal specificity, responding differently to distinct patterns of spectral elements and their combinations. HVC neuron types include basal-ganglia-projecting HVCX, forebrain-projecting HVCRA, and interneurons (HVC¬INT), each exhibiting distinct cellular, electrophysiological and functional properties. In this work, we develop conductance-based neural network models connecting the different classes of HVC neurons via different wiring scenarios, aiming to explore possible neural mechanisms that orchestrate the combination sensitivity property exhibited by HVCX, as well as replicating in vivo firing patterns observed when TCS neurons are presented with various auditory stimuli. The ionic and synaptic currents for each class of neurons that are presented in our networks and are based on pharmacological studies, rendering our networks biologically plausible. We present for the first time several realistic scenarios in which the different types of HVC neurons can interact to produce this behavior. The different networks highlight neural mechanisms that could potentially help to explain some aspects of combination sensitivity, including 1) interplay between inhibitory interneurons’ activity and the post inhibitory firing of the HVCX neurons enabled by T-type Ca2+ and H currents, 2) temporal summation of synaptic inputs at the TCS site of opposing signals that are time-and frequency- dependent, and 3) reciprocal inhibitory and excitatory loops as a potent mechanism to encode information over many milliseconds. The result is a plausible network model characterizing auditory processing in HVC. Our next step is to test the predictions of the model.

Keywords: combination sensitivity, songbirds, neural networks, spatiotemporal integration

Procedia PDF Downloads 61
14414 AINA: Disney Animation Information as Educational Resources

Authors: Piedad Garrido, Fernando Repulles, Andy Bloor, Julio A. Sanguesa, Jesus Gallardo, Vicente Torres, Jesus Tramullas

Abstract:

With the emergence and development of Information and Communications Technologies (ICTs), Higher Education is experiencing rapid changes, not only in its teaching strategies but also in student’s learning skills. However, we have noticed that students often have difficulty when seeking innovative, useful, and interesting learning resources for their work. This is due to the lack of supervision in the selection of good query tools. This paper presents AINA, an Information Retrieval (IR) computer system aimed at providing motivating and stimulating content to both students and teachers working on different areas and at different educational levels. In particular, our proposal consists of an open virtual resource environment oriented to the vast universe of Disney comics and cartoons. Our test suite includes Disney’s long and shorts films, and we have performed some activities based on the Just In Time Teaching (JiTT) methodology. More specifically, it has been tested by groups of university and secondary school students.

Keywords: information retrieval, animation, educational resources, JiTT

Procedia PDF Downloads 340
14413 Shear Behavior of Reinforced Concrete Beams Casted with Recycled Coarse Aggregate

Authors: Salah A. Aly, Mohammed A. Ibrahim, Mostafa M. khttab

Abstract:

The amount of construction and demolition (C&D) waste has increased considerably over the last few decades. From the viewpoint of environmental preservation and effective utilization of resources, crushing C&D concrete waste to produce coarse aggregate (CA) with different replacement percentage for the production of new concrete is one common means for achieving a more environment-friendly concrete. In the study presented herein, the investigation was conducted in two phases. In the first phase, the selection of the materials was carried out and the physical, mechanical and chemical characteristics of these materials were evaluated. Different concrete mixes were designed. The investigation parameter was Recycled Concrete Aggregate (RCA) ratios. The mechanical properties of all mixes were evaluated based on compressive strength and workability results. Accordingly, two mixes have been chosen to be used in the next phase. In the second phase, the study of the structural behavior of the concrete beams was developed. Sixteen beams were casted to investigate the effect of RCA ratios, the shear span to depth ratios and the effect of different locations and reinforcement of openings on the shear behavior of the tested specimens. All these beams were designed to fail in shear. Test results of the compressive strength of concrete indicated that, replacement of natural aggregate by up to 50% recycled concrete aggregates in mixtures with 350 Kg/m3 cement content led to increase of concrete compressive strength. Moreover, the tensile strength and the modulus of elasticity of the specimens with RCA have very close values to those with natural aggregates. The ultimate shear strength of beams with RCA is very close to those with natural aggregates indicating the possibility of using RCA as partial replacement to produce structural concrete elements. The validity of both the Egyptian Code for the design and implementation of Concrete Structures (ECCS) 203-2007 and American Concrete Institute (ACI) 318-2011Codes for estimating the shear strength of the tested RCA beams was investigated. It was found that the codes procedures gives conservative estimates for shear strength.

Keywords: construction and demolition (C&D) waste, coarse aggregate (CA), recycled coarse aggregates (RCA), opening

Procedia PDF Downloads 389
14412 Evaluation and Strategic Development of IT in Accounting in Turkey

Authors: Eda Kocakaya, Sebahat Seker, Dogan Argun

Abstract:

The aim of this study is to determine the process of information technologies and the connections between concepts in accounting management services in Turkey. The objective of this study is to determine the adaptation and evaluation process of information technologies and the connections between concepts and differences in accounting management services in Turkey. The situation and determination of the IT applications of Accounting Management were studied. The applications of • Billing • Order Processing • Accounts Receivable/Payable Management • Contract Management • Bank Account Management Were discussed in this study. The IT applications were demonstrated and realized in actual accounting services. The sectoral representative's companies were selected, and the IT application was searched by bibliometric analysis.

Keywords: management, accounting, information technologies, adaptation

Procedia PDF Downloads 307
14411 Impact of Joule Heating on the Electrical Conduction Behavior of Carbon Composite Laminates under Simulated Lightning Strike

Authors: Hong Yu, Dirk Heider, Suresh Advani

Abstract:

Increasing demands for high strength and lightweight materials in aircraft industry prompted the wide use of carbon composites in recent decades. Carbon composite laminates used on aircraft structures are subject to lightning strikes. Unlike its metal/alloy counterparts, carbon fiber reinforced composites demonstrate smaller electrical conductivity, yielding more severe damages due to Joule heating. The anisotropic nature of composite laminates makes the electrical and thermal conduction within carbon composite laminates even more complicated. Good understanding of the electrical conduction behavior of carbon composites is the key to effective lightning protection design. The goal of this study is to numerically and experimentally investigate the impact of ultra-high temperature induced by simulated lightning strike on the electrical conduction of carbon composites. A lightning simulator is designed to apply standard lightning current waveform to composite laminates. Multiple carbon composite laminates made from IM7 and AS4 carbon fiber are tested and the transient resistance data is recorded. A microstructure based resistor network model is developed to describe the electrical and thermal conduction behavior, with consideration of temperature dependent material properties. Material degradations such as thermal and electrical breakdown are also modeled to include the effect of high current and high temperature induced by lightning strikes. Good match between the simulation results and experimental data indicates that the developed model captures the major conduction mechanisms. A parametric study is then conducted using the validated model to investigate the effect of system parameters such as fiber volume fraction, inter-ply interface quality, and lightning current waveforms.

Keywords: carbon composite, joule heating, lightning strike, resistor network

Procedia PDF Downloads 224
14410 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 55