Search results for: cloud service brokerage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4069

Search results for: cloud service brokerage

3769 Guests’ Perceptions of Service Quality Performance in Saudi Hotels: Testing the Relation with Brand Loyalty, and Gender through SERVPERF

Authors: Mohamed Mohsen

Abstract:

The purpose of this study is to explore the level of service quality performance from the perspectives of hotel guests. The aim is to examine hotel guests’ perceptions of service quality performance and its relation with their brand loyalty and gender. The study utilized the instrument of SERVPERF developed by Cronin and Taylor (1992) to measure service quality performance. The study was conducted in three upscale hotels in Saudi Arabia. The study found that service quality performance is significantly correlated to both brand loyalty and gender of hotel guests. The study also found that loyal and female hotel guests have perceptions of service quality performance than do non-loyal and male hotel guests. This research is the first empirical study in the Middle East that links service quality performance with brand loyalty and gender of hotel guests.

Keywords: service quality, SERVPERF, customer satisfaction, brand loyalty, gender

Procedia PDF Downloads 323
3768 The Role of Knowledge Management in Global Software Engineering

Authors: Samina Khalid, Tehmina Khalil, Smeea Arshad

Abstract:

Knowledge management is essential ingredient of successful coordination in globally distributed software engineering. Various frameworks, KMSs, and tools have been proposed to foster coordination and communication between virtual teams but practical implementation of these solutions has not been found. Organizations have to face challenges to implement knowledge management system. For this purpose at first, a literature review is arranged to investigate about challenges that restrict organizations to implement KMS and then by taking in account these challenges a problem of need of integrated solution in the form of standardized KMS that can easily store tacit and explicit knowledge, has traced down to facilitate coordination and collaboration among virtual teams. Literature review has been already shown that knowledge is a complex perception with profound meanings, and one of the most important resources that contributes to the competitive advantage of an organization. In order to meet the different challenges caused by not properly managing knowledge related to projects among virtual teams in GSE, we suggest making use of the cloud computing model. In this research a distributed architecture to support KM storage is proposed called conceptual framework of KM as a service in cloud. Framework presented is enhanced and conceptual framework of KM is embedded into that framework to store projects related knowledge for future use.

Keywords: management, Globsl software development, global software engineering

Procedia PDF Downloads 504
3767 Human Errors in IT Services, HFACS Model in Root Cause Categorization

Authors: Kari Saarelainen, Marko Jantti

Abstract:

IT service trending of root causes of service incidents and problems is an important part of proactive problem management and service improvement. Human error related root causes are an important root cause category also in IT service management, although it’s proportion among root causes is smaller than in the other industries. The research problem in this study is: How root causes of incidents related to human errors should be categorized in an ITSM organization to effectively support service improvement. Categorization based on IT service management processes and based on Human Factors Analysis and Classification System (HFACS) taxonomy was studied in a case study. HFACS is widely used in human error root cause categorization across many industries. Combining these two categorization models in a two dimensional matrix was found effective, yet impractical for daily work.

Keywords: IT service management, ITIL, incident, problem, HFACS, swiss cheese model

Procedia PDF Downloads 456
3766 Using a Design Structure Method to Support Technology Roadmapping for Product-Service Integrated Systems

Authors: Heungwook Son, Sungjoo Lee

Abstract:

Recently, due to intensifying competition in several industries, the importance of meeting customer requirements has increased. The role that service plays in satisfying customer‘s requirements is key area of focus. Thus, the concept of using product development-research in the service system has been actively practiced. As strategic decision making tool, various types of the technology roadmap were suggested in the product-service system (PSS). However, the technology roadmap was configured a top-down form around the technologies of the elements. The limitation is that it hard for it to indicate a variety of interrelations. In response, this paper suggests using the planning support tool of PSS for a DSM for the technology roadmap; it consists of the relationship of product-service-technology as a bottom-up form. Therefore, nine types of the technology roadmap of PSS exist. The first defines the relationship of product-service-technology. The second phase identifies output when of the technology roadmaps are adapted to the DSM process. Finally, the DSM-based forms of each type of technology roadmap are presented through case studies.

Keywords: DSM, technology roadmap, PSS, product-service system, bottom-up

Procedia PDF Downloads 355
3765 Through 7S Model to Promote the Service Innovation Management

Authors: Cheng Fang Hsu

Abstract:

Call center is the core of building customer relationship management system. Under the strong competitive stress, it becomes a new profiting challenge for a successful enterprise. Call center is a department not only to provide customer service but also to bring business profit. This is the qualitative case study in Taiwan bank service industry which goes on deeper exploration, and analysis by business interviews and industrial analysis. This study starts from the establishment, development, and management after the reforming of the case call center. Through SWOT analysis, and industrial analysis, this study adopted 7S model to explain how the call center reforms from service oriented to profit oriented and from cost management to profit management. The results indicated how service innovation management promotes call center to be operated as a market profit competition center. The recommendations are indicated to support the call center on marketing profit by service innovation management.

Keywords: call center, 7S model, service innovation management, bioinformatics

Procedia PDF Downloads 460
3764 Cloud Support for Scientific Workflow Execution: Prototyping Solutions for Remote Sensing Applications

Authors: Sofiane Bendoukha, Daniel Moldt, Hayat Bendoukha

Abstract:

Workflow concepts are essential for the development of remote sensing applications. They can help users to manage and process satellite data and execute scientific experiments on distributed resources. The objective of this paper is to introduce an approach for the specification and the execution of complex scientific workflows in Cloud-like environments. The approach strives to support scientists during the modeling, the deployment and the monitoring of their workflows. This work takes advantage from Petri nets and more pointedly the so-called reference nets formalism, which provides a robust modeling/implementation technique. RENEWGRASS is a tool that we implemented and integrated into the Petri nets editor and simulator RENEW. It provides an easy way to support not experienced scientists during the specification of their workflows. It allows both modeling and enactment of image processing workflows from the remote sensing domain. Our case study is related to the implementation of vegetation indecies. We have implemented the Normalized Differences Vegetation Index (NDVI) workflow. Additionally, we explore the integration possibilities of the Cloud technology as a supplementary layer for the deployment of the current implementation. For this purpose, we discuss migration patterns of data and applications and propose an architecture.

Keywords: cloud computing, scientific workflows, petri nets, RENEWGRASS

Procedia PDF Downloads 426
3763 Scaffolding Pre-Service Teachers’ Experiences with Book Creator

Authors: Bekir Mugayitoglu

Abstract:

This work shares pre-service teachers' experiences with the Book Creator application during the face-to-face class. Participants for this work were pre-service teachers in a semester-long instructional technology course who developed their own e-books. The work was conducted during the Fall of 2023. Eleven pre-service teachers completed the project, producing books appropriate to their area of concentration. Analysis of participant progress reports shows, that Exemplars showcase creative ways to prepare pre-service teachers to design their own books and have an opportunity to use mobile apps to create a variety of e-material options. The findings support future opportunities for pre-service teachers to design and implement technology-supported literacy applications to integrate into their own classroom pedagogy.

Keywords: scaffolding, e-book, classroom pedagogy, face-to-face class

Procedia PDF Downloads 28
3762 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 114
3761 Exploring Service Performance of Area-Based Bus Service for Dhaka: A Case Study of Dhaka Chaka

Authors: Md. Musfiqur Rahman Bhuiya Nidalia Islam, Hossain Mohiuddin, Md. Kawser Bin Zaman

Abstract:

Dhaka North City Corporation introduced first area-based bus service on 10 August 2016 to run through Gulshan and Banani area to dilute sufferings of the people which started with the ban on movement of the bus in these areas after Holy Artisan terrorist attack. This study explores service quality performance of Dhaka Chaka on the basis of information provided by its riders on a questionnaire survey. Total thirteen service quality indicators have been ranked on a scale of 1-5, and they have been classified under three latent variables based on their correlation using eigenvalue and rotated factor matrix derived through factor analysis process. Mean, and skewness has been calculated for each indicator. It has been found that ticket price and ticketing system have relatively poor average service quality rank than other factors. All other factors have moderately good performance. The study also suggests some recommendation to improve service quality of Dhaka Chaka based on the interrelation between considered parameters.

Keywords: area based bus service, eigen value, factor analysis, correlation

Procedia PDF Downloads 161
3760 Functionality Based Composition of Web Services to Attain Maximum Quality of Service

Authors: M. Mohemmed Sha Mohamed Kunju, Abdalla A. Al-Ameen Abdurahman, T. Manesh Thankappan, A. Mohamed Mustaq Ahmed Hameed

Abstract:

Web service composition is an effective approach to complete the web based tasks with desired quality. A single web service with limited functionality is inadequate to execute a specific task with series of action. So, it is very much required to combine multiple web services with different functionalities to reach the target. Also, it will become more and more challenging, when these services are from different providers with identical functionalities and varying QoS, so while composing the web services, the overall QoS is considered to be the major factor. Also, it is not true that the expected QoS is always attained when the task is completed. A single web service in the composed chain may affect the overall performance of the task. So care should be taken in different aspects such as functionality of the service, while composition. Dynamic and automatic service composition is one of the main option available. But to achieve the actual functionality of the task, quality of the individual web services are also important. Normally the QoS of the individual service can be evaluated by using the non-functional parameters such as response time, throughput, reliability, availability, etc. At the same time, the QoS is not needed to be at the same level for all the composed services. So this paper proposes a framework that allows composing the services in terms of QoS by setting the appropriate weight to the non-functional parameters of each individual web service involved in the task. Experimental results show that the importance given to the non-functional parameter while composition will definitely improve the performance of the web services.

Keywords: composition, non-functional parameters, quality of service, web service

Procedia PDF Downloads 306
3759 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 233
3758 In-service High School Teachers’ Experiences On Blended Teaching Approach Of Mathematics

Authors: Lukholo Raxangana

Abstract:

Fourth Industrial Revolution (4IR)-era teaching offers in-service mathematics teachers opportunities to use blended approaches to engage learners while teaching mathematics. This study explores in-service high school teachers' experiences with a blended teaching approach to mathematics. This qualitative case study involved eight pre-service teachers from four selected schools in the Sedibeng West District of the Gauteng Province. The study used the community of inquiry model as its analytical framework for data analysis. Data collection was through semi-structured interviews and focus-group discussions to explore in-service teachers' experiences with the influence of blended teaching (BT) on learning mathematics. The study results are the impact of load-shedding, benefits of BT, and perceptions of in-service and hindrances of BT. Based on these findings, the study recommends that further research should focus on developing data-free BT tools to assist during load-shedding, regardless of location.

Keywords: bended teaching, teachers, in-service, and mathematics

Procedia PDF Downloads 28
3757 Use of Cloud-Based Virtual Classroom in Connectivism Learning Process to Enhance Information Literacy and Self-Efficacy for Undergraduate Students

Authors: Kulachai Kultawanich, Prakob Koraneekij, Jaitip Na-Songkhla

Abstract:

The way of learning has been changed into a new paradigm since the improvement of network and communication technology, so learners have to interact with massive amount of the information. Thus, information literacy has become a critical set of abilities required by every college and university in the world. Connectivism is considered to be an alternative way to design information literacy course in online learning environment, such as Virtual Classroom (VC). With the change of learning pedagogy, VC is employed to improve the social capability by integrating cloud-based technology. This paper aims to study the use of Cloud-based Virtual Classroom (CBVC) in Connectivism learning process to enhance information literacy and self-efficacy of twenty-one undergraduate students who registered in an e-publishing course at Chulalongkorn University. The data were gathered during 6 weeks of the study by using the following instruments: (1) Information literacy test (2) Information literacy rubrics (3) Information Literacy Self-Efficacy (ILSE) Scales and (4) Questionnaire. The result indicated that students have information literacy and self-efficacy posttest mean scores higher than pretest mean scores at .05 level of significant after using CBVC in Connectivism learning process. Additionally, the study identified that the Connectivism learning process proved useful for developing information rich environment and a sense of community, and the CBVC proved useful for developing social connection.

Keywords: cloud-based, virtual classroom, connectivism, information literacy

Procedia PDF Downloads 428
3756 Metamodel for Artefacts in Service Engineering Analysis and Design

Authors: Purnomo Yustianto, Robin Doss

Abstract:

As a process of developing a service system, the term ‘service engineering’ evolves in scope and definition. To achieve an integrated understanding of the process, a general framework and an ontology are required. This paper extends a previously built service engineering framework by exploring metamodels for the framework artefacts based on a foundational ontology and a metamodel landscape. The first part of this paper presents a correlation map between the proposed framework with the ontology as a form of evaluation for the conceptual coverage of the framework. The mapping also serves to characterize the artefacts to be produced for each activity in the framework. The second part describes potential metamodels to be used, from the metamodel landscape, as alternative formats of the framework artefacts. The results suggest that the framework sufficiently covers the ontological concepts, both from general service context and software service context. The metamodel exploration enriches the suggested artefact format from the original eighteen formats to thirty metamodel alternatives.

Keywords: artefact, framework, service, metamodel

Procedia PDF Downloads 176
3755 A Study on the HTML5 Based Multi Media Contents Authority Tool

Authors: Heesuk Seo, Yongtae Kim

Abstract:

Online learning started in the 1990s, the spread of the Internet has been through the era of e-learning paradigm of online education in the era of smart learning change. Reflecting the different nature of the mobile to anywhere anytime, anywhere was also allows the form of learning, it was also available through the learning content and interaction. We are developing a cloud system, 'TLINKS CLOUD' that allows you to configure the environment of the smart learning without the need for additional infrastructure. Using the big-data analysis for e-learning contents, we provide an integrated solution for e-learning tailored to individual study.

Keywords: authority tool, big data analysis, e-learning, HTML5

Procedia PDF Downloads 377
3754 Supporting Women's Economic Development in Rural Papua New Guinea

Authors: Katja Mikhailovich, Barbara Pamphilon

Abstract:

Farmer training in Papua New Guinea has focused mainly on technology transfer approaches. This has primarily benefited men and often excluded women whose literacy, low education and role in subsistence crops has precluded participation in formal training. The paper discusses an approach that uses both a brokerage model of agricultural extension to link smallholders with private sector agencies and an innovative family team’s approach that aims to support the economic empowerment of women in families and encourages sustainable and gender equitable farming and business practices.

Keywords: women, economic development, agriculture, training

Procedia PDF Downloads 370
3753 Determinants of Service Quality on Thai Passengers’ Repeated Purchase of Domestic Flight Service with Thai Airways International

Authors: Nattapong Techarattanased

Abstract:

This research paper aimed to identify determinants of airline service quality on passengers’ repeated purchase of service. The population of this study was Thai passengers flying domestic flights with Thai Airways, making a total of 300 samples. These 300 samples participated in this research by answering a collection of questions by means of a questionnaire. An analysis of means score and multiple regression revealed that perceived service quality for tangible elements, reliability, responsiveness, assurance and empathy had determined repeated purchase of flight service of the passengers at a high level. Moreover, reliability and responsiveness factors could predict the passengers’ repeated purchase of flight service at the percentage of 30.6. The findings gave a signal that Thai Airways may consider a development of route network and fleet strategy as well as an establishment of aircraft and seat qualification to meet passengers’ needs and requirements. Passengers’ level of satisfaction could also be maximized by offering service value through various kinds of special deals and programs, whereas value- added pricing strategy should be considered in order to differentiate from and beat other leading airline competitors.

Keywords: repeated purchase, service quality, domestic flight, Thai Airways

Procedia PDF Downloads 264
3752 Pre-Service Teachers’ Opinions on Disabled People

Authors: Sinem Toraman, Aysun Öztuna Kaplan, Hatice Mertoğlu, Esra Macaroğlu Akgül

Abstract:

This study aims to examine pre-service teachers’ opinions on disabled people taking into consideration various variables. The participants of the study are composed of 170 pre-service teachers being 1st year students of different branches at Education Department of Yıldız Technical, Yeditepe, Marmara and Sakarya Universities. Data of the research was collected in 2013-2014 fall term. This study was designed as a phenomenological study appropriately qualitative research paradigm. Pre-service teachers’ opinions about disabled people were examined in this study, open ended question form which was prepared by researcher and focus group interview techniques were used as data collection tool. The study presents pre-service teachers’ opinions about disabled people which were mentioned, and suggestions about teacher education.

Keywords: pre-service teachers, disabled people, teacher education, teachers' opinions

Procedia PDF Downloads 425
3751 Flexible 3D Virtual Desktop Using Handles for Cloud Environments

Authors: J. K. Lee, S. L. Lee

Abstract:

Due to the improvement in performance of computer hardware and the development of operating systems, a multi-tasking for several programs has become one of the basic functions to computer users. It is natural for computer users to want more functional, convenient, and visual GUI functions (Graphic User Interface). In this paper, a 3D virtual desktop system was proposed to meet users’ requirements for cloud environments such as a virtual desktop function in the Windows environment. The proposed system uses the handles of the windows to hide or restore several windows. It connects the list of task spaces using the circular double linked list to manage the handles. Each handle list is registered in the corresponding task space being executed. The 3D virtual desktop is efficient and flexible in handling the numbers of task spaces and can help users to work under more comfortable environments. Acknowledgment: This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korea government (MSIP) (NRF-2015R1D1A1A01057680).

Keywords: virtual desktop, GUI, cloud, virtualization

Procedia PDF Downloads 184
3750 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 446
3749 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 82
3748 19th Century Exam, 21st Century Policing: An Examination of the New York State Civil Service and Police Officer Recruitment Efforts

Authors: A. Edwards

Abstract:

The civil service was created to reform the hiring process for public officials, changing the patronage system to a merit-based system. Though exam reforms continued throughout the 20th century, there have been few during the 21st century, particularly in New York state. In the case of police departments, the civil service exam has acted as a hindrance to its ‘21st Century Policing’ goals and new exam reform efforts have left out officers voices and concerns. Through in-depth interviews of current and retired police officers and local and state civil service administrators in Albany County in New York, this study seeks to understand police influence and insight regarding the civil service exam, placing some of the voice and input for civil service reform on police departments, instead of local and state bureaucrats. The study also looks at the relationship between civil service administrators and police departments. Using practice theory, the study seeks to understand the ways in which the civil service exam was defined in the 20th century and how it is out of step with current thinking while examining possible changes to the civil service exam that would lead to a more equitable hiring process and successful police departments.

Keywords: civil service, hiring, merit, policing

Procedia PDF Downloads 170
3747 A Design for Application of Mobile Agent Technology to MicroService Architecture

Authors: Masayuki Higashino, Toshiya Kawato, Takao Kawamura

Abstract:

A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services.

Keywords: mobile agent, microservice, web service, distributed system

Procedia PDF Downloads 136
3746 The Impact of Level and Consequence of Service Co-Recovery on Post-Recovery Satisfaction and Repurchase Intent

Authors: Chia-Ching Tsai

Abstract:

In service delivery, interpersonal interaction is the key to customer satisfaction, and apparently, the factor of human is critical in service delivery. Besides, customers quite care about the consequences of co-recovery. Thus, this research focuses on service failure caused by other customers and uses a 2x2 factorial design to investigate the impact of consequence and level of service co-recovery on post-recovery satisfaction and repurchase intent. 150 undergraduates were recruited as participants, and assigned to one of the four cells randomly. Every participant was requested to read the scenario and then rated the post-recovery satisfaction and repurchase intent. The results show that under the condition of failed co-recovery, level of co-recovery has no effect on post-recovery satisfaction, while under the condition of successful co-recovery, high-level co-recovery causes significantly higher post-recovery satisfaction than low-level co-recovery. Moreover, post-recovery satisfaction has significantly positive impact on repurchase intent. In the system of service delivery, customers interact with other customers frequently. Therefore, comparing with the literature, this research focuses on the service failure caused by other customers. This research also supplies a better understanding of customers’ view on consequences of different levels of co-recovery, which is helpful for the practitioners to make use of co-recovery.

Keywords: service failure, service co-recovery, consequence of co-recovery, level of co-recovery, post-recovery satisfaction, repurchase intent

Procedia PDF Downloads 394
3745 Using Confirmatory Factor Analysis to Test the Dimensional Structure of Tourism Service Quality

Authors: Ibrahim A. Elshaer, Alaa M. Shaker

Abstract:

Several previous empirical studies have operationalized service quality as either a multidimensional or unidimensional construct. While few earlier studies investigated some practices of the assumed dimensional structure of service quality, no study has been found to have tested the construct’s dimensionality using confirmatory factor analysis (CFA). To gain a better insight into the dimensional structure of service quality construct, this paper tests its dimensionality using three CFA models (higher order factor model, oblique factor model, and one factor model) on a set of data collected from 390 British tourists visited Egypt. The results of the three tests models indicate that service quality construct is multidimensional. This result helps resolving the problems that might arise from the lack of clarity concerning the dimensional structure of service quality, as without testing the dimensional structure of a measure, researchers cannot assume that the significant correlation is a result of factors measuring the same construct.

Keywords: service quality, dimensionality, confirmatory factor analysis, Egypt

Procedia PDF Downloads 559
3744 Visitors’ Attitude towards the Service Marketing Mix and Frequency of Visits to Bangpu Recreation Centre, Thailand

Authors: Siri-Orn Champatong

Abstract:

This research paper was aimed to examine the relationship between visitors’ attitude towards the service marketing mix and visitors’ frequency of visit to Bangpu Recreation Centre. Based on a large and uncalculated population, the number of samples was calculated according to the formula to obtain a total of 385 samples. In collecting the samples, systematic random sampling was applied and by using of a Likert five-scale questionnaire for, a total of 21 days to collect the needed information. Mean, Standard Deviation, and Pearson’s basic statistical correlations were utilized in analyzing the data. This study discovered a high level of visitors’ attitude product and service of Bangpu Recreation Centre, price, place, promotional activities, people who provided service and physical evidence of the centre. The attitude towards process of service was discovered to be at a medium level. Additionally, the finding of an examination of a relationship between visitors’ attitude towards service marketing mix and visitors’ frequency of visit to Bangpu Recreation Centre presented that product and service, people, physical evidence and process of service provision showed a relationship with the visitors’ frequency of visit to the centre per year.

Keywords: frequency of visit, visitor, service marketing mix, Bangpu Recreation Centre

Procedia PDF Downloads 346
3743 Inclusive Education in South African Universities: Pre-Service Teachers’ Experiences

Authors: Cina Mosito, Toyin Mary Adewumi, Charlene Nissen

Abstract:

One of the goals of inclusive education is to provide learners with suitable learning environments and prospects to best attain their potential. This study sought to determine the experiences of studying inclusive education on pre-service teachers’ teaching within the South African education context. A purposeful sample comprising 6 pre-service teachers was selected from a university of technology located in the Western Cape South Africa. Data were collected using open-ended questionnaires, which were exploratory in nature and analyzed thematically. The findings supported significant proportions of experiences as self-reported by pre-service teachers. The pre-service teachers’ experiences of studying inclusive education included inclusive education as an “eye-opener” to the fact that learners experiencing various barriers to learning can be accommodated in the regular classrooms, exposure to some aspects of inclusive education, such as diversity, learners’ rights, and curriculum differentiation. It was also revealed that studying inclusive education made pre-service teachers love and enjoy teaching more. The study shows that awareness of inclusive education has influenced pre-service teachers in South African schools.

Keywords: experience, inclusive education, pre-service teacher, South Africa

Procedia PDF Downloads 180
3742 New Technologies in Corporate Finance Management in the Digital Economy: Case of Kyrgyzstan

Authors: Marat Kozhomberdiev

Abstract:

The research will investigate the modern corporate finance management technologies currently used in the era of digitalization of the global economy and the degree to which financial institutions are utilizing these new technologies in the field of corporate finance management in Kyrgyzstan. The main purpose of the research is to reveal the role of financial management technologies as joint service centers, intercompany banks, specialized payment centers in the third-world country. Particularly, the analysis of the implacability of automated corporate finance management systems such as enterprise resource planning system (ERP) and treasury management system (TMS) will be carried out. Moreover, the research will investigate the role of cloud accounting systems in corporate finance management in Kyrgyz banks and whether it has any impact on the field of improving corporate finance management. The study will utilize a data collection process via surveying 3 banks in Kyrgyzstan, namely Mol-Bulak, RSK, and KICB. The banks were chosen based on their ownerships, such as state banks, private banks with local authorized capital, and private bank with international capital. The regression analysis will be utilized to reveal the correlation between the ownership of the bank and the use of new financial management technologies. The research will provide policy recommendations to both private and state banks on developing strategies for switching and utilizing modern corporate finance management technologies in their daily operations.

Keywords: digital economy, corporate finance, digital environment, digital technologies, cloud technologies, financial management

Procedia PDF Downloads 47
3741 3D Point Cloud Model Color Adjustment by Combining Terrestrial Laser Scanner and Close Range Photogrammetry Datasets

Authors: M. Pepe, S. Ackermann, L. Fregonese, C. Achille

Abstract:

3D models obtained with advanced survey techniques such as close-range photogrammetry and laser scanner are nowadays particularly appreciated in Cultural Heritage and Archaeology fields. In order to produce high quality models representing archaeological evidences and anthropological artifacts, the appearance of the model (i.e. color) beyond the geometric accuracy, is not a negligible aspect. The integration of the close-range photogrammetry survey techniques with the laser scanner is still a topic of study and research. By combining point cloud data sets of the same object generated with both technologies, or with the same technology but registered in different moment and/or natural light condition, could construct a final point cloud with accentuated color dissimilarities. In this paper, a methodology to uniform the different data sets, to improve the chromatic quality and to highlight further details by balancing the point color will be presented.

Keywords: color models, cultural heritage, laser scanner, photogrammetry

Procedia PDF Downloads 256
3740 Architecture for QoS Based Service Selection Using Local Approach

Authors: Gopinath Ganapathy, Chellammal Surianarayanan

Abstract:

Services are growing rapidly and generally they are aggregated into a composite service to accomplish complex business processes. There may be several services that offer the same required function of a particular task in a composite service. Hence a choice has to be made for selecting suitable services from alternative functionally similar services. Quality of Service (QoS)plays as a discriminating factor in selecting which component services should be selected to satisfy the quality requirements of a user during service composition. There are two categories of approaches for QoS based service selection, namely global and local approaches. Global approaches are known to be Non-Polynomial (NP) hard in time and offer poor scalability in large scale composition. As an alternative to global methods, local selection methods which reduce the search space by breaking up the large/complex problem of selecting services for the workflow into independent sub problems of selecting services for individual tasks are coming up. In this paper, distributed architecture for selecting services based on QoS using local selection is presented with an overview of local selection methodology. The architecture describes the core components, namely, selection manager and QoS manager needed to implement the local approach and their functions. Selection manager consists of two components namely constraint decomposer which decomposes the given global or workflow level constraints in local or task level constraints and service selector which selects appropriate service for each task with maximum utility, satisfying the corresponding local constraints. QoS manager manages the QoS information at two levels namely, service class level and individual service level. The architecture serves as an implementation model for local selection.

Keywords: architecture of service selection, local method for service selection, QoS based service selection, approaches for QoS based service selection

Procedia PDF Downloads 402