Search results for: Google Play Store
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3770

Search results for: Google Play Store

3470 KBASE Technological Framework - Requirements

Authors: Ivan Stanev, Maria Koleva

Abstract:

Automated software development issues are addressed in this paper. Layers and packages of a Common Platform for Automated Programming (CPAP) are defined based on Service Oriented Architecture, Cloud computing, Knowledge based automated software engineering (KBASE) and Method of automated programming. Tools of seven leading companies (AWS of Amazon, Azure of Microsoft, App Engine of Google, vCloud of VMWare, Bluemix of IBM, Helion of HP, OCPaaS of Oracle) are analyzed in the context of CPAP. Based on the results of the analysis CPAP requirements are formulated

Keywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture

Procedia PDF Downloads 278
3469 Movies and Dynamic Mathematical Objects on Trigonometry for Mobile Phones

Authors: Kazuhisa Takagi

Abstract:

This paper is about movies and dynamic objects for mobile phones. Dynamic objects are the software programmed by JavaScript. They consist of geometric figures and work on HTML5-compliant browsers. Mobile phones are very popular among teenagers. They like watching movies and playing games on them. So, mathematics movies and dynamic objects would enhance teaching and learning processes. In the movies, manga characters speak with artificially synchronized voices. They teach trigonometry together with dynamic mathematical objects. Many movies are created. They are Windows Media files or MP4 movies. These movies and dynamic objects are not only used in the classroom but also distributed to students. By watching movies, students can study trigonometry before or after class.

Keywords: dynamic mathematical object, javascript, google drive, transfer jet

Procedia PDF Downloads 241
3468 Effect of Male and Female Early Childhood Teacher's Educational Practices on Child' Social Adaptation

Authors: Therese Besnard

Abstract:

Internationally in early childhood education (ECE), the great majority of teachers are women. Some groups believe that a greater male teacher presence in ECE would be beneficial for children, specifically for boys as it could offer a positive male model. It is a common belief that children would benefit from being exposed to both male and female models. Some believe that women are naturally better suited to offer quality care to young children comparatively to men. Some authors bring forth that after equivalent training, differences in the educational practices are purely individual and do not depend on the teacher’s gender. Others believe that a greater male presence in ECE would increase the risk of pedophilia or child abuse. The few scientific studies in this area suggest that differences could exist between male and female ECE teacher, in particular when it comes to play which is the mainstay of the ECE educational program. Male teachers describe themselves as being more playful and having a greater tendency to initiate physical and turbulent play comparatively to female teachers, who describe themselves as favoring games that are calmer and focused on social interaction. Observed directly, male teachers appear more actively engaged in play with children and propose more motor play than female teachers. Furthermore children who have both male and female teachers for one year show less behavior difficulties when compared to children with only female teachers. Despite a variety of viewpoints we don’t know if the educational practices of male ECE teachers, (emotional support, classroom organization or instructional support) are different than the educational practices of female teachers and if these practices are linked with children’s adaptation. This study compares the educational practices of 37 ECE teachers (57 % male) and analyses the link with children' social adaptation (n=221). Educational practices were assessed through observational measurements with the Classroom Assessment Scoring System (CLASS) in a natural class environment. Child social adaptation was assessed with the Social Competence and Behavior Evaluation (SCBE). Observational data reveals no differences between men's and women's scale of the CLASS. Results using Multilevel models analyses suggest that the ability to propose good classroom organization and give good instructional support are linked with better child' social adaptation, and that is always true for men and women teachers. The results are discussed on the basis of their potential impact on future educational interventions.

Keywords: child social adaptation, early childhood education, educational practices, men teacher

Procedia PDF Downloads 345
3467 The Role of Law Corruption and Culture in Investment Fund Manager Fees

Authors: Samir Assal

Abstract:

This paper considers an international sample of venture capital and private equity funds to assess the role of law, corruption and culture in setting fund manager fees in terms of their fixed management fees, carried interest performance fees, clawbacks of fees and cash versus share distributions of fees. The data highlight a role of legal conditions in shaping fees paid to fund managers. In countries with better legal conditions, fixed fees are lower, carried interest fees are higher, clawbacks are less likely, and share distributions are more likely. These findings suggest legal conditions help to align the interests of managers and shareholders. More specifically, we examine which element of legal conditions matter most, and discover that corruption levels play a pronounced role in shaping fund manager fee contracts. We also show that cultural forces such as Hofstede’s measures of power distance and uncertainty avoidance likewise play a role in influencing fees.

Keywords: managerial compensation, incentive contracts, private equity, law and finance

Procedia PDF Downloads 288
3466 'It’s a Very, Very New Old South Africa…': Exploring Some Race, Corruption and Protest Issues in Zakes Mda’s 'Our Lady of Benoni'

Authors: Bongani Clearance Thela

Abstract:

It seems that theatre remains a practical method for mobilising people and their ideologies; and South African literature has strengthened over the years as a result of the events which took place during both the Apartheid and Post-Apartheid eras. Hence, the problem noted in this study is that, generally, many people seem to believe that the issues which were a concern during Apartheid times in South Africa no longer exist in Post-Apartheid South Africa, whereas, it is seems that they still do. Post-Apartheid playwrights such as Zakes Mda among others, explore these issues in their works. There are common themes between the two periods, for this reason, distinction can only be drawn in terms of the context. Therefore, this study explores solutions offered by the themes of protest, corruption and race in Zakes Mda’s Our Lady of Benoni. The study uses real events and Mda’s play to reveal that there is a reinvention of Apartheid times’ issues into Post-Apartheid times’ issues. Moreover, the theme of race is explored with reference to class issues. Also, the study aims at highlighting some distinctions between the Apartheid period and Post-Apartheid period as shown by the playwright, Zakes Mda’s fictitious version as seen in some of his characters in the play. Theatre in general has always protested, it is either against an issue or for an issue; therefore, this paper will also explore the various ways in which the theme of protest is undertaken in the study of theatre. Respectively, the paper looks in the literal protest found in Mda’s Our Lady of Benoni in order to provide critical understanding with regard to the notion undertaken in this study. The paper goes on to provide an alternative discussion of the theme of protest; it critically evaluates issues such as corruption and race in terms of class that the playwright, Mda addresses in his play. In conclusion, this paper will use other relevant examples other than Mda’s drama, Our Lady of Benoni, in order to prove that there is a reinvention of Apartheid issues in Post-Apartheid issues in South Africa.

Keywords: protest, corruption, race, class

Procedia PDF Downloads 307
3465 Measurements of Service Quality vs Customer Satisfaction in Government Owned Retail Store at Kochi

Authors: N. S. Ajisha

Abstract:

In today’s competitive world the quality of the service you deliver is one of the important factor that determine customer satisfaction. Service quality is considered to be one important determinant to evaluate customer satisfaction and the relationship between service quality and customer satisfaction is considered as the foundation in researches on customer satisfaction. This research examines to do a gap analysis between the perception and expectation of the services delivered and find relation between the service quality and customer satisfaction. Service quality is found out here using the SERVQUAL model. And it finds out the dimension of service quality which is more important to measure customer satisfaction. The dimensions which we measure using SERVQUAL include the tangibles, reliability, responsiveness, assurance, and empathy. This study involves primary data collection like market survey.

Keywords: customer satisfaction, service quality, retail service quality, Kochi

Procedia PDF Downloads 524
3464 Block Mining: Block Chain Enabled Process Mining Database

Authors: James Newman

Abstract:

Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.

Keywords: blockchain, process mining, memory optimization, protocol

Procedia PDF Downloads 71
3463 Online Escape Room for Intergenerational Play

Authors: David Kaufman

Abstract:

Despite the ‘silver Tsunami’ that is occurring worldwide, ageism is still a problem in modern society. As well, families are becoming increasingly separated geographically. This paper will discuss these issues and one potential solution - an online escape room game that is played by two players over the internet while talking to each other. The payers can be two seniors or one senior and one youth, e.g., a grandchild. Each player sees a different view of the game environment and players must collaborate in order to solve the puzzles presented and escape from the three rooms, all connected by a maze. The game was developed by Masters students at the Centre for Digital Media in Vancouver, BC in collaboration with a team of post-doctoral scholar, graduate students and faculty member, as well as 10 seniors who assisted. This paper will describe the game, development process and results of our pilot studies. The research study conducted comprises several stages: 1. several formative evaluation sessions with seniors to obtain feedback to assist further design, and 2. field testing of the game. Preliminary results have been extremely positive and results of our field tests will be presented in this paper.

Keywords: digital game, online escape room, intergenerational play, seniors

Procedia PDF Downloads 339
3462 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data

Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju

Abstract:

Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.

Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding

Procedia PDF Downloads 389
3461 A Development of a Simulation Tool for Production Planning with Capacity-Booking at Specialty Store Retailer of Private Label Apparel Firms

Authors: Erika Yamaguchi, Sirawadee Arunyanrt, Shunichi Ohmori, Kazuho Yoshimoto

Abstract:

In this paper, we suggest a simulation tool to make a decision of monthly production planning for maximizing a profit of Specialty store retailer of Private label Apparel (SPA) firms. Most of SPA firms are fabless and make outsourcing deals for productions with factories of their subcontractors. Every month, SPA firms make a booking for production lines and manpower in the factories. The booking is conducted a few months in advance based on a demand prediction and a monthly production planning at that time. However, the demand prediction is updated month by month, and the monthly production planning would change to meet the latest demand prediction. Then, SPA firms have to change the capacities initially booked within a certain range to suit to the monthly production planning. The booking system is called “capacity-booking”. These days, though it is an issue for SPA firms to make precise monthly production planning, many firms are still conducting the production planning by empirical rules. In addition, it is also a challenge for SPA firms to match their products and factories with considering their demand predictabilities and regulation abilities. In this paper, we suggest a model for considering these two issues. An objective is to maximize a total profit of certain periods, which is sales minus costs of production, inventory, and capacity-booking penalty. To make a better monthly production planning at SPA firms, these points should be considered: demand predictabilities by random trends, previous and next month’s production planning of the target month, and regulation abilities of the capacity-booking. To decide matching products and factories for outsourcing, it is important to consider seasonality, volume, and predictability of each product, production possibility, size, and regulation ability of each factory. SPA firms have to consider these constructions and decide orders with several factories per one product. We modeled these issues as a linear programming. To validate the model, an example of several computational experiments with a SPA firm is presented. We suppose four typical product groups: basic, seasonal (Spring / Summer), seasonal (Fall / Winter), and spot product. As a result of the experiments, a monthly production planning was provided. In the planning, demand predictabilities from random trend are reduced by producing products which are different product types. Moreover, priorities to produce are given to high-margin products. In conclusion, we developed a simulation tool to make a decision of monthly production planning which is useful when the production planning is set every month. We considered the features of capacity-booking, and matching of products and factories which have different features and conditions.

Keywords: capacity-booking, SPA, monthly production planning, linear programming

Procedia PDF Downloads 501
3460 A Pedagogical Approach of Children’s Learning by Toys, Perspective: Bangladesh

Authors: Muktadir Ahmed, Sayed Akhlakur Rahaman, Mridha Shihab Mahmud

Abstract:

The parents of Bangladesh have scarcity of knowledge about children play. Most of them do not know which toys are perfect for their children. Appropriate toys for playing is one of the most significant parts of children development from early age, besides for proper amelioration of children’s mental growth and brain capacities, toys play an emergent role. So selection of proper toy for children is very important. A toy forms the sagacity of a child and instructs child’s attitude. In this era of globalization to keep pace with everything children toys are also going forward but in a deleterious way. Maximum toys are now battery-driven and for this psychological developments of children are not increasing in effective way; therefore, pedagogical toys are proper selection. This type of toy inspires the wisdom and helps a child to reveal himself/herself. Pedagogical toys are attractive to children and help to stimulate their imagination. Pedagogical toys help them to build senso-motoric skills and hand-eye coordination. In this study, some children divided into two groups, one group played with pedagogical toys and another group played with conventional toys. This study is going to exhibit the difference between pedagogical and conventional toys for kids. The main aim of this study is to reveal the potency of pedagogical toy for children. To implement this study two Daycare Centers (DCC) Projapoti 1 & 3 of Mymensingh city had chosen. Every DCC having 1.5-6 years old children but for this study 2-5 years old children had been selected. The children of Projapoti-1 played with pedagogical toys and the children of Projapoti-2 played with conventional toys. After 6 weeks of study, the children of Projapoti-1 proved that they have improved their skills more than those children of Projapoti-3 who were playing with conventional toys. The children of Projapoti-1 have developed their touch sensation, muscular movement, imitation power, hand-eye coordination whereas the children of Projapoti-3 have only developed their muscular movement fairly (while running after battery driven toys) which is not better than those children of Projapoti-1. They cannot imitate like the children of Projapoti-1. They just had fun from playing virtual games, battery driven toys, watching cartoons etc. Actually, it is not possible to develop a child’s brain without pedagogical toy.

Keywords: brain development, mental growth, pedagogical toys, play for children

Procedia PDF Downloads 303
3459 Big Data Analysis with RHadoop

Authors: Ji Eun Shin, Byung Ho Jung, Dong Hoon Lim

Abstract:

It is almost impossible to store or analyze big data increasing exponentially with traditional technologies. Hadoop is a new technology to make that possible. R programming language is by far the most popular statistical tool for big data analysis based on distributed processing with Hadoop technology. With RHadoop that integrates R and Hadoop environment, we implemented parallel multiple regression analysis with different sizes of actual data. Experimental results showed our RHadoop system was much faster as the number of data nodes increases. We also compared the performance of our RHadoop with lm function and big lm packages available on big memory. The results showed that our RHadoop was faster than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases.

Keywords: big data, Hadoop, parallel regression analysis, R, RHadoop

Procedia PDF Downloads 413
3458 The Way of the English Use of Businessmen for the ASEAN Economic Community in Chonburi Province

Authors: Kittivate Boonyopakorn

Abstract:

The purposes of this study were to investigate the method of the English use of the businessmen and to study their behavior of the utilization for the ASEAN economic community. The participants were divided into the three types of the merchants including the construction contractors, the construction material traders, and SME entrepreneurs. Survey questionnaires and interviews were used in this study. The findings showed that in the type of traders, 23 of the participants are construction contractors, 121 are construction material traders, and 206 are SME entrepreneurs. The study of English in language institute is highly 51.4%. The use of Google in translating English into Thai is 41.7%. Learning English themselves is 41.1% respectively. The businessmen study English for readiness for their trade.

Keywords: way of rnglish use, businessmen, ASEAN economic community, Chonburi province

Procedia PDF Downloads 223
3457 The Effect of Computerized Systems of Office Automation on Employees' Productivity Efficiency

Authors: Mohammad Hemmati, Mohammad Taban, Ali Yasini

Abstract:

One of the factors that can play an important role in increasing productivity is the optimal use of information technology, which in this area today has a significant role to play in computer systems of office automation in organizations and companies. Therefore, this research has been conducted with the aim of investigating the effect of the relationship between computerized systems of office automation and the productivity of employees in the municipality of Ilam city. The statistical population of this study was 110 people. Using Cochran formula, the minimum sample size is 78 people. The present research is a descriptive-looking research in terms of the type of objective view. A questionnaire was used to collect data. To assess the reliability of variables, Cornbrash’s alpha coefficient was used, which was equal to 0.85; SPSS19 and Pearson test were used to analyze the data and test the hypothesis of the research. In this research, three hypotheses of the relationship between office automation with efficiency, performance, and effectiveness were investigated. The results showed a direct and positive relationship between the office automation system and the increase in the efficiency, effectiveness, and efficiency of employees, and there was no reason to reject these hypotheses.

Keywords: efficiency, performance, effectiveness, automation

Procedia PDF Downloads 184
3456 Citizens’ Satisfaction with Green and Blue Spaces and Urban Furniture in Sari Iran

Authors: Neda Rezvanisanijouybari

Abstract:

Cities are living and dynamic organisms that can play an essential role in meeting people's psychological and mental needs. The green and blue spaces, including parks, play an important role in meeting those needs, and therefore they should be prioritised in urban planning and designing. Sari city had several city designs and planning projects to expand the green spaces. These included adding more parks and open spaces with new urban furniture in the city and were an important step forward in creating a pleasant urban landscape in the north of Iran. This research used quantitative and qualitative methods to examine whether the citizens of Sari were satisfied with green and blue spaces and new urban furniture in the city or not. From a questionnaire of 120 Sari citizens, it was found that the citizens were generally satisfied with the green and blue spaces and new urban furniture in Sari. It was also found that the favourite park was Mellal park, and the least favourite was Azadegan park. Accessibility, safety, design, facilities, and water source were the most important reason to visit the parks.

Keywords: satisfaction, green, blue, urban furniture

Procedia PDF Downloads 145
3455 Sentiment Analysis of Social Media on the Cryptocurrency Price

Authors: Tarek Sadraoui, Ahlem Nasr Othman

Abstract:

Our research deal with studying and testing the effects of social media on the cryptocurrency price during the period 2020-2023. The rise of the phenomena of cryptocurrency in the world raises questions about the importance of sentiment analysis of social media on the price of the cryptocurrency. Using panel data, we show that the positive and negative twits have a positive and statistically significant impact on the price of the cryptocurrency, and neutral twits have exerted a negative and significant effect on the cryptocurrency price. Specifically, we determine the causal relationship, short-term and long-term relationship with ARDL approach between the cryptocurrency price and social media using the Granger causality test.

Keywords: social media, Twitter, Google trend, panel, cryptocurrency

Procedia PDF Downloads 86
3454 Assessment of Morphodynamic Changes at Kaluganga River Outlet, Sri Lanka Due to Poorly Planned Flood Controlling Measures

Authors: G. P. Gunasinghe, Lilani Ruhunage, N. P. Ratnayake, G. V. I. Samaradivakara, H. M. R. Premasiri, A. S. Ratnayake, Nimila Dushantha, W. A. P. Weerakoon, K. B. A. Silva

Abstract:

Sri Lanka is affected by different natural disasters such as tsunami, landslides, lightning, and riverine flood. Out of them, riverine floods act as a major disaster in the country. Different strategies are applied to control the impacts of flood hazards, and the expansion of river mouth is considered as one of the main activities for flood mitigation and disaster reduction. However, due to this expansion process, natural sand barriers including sand spits, barrier islands, and tidal planes are destroyed or subjected to change. This, in turn, can change the hydrodynamics and sediment dynamics of the area leading to other damages to the natural coastal features. The removal of a considerable portion of naturally formed sand barrier at Kaluganga River outlet (Calido Beach), Sri Lanka to control flooding event at Kaluthara urban area on May 2017, has become a serious issue in the area causing complete collapse of river mouth barrier spit bar system leading to rapid coastal erosion Kaluganga river outlet area and saltwater intrusion into the Kaluganga River. The present investigation is focused on assessing effects due to the removal of a considerable portion of naturally formed sand barrier at Kaluganga river mouth. For this study, the beach profiles, the bathymetric surveys, and Google Earth historical satellite images, before and after the flood event were collected and analyzed. Furthermore, a beach boundary survey was also carried out in October 2018 to support the satellite image data. The results of Google Earth satellite images and beach boundary survey data analyzed show a chronological breakdown of the sand barrier at the river outlet. The comparisons of pre and post-disaster bathymetric maps and beach profiles analysis revealed a noticeable deepening of the sea bed at the nearshore zone as well. Such deepening in the nearshore zone can cause the sea waves to break very near to the coastline. This might also lead to generate new diffraction patterns resulting in differential coastal accretion and erosion scenarios. Unless immediate mitigatory measures were not taken, the impacts may cause severe problems to the sensitive Kaluganag river mouth system.

Keywords: bathymetry, beach profiles, coastal features, river outlet, sand barrier, Sri Lanka

Procedia PDF Downloads 119
3453 Secondhand Clothing and the Future of Fashion

Authors: Marike Venter de Villiers, Jessica Ramoshaba

Abstract:

In recent years, the fashion industry has been associated with the exploitation of both people and resources. This is largely due to the emergence of the fast fashion concept, which entails rapid and continual style changes where clothes quickly lose their appeal, become out-of-fashion, and are then disposed of. This cycle often entails appalling working conditions in sweatshops with low wages, child labor, and a significant amount of textile waste that ends up in landfills. Although the awareness of the negative implications of ‘mindless fashion production and consumption’ is growing, fast fashion remains to be a popular choice among the youth. This is especially prevalent in South Africa, a poverty-stricken country where a vast number of young adults are unemployed and living in poverty. Despite being in poverty, the celebrity conscious culture and fashion products frequently portrayed on the growing intrusive social media platforms in South Africa pressurizes the consumers to purchase fashion and luxury products. Young adults are therefore more vulnerable to the temptation to purchase fast fashion products. A possible solution to the detrimental effects that the fast fashion industry has on the environment is the revival of the secondhand clothing trend. Although the popularity of secondhand clothing has gained momentum among selected consumer segments, the adoption rate of such remains slow. The main purpose of this study was to explore consumers’ perceptions of the secondhand clothing trend and to gain insight into factors that inhibit the adoption of secondhand clothing. This study also aimed to investigate whether consumers are aware of the negative implications of the fast fashion industry and their likelihood to shift their clothing purchases to that of secondhand clothing. By means of a quantitative study, fifty young females were asked to complete a semi-structured questionnaire. The researcher approached females between the ages of 18 and 35 in a face-to-face setting. The results indicated that although they had an awareness of the negative consequences of fast fashion, they lacked detailed insight into the pertinent effects of fast fashion on the environment. Further, a number of factors inhibit their decision to buy from secondhand stores: firstly, the accessibility to the latest trends was not always available in secondhand stores; secondly, the convenience of shopping from a chain store outweighs the inconvenience of searching for and finding a secondhand store; and lastly, they perceived secondhand clothing to pose a hygiene risk. The findings of this study provide fashion marketers, and secondhand clothing stores, with insight into how they can incorporate the secondhand clothing trend into their strategies and marketing campaigns in an attempt to make the fashion industry more sustainable.

Keywords: eco-friendly fashion, fast fashion, secondhand clothing, eco-friendly fashion

Procedia PDF Downloads 112
3452 Data Hiding in Gray Image Using ASCII Value and Scanning Technique

Authors: R. K. Pateriya, Jyoti Bharti

Abstract:

This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.

Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message

Procedia PDF Downloads 395
3451 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 60
3450 Creative Culture to Innovative Culture: Transformal Operation

Authors: Peer M. Sathikh

Abstract:

Creativity and innovation have become an important phenomenon today, whose potential is being realized through the success of Apple, Google/Android, Nike, Virgin, Dyson and other multinationals that are a household name today. Creativity and Innovation are, many times, used interchangeably, causing confusion as to what each represents and are capable of. Attempts to understand creativity and innovation clearly point to the difference, and at the same time, inter-dependency of one on the other. The assumption that having more creative personnel in a team will translate into innovation sooner or later seems generally counterproductive. What helps define the role of creativity and innovation in an organization and how can one build an innovative team? This paper points to the importance of understanding creative culture and innovation culture in order to bring about the desired innovation outcome and proposes a means to transform one to another as ideas move from mere ideas to useful innovation.

Keywords: creativity, innovation, creative culture, innovation culture, transformal operators

Procedia PDF Downloads 376
3449 Statistical Estimation of Ionospheric Energy Dissipation Using ØStgaard's Empirical Relation

Authors: M. A. Ahmadu, S. S. Rabia

Abstract:

During the past few decades, energy dissipation in the ionosphere resulting from the geomagnetic activity has caused an increasing number of major disruptions of important power and communication services, malfunctions and loss of expensive facilities. Here, the electron precipitation energy, w(ep) and joule heating energy, w(jh) was used in the computation of this dissipation using Østgaard’s empirical relation from hourly geomagnetic indices of 2012, under the assumption that the magnetosphere does not store any energy, so that at the beginning of the activity t1=0 and end at t2=t, the statistical results obtained show that ionospheric dissipation varies month to month, day to day and hour to hour and estimated with a value ~3.6 w(ep), which is in agreement with experimental result.

Keywords: Ostgaard's, ionospheric dissipation, joule heating, electron precipitation, geomagnetic indices, empirical relation

Procedia PDF Downloads 276
3448 The Strategic Roles of Women in Small Family Businesses: Evidence from Two Emerging Economies in West Africa

Authors: Bamidele Wale-Oshinowo, Doris Akyere Boateng, Lebura Sorbarikor

Abstract:

Women play significant roles when it comes to the survival of family businesses; however, their efforts are less acknowledged across the developing world. In the case where these businesses are started by husbands, women in many instances work as hard as the men to build up the business. In spite of this, the benefits women receive are not equal to their inputs. For instance, the profits accruing from ownership of these businesses are mainly enjoyed by husbands, as they are deemed to be the legal owners of family businesses in most developing economies. Though the number of women involvement in the ownership, management, and direction of family businesses keeps increasing over the years, their efforts sometimes are ‘invisible’ and not rewarded. Using a phenomenological approach, this study purposively selected 20 businesswomen each from Ghana and Nigeria for in-depth interviews on the different roles they play in ensuring the success of their family businesses (FBs). This study also explored the challenges and opportunities that these women have within their family businesses. Among the major findings of this study is the important strategic direction that women give in terms of providing both tangible and intangible resources such as transfer of transit knowledge to the next generation. Women were also found to play a significant role in the implementation of entrepreneurial orientation within small family businesses in Ghana and Nigeria. However, the study revealed that women experience various challenges as stakeholders in family businesses, among which are: work-life balance issues, succession issues, and culture-related presuppositions about gender roles both within the business and in their families. In the light of the study’s findings, critical recommendations made include encouraging founders and/or owners of family businesses to create a conducive and viable platform for women to grow into key leadership positions within Family businesses; doing this would impact strongly on the growth rate of these form of businesses within the African Region.

Keywords: emerging economies, control, management, resources, strategy, women

Procedia PDF Downloads 337
3447 Aeroelastic Analysis of Nonlinear All-Movable Fin with Freeplay in Low-Speed

Authors: Laith K. Abbas, Xiaoting Rui, Pier Marzocca

Abstract:

Aerospace systems, generally speaking, are inherently nonlinear. These nonlinearities may modify the behavior of the system. However, nonlinearities in an aeroelastic system can be divided into structural and aerodynamic. Structural nonlinearities can be subdivided into distributed and concentrated ones. Distributed nonlinearities are spread over the whole structure representing the characteristic of materials and large motions. Concentrated nonlinearities act locally, representing loose of attachments, worn hinges of control surfaces, and the presence of external stores. The concentrated nonlinearities can be approximated by one of the classical structural nonlinearities, namely, cubic, free-play and hysteresis, or by a combination of these, for example, a free-play and a cubic one. Compressibility, aerodynamic heating, separated flows and turbulence effects are important aspects that result in nonlinear aerodynamic behavior. An issue related to the low-speed flutter and its catastrophic/benign character represented by Limit Cycle Oscillation (LCO) of all-movable fin, as well to their control is addressed in the present work. To the approach of this issue: (1) Quasi-Steady (QS) Theory and Computational Fluid Dynamics (CFD) of subsonic flow are implemented, (2) Flutter motion equations of a two-dimensional typical section with cubic nonlinear stiffness in the pitching direction and free play gap are established, (3) Uncoupled bending/torsion frequencies of the selected fin are computed using recently developed Transfer Matrix Method of Multibody System Dynamics (MSTMM), and (4) Time simulations are carried out to study the bifurcation behavior of the aeroelastic system. The main objective of this study is to investigate how the LCO and chaotic behavior are influenced by the coupled aeroelastic nonlinearities and intend to implement a control capability enabling one to control both the flutter boundary and its character. By this way, it may expand the operational envelop of the aerospace vehicle without failure.

Keywords: aeroelasticity, CFD, MSTMM, flutter, freeplay, fin

Procedia PDF Downloads 352
3446 Exploring the Connectedness of Ad Hoc Mesh Networks in Rural Areas

Authors: Ibrahim Obeidat

Abstract:

Reaching a fully-connected network of mobile nodes in rural areas got a great attention between network researchers. This attention rose due to the complexity and high costs while setting up the needed infrastructures for these networks, in addition to the low transmission range these nodes has. Terranet technology, as an example, employs ad-hoc mesh network where each node has a transmission range not exceed one kilometer, this means that every two nodes are able to communicate with each other if they are just one kilometer far from each other, otherwise a third-party will play the role of the “relay”. In Terranet, and as an idea to reduce network setup cost, every node in the network will be considered as a router that is responsible of forwarding data between other nodes which result in a decentralized collaborative environment. Most researches on Terranet presents the idea of how to encourage mobile nodes to become more cooperative by letting their devices in “ON” state as long as possible while accepting to play the role of relay (router). This research presents the issue of finding the percentage of nodes in ad-hoc mesh network within rural areas that should play the role of relay at every time slot, relating to what is the actual area coverage of nodes in order to have the network reach the fully-connectivity. Far from our knowledge, till now there is no current researches discussed this issue. The research is done by making an implementation that depends on building adjacency matrix as an indicator to the connectivity between network members. This matrix is continually updated until each value in it refers to the number of hubs that should be followed to reach from one node to another. After repeating the algorithm on different area sizes, different coverage percentages for each size, and different relay percentages for several times, results extracted shows that for area coverage less than 5% we need to have 40% of the nodes to be relays, where 10% percentage is enough for areas with node coverage greater than 5%.

Keywords: ad-hoc mesh networks, network connectivity, mobile ad-hoc networks, Terranet, adjacency matrix, simulator, wireless sensor networks, peer to peer networks, vehicular Ad hoc networks, relay

Procedia PDF Downloads 252
3445 Toward an Appropriate Index for Corporate Governance

Authors: Bita Mashayekhi, Farzaneh Jalali, Alemeh Yazdanian

Abstract:

This study contributes to identifying the corporate governance indices in previous researches by using content analysis on relevant papers published in 20 top accounting journals according to Google Scholar ranking, dated from 1990 to 2016. For this purpose, 65 papers are scrutinized deeply, and the concepts of corporate governance are coded and categorized. Then extracted indices are clustered into 10 and 51 categories and subcategories, respectively; and their frequencies are determined. Results show that the board of directors’ characteristics is employed more frequently in reviewed papers, and the board of directors’ independency is the most frequent index within the 97 percent of our sample. Duality, board size, and ownership structure have more frequencies in comparison with other extracted corporate governance indices.

Keywords: corporate governance, content analysis, corporate governance index, top accounting journals

Procedia PDF Downloads 323
3444 Analysis of Business Intelligence Tools in Healthcare

Authors: Avishkar Gawade, Omkar Bansode, Ketan Bhambure, Bhargav Deore

Abstract:

In recent year wide range of business intelligence technology have been applied to different area in order to support decision making process BI enables extraction of knowledge from data store. BI tools usually used in public health field for financial and administrative purposes.BI uses a dashboard in presentation stage to deliver information to information to end users.In this paper,we intend to analyze some open source BI tools on the market and their applicability in the clinical sphere taking into consideration the general characteristics of the clinical environment.A pervasive BI platform was developed using a real case in order to prove the tool viability.Analysis of various BI Tools in done with the help of several parameters such as data security,data integration,data quality reporting and anlaytics,performance,scalability and cost effectivesness.

Keywords: CDSS, EHR, business intelliegence, tools

Procedia PDF Downloads 117
3443 Classifying the Role of Technology in Technology Development

Authors: Hyun Joung No, Chul Lee

Abstract:

Even though technology evolves and develops through interaction with each other, not all technologies contribute to the development of technology equally. While some technologies play a central role in developing technology, others play a secondary role. The role of the technological components can be classified as core or non-core (peripheral) technology. The core technologies have a considerable knowledge interaction with other technological components while the non-core technologies barely interact with others within the system. This study introduces the concept that classifies the technological components into core or peripheral technology according to their role and importance in the technology field. The study adapted the social network analysis to examine the relationship between technological components. Using a continuous core-periphery analysis, it identifies the technological network structure and classifies the core and peripheral nodes. Based on their knowledge inflow/outflow direction and their dependence/influence on core technologies, the technological clusters are classified into four categories: (1) high dependence and high influence on core technology, (2) high dependence and low influence on core technology, (3) low dependence and high influence on core technology, and (4) low dependence and low influence on core technology.

Keywords: core technology, periphery technology, technological components, technological role

Procedia PDF Downloads 514
3442 Model-Viewer for Setting Interactive 3D Objects of Electronic Devices and Systems

Authors: Julio Brégains, Ángel Carro, José-Manuel Andión

Abstract:

Virtual 3D objects constitute invaluable tools for teaching practical engineering subjects at all -from basic to advanced- educational levels. For instance, they can be equipped with animation or informative labels, manipulated by mouse movements, and even be immersed in a real environment through augmented reality. In this paper, we present the investigation and description of a set of applications prepared for creating, editing, and making use of interactive 3D models to represent electric and electronic devices and systems. Several examples designed with the described tools are exhibited, mainly to show their capabilities as educational technological aids, applicable not only to the field of electricity and electronics but also to a much wider range of technical areas.

Keywords: educational technology, Google model viewer, ICT educational tools, interactive teaching, new tools for teaching

Procedia PDF Downloads 48
3441 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 67